0% found this document useful (0 votes)
484 views

Design of Cell Phone Detector

This document provides details about a student project to design a cell phone detector. It acknowledges the project advisor and others who provided support. The abstract explains that the detector can sense activated cell phones from up to 8 meters away to prevent unauthorized phone use. The introduction describes the project goal of increasing the detection range and reviews background literature on existing detectors. The objectives are outlined as avoiding improper phone use, preventing spying, learning design skills, and promoting appropriate phone usage. The methodology discusses the planning, research, hardware and software requirements, implementation, and analysis steps.

Uploaded by

Merawi Wubishet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
484 views

Design of Cell Phone Detector

This document provides details about a student project to design a cell phone detector. It acknowledges the project advisor and others who provided support. The abstract explains that the detector can sense activated cell phones from up to 8 meters away to prevent unauthorized phone use. The introduction describes the project goal of increasing the detection range and reviews background literature on existing detectors. The objectives are outlined as avoiding improper phone use, preventing spying, learning design skills, and promoting appropriate phone usage. The methodology discusses the planning, research, hardware and software requirements, implementation, and analysis steps.

Uploaded by

Merawi Wubishet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 40

HAWASSA UNIVERSITY

INSTITUTE OF TECHNOLOGY
SCHOOL OF ELECTRICAL AND COMPUTER
ENGINEERING

STREAM OF COMMUNICATION

DESIGN OF CELL PHONE DETECTOR

PREPPARED BY:

ANMUT ADDIS…………………………………..................0146/05

GETAHUN GEBRIE………………………………..….…..0580/05

NEGA BELAY……………………………………….…..…0961/05

ADVISOR: K.SAIDULU (DR)


DRAFT DATE:
HAWASSA, ETHIOPIA
Acknowledgment
First and foremost, we would like to express our high gratitude to our advisor Dr. K. Saidulu for
everything he had helped. Without his priceless advice, encouragement and guidance, this project would
be an extremely hard task for us.
We would also like to convey our gratitude to the school of electrical and computer engineering which
provided the necessary facilities for this project, and also to the lectures and lab assistance for their
information, help and guidance.

ABSTRACT
The cell phone detector is a handy pocket size mobile transmission detector that can sense the presence of
an activated mobile cell phone from a distance. As increase in the world using the electronic equipment is
being used in a wrong way like, in the examination halls, confidential rooms etc.

So it can be used to prevent use of mobile phones in examination halls, confidential rooms and it is also
useful for detecting the uses of mobile phones for spying and unauthorized video transmission.

The circuit can detect the incoming and outgoing calls, SMS and video transmission even if the mobile
phone is kept in the silent mode. The moment the cell phone detector detects RF (radio frequency)
transmission signal from an activated mobile phone, it starts sounding a deep alarm and the LED blinks.
The alarm continues until the signal transmission cease.

CHAPTER ONE:

Introduction
1.1 Project description
To explain the project title clearly, the cell phone detector is a handy pocket size mobile transmission
detector that can sense the presence of an activated mobile phone from a certain distance. The cell phone
detector detects up to a distance of 8 meters. The project is to design cell phone detector to detect cell
phone when it is activated. Theory of cell phone detector and operation of the circuit are studied before
any implementation of the hard ware.
1.2 Background
Cell phone detector is one of a detector technique that detects cell phone. This technique is so important
now a day that it can be applied in military basis, schools and colleges, hospitals, prisons and etc. To get a
good grasp on what is available today let us take a close look at some of the shelf cellular phone
detectors. Most detectors are manufactured with the intent that the cellular phone is stationary and
powered on. They generally have the same features and it is questionable whether or not they actually
detect a cellular phone. The two most popular cellular phone detectors available on the market today are
produced by Berkeley Varitronics Systems and Mobile Security Products. These companies produce the
wolfhound cell phone detector and Cell buster respectively. Berkeley Varitronics Systems wolfhound
cell phone detector will detect PCS, CDMA, GSM, and cellular bands using RF signatures and has the
capability to directionally find or locate cellular phones that are nearby. The wolfhound, according to the
advertisement, can detect phones that are in standby mode, actively using voice, or data transmissions.

1.3 Statement of the Problem


Previously there was no technology to detect the cell phones in the examination hall and in cell phone
restricted areas. There is manual checking and there is still chance of having the cell phone with the
person if he/she is not checked properly. So to avoid this problem, an automatic detection of cell phone is
introduced. This is the reason why we are focused our semester project on cell phone detector. Detecting
a cellular phone signal using an accurate signal detection technique is the focus of this project.

