نتایج جستجو برای: mobile phone jammers

تعداد نتایج: 231873  

Journal: :Computer Communications 2007
Yong Lee Jaeil Lee JooSeok Song

With the advent of wireless communication and internet protocol, many technologies have been developed to provide mobile phone user with the wireless internet service. Security supporting wireless internet must be guaranteed at same level as the wired security. But PKI (Public Key Infrastructure) which is used for the security of e-commerce in wired internet is not suitable for the mobile phone...

2017
Amber L Pearson Elizabeth Mack Judith Namanya

Due to the ubiquity of mobile phones around the globe, studies are beginning to analyze their influence on health. Prior work from developed countries highlights negative mental health outcomes related to overuse of mobile phones. However, there is little work on mental health impacts of mobile phone use or ownership in developing countries. This is an important gap to address because there are...

The study investigated the roles of different stakeholders influencing the use of mobile phones in accessing agricultural information in Tanzania. While information is becoming an important ingredient in agriculture, farmers in Tanzania suffer the problem of lacking access to agricultural information. Promisingly, mobile phone technology has become the most valued infrastructure which gives peo...

2017
Ming Yang WenWen Guo ChunSheng Yang JianQin Tang Qian Huang ShouXin Feng AiJun Jiang XiFeng Xu Guan Jiang

OBJECTIVE Many studies have previously investigated the potential association between mobile phone use and the risk of glioma. However, results from these individual studies are inconclusive and controversial. The objective of our study was to investigate the potential association between mobile phone use and subsequent glioma risk using meta-analysis. METHODS We performed a systematic search...

Journal: :journal of biomedical physics and engineering 0
e kazemi smj mortazavi 1. medical physics department, school of medicine, shiraz university of medical sciences, shiraz, iran a ali-ghanbari s sharifzadeh r ranjbaran z mostafavi-pour

background , despite numerous studies over a decade, it still remains controversial about the biological effects of rf emf emitted by mobile phone telephony. objective , here we investigated the effect of 900 mhz gsm on the induction of oxidative stress and the level of intracellular reactive oxygen species (ros) in human mononuclear cells, monocytes and lymphocytes as defence system cells. met...

Journal: :journal of biomedical physics and engineering 0
s a r mortazavi m haghani s zarei n rastegarian n alighanbari m haghparast

mobile phones, mobile phone base stations, cordless phones and power lines are among the main sources of our daily exposures to radiofrequency electromagnetic fields (rf-emf). today, a large proportion of children aged eight and under has used smart phones and tablets for media activities such as playing online games, watching videos or using different applications. over the past several years,...

2015
Louis Leung Jingwen Liang

This chapter reviews the literature on mobile phone addiction, the excessive use of mobile phone technology, which is an impulse control disorder with negative social and psychological consequences. It provides a clear definition of mobile phone addiction, along with its theoretical origin, diagnostic criteria for assessment, and an identification of the symptoms and consequences of addictive b...

2008
Hoang Nguyen Thadpong Pongthawornkamol

We consider the problem of detecting the insiderbased attacks in the form of jammers in a single-hop wireless LAN environment, where jammers have the inside knowledge of frequency hopping patterns and any protocols used in the wireless network. We propose a novel jammer model in which the jammers are modeled by the number of channels that they can jam simultaneously. We further propose the nove...

2017
Dae-Kyo Jeong Insook Kim Dongwoo Kim

This paper presents a price-searching model in which a source node (Alice) seeks friendly jammers that prevent eavesdroppers (Eves) from snooping legitimate communications by generating interference or noise. Unlike existing models, the distributed jammers also have data to send to their respective destinations and are allowed to access Alice's channel if it can transmit sufficient jamming powe...

2010
Ninoslav Marina Mérouane Debbah Are Hjørungnes Hesham El-Gamal

Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. We investigate the interaction between the source that tra...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید