Implementation of missed call for making a password and controlling devices
DOI:
https://doi.org/10.14419/ijet.v7i4.36.28986Keywords:
Control, Missed call, Password, Ring, Telephone.Abstract
The cellular phones do not use telephone cables. The cellular phones send radio signals into the air to the nearest transmitter tower called the base station. The transmitter tower will emit the signal to the next station and so on until it reaches the phone that is called. When a new call arrives on the phone number, it will generate a tone until it is picked up, rejected, or the time has been ended to receive this tone (each telephone network provider has different policies related to the time used for this telephone connection so that this causes the number of rings raised to vary). This paper focuses on the missed call services which is one of the features found on the telephone. The tone that has been generated by this calling can emerge ring. This ring can be detected and manipulated to be something useful for controlling devices or making some password.
References
[1] Wibowo FW, “A dynamic intelligent control analysis on the wireless smart machine environments in the industry 4.0â€, Proceedings of the 2018 international seminar on research of information technology and intelligent systems (ISRITI), (2018), pp: 389-393.
[2] Donner J, “The rules of beeping: exchanging messages via intentional “missed calls†on mobile phonesâ€, Journal of Computer-Mediated Communication, Vol. 13, (2008), pp: 1-22. DOI: 10.1111/j.1083-6101.2007.00383.x
[3] Fernández-Ardèvol M, “Missed calls: Barcelona and Los Angeles comparedâ€, Proceedings of the Technology & Emerging Media Track – Annual Conference of the Canadian Communication Association, (2012), pp: 1-14.
[4] Maqbool S & Lone SA, “Monitoring system using GSMâ€, International Journal of Computer Applications, Vol. 117, No. 10, (2015), pp: 28-31.
[5] Istiyanto JE & Wibowo FW, “A DC Motor Control Based-on Cellular Phoneâ€, Proceedings of 2nd Jogja International Physics Conference, (2007), pp. EI072-EI075.
[6] Eseosa O & Promise E, “GSM based intelligent home security system for intrusion detectionâ€, International Journal of Engineering and Technology, Vol. 4, No. 10, (2014), pp: 595-605.
[7] Sangme PB, Khatal RB, Patil OM & Patil AG, “GSM based motor control for irrigation systemâ€, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 6, Issue 3, (2018), pp: 2138-2142. DOI: 10.15680/IJIRCCE.2018.0603064
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2019-04-25