If this solution was implemented, it would greatly reduce the risk of cellular phones getting into secure
facilities. Businesses and government would save a lot of money on security. The solution would also
greatly reduce the risk of their data leaking to the general public and losing even larger amounts of money
on security. The solution would also greatly reduce the risk of their data leaking to the general public and
losing even larger amounts of money.
1.4 Literature Review
The concept about cell phone detector is obtained from former researchers in India which is
published in 2012 as well as from the internet which have done. And also from former writeen
papers about cell phone detector and from diferent books. The main advantages of cell phone
detector is to detect cell phone in cell phone restricted area like examination halls, conference
rooms, prisons, hospitals and to avoid spying and unauthorized video transmissions.
The cell phone detector have greatest applications in different areas to have a secure and clear
information when cell phones are activated for unnecessary usages. The Cell phone detector can also
detect the incoming and outgoing calls, SMS video transmission even if the mobile phone is kept in the
silent mode.
The moment the cell phone detector detects RF transmission signal from an activated mobile phone, it
starts sounding a beep alarm and the LED blinks. The alarm continues until the signal transmission
ceases. When a transmission is elected, an alarm sequence begins that may include any combination of
visual LED glows.

1.5. Objective of the project


1.5.1 Main Objective
The main objective of the design of the cell phone detector is to try to increase the detecting range
of cell phone detector to few more meters for observing wide range of area.

1.5.2 Specific objectives

Our specific objectives are the following:

 To avoid use of mobile phone in examination halls, confidential rooms.


 To prevent spying and unauthorized video transmission.
 To know about the working principle of cell phone detector.
 To master our self in doing this project with Proteus software.
 To be familiar with the use of design and simulation tools in the design process.
 To prevent use of mobile phone in temple, offices, theaters etc.
 Generally to use mobile phones for good purposes.
1.6. Methodology
This semester project used three major steps to implement the project starting from planning,
implementing and testing. All the methods used for finding and analyzing data regarding the project

related.

1.6.1. Planning
To identify all the information and requirement such as hardware and software, planning must be done in
the proper manner. The planning phase has two main elements namely data collection and the

requirements of hardware and software.

1.6.2. Data collection


Data collection is a stage in any area of study. At this stage we planned about the projects resources and
requirements, literature studies and schedule to get more information in this study. All the materials are
collected from journal, texts book and research papers gathered from libraries and Internet.

Within the data collection period we have found the study about the cell phone detector in the Internet
and observe some research about the project related. Once we got the project manual, we tried to find out
the electronic component and other materials and some of equipment to be used.

While planning, we have observed the research about the project related, which including with study
about the electronic component such as capacitor, resistor, and transistor. The study is not just for the
function of the component but the types of small circuit build by each component related.

Hardware and Software Requirement

1.6.1.1. Hardware Requirement


Below is the list of the entire electronic components and the other materials that will support to
complete this project.
 ANTENNA
 IC CA3130
 NE555 TIMER
 BC548 TRANSISTOR
 LED
 PIEZO BUZZER
 12V SUPPLY
 RESISTORS
 CAPACITORS

1.6.1.2. Software Requirement


For software requirement, we have chosen Proteus Software. The software is used mainly to create
electronic prints for manufacturing of printed circuit boards, by electronic design engineers and electronic
technicians to manufacture electronic schematics and diagrams, and for their simulation.

1.6.3. Implementing
At this stage, after the available data is collected, the simulation and the hard ware of the project will be
implemented. The implementation stage can be explained as testing point and implement the project. The
components for this project are based on the circuit diagram designed.

1.6.4. Analysis
The analysis stage is the final stage where two points will be done. First, the whole circuit will be
specified (analyzed) and second, the conclusion will be identified from the simulation and hard ware
results.

1.7. Outline of the Project


The first chapter discusses about the background, statement of the problem, literature review, the
methodology and the objectives of the project. The second chapter explains about cell phone detector
theory. The third chapter is about the methodology of cell phone detector. The fourth chapter is concerned
with design of simple cell phone detector and its application. The fifth chapter is about simulation and the
last chapter is about the summary /discussion of the project and gives recommendation.
CHAPTER TWO
Theory of cell phone detector
Mobile phone system is referred to as “Cellular Telephone system” because the coverage area is divided
into “cells” each of which has a base station. cell phone detector, pocket size mobile transmission
detector can sense the presence of an activated mobile cell phone from a short distance. . It senses the
radio frequency (RF) transmissions from nearby cellular or mobile phones. If required, other sources of
RF transmission can also be detected including two-way radios, and other wireless communication
devices.
When a transmission is elected, an alarm sequence begins that may include any combination of visual
LED glows. In addition the unit can be used as a static or portable detector, and it can be used to
generate remote alarms, activate other equipment (including remote indication devices) and extend
alarm messages into other area. When the mobile phone is active it transmits the signal in the Form
of sine wave which passes through the space.
The encoded audio/video signal contains electromagnetic radiation which is picked up by the receiver in
the base station. The transmitter power of the modern 2G antenna in the base station is 20-100 watts.
When a GSM (Global System of Mobile communication) digital phone is transmitting, the signal is time
shared with 7 other users. That is at any one second, each of the 8 users on the same frequency is
allotted 1/8 of the time and the signal is reconstituted by the receiver to form the speech.
Peak power output of a mobile phone corresponds to 2 watts with an average of 250 mills watts of
continuous power each hand set with in a cell is allotted a particular frequency for its use. The mobile
phone transmits short signals at regular intervals to register its availability to the nearest base station. The
network data base stores the information transmitted by the mobile phone. If the mobile phone moves
from one cell to another, it will keep the connection with the base station having strongest transmission.
Mobile phone always tries to make connection with the available base station. That is why the back
light of the phone turns on intermittently while traveling. This will cause severe battery drain. So in
long journeys, battery will flat with in a fewhours.AM Radio uses frequencies between 180 kHz
and 1.6 MHz.FM radio uses 88 to 180 MHZ. TV uses 470 to 854 MHZ. Waves at higher frequencies but
within the RF region is called Microwaves. Mobile phone uses high frequency RF wave in the micro
wave region carrying huge amount of electromagnetic energy.
That is why burning sensation develops in the ear if the mobile is used for a long period. Just like a micro
wave oven, mobile phone is ‘cooking’ the tissues in the ear. RF radiation from the phone causes
oscillation of polar molecules like water in the tissues. This generates heat through friction just like the
principle of microwave oven. The strongest radiation from the mobile phone is about 2 watts which can
make connection with a base station located 2 to 3 km away .
2.1.1 Cellular phone theory
Cellular phone technology is rapidly changing. Features like Bluetooth, USB, high resolution cameras,
microphones, Internet, 802.11 wirelesses, and memory cards are added every year. Also, the
communication technology a cellular phone uses such as CDMA, GSM, 3G, and 4G are rapidly changing.

