SlideShare a Scribd company logo
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2567-2571 ISSN: 2249-6645
www.ijmer.com 2567 | Page
N. Radha Krishnaiah1
, Mrs. P. Brundavani2
M. Tech VLSI System Design, AITS, Rajampet, Kadapa(DT)
Assistant Professor, Dept: ECE, AITS, Rajampet, Kadapa (DT)
Abstract: A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base
stations. When used, the jammer effectively disables cellular phones. These devices can be used in practically any location,
but are found primarily in places where a phone call would be particularly disruptive because silence is expected. But the
existing mobile phone jammers are having several defects so we are going to design a new mobile phone jammer using VLSI
Technology which will be more efficient than existing jammers.
Keywords: Jammers, Mobile Jammer, FPGA, RF Transmitter, RF Receiver, LCD, Frequency Jamming.
I. Introduction
A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations.
When used, the jammer effectively disables cellular phones. These devices can be used in practically any location, but are
found primarily in places where a phone call would be particularly disruptive because silence is expected.
Mobile Jammers were originally developed for law enforcement and the military to interrupt communications by criminals
and terrorists to foil the use of certain remotely detonated explosives. The civilian applications were apparent with growing
public resentment over usage of mobile phones in public areas on the rise & reckless invasion of privacy. Over time many
companies originally contracted todesign mobile jammers for government switched over to sell these devices to private
entities. As with other radio jamming, mobile jammers block mobile phone use by sending out radio waves along the same
frequencies that mobile phones use. This causes enough interference with the communication between mobile phones and
communicating towers to render the phones unusable. Upon activating mobile jammers, all mobile phones will indicate
"NO NETWORK”. Incoming calls are blocked as if the mobile phone were off. When the mobile jammers are turned off,
all mobile phones will automatically re-establish communications and provide full service. Mobile jammer's effect can vary
widely based on factors such as proximity to towers, indoor and outdoor settings, presence of buildings and landscape, even
temperature and humidity play a role.
The choice of mobile jammers are based on the required range starting with the personal pocket mobile jammer
that can be carried along with you to ensure undisrupted meeting with your client or a personal portable mobile jammer for
your room or medium power mobile jammer or high power mobile jammer for your organisation to very high power military
jammers to jam a large campuses.
Need & History of Jammers
The rapid proliferation of cell phones at the beginning of the 21st century to near ubiquitous status eventually raised
problems, such as their potential use to invade privacy or contribute to academic cheating. In addition, public backlash was
growing against the disruption cell phones introduced in daily life. While older analog cell phones often suffered from poor
reception and could even be disconnected by simple interference such as high frequency noise, increasingly sophisticated
digital phones have led to more elaborate counters. Cell phone jamming devices are an alternative to more expensive
measures against cell phones, such as Faraday cages, which are mostly suitable as built in protection for structures. They
were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists.
Some were also designed to foil the use of certain remotely detonated explosives. The civilian applications were apparent, so
over time many companies originally contracted to design jammers for government use switched over to sell these devices to
private entities. Since then, there has been a slow but steady increase in their purchase and use, especially in major
metropolitan areas.
As with other radio jamming, cell phone jammers block cell phone use by sending out radio waves along the same
frequencies that cellular phones use. This causes enough interference with the communication between cell phones and
towers to render the phones unusable. On most retail phones, the network would simply appear out of range. Most cell
phones use different bands to send and receive communications from towers (called frequency division duplexing, FDD).
Jammers can work by either disrupting phone to tower frequencies or tower to phone frequencies. Smaller handheld models
block all bands from 800 MHz to 1900 MHz within a 30-foot range (9 meters). Small devices tend to use the former method,
while larger more expensive models may interfere directly with the tower. The radius of cell phone jammers can range from
a dozen feet for pocket models to kilometers for more dedicated units. The TRJ-89 jammer can block cellular
communications for a 5-mile (8 km) radius.
Less energy is required to disrupt signal from tower to mobile phone than the signal from mobile phone to the tower
(also called base station), because the base station is located at larger distance from the jammer than the mobile phone and
that is why the signal from the tower is not as strong.
Older jammers sometimes were limited to working on phones using only analog or older digital mobile phone standards.
Newer models such as the double and triple band jammers can block all widely used systems (CDMA, iDEN, GSM, et al.)
and are even very effective against newer phones which hop to different frequencies and systems when interfered with. As
FPGA Based Wireless Jamming Networks
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2567-2571 ISSN: 2249-6645
www.ijmer.com 2568 | Page
the dominant network technology and frequencies used for mobile phones vary worldwide, some work only in specific
regions such as Europe or North America. Some Cell Phone Jammers have been introduced to some State Prisons in the
United States. Cell phones that have been sneaked into prison pose a security risk for guards and property owners living
nearby.
Problems in Existing Jammers
Envisage a situation where you are essaying to dial 911 and cannot get through because someone has a cell phone
jammer with him. Otherwise, you want to call the police to avoid a robbery in your building but the robber has a cell phone
jammer with him. So, what could you do in such a dangerous situation? Jamming devices utilized with some thoughts may
be much more useful than just a method of enjoyment. To remove these hazards a new efficient type of mobile jammer is
proposed using FPGA. In this new design we are going to disable the keypad, MIC, speaker, will be only disabled by using
