<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cost Effective Tri-Band Mobile Phone Jammer for Hospitals Applications</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Abdulkareem. A. Oloyede</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>A. Shamsudeen</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nasir Faruk</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lukaman. A. Olawoyin</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>S.I. Popool</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Abubakar. Abdulkarim</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>-Wireless Telecommunication services are becoming a part of our everyday life because they support a lot of services. However, they are often misused in environments such as hospitals where some patients would require quietness or sometimes they distract medical practitioners from carrying out their duties of saving lives. Therefore, there is a need to use a jammer that prevents mobile phone from working in such an environment. Hence, this paper proposes a cost-effective tri-band mobile phone jammer for hospitals applications. The jammer is designed, constructed, test and found very effective in terms of jamming signal within the bands.</p>
      </abstract>
      <kwd-group>
        <kwd>Cell Phone</kwd>
        <kwd>Jammer</kwd>
        <kwd>Mobile Phone</kwd>
        <kwd>Hospital</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. INTRODUCTION</title>
      <p>
        In the last decade, wireless phones has achieved significant global
penetration in both developed and developing countries [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. They are now
becoming an important and essential tool in our day-to-day activities because
of their use in communication, entertainment, education, e-commerce,
ebanking etc. They are used; to watch videos and play music for entertainment
purpose, to access documents and watch online tutorial for learning, to
perform online financial transaction and to exchange and disseminate
information among others. However, the widespread use of these mobile
phones or mobile stations (MSs) presents some problems and could also pose
a threat in certain scenarios especially in hospital environments. A number
of such cases are when the sound of ringing cell-phones becomes distractive,
annoying or disruptive to health workers who are saving lives [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. A possible
preventive measure is to setup and install a device in a place that will
regulate or inhibit the using of a cell-phones and render them inactive. Such a
device can be a mobile-phone jammer. It can also be called a “GSM
jammer”. This can categorize as some electronic devices/system that hinder
communication between mobile device and base station [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Generally, a cell phone-jammer is a device that block signal from mobile
by creating interference such that it prevents transmission and reception
power at the certain frequency [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. They can concurrently jam services in a
number of frequency bands, so they could be a dual, tri or quad-bands
Jammer which are very effective against intelligent phones that can
automatically switch between different frequencies bands when interfered
with in a bid to get service connection. Mobile Jammer works by either
blocking the uplink transmission of mobiles or by blocking the downlink
transmission of Base transceiver stations (BTSs). Either one has same effect
of hindering both since the phone would assume a “no service”. This is
because it can only receive from one of the frequencies [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Less amount of
energy is needed to interfere with the signals from the BTS to MSs than the
signals from MSs to the BTS, since the BTS is located at a farther distance
from where the jammer is than the cell-phone and as such would have a
weaker signal compared to that of the cell-phone [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Although, power
control is possible when weak signal is being received by the MS, however,
the Jammer must on the other hand be matches its power to commensurate
the increase in the transmitting power of the MS [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The jamming cancels
out the communication when all the mobiles located in close proximity to
where the Jammer device is deployed are effectively blocked and denied
access to the cellular network [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Early Jammers were initially developed
and used by the military in wartimes to disrupt an enemy’s communication or
send false information in an attempt to mislead an enemy [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. It is important
to note that in most countries of the world, mobile Jammers are unlawful
devices and their usage are prohibited, with the exception of law enforcement
agencies such as the military and security use. This work therefore, provides
a detailed insight into the Design, Construction and Operational analysis of a
device that would effectively jam the signal transmitted from MS providing
the GSM and WCDA services.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. RELATED WORKS</title>
      <p>Jammers are classified into different types. In this work, we would be
focusing on type “A” jammers. This uses the Denial of Service technique.
therefore, this section provide an executive summary of the related works in
table 1.</p>
    </sec>
    <sec id="sec-3">
      <title>COMMENT</title>
      <sec id="sec-3-1">
        <title>P. Naresh, P. R Hyderabad, Babu and K. India. Satyaswathi (2013) [1]</title>
      </sec>
      <sec id="sec-3-2">
        <title>This design implemented a pre</title>
        <p>scheduled timer with a mobile Jammer.
