was allocated. It was a bandwidth monitoring area of 
200 m2 and 20 employees. Control of access to the 
territory was carried out by using access cards, 
allowing us to conduct a comparative analysis of the 
system. 
As a part of the experiment, which was 
conducted during five weeks, antennas and amplifier 
were installed around the perimeter of the zone so as 
to completely cover-control it. For ease of testing, 
the system was set up for one mobile operator (the 
employees who worked in the territory, used the 
services of the same operator). The results of the 
experiment are given in Table 1. 
Table 1: Results of the experiment of counting visitors. 
Timeline NFCC inspection 
results  
(entrance to the 
facility) 
Access cards 
inspection results 
(entrance to the 
facility) 
1 week  586  578 
2 weeks  565  563 
3 weeks  586  586 
4 weeks  574  569 
5 weeks  592  589 
During the entire time of the experiment, the 
system shows stable operation. The results obtained 
with the help of NFCC were compared with the data, 
fixed by means of electronic access cards to the 
territory. The results do not differ by more than 1%. 
Inaccuracy is due to the fact that some employees 
had a tablet with access to the Internet or a second 
cell phone while being at the controlled territory. 
4 CONCLUSIONS 
Thus, this paper describes a system of impersonal 
counting of identifiers of mobile phones, which 
would greatly increase the efficiency of counting 
unique visitors in shopping malls, exhibitions and 
other similar events. The system requires a small 
financial cost for its installation and operation, it 
does not affects the quality of services provided to 
users by the operator of communication and has no 
adverse impact on the information security of mobile 
devices. 
Ongoing testing of the prototype system 
demonstrated its high efficiency, where the accuracy 
of the results obtained by the device is 99% 
compared to the actual data. In the future, this figure 
will be increased to 100%. 
The limitations of the study are the following: 
 legal difficulties as there is no regulation of use 
of such devices, albeit low-power, at frequencies 
of mobile operators; 
 the system only supports the 2G (GSM), other 
cellular standards are not supported. It is 
necessary to develop a system or jammers for 
them. But the latter encounter legal difficulties. 
Today, the system is being tested and further 
developed. It is planned to conduct scientific 
research to address the problem of the calculation of 
several unique devices from one owner (for 
example, the visitor has two mobile phones and a 
tablet). 
The scalability of the system described will also 
be examined. 
REFERENCES 
Positioning (2015) Marketing tools and sales. Official site 
of Development Program of the Small Business in 
Saint-Petersburg. Committee for economic 
development, industrial policy and trade of 
Administration of St. Petersburg. URL: 
http://www.spb-mb.ru/index.php?page=286. 
Dmitry Mikhaylov, Timur Khabibullin, Andrey 
Starikovskiy, Alexander Smirnov, Mikhail Froimson, 
Maxim Aristov and Vladimir Konev (2014a) Method 
and System for Gender-oriented Targeted Advertising. 
ICORES 2014. Proceedings of the 3rd International 
Conference on Operations Research and Enterprise 
Systems. ESEO, Angers, Loire Valley, France. 6 - 8 
March, 2014. Pages 153-158. 
Zhaowei Cai; Longyin Wen; Dong Cao; Zhen Lei; Dong 
Yi; Li, S.Z. (2013) Person-specific face tracking with 
online recognition. 10th IEEE International 
Conference and Workshops on Automatic Face and 
Gesture Recognition (FG), 2013. Pages: 1 – 6. 
Dmitry Mikhaylov, Anton Samoylov, Peter Minin and 
Alexey Egorov. (2014b) Face Detection and Tracking 
from Image and Statistics Gathering. Tenth 
International Conference on Signal-Image Technology 
& Internet-Based Systems, 2014. С 37-42. 
Samoylov A.S., Mikhaylov D.M., Minin P.E., Egorov 
A.D. (2015) Face Tracking for a System of Collecting 
Statistics on Visitors and Quality Assessment of its 
Functioning.  Journal of Theoretical and Applied 
Information Technology. Volume 71, Issue 3, 31 
January 2015, Pages 353-366. 
Guojun Wang; Alam Bhuiyan, M.Z.; Jiannong Cao; Jie 
Wu. (2014) Detecting Movements of a Target Using 
Face Tracking in Wireless Sensor Networks. IEEE 
Transactions on Parallel and Distributed Systems, 
(Volume: 25, Issue: 4). April 2014. Pages: 939 – 949. 
Chao Wang; Yunhong Wang; Zhaoxiang Zhang; Yiding 
Wang. (2013) Face Tracking and Recognition via 
Incremental Local Sparse Representation. Seventh