the FPGA & we doing it using a 400MHz frequency which has an public license so there is no need of licensing.
Some of the Common Problems are listed below:
 The person didn’t even get the notification of a call or message when he is in the jammer coverage area.
 The person cannot be contacted for some urgent information also.
 Nearly the mobile phone will be in Switch Off state.
 There will not be any notification that the user mobile has been jammed.
Proposed System Design
In most countries, it is illegal for private citizens to jam cell-phone transmission, but some countries are allowing
businesses and government organizations to install jammers in areas where cell-phone use is seen as a public nuisance. In
December 2004, France legalized cell-phone jammers in movie theaters, concert halls and other places with performances.
France is finalizing technology that will let calls to emergency services go through. India has installed jammers in parliament
and some prisons. It has been reported that universities in Italy have adopted the technology to prevent cheating. Students
were taking photos of tests with their camera phones and sending them to classmates.
Alternatives to Cell Phone Jamming
While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against
passive cell-phone blocking. That means using things like wallpaper or building materials embedded with metal fragments to
prevent cell-phone signals from reaching inside or outside the room. Some buildings have designs that block radio signals by
accident due to thick concrete walls or a steel skeleton. Companies are working on devices that control a cell phone but do
not "jam the signal." One device sends incoming calls to voicemail and blocks outgoing calls. The argument is that the phone
still works, so it is technically not being jammed. It is a legal gray area that has not been ruled on by the FCC as of April
2005.
Cell-phone alerters are available that indicate the presence of a cell-phone signal. These have been used in
hospitals where cell-phone signals could interfere with sensitive medical equipment.
Block Diagram
Figure 1: Mobile Jammer General Block Diagram
FPGA
A Field-programmable Gate Array (FPGA) is an integrated circuit designed to be configured by the customer or
designer after manufacturing—hence "field-programmable". The FPGA configuration is generally specified using a
hardware description language (HDL), similar to that used for an application-specific integrated circuit (ASIC) (circuit
diagrams were previously used to specify the configuration, as they were for ASICs, but this is increasingly rare). FPGAs
can be used to implement any logical function that an ASIC could perform. The ability to update the functionality after
FPGAMobile
Controller
Unit
RF
Receiver
Jammer Unit
RF
Transmitter
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2567-2571 ISSN: 2249-6645
www.ijmer.com 2569 | Page
shipping, partial re-configuration of the portion of the design[1]
and the low non-recurring engineering costs relative to an
ASIC design (notwithstanding the generally higher unit cost), offer advantages for many applications.
FPGA’s contain programmable logic components called "logic blocks", and a hierarchy of reconfigurable
interconnects that allow the blocks to be "wired together"—somewhat like many (changeable) logic gates that can be inter-
wired in (many) different configurations. Logic blocks can be configured to perform complex combinational functions, or
merely simple logic gates like AND and XOR. In most FPGAs, the logic blocks also include memory elements, which may
be simple flip-flops or more complete blocks of memory.
In addition to digital functions, some FPGAs have analog features. The most common analog feature is
programmable slew rate and drive strength on each output pin, allowing the engineer to set slow rates on lightly loaded pins
that would otherwise ring unacceptably, and to set stronger, faster rates on heavily loaded pins on high-speed channels that
would otherwise run too slow. Another relatively common analog feature is differential comparators on input pins designed
to be connected to differential signaling channels. A few "mixed signal FPGAs" have integrated peripheral Analog-to-Digital
Converters (ADCs) and Digital-to-Analog Converters (DACs) with analog signal conditioning blocks allowing them to
operate as a system-on-a-chip. Such devices blur the line between an FPGA, which carries digital ones and zeros on its
internal programmable interconnect fabric, and field-programmable analog array (FPAA), which carries analog values on its
internal programmable interconnect fabric.
RF Encoder and Decoder
General Encoder and Decoder Operations
The Holtek HT-12E IC encodes 12-bits of information and serially transmits this data on receipt of a Transmit
Enable, or a LOW signal on pin-14 /TE. Pin-17 the D_OUT pin of the HT-12E serially transmits whatever data is available
on pins 10,11,12 and 13, or D0,D1,D2 and D3. Data is transmitted at a frequency selected by the external oscillator resistor.
By using the switches attached to the data pins on the HT-12E, as shown in the schematic, we can select the information in
binary format to send to the receiver. The receiver section consists of the Ming RE-99 and the HT-12D decoder IC. The
DATA_IN pin-14 of the HT-12D reads the 12-bit binary information sent by the HT-12E and then places this data on its
output pins. Pins 10,11,12 and 13 are the data out pins of the HT-12D, D0,D1,D2 and D3. The HT-12D receives the 12-bit
word and interprets the first 8-bits as address and the last 4-bits as data. Pins 1-8 of the HT-12E are the address pins. Using
the address pins of the HT-12E, we can select different addresses for up to 256 receivers. The address is determined by
setting pins 1-8 on the HT-12E to ground, or just leaving them open. The address selected on the HT-12E circuit must match
the address selected on the HT-12D circuit (exactly), or the information will be ignored by the receiving circuit.
When the received addresses from the encoder matches the decoders, the Valid Transmission pin-17 of the HT-12D
will go HIGH to indicate that a valid transmission has been received and the 4-bits of data are latched to the data output pins,
10-13. The transistor circuit shown in the schematic will use the VT, or valid transmission pin to light the LED. When the
VT pin goes HIGH it turns on the 2N2222 transistor which in turn delivers power to the LED providing a visual indication of
a valid transmission reception.
Controlling the Project with a FPGA
Using these RF transmitter & receiver circuits with a FPGA would be simple. We can simply replace the switches
used for selecting data on the HT-12E with the output pins of the FPGA. Also we can use another output pin to select TE, or