When the ON time reaches, the Jammer
is activated through a relay and blocks
all GSM and CDMA services within a 5
– 7 m range. The device was
successfully able to jam cell-phones
using these services.</p>
        <p>Nadu, The designed Jammer was able to block
2G and 3G services. However, the
challenge faced in this work was that
the amplification process did not
achieve proper output gain to jam the
target services due to issues with the
power amplifiers. Because of this, their
project is partially designed till date.</p>
        <p>The mobile Jammer was able to block
cell-phones using 2G and 3G networks.
But the jamming device had a poor
frequency selectivity and the jamming
range was smaller than expected. Also
the tuner circuit had poor calibration,
this makes difficult to block all
frequencies in the applicable
bandwidth.</p>
        <p>The designed Jammer was able to block
GSM 900 services. However in this
design, the right amount of current was
not provided to the VCO and the Power
amplifier which consequently prevented
tuning to the desired frequency range
for the VCO and also limiting the
output power of the Jammer. This
limited the jamming range to 10 meters
instead of the intended 20 meters.</p>
        <p>The designed dual band GSM Jammer
used a directional Yagi-uda antenna</p>
      </sec>
      <sec id="sec-3-3">
        <title>S.K. Mahato and Tamil C.Vimala (2014) India. [3]</title>
      </sec>
      <sec id="sec-3-4">
        <title>D.S Madara, E. Moi Ataro, and S. University, Sitati (2016) [5] Kenya.</title>
      </sec>
      <sec id="sec-3-5">
        <title>Ahmed (2014) [6] Jiswari Jordan</title>
      </sec>
      <sec id="sec-3-6">
        <title>J.G. Martins et al Abuja, (2016) [8] Nigeria.</title>
      </sec>
      <sec id="sec-3-7">
        <title>A. Mahmoud et Egypt. al (2015) [9]</title>
      </sec>
      <sec id="sec-3-8">
        <title>A.O. Oke, A.S. Oyo, Nigeria. Falohun and A.A. Adigun (2016) [10]</title>
        <p>instead of the conventional monopole
antenna. The Jammer was able to
achieve a maximum jamming distance
of 16.72 meters when the antenna is at
an angle of 10 degrees and a minimum
distance of 3.12 meters at an angle of
120 degrees
Their cell-phone Jammer works in both
the GSM 900/1800 bands and tested
Egypt. After full testing, a heat sink was
later implemented with the RF power
amplifiers in this design to reduce
overheating during operation.</p>
        <p>The designed Jammer used a different
jamming technique by first detecting
mobile phones operating in the
GSM900 band, and upon detection
transmits a jamming signal to block the
service within a 2.5 m range. At GSM
900 it was capable of detecting and
blocking all the services.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. METHODOLOGY</title>
      <p>The proposed jamming device consists of three (3) major sections
that makes up the Jammer circuit. These include the Power supply, the
Intermediate Frequency (IF) and the Radio Frequency (RF). Fig. 1 illustrates
the general overview diagram of the Jamming system.</p>
      <p>Fig 1. Block diagram of the Jamming device</p>
      <p>The circuit schematic for each of these sections and the various electronic
components that makes up these sections are critically chosen and selected.
Also detailed calculations and measurements is carried out before assembling
these different electronic components (resistors, capacitor, transistors, diodes,
voltage controlled oscillators, amplifiers, antennas etc.) that forms the
Jammer circuit. The range of frequencies that are jammed in this work is
provided in table 2: The Network providers considered were: Airtel, MTN.
Globacom and 9mobile networks.</p>
    </sec>
    <sec id="sec-5">
      <title>UPLINK DOWNLINK</title>
    </sec>
    <sec id="sec-6">
      <title>SERVICES FREQUENCY FREQUENCY RANGE RANGE (MHz) (MHz)</title>
      <p>890 – 915 935 – 960
1710 – 1785 1805 – 1880
1920 – 1980 2110–2170
( ) = 32.45 + 20
 + 20

.
where  is the jamming distance in 
and  is the operating frequency in</p>
      <sec id="sec-6-1">
        <title>4.2 Jamming to Signal Ratio (J/S)</title>
        <p>
          The Jamming-to-Signal ratio (J/S) of a target system is another important
parameter in mobile jamming. It is the ratio of the jamming signal power at a
specific receiver to the strength of the target signal at that same receiver [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
This ratio is an indicator that shows the degree of vulnerability of a system to
interference. The larger the J/S ratio of a system, the greater it’s jamming
rejection capability [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. The J/S ratio can be calculated by the use of Friis
equation for free space transmission.
