Implementation of missed call for making a password and controlling devices
Keywords:Control, Missed call, Password, Ring, Telephone.
The cellular phones do not use telephone cables. The cellular phones send radio signals into the air to the nearest transmitter tower called the base station. The transmitter tower will emit the signal to the next station and so on until it reaches the phone that is called. When a new call arrives on the phone number, it will generate a tone until it is picked up, rejected, or the time has been ended to receive this tone (each telephone network provider has different policies related to the time used for this telephone connection so that this causes the number of rings raised to vary). This paper focuses on the missed call services which is one of the features found on the telephone. The tone that has been generated by this calling can emerge ring. This ring can be detected and manipulated to be something useful for controlling devices or making some password.
 Wibowo FW, â€œA dynamic intelligent control analysis on the wireless smart machine environments in the industry 4.0â€, Proceedings of the 2018 international seminar on research of information technology and intelligent systems (ISRITI), (2018), pp: 389-393.
 Donner J, â€œThe rules of beeping: exchanging messages via intentional â€œmissed callsâ€ on mobile phonesâ€, Journal of Computer-Mediated Communication, Vol. 13, (2008), pp: 1-22. DOI: 10.1111/j.1083-6101.2007.00383.x
 FernÃ¡ndez-ArdÃ¨vol M, â€œMissed calls: Barcelona and Los Angeles comparedâ€, Proceedings of the Technology & Emerging Media Track â€“ Annual Conference of the Canadian Communication Association, (2012), pp: 1-14.
 Maqbool S & Lone SA, â€œMonitoring system using GSMâ€, International Journal of Computer Applications, Vol. 117, No. 10, (2015), pp: 28-31.
 Istiyanto JE & Wibowo FW, â€œA DC Motor Control Based-on Cellular Phoneâ€, Proceedings of 2nd Jogja International Physics Conference, (2007), pp. EI072-EI075.
 Eseosa O & Promise E, â€œGSM based intelligent home security system for intrusion detectionâ€, International Journal of Engineering and Technology, Vol. 4, No. 10, (2014), pp: 595-605.
 Sangme PB, Khatal RB, Patil OM & Patil AG, â€œGSM based motor control for irrigation systemâ€, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 6, Issue 3, (2018), pp: 2138-2142. DOI: 10.15680/IJIRCCE.2018.0603064
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).