transmit enable on the HT-12E. By taking pin-14 LOW we cause the transmitter section to transmit the data on pins 10-13.
To receive information simply hook up the HT-12D output pins to the FPGA. The VT, or valid transmission pin of the HT-
12D could signal the FPGA to grab the 4-bits of data from the data output pins. If you are using a FPGA with interrupt
capabilities, use the VT pin to cause a jump to an interrupt vector and process the received data.
The HT-12D data output pins will LATCH and remain in this state until another valid transmission is received. NOTE: You
will notice that in both schematics each of the Holtek chips have resistors attached to pins 15 and 16. These resistors must be
the exact values shown in the schematic. These resistors set the internal oscillators of the HT-12E/HT-12D. It is
recommended that you choose a 1% resistor for each of these resistors to ensure the correct circuit oscillation.
Range of Operation
The normal operating range using (only) the LOOP TRACE ANTENNA on the transmitter board is about 50 feet.
By connecting a quarter wave antenna using 9.36 inches of 22 gauge wire to both circuits, you can extend this range to
several hundred feet. Your actual range may vary due to your finished circuit design and environmental conditions. The
transistors and diodes can be substituted with any common equivalent type. These will normally depend on the types and
capacities of the particular loads you want to control and should be selected accordingly for your intended application.
RF Details
The TWS-434 and RWS-434 are extremely small, and are excellent for applications requiring short-range RF
remote controls. The transmitter module is only 1/3 the size of a standard postage stamp, and can easily be placed inside a
small plastic enclosure. TWS-434: The transmitter output is up to 8mW at 433.92MHz with a range of approximately 400
foot (open area) outdoors. Indoors, the range is approximately 200 foot, and will go through most walls.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2567-2571 ISSN: 2249-6645
www.ijmer.com 2570 | Page
Fig2: RF 434 Mhz Transmitter. Modulation: ASK
The TWS-434 transmitter accepts both linear and digital inputs, can operate from 1.5 to 12 Volts-DC, and makes
building a miniature hand-held RF transmitter very easy. The TWS-434 is approximately the size of a standard postage
stamp.
Fig 3: RF-434 Pin Diagram
LCD display
More FPGA devices are using ‘smart LCD’ displays to output visual information. The following discussion covers
the connection of a 16x2 LCD display to a PIC FPGA. LCD displays designed around Hitachi’s. LCD HD44780 module,
are inexpensive, easy to use, and it is even possible to produce a readout using the 8x80 pixels of the display. Hitachi LCD
display have a standard ASCII set of a characters plus Japanies, Greek and Mathematical symbols
For a 8-bit data bus, the display requires a +5 supply plus 11 I/O lines. For a 4_bit data bus it only requires the
supply lines plus seven extra lines. When the LCD display is not enabled, data lines are tri-state which means they are in a
state of high impedence and this means they do not interfere with the operation of the display is not being addressed.
Reading data from the LCD is done in the same way, but control line R/W has to be high. When we send a high to
the LCD, it will reset and wait for instructions. Typical instructions sent to LCD display after a reset are: turning on a
display, turning on a cursor and writing characters from left to right. When the LCD is initialized, it is ready to continue
receiving data or instructions. If it receives character, it will write it on the display and move the cursor one space to the
right. The Cursor marks the next location where a character will be written. When we want to write a string of characters,
first we need to set up the starting address, and then send one character at a time. Characters that can be shown on the display
are stored in data display (DD) RAM. The size of DDRAM is 80 bytes.
Fig 4(a)
Fig 4(b)
Fig 4(a),4(b): Pictures of our Proposed Mobile jammer
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2567-2571 ISSN: 2249-6645
www.ijmer.com 2571 | Page
II. Conclusions
Our Proposed Mobile Jammer is working perfectly without affecting the signals from the network. So that the user
can able to get the notifications regarding Calls and messages (SMS, MMS). The notification about the calls will be given to
the user. If there is any urgent call as we can get the notification we can go out from the coverage area and use our mobile as
it is. No need of licensing. Implementation of our newly designed jammers is easy. As we are using a FPGA, our hardware
can be modified whenever we want. Can be implemented where silence to be maintained. Future modifications are possible
easily. Misuse of mobiles can be restricted. Thus our Mobile jammers can provide higher efficiency with lower misuses.
References
[1]. D. Adamy. EW 101: A first course in electronic warfare. Artech House Publishers, 2001.
[2]. I. Akyildiz, W. Lee, M. Vuran, and S. Mohanty. Next generation dynamic spectrum access cognitive radio wireless networks: A
survey. Computer Networks, 50(13):2127–2159, 2006.
[3]. L. C. Baird, W. L. Bahn, M. D. Collins, M. C. Carlisle, and S. C. Butler. Keyless jam resistance. In Proceedings of the 2007 IEEE
Workshop on Information Assurance United States Military Academy, 2007.
[4]. T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of the ACM
MobiHoc, pages 120–130, 2006.
[5]. M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based anti-jamming techniques in sensor networks. IEEE Transactions on
Mobile Computing, 6(1):100–114, 2007.
[6]. A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: resilience and identification of traitors. In Proceedings of
ISIT, 2007.
[7]. J. T. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proceedings of the
MobiCom, pages 346–349, 2007.
N. Radha Krishnaiah , born in Rajampet, A.P., India in 1989. He received B.Tech Degree in Electronics
and Communication Engineering from J.N.T University Anantapur, India. Presently pursuing M.Tech (VLSI SYSTEM
DESIGN) from Annamcharya Institute of Technology and Sciences, Rajampet, A.P., India. His research interests include
VLSI, Embedded Systems
I did this project under the guidance of Mrs. P. Brundavani born in Proddatur, A.P., India in 1982. She
received B.Tech Degree in Electronics and Communication Engineering from G Pullareddy Engineering College, Kurnool,
A.P., India in 2004. Presently working as an associative professor in Annamacharya Institute of Technology and Sciences,
Rajampet, India. She got her M.Tech from JNTU Anantapur, A.P., India. Her research area is in Digital IC Design, VLSI
Technology, Testing and Testability, Microprocessor.