        </p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>4. DESIGN SPECIFICATION</title>
      <sec id="sec-7-1">
        <title>4.1 Path Loss</title>
        <p>In this paper, we employ the free space path loss model (FSPL). Generally,
path loss can be determined using the mathematical model defined in
equation (1), that is.
(1)
(2)
(3)
(4)
(5)
where; PJ, PT, GJ, GT, dJ,and dS are the Jammer output power (dBW),
Transmitter power (dBW), antenna gains (in dBi) of Jammer and transmitter,
distance (in meters) of jammer to receiver and then transmitter to receiver
respectively. Applying some mathematical rearrangements, J/S can also be
obtain using the equation (5).</p>
        <p>( ) =
       2</p>
        <p>2    
where; RTR and RJR is the distance between the transmitter and receiver, and
Jammer and receiver, LR and L</p>
        <p>J is the signal loss in of the communicating
device and signal Loss by the Jammer. BR is the bandwidth of the Receiver
and BJ is the bandwidth of the Jamming.</p>
      </sec>
      <sec id="sec-7-2">
        <title>4.3 Signal to Noise Ratio (SNR)</title>
        <p>
          Every radio device has a limit to which they can accommodate noise present
in any signal. This is known as the SNR handling capability of the device. It
is the wanted signal divided by that of noise [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. The received signal power
is considered along with noise power to determine the SNR at the receiver
input [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
        </p>
      </sec>
      <sec id="sec-7-3">
        <title>4.4 Maximum Receive Signal Power</title>
        <p>
          The maximum receive signal power refers to the best or strongest level of
signal a mobile station can possibly receive from another radio device in the
cellular network e.g. the Base station. Table 3 show the maximum power for
each band [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
      </sec>
      <sec id="sec-7-4">
        <title>4.5 Power Calculation</title>
        <p>The mathematical models to determine the receiver jamming power and the
Jammer output power is given in the equations (6) to (7).</p>
        <p>Jamming power at mobile receiver,


≥ 

−</p>
        <p>Maximum Jammer output power,  
=  
+ 
(6)
(7)
For GSM 900
Maximum RSSI, RSSImax = -15dBm
Minimum SNR, SNRmin = 9dB
Jamming power at mobile receiver ,</p>
        <p>
For GSM 1800
Maximum RSSI, RSSImax = -23dBm
Minimum SNR, SNRmin = 9dB</p>
        <p>≥ −32
5.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>SYSTEM IMPLEMENTATION</title>
      <p>≥ −15
– 9
Jamming power at mobile receiver,  
≥ −23
– 9
This section presents implementation of the Tri-band cell-phone Jammer.
