Implementation of missed call for making a password and controlling devices

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The cellular phones do not use telephone cables. The cellular phones send radio signals into the air to the nearest transmitter tower called the base station. The transmitter tower will emit the signal to the next station and so on until it reaches the phone that is called. When a new call arrives on the phone number, it will generate a tone until it is picked up, rejected, or the time has been ended to receive this tone (each telephone network provider has different policies related to the time used for this telephone connection so that this causes the number of rings raised to vary). This paper focuses on the missed call services which is one of the features found on the telephone. The tone that has been generated by this calling can emerge ring. This ring can be detected and manipulated to be something useful for controlling devices or making some password.

     

     


  • Keywords


    Control, Missed call, Password, Ring, Telephone.

  • References


      [1] Wibowo FW, “A dynamic intelligent control analysis on the wireless smart machine environments in the industry 4.0”, Proceedings of the 2018 international seminar on research of information technology and intelligent systems (ISRITI), (2018), pp: 389-393.

      [2] Donner J, “The rules of beeping: exchanging messages via intentional “missed calls” on mobile phones”, Journal of Computer-Mediated Communication, Vol. 13, (2008), pp: 1-22. DOI: 10.1111/j.1083-6101.2007.00383.x

      [3] Fernández-Ardèvol M, “Missed calls: Barcelona and Los Angeles compared”, Proceedings of the Technology & Emerging Media Track – Annual Conference of the Canadian Communication Association, (2012), pp: 1-14.

      [4] Maqbool S & Lone SA, “Monitoring system using GSM”, International Journal of Computer Applications, Vol. 117, No. 10, (2015), pp: 28-31.

      [5] Istiyanto JE & Wibowo FW, “A DC Motor Control Based-on Cellular Phone”, Proceedings of 2nd Jogja International Physics Conference, (2007), pp. EI072-EI075.

      [6] Eseosa O & Promise E, “GSM based intelligent home security system for intrusion detection”, International Journal of Engineering and Technology, Vol. 4, No. 10, (2014), pp: 595-605.

      [7] Sangme PB, Khatal RB, Patil OM & Patil AG, “GSM based motor control for irrigation system”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 6, Issue 3, (2018), pp: 2138-2142. DOI: 10.15680/IJIRCCE.2018.0603064


 

View

Download

Article ID: 26966
 
DOI: 10.14419/ijet.v7i4.44.26966




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.