More Related Content

What's hot

Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
Manikandan Jeeva
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
masoommehsoud1
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
Sudhanshu kumar Sah
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
Farhanullah khan
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerharrynik
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Komal Srivastava
 
Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
Amit sundaray
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
Professional Packers & Movers Pvt. Ltd.
 
IRJET- Signal Jammer in Military Operations
IRJET-  	  Signal Jammer in Military OperationsIRJET-  	  Signal Jammer in Military Operations
IRJET- Signal Jammer in Military Operations
IRJET Journal
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
Venky Venkatesh
 
Mobile Signal jammer
Mobile Signal jammerMobile Signal jammer
Mobile Signal jammer
Jubayer Rahman
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Abhishek Gupta
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jammingMahmoud Abdeen
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
PREMKUMAR
 
14 598
14 59814 598

What's hot (20)

Mobile Jammer_2
Mobile Jammer_2Mobile Jammer_2
Mobile Jammer_2
 
Cell phone jammer presentation
Cell phone jammer presentationCell phone jammer presentation
Cell phone jammer presentation
 
MOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMERMOBILE SIGNAL JAMMER
MOBILE SIGNAL JAMMER
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Mobile Jammer
Mobile JammerMobile Jammer
Mobile Jammer
 
Mobile jammer
Mobile jammer Mobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer report
Mobile jammer reportMobile jammer report
Mobile jammer report
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
IRJET- Signal Jammer in Military Operations
IRJET-  	  Signal Jammer in Military OperationsIRJET-  	  Signal Jammer in Military Operations
IRJET- Signal Jammer in Military Operations
 
Mobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisettyMobile jammer by venkatesh akkisetty
Mobile jammer by venkatesh akkisetty
 
Mobile Signal jammer
Mobile Signal jammerMobile Signal jammer
Mobile Signal jammer
 
Mobile Jammer ppt
Mobile Jammer pptMobile Jammer ppt
Mobile Jammer ppt
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
 
14 598
14 59814 598
14 598
 

Viewers also liked

A Novel Approach for User Search Results Using Feedback Sessions
A Novel Approach for User Search Results Using Feedback  SessionsA Novel Approach for User Search Results Using Feedback  Sessions
A Novel Approach for User Search Results Using Feedback Sessions
IJMER
 
Optimization of Surface Impedance for Reducing Surface Waves between Antennas
Optimization of Surface Impedance for Reducing Surface Waves between AntennasOptimization of Surface Impedance for Reducing Surface Waves between Antennas
Optimization of Surface Impedance for Reducing Surface Waves between Antennas
IJMER
 
Dq2644974501
Dq2644974501Dq2644974501
Dq2644974501IJMER
 
Virtualization Technology using Virtual Machines for Cloud Computing
Virtualization Technology using Virtual Machines for Cloud ComputingVirtualization Technology using Virtual Machines for Cloud Computing
Virtualization Technology using Virtual Machines for Cloud Computing
IJMER
 
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOSPROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
Ricardo Vega Gonzalez
 
ingeniería de arquitectura de facebook andrea serna estic 56
ingeniería de arquitectura de facebook andrea serna estic 56ingeniería de arquitectura de facebook andrea serna estic 56
ingeniería de arquitectura de facebook andrea serna estic 56
andrea_matinfo56ETM
 
Bv31291295
Bv31291295Bv31291295
Bv31291295IJMER
 
A Novel Data mining Technique to Discover Patterns from Huge Text Corpus
A Novel Data mining Technique to Discover Patterns from Huge  Text CorpusA Novel Data mining Technique to Discover Patterns from Huge  Text Corpus
A Novel Data mining Technique to Discover Patterns from Huge Text Corpus
IJMER
 
Receiver Module of Smart power monitoring and metering distribution system u...
Receiver Module of Smart power monitoring and metering  distribution system u...Receiver Module of Smart power monitoring and metering  distribution system u...
Receiver Module of Smart power monitoring and metering distribution system u...
IJMER
 
Dh31504508
Dh31504508Dh31504508
Dh31504508IJMER
 
Presentation bm tahun 1 unit 4 2012
Presentation bm tahun 1 unit 4 2012Presentation bm tahun 1 unit 4 2012
Presentation bm tahun 1 unit 4 2012凤 葆
 
Db31463471
Db31463471Db31463471
Db31463471IJMER
 
Monitor the Unmeasurable
Monitor the UnmeasurableMonitor the Unmeasurable
Monitor the Unmeasurable
Jennifer Davis
 
Finite Element Analysis of Convective Micro Polar Fluid Flow through a Porou...
Finite Element Analysis of Convective Micro Polar Fluid Flow  through a Porou...Finite Element Analysis of Convective Micro Polar Fluid Flow  through a Porou...
Finite Element Analysis of Convective Micro Polar Fluid Flow through a Porou...
IJMER
 
Acc 421 final exam
Acc 421 final examAcc 421 final exam
Acc 421 final examliam111221
 
Application of Neuro-Fuzzy System to Evaluate Sustainability in Highway Design
Application of Neuro-Fuzzy System to Evaluate Sustainability in Highway DesignApplication of Neuro-Fuzzy System to Evaluate Sustainability in Highway Design
Application of Neuro-Fuzzy System to Evaluate Sustainability in Highway Design
IJMER
 