The figure 2 depicts the different parts of the Jammer which are developed
individually and assembled to form the whole jamming system.</p>
    </sec>
    <sec id="sec-9">
      <title>6. TESTING, RESULTS AND ANALYSIS</title>
      <p>After the successful design and simulation of the Jammer circuit, the design
was shifted to a Vero-board to connect all the electronic components. The
constructed Jammer device is shown in figure 3.</p>
    </sec>
    <sec id="sec-10">
      <title>7. TESTING OF THE JAMMER</title>
      <p>The testing of the cell-phone Jammer was a full successful as developed
device was able to block the four major Mobile operators in Nigeria namely
MTN, Globacom, Airtel and 9mobile as shown in Figures 4-6. Although the
average jamming range of the system was approximately 10 meters, which is
less than the design specification. This limitation can be attributed to the use
of telescopic antennas by the jamming system instead of duck antennas that
have a good gain. Also the RF power amplifiers that increase the strength of
the jamming signal were not able to get the precise voltage supply as
specified in their data sheet, as 3.3 volts was provided to them instead of the
required 3.5 volts.</p>
      <p>During testing, the Jammer was able to block the target services on an
average of two (2) minutes after being turned “ON”. Further testing
confirmed that, the relationship between the distance between the Jammer
and the base station increases proportionally thus blocking more numbers of
cell-phones. This is due to the fact that the signal strength at cell-phones are
at their strongest when close to the base station, and the farther these
cellphones are from the base station, the lesser the amount of power reaching
them, thus having a weak signal strength.</p>
      <p>The figures 4-6 show the effect of testing the Jammer on different mobile
networks. It can be clearly seen that when the Jammer is “OFF”, network
services on the different cell-phones were available, but after turning the
Jammer “ON”, these services disappears or becomes unavailable.</p>
      <p>Fig. 5. Airtel service before and after the Jammer was “ON”.</p>
    </sec>
    <sec id="sec-11">
      <title>8. CONCLUSION</title>
      <p>This project work presents a detailed insight into the implementation of a
triband cell-phone Jammer that uses the denial of service jamming technique to
inhibit the operation of cell-phones. The aim and objectives initially set out
for this work has been achieved as the designed Jammer was relatively able
to block GSM 900/1800 and UMTS 2100 services within its jamming range.
Further testing of this device shows that its effective jamming distance
reduces when tested close to a base station and as we move farther from the
base station, this distance increases.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A. A.</given-names>
            ,
            <surname>Oloyede</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Faruk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Olawoyin</surname>
          </string-name>
          , &amp; O.W Bello, “
          <article-title>Energy Efficient Dynamic Bid Learning Model for Future Wireless Network</article-title>
          ” Journal of Siberian Federal University. Engineering &amp; Technologies, Vol
          <volume>8</volume>
          No 4.
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.S.</given-names>
            <surname>Abdul-Rahman</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.N.</given-names>
            <surname>Mohammad</surname>
          </string-name>
          , “
          <source>Dual Band Mobile Jammer for GSM 900 &amp; GSM</source>
          <year>1800</year>
          ,” Department of Electrical Engineering, Jordan University of science and technology.
          <source>(Undergraduate project)</source>
          . [online]. Available: http://www.just.edu.jo/~nihad/files/mat/591/Jammer%20Final%20Repor t.
          <source>pdf [Accessed Jan. 5</source>
          ,
          <year>2018</year>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.K.</given-names>
            <surname>Mahato</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Vimala</surname>
          </string-name>
          , “
          <article-title>Cellular Signals Jamming System in 2G And 3G</article-title>
          ,”
          <source>International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering</source>
          , vol.
          <volume>3</volume>
          ,
          <issue>iss</issue>
          . 3,
          <string-name>
            <surname>April</surname>
          </string-name>
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G.</given-names>
            <surname>Wollenhaupt</surname>
          </string-name>
          , “
          <article-title>How cell-phone Jammer works</article-title>
          ,”
          <year>2016</year>
          . [online]. Available: https://electronics.howstuffworks.
          <source>com/cell-phonejammer1.htm [Accessed Jan</source>
          .
          <volume>17</volume>
          ,
          <year>2018</year>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jiswari</surname>
          </string-name>
          , “GSM-900 Mobile Jammer,” Department of Electrical Engineering, Jordan University of science and technology.
          <source>(Undergraduate project)</source>
          . [online]. Available: http://www.qrz.ru/schemes/contribute/security/jammers/gsm-jammer.
          <source>pdf [Accessed Feb. 3</source>
          ,
          <year>2018</year>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.S</given-names>
            <surname>Madara</surname>
          </string-name>
          , E. Ataro, and
          <string-name>
            <given-names>S.</given-names>
            <surname>Sitati</surname>
          </string-name>
          , “
          <article-title>Design and Testing of a MobilePhone-Jammer</article-title>
          ,” School of Engineering, Moi University, Kenya.
          <source>Innovative Systems Design and Engineering</source>
          , vol.
          <volume>7</volume>
          , no.