Viewers also liked (20)

A Novel Approach for User Search Results Using Feedback Sessions
A Novel Approach for User Search Results Using Feedback  SessionsA Novel Approach for User Search Results Using Feedback  Sessions
A Novel Approach for User Search Results Using Feedback Sessions
 
Optimization of Surface Impedance for Reducing Surface Waves between Antennas
Optimization of Surface Impedance for Reducing Surface Waves between AntennasOptimization of Surface Impedance for Reducing Surface Waves between Antennas
Optimization of Surface Impedance for Reducing Surface Waves between Antennas
 
Dq2644974501
Dq2644974501Dq2644974501
Dq2644974501
 
South africa
South africaSouth africa
South africa
 
Virtualization Technology using Virtual Machines for Cloud Computing
Virtualization Technology using Virtual Machines for Cloud ComputingVirtualization Technology using Virtual Machines for Cloud Computing
Virtualization Technology using Virtual Machines for Cloud Computing
 
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOSPROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
 
ingeniería de arquitectura de facebook andrea serna estic 56
ingeniería de arquitectura de facebook andrea serna estic 56ingeniería de arquitectura de facebook andrea serna estic 56
ingeniería de arquitectura de facebook andrea serna estic 56
 
new zealand
new zealandnew zealand
new zealand
 
Bv31291295
Bv31291295Bv31291295
Bv31291295
 
A Novel Data mining Technique to Discover Patterns from Huge Text Corpus
A Novel Data mining Technique to Discover Patterns from Huge  Text CorpusA Novel Data mining Technique to Discover Patterns from Huge  Text Corpus
A Novel Data mining Technique to Discover Patterns from Huge Text Corpus
 
Receiver Module of Smart power monitoring and metering distribution system u...
Receiver Module of Smart power monitoring and metering  distribution system u...Receiver Module of Smart power monitoring and metering  distribution system u...
Receiver Module of Smart power monitoring and metering distribution system u...
 
Kingston
KingstonKingston
Kingston
 
Dh31504508
Dh31504508Dh31504508
Dh31504508
 
Presentation bm tahun 1 unit 4 2012
Presentation bm tahun 1 unit 4 2012Presentation bm tahun 1 unit 4 2012
Presentation bm tahun 1 unit 4 2012
 
Db31463471
Db31463471Db31463471
Db31463471
 
Misty holcomb
Misty holcombMisty holcomb
Misty holcomb
 
Monitor the Unmeasurable
Monitor the UnmeasurableMonitor the Unmeasurable
Monitor the Unmeasurable
 
Finite Element Analysis of Convective Micro Polar Fluid Flow through a Porou...
Finite Element Analysis of Convective Micro Polar Fluid Flow  through a Porou...Finite Element Analysis of Convective Micro Polar Fluid Flow  through a Porou...
Finite Element Analysis of Convective Micro Polar Fluid Flow through a Porou...
 
Acc 421 final exam
Acc 421 final examAcc 421 final exam
Acc 421 final exam
 
Application of Neuro-Fuzzy System to Evaluate Sustainability in Highway Design
Application of Neuro-Fuzzy System to Evaluate Sustainability in Highway DesignApplication of Neuro-Fuzzy System to Evaluate Sustainability in Highway Design
Application of Neuro-Fuzzy System to Evaluate Sustainability in Highway Design
 

Similar to FPGA Based Wireless Jamming Networks

Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
Ronson Fernandes
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer reportSameer Gupta
 
Presentation1
Presentation1Presentation1
Presentation1
poojithakannikanti
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Avay Minni
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd Iaetsd
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammerAlok Gupta
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
Prejith Pavanan
 
mobilejammer
mobilejammermobilejammer
mobilejammer
Naga Dinesh
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
LingaSwamy10
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
ijtsrd
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
DyarAbubakr
 
Govind
GovindGovind
Govind
Garima Singh
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
Chandu Pawar
 
WIFI CAMERA JAMMER.pdf
WIFI CAMERA JAMMER.pdfWIFI CAMERA JAMMER.pdf
WIFI CAMERA JAMMER.pdf
Boney Maundu Slim
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
mgnboy
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
Pula Likhitha
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
VinodDoddaka
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
swathi reddy
 

Similar to FPGA Based Wireless Jamming Networks (20)

Cellphone Jammer
Cellphone JammerCellphone Jammer
Cellphone Jammer
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
Presentation1
Presentation1Presentation1
Presentation1
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 gIaetsd advanced mobile signal jammer for gsm, cdma and 3 g
Iaetsd advanced mobile signal jammer for gsm, cdma and 3 g
 
Mobile phone jammer
Mobile phone jammerMobile phone jammer
Mobile phone jammer
 
Intelligent Jammer
Intelligent JammerIntelligent Jammer
Intelligent Jammer
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
Signal.pptx
Signal.pptxSignal.pptx
Signal.pptx
 
Govind
GovindGovind
Govind
 
4g
4g4g
4g
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
WIFI CAMERA JAMMER.pdf
WIFI CAMERA JAMMER.pdfWIFI CAMERA JAMMER.pdf
WIFI CAMERA JAMMER.pdf
 
Gsm jammer 2
Gsm jammer 2Gsm jammer 2
Gsm jammer 2
 
Pxc3871282
Pxc3871282Pxc3871282
Pxc3871282
 
Cell phone jammer
Cell phone jammerCell phone jammer
Cell phone jammer
 
Mobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptxMobile Jammer ppt 19030 -EC-229.pptx
Mobile Jammer ppt 19030 -EC-229.pptx
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

FPGA Based Wireless Jamming Networks

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2567-2571 ISSN: 2249-6645 www.ijmer.com 2567 | Page N. Radha Krishnaiah1 , Mrs. P. Brundavani2 M. Tech VLSI System Design, AITS, Rajampet, Kadapa(DT) Assistant Professor, Dept: ECE, AITS, Rajampet, Kadapa (DT) Abstract: A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations. When used, the jammer effectively disables cellular phones. These devices can be used in practically any location, but are found primarily in places where a phone call would be particularly disruptive because silence is expected. But the existing mobile phone jammers are having several defects so we are going to design a new mobile phone jammer using VLSI Technology which will be more efficient than existing jammers. Keywords: Jammers, Mobile Jammer, FPGA, RF Transmitter, RF Receiver, LCD, Frequency Jamming. I. Introduction A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations. When used, the jammer effectively disables cellular phones. These devices can be used in practically any location, but are found primarily in places where a phone call would be particularly disruptive because silence is expected. Mobile Jammers were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists to foil the use of certain remotely detonated explosives. The civilian applications were apparent with growing public resentment over usage of mobile phones in public areas on the rise & reckless invasion of privacy. Over time many companies originally contracted todesign mobile jammers for government switched over to sell these devices to private entities. As with other radio jamming, mobile jammers block mobile phone use by sending out radio waves along the same frequencies that mobile phones use. This causes enough interference with the communication between mobile phones and communicating towers to render the phones unusable. Upon activating mobile jammers, all mobile phones will indicate "NO NETWORK”. Incoming calls are blocked as if the mobile phone were off. When the mobile jammers are turned off, all mobile phones will automatically re-establish communications and provide full service. Mobile jammer's effect can vary widely based on factors such as proximity to towers, indoor and outdoor settings, presence of buildings and landscape, even temperature and humidity play a role. The choice of mobile jammers are based on the required range starting with the personal pocket mobile jammer that can be carried along with you to ensure undisrupted meeting with your client or a personal portable mobile jammer for your room or medium power mobile jammer or high power mobile jammer for your organisation to very high power military jammers to jam a large campuses. Need & History of Jammers The rapid proliferation of cell phones at the beginning of the 21st century to near ubiquitous status eventually raised problems, such as their potential use to invade privacy or contribute to academic cheating. In addition, public backlash was growing against the disruption cell phones introduced in daily life. While older analog cell phones often suffered from poor reception and could even be disconnected by simple interference such as high frequency noise, increasingly sophisticated digital phones have led to more elaborate counters. Cell phone jamming devices are an alternative to more expensive measures against cell phones, such as Faraday cages, which are mostly suitable as built in protection for structures. They were originally developed for law enforcement and the military to interrupt communications by criminals and terrorists. Some were also designed to foil the use of certain remotely detonated explosives. The civilian applications were apparent, so over time many companies originally contracted to design jammers for government use switched over to sell these devices to private entities. Since then, there has been a slow but steady increase in their purchase and use, especially in major metropolitan areas. As with other radio jamming, cell phone jammers block cell phone use by sending out radio waves along the same frequencies that cellular phones use. This causes enough interference with the communication between cell phones and towers to render the phones unusable. On most retail phones, the network would simply appear out of range. Most cell phones use different bands to send and receive communications from towers (called frequency division duplexing, FDD). Jammers can work by either disrupting phone to tower frequencies or tower to phone frequencies. Smaller handheld models block all bands from 800 MHz to 1900 MHz within a 30-foot range (9 meters). Small devices tend to use the former method, while larger more expensive models may interfere directly with the tower. The radius of cell phone jammers can range from a dozen feet for pocket models to kilometers for more dedicated units. The TRJ-89 jammer can block cellular communications for a 5-mile (8 km) radius. Less energy is required to disrupt signal from tower to mobile phone than the signal from mobile phone to the tower (also called base station), because the base station is located at larger distance from the jammer than the mobile phone and that is why the signal from the tower is not as strong. Older jammers sometimes were limited to working on phones using only analog or older digital mobile phone standards. Newer models such as the double and triple band jammers can block all widely used systems (CDMA, iDEN, GSM, et al.) and are even very effective against newer phones which hop to different frequencies and systems when interfered with. As FPGA Based Wireless Jamming Networks
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2567-2571 ISSN: 2249-6645 www.ijmer.com 2568 | Page the dominant network technology and frequencies used for mobile phones vary worldwide, some work only in specific regions such as Europe or North America. Some Cell Phone Jammers have been introduced to some State Prisons in the United States. Cell phones that have been sneaked into prison pose a security risk for guards and property owners living nearby. Problems in Existing Jammers Envisage a situation where you are essaying to dial 911 and cannot get through because someone has a cell phone jammer with him. Otherwise, you want to call the police to avoid a robbery in your building but the robber has a cell phone jammer with him. So, what could you do in such a dangerous situation? Jamming devices utilized with some thoughts may be much more useful than just a method of enjoyment. To remove these hazards a new efficient type of mobile jammer is proposed using FPGA. In this new design we are going to disable the keypad, MIC, speaker, will be only disabled by using the FPGA & we doing it using a 400MHz frequency which has an public license so there is no need of licensing. Some of the Common Problems are listed below:  The person didn’t even get the notification of a call or message when he is in the jammer coverage area.  