          <issue>7</issue>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J.G.</given-names>
            <surname>Martins</surname>
          </string-name>
          et al, “
          <article-title>Design Considerations for a Dual Band GSM Signal Jammer Coupled to a Yagi-Uda Antenna</article-title>
          ,”
          <source>International Journal of Engineering Trends and Technology</source>
          , vol.
          <volume>33</volume>
          ,
          <issue>iss</issue>
          . 7,
          <string-name>
            <surname>March</surname>
          </string-name>
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Mahmoud</surname>
          </string-name>
          et al, “
          <string-name>
            <surname>Dual-Band Mobile</surname>
            <given-names>Jammer</given-names>
          </string-name>
          ,” College of Engineering and Technology, Arab Academy for Science,
          <source>Technology &amp; Maritime Transport</source>
          , Egypt. [online]. Available: https://www.slideshare.net/MohamedAtef12/dualband-mobile-phonejammer
          <source>[Accessed May 10</source>
          ,
          <year>2018</year>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.O.</given-names>
            <surname>Oke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.S.</given-names>
            <surname>Falohun</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Adigun</surname>
          </string-name>
          , “
          <article-title>The Design and Implementation of a Mobile Phone Detector Device with a Frequency Jamming Feature</article-title>
          ,”
          <source>International Journal of Computer Applications</source>
          , vol.
          <volume>143</volume>
          ,
          <issue>iss</issue>
          .1, pp.
          <fpage>15</fpage>
          -
          <lpage>19</lpage>
          ,
          <year>June 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Hewes</surname>
          </string-name>
          , “Circuit Symbols of Electronic Components,” The Electronics Club,
          <year>March 2011</year>
          . [online]. Available: http://web.gps.caltech.edu/~als/IRMS/course-materials/
          <year>lecture1</year>
          .../circuit-symbols.
          <source>pdf [Accessed June 2</source>
          ,
          <year>2018</year>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kolios</surname>
          </string-name>
          , EPL
          <volume>657</volume>
          ,
          <string-name>
            <surname>Class</surname>
            <given-names>lecture</given-names>
          </string-name>
          , Topic: “Wireless Environment and Mobility Issues,” Department of Computer Science, University of Cyprus,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Cem</surname>
          </string-name>
          , “Digital communications jamming,” Naval Postgraduate School, Monterey, California, Sept.
          <year>2000</year>
          .
          <article-title>(Doctoral dissertation)</article-title>
          . [online]. Available: http://hdl.handle.
          <source>net/10945/32961 [Accessed July 30</source>
          ,
          <year>2018</year>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kolios</surname>
          </string-name>
          , EPL
          <volume>657</volume>
          ,
          <string-name>
            <surname>Class</surname>
            <given-names>lecture</given-names>
          </string-name>
          , Topic: “Wireless Environment and Mobility Issues,” Department of Computer science, University of Cyprus,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Cem</surname>
          </string-name>
          , “Digital communications jamming,” Naval Postgraduate School, Monterey, California, Sept.
          <year>2000</year>
          .
          <article-title>(Doctoral dissertation)</article-title>
          . [online]. Available: http://hdl.handle.
          <source>net/10945/32961 [Accessed July 30</source>
          ,
          <year>2018</year>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Gu</surname>
          </string-name>
          , “
          <article-title>RF System Design of Transceivers for Wireless Communications</article-title>
          ,” Springer Science and Business media,
          <source>Nokia Mobile Phones, Inc. chp. 4, pg. 277</source>
          ,
          <year>2005</year>
          . [online]. Available: https://b ooks.google.com.ng/books/about/RF_System_
          <article-title>Design_of_Transceivers_ for_Wir.html?id=dAGfSkX3_vgC&amp;printsec=frontcover&amp;source=kp_rea d_button&amp;redir_esc=y#v=onepage&amp;q&amp;f=false [</article-title>
          <source>Accessed Aug. 7</source>
          ,
          <year>2018</year>
          ].
          <string-name>
            <given-names>M.</given-names>
            <surname>Young</surname>
          </string-name>
          ,
          <source>The Technical Writer's Handbook</source>
          . Mill Valley, CA: University Science,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>