The person cannot be contacted for some urgent information also.  Nearly the mobile phone will be in Switch Off state.  There will not be any notification that the user mobile has been jammed. Proposed System Design In most countries, it is illegal for private citizens to jam cell-phone transmission, but some countries are allowing businesses and government organizations to install jammers in areas where cell-phone use is seen as a public nuisance. In December 2004, France legalized cell-phone jammers in movie theaters, concert halls and other places with performances. France is finalizing technology that will let calls to emergency services go through. India has installed jammers in parliament and some prisons. It has been reported that universities in Italy have adopted the technology to prevent cheating. Students were taking photos of tests with their camera phones and sending them to classmates. Alternatives to Cell Phone Jamming While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking. That means using things like wallpaper or building materials embedded with metal fragments to prevent cell-phone signals from reaching inside or outside the room. Some buildings have designs that block radio signals by accident due to thick concrete walls or a steel skeleton. Companies are working on devices that control a cell phone but do not "jam the signal." One device sends incoming calls to voicemail and blocks outgoing calls. The argument is that the phone still works, so it is technically not being jammed. It is a legal gray area that has not been ruled on by the FCC as of April 2005. Cell-phone alerters are available that indicate the presence of a cell-phone signal. These have been used in hospitals where cell-phone signals could interfere with sensitive medical equipment. Block Diagram Figure 1: Mobile Jammer General Block Diagram FPGA A Field-programmable Gate Array (FPGA) is an integrated circuit designed to be configured by the customer or designer after manufacturing—hence "field-programmable". The FPGA configuration is generally specified using a hardware description language (HDL), similar to that used for an application-specific integrated circuit (ASIC) (circuit diagrams were previously used to specify the configuration, as they were for ASICs, but this is increasingly rare). FPGAs can be used to implement any logical function that an ASIC could perform. The ability to update the functionality after FPGAMobile Controller Unit RF Receiver Jammer Unit RF Transmitter
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2567-2571 ISSN: 2249-6645 www.ijmer.com 2569 | Page shipping, partial re-configuration of the portion of the design[1] and the low non-recurring engineering costs relative to an ASIC design (notwithstanding the generally higher unit cost), offer advantages for many applications. FPGA’s contain programmable logic components called "logic blocks", and a hierarchy of reconfigurable interconnects that allow the blocks to be "wired together"—somewhat like many (changeable) logic gates that can be inter- wired in (many) different configurations. Logic blocks can be configured to perform complex combinational functions, or merely simple logic gates like AND and XOR. In most FPGAs, the logic blocks also include memory elements, which may be simple flip-flops or more complete blocks of memory. In addition to digital functions, some FPGAs have analog features. The most common analog feature is programmable slew rate and drive strength on each output pin, allowing the engineer to set slow rates on lightly loaded pins that would otherwise ring unacceptably, and to set stronger, faster rates on heavily loaded pins on high-speed channels that would otherwise run too slow. Another relatively common analog feature is differential comparators on input pins designed to be connected to differential signaling channels. A few "mixed signal FPGAs" have integrated peripheral Analog-to-Digital Converters (ADCs) and Digital-to-Analog Converters (DACs) with analog signal conditioning blocks allowing them to operate as a system-on-a-chip. Such devices blur the line between an FPGA, which carries digital ones and zeros on its internal programmable interconnect fabric, and field-programmable analog array (FPAA), which carries analog values on its internal programmable interconnect fabric. RF Encoder and Decoder General Encoder and Decoder Operations The Holtek HT-12E IC encodes 12-bits of information and serially transmits this data on receipt of a Transmit Enable, or a LOW signal on pin-14 /TE. Pin-17 the D_OUT pin of the HT-12E serially transmits whatever data is available on pins 10,11,12 and 13, or D0,D1,D2 and D3. Data is transmitted at a frequency selected by the external oscillator resistor. By using the switches attached to the data pins on the HT-12E, as shown in the schematic, we can select the information in binary format to send to the receiver. The receiver section consists of the Ming RE-99 and the HT-12D decoder IC. The DATA_IN pin-14 of the HT-12D reads the 12-bit binary information sent by the HT-12E and then places this data on its output pins. Pins 10,11,12 and 13 are the data out pins of the HT-12D, D0,D1,D2 and D3. The HT-12D receives the 12-bit word and interprets the first 8-bits as address and the last 4-bits as data. Pins 1-8 of the HT-12E are the address pins. Using the address pins of the HT-12E, we can select different addresses for up to 256 receivers. The address is determined by setting pins 1-8 on the HT-12E to ground, or just leaving them open. The address selected on the HT-12E circuit must match the address selected on the HT-12D circuit (exactly), or the information will be ignored by the receiving circuit. When the received addresses from the encoder matches the decoders, the Valid Transmission pin-17 of the HT-12D will go HIGH to indicate that a valid transmission has been received and the 4-bits of data are latched to the data output pins, 10-13. The transistor circuit shown in the schematic will use the VT, or valid transmission pin to light the LED. When the VT pin goes HIGH it turns on the 2N2222 transistor which in turn delivers power to the LED providing a visual indication of a valid transmission reception. Controlling the Project with a FPGA Using these RF transmitter & receiver circuits with a FPGA would be simple. We can simply replace the switches used for selecting data on the HT-12E with the output pins of the FPGA. Also we can use another output pin to select TE, or transmit enable on the HT-12E. By taking pin-14 LOW we cause the transmitter section to transmit the data on pins 10-13. To receive information simply hook up the HT-12D output pins to the FPGA. The VT, or valid transmission pin of the HT- 12D could signal the FPGA to grab the 4-bits of data from the data output pins. If you are using a FPGA with interrupt capabilities, use the VT pin to cause a jump to an interrupt vector and process the received data. The HT-12D data output pins will LATCH and remain in this state until another valid transmission is received. NOTE: You will notice that in both schematics each of the Holtek chips have resistors attached to pins 15 and 16. These resistors must be the exact values shown in the schematic. These resistors set the internal oscillators of the HT-12E/HT-12D. It is recommended that you choose a 1% resistor for each of these resistors to ensure the correct circuit oscillation. Range of Operation The normal operating range using (only) the LOOP TRACE ANTENNA on the transmitter board is about 50 feet. By connecting a quarter wave antenna using 9.36 inches of 22 gauge wire to both circuits, you can extend this range to several hundred feet. Your actual range may vary due to your finished circuit design and environmental conditions. The transistors and diodes can be substituted with any common equivalent type. These will normally depend on the types and capacities of the particular loads you want to control and should be selected accordingly for your intended application. RF Details The TWS-434 and RWS-434 are extremely small, and are excellent for applications requiring short-range RF remote controls. The transmitter module is only 1/3 the size of a standard postage stamp, and can easily be placed inside a small plastic enclosure. TWS-434: The transmitter output is up to 8mW at 433.92MHz with a range of approximately 400 foot (open area) outdoors. Indoors, the range is approximately 200 foot, and will go through most walls.
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2567-2571 ISSN: 2249-6645 www.ijmer.com 2570 | Page Fig2: RF 434 Mhz Transmitter. Modulation: ASK The TWS-434 transmitter accepts both linear and digital inputs, can operate from 1.5 to 12 Volts-DC, and makes building a miniature hand-held RF transmitter very easy. The TWS-434 is approximately the size of a standard postage stamp. Fig 3: RF-434 Pin Diagram LCD display More FPGA devices are using ‘smart LCD’ displays to output visual information. The following discussion covers the connection of a 16x2 LCD display to a PIC FPGA. LCD displays designed around Hitachi’s. LCD HD44780 module, are inexpensive, easy to use, and it is even possible to produce a readout using the 8x80 pixels of the display. Hitachi LCD display have a standard ASCII set of a characters plus Japanies, Greek and Mathematical symbols For a 8-bit data bus, the display requires a +5 supply plus 11 I/O lines. For a 4_bit data bus it only requires the supply lines plus seven extra lines. When the LCD display is not enabled, data lines are tri-state which means they are in a state of high impedence and this means they do not interfere with the operation of the display is not being addressed. Reading data from the LCD is done in the same way, but control line R/W has to be high. When we send a high to the LCD, it will reset and wait for instructions. Typical instructions sent to LCD display after a reset are: turning on a display, turning on a cursor and writing characters from left to right. When the LCD is initialized, it is ready to continue receiving data or instructions. If it receives character, it will write it on the display and move the cursor one space to the right. The Cursor marks the next location where a character will be written. When we want to write a string of characters, first we need to set up the starting address, and then send one character at a time. Characters that can be shown on the display are stored in data display (DD) RAM. The size of DDRAM is 80 bytes. Fig 4(a) Fig 4(b) Fig 4(a),4(b): Pictures of our Proposed Mobile jammer
  • 5. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2567-2571 ISSN: 2249-6645 www.ijmer.com 2571 | Page II. Conclusions Our Proposed Mobile Jammer is working perfectly without affecting the signals from the network. So that the user can able to get the notifications regarding Calls and messages (SMS, MMS). The notification about the calls will be given to the user. If there is any urgent call as we can get the notification we can go out from the coverage area and use our mobile as it is. No need of licensing. Implementation of our newly designed jammers is easy. As we are using a FPGA, our hardware can be modified whenever we want. Can be implemented where silence to be maintained. Future modifications are possible easily. Misuse of mobiles can be restricted. Thus our Mobile jammers can provide higher efficiency with lower misuses. References [1]. D. Adamy. EW 101: A first course in electronic warfare. Artech House Publishers, 2001. [2]. I. Akyildiz, W. Lee, M. Vuran, and S. Mohanty. Next generation dynamic spectrum access cognitive radio wireless networks: A survey. Computer Networks, 50(13):2127–2159, 2006. [3]. L. C. Baird, W. L. Bahn, M. D. Collins, M. C. Carlisle, and S. C. Butler. Keyless jam resistance. In Proceedings of the 2007 IEEE Workshop on Information Assurance United States Military Academy, 2007. [4]. T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of the ACM MobiHoc, pages 120–130, 2006. [5]. M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based anti-jamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6(1):100–114, 2007. [6]. A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: resilience and identification of traitors. In Proceedings of ISIT, 2007. [7]. J. T. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proceedings of the MobiCom, pages 346–349, 2007. N. Radha Krishnaiah , born in Rajampet, A.P., India in 1989. He received B.Tech Degree in Electronics and Communication Engineering from J.N.T University Anantapur, India. Presently pursuing M.Tech (VLSI SYSTEM DESIGN) from Annamcharya Institute of Technology and Sciences, Rajampet, A.P., India. His research interests include VLSI, Embedded Systems I did this project under the guidance of Mrs. P. Brundavani born in Proddatur, A.P., India in 1982. She received B.Tech Degree in Electronics and Communication Engineering from G Pullareddy Engineering College, Kurnool, A.P., India in 2004. Presently working as an associative professor in Annamacharya Institute of Technology and Sciences, Rajampet, India. She got her M.Tech from JNTU Anantapur, A.P., India. Her research area is in Digital IC Design, VLSI Technology, Testing and Testability, Microprocessor.