2.1.2 Cellular Phone Features


Bluetooth is a secure wireless protocol that operates at 2.4 GHz. The protocol uses a master slave
structure and is very similar to having a wireless USB port on your cellular phone. Devices like a printer,
keyboard, mouse, audio device, and storage device can be connected wirelessly. This feature is mainly
used for hands-free devices but can also be used for file transfer of pictures, music, and other data.
Universal serial bus (USB) is a way for cellular phones to connect to a computer for data transfer. This
feature is very similar to Bluetooth for a cellular phone with the exception of using a cable. On today's
cellular phones this feature is mainly used for charging the battery or programming by the manufacturer.
It can also be used to transfer pictures, music, and other data.
Cameras on cellular phones are a very popular feature that was added in the last 10 years. In recent
years, high resolution cameras have become a standard feature. Most cellular phones will come with at
least a 2 mega pixel camera and the more expensive phones can be as much as 8 mega pixels.
Microphones have been featured on cellular phones since they first came out. In the last 10 years the
microphones have become dual purpose; now there are programs on the phone that record voice to file
such as a simple voice recorder or as part of a video.
Almost every available cellular phone today has a connection to the Internet. This allows users to transfer
files and data wherever they are. Cellular phones can send emails, text messages, picture text messages,
videotext messages, and upload data to the Internet. Some cellular phones come with 802.11 wireless
built in and allows the phone to connect to any nearby wireless networks. This provides an alternate
connection method to the Internet and saves money if you're on a limited data plan. Also, connecting with
802.11 is most likely going to provide better throughput than using the cellular phone network.
Since cameras and music have become popular features on cellular phones, manufacturers have started
adding memory card slots. These memory cards provide expanded memory and allow more pictures to be
take nor music files to be stored. Most memory cards can plug directly into the computer for easy data
transfer. All these features make cellular phones today very versatile. They can connect with almost any
storage medium or computer. In the years to come, cellular phones will continue to gain more and more
features.

2.1.3 Cellular Phone Communication Standards


Currently the three main technologies used by cellular phone providers are 2G, 3G, and 4G. Each
generation of technology uses a different transmission protocol. The transmission protocols dictate how a
cellular phone communicates with the tower.
Some examples are: frequency division multiple access (FDMA), time division multiple access (TDMA),
code division multiple access (CDMA), global system for mobile communications (GSM), CDMA2000,
wideband code division multiple access (WCDMA), and time-division synchronous code-division
multiple access (TD-SCDMA). All of these protocols typically operate in the 824- 894 MHz band in the
United States. Some protocols, such as GSM (depending on the provider) will use the 1800 - 2000 MHz
bands. Figure 1 shows this.

To provide a good example of how a cellular phone transmission works, take a look at Diagram 1 which
shows how FDMA works. Each phone call uses a different frequency within the 45 MHz bandwidth.
FDMA is normally used for analog transmissions and is capable of digital transmissions.

2.1.4 Secure Facilities


Many businesses such as psychiatric hospitals, correctional facilities, Pharmaceutical companies,
government facilities, and military bases rely on keeping information protected. They build security
fortresses that shield their money making information from getting to the general public. These facilities
have many computers that house the valuable information and are not connected to the Internet.
Generally, access is restricted by guards with metal detectors and electronic devices are not allowed in or
out without proper approval.
In every secure facility it is hard to ensure that employees and visitors aren't violating the policies. The
only way to ensure someone isn't carrying a cellular phone is to search everyone as they enter and exit.
This requires a great deal of manpower and most companies can't afford that level of security.
Additionally, it will make the employees feel like the company doesn't trust them.

2.2. Cellular Phone Detectors Available Today


To get a good grasp on what is available today let us take a close look at some off the shelf cellular phone
detectors. Most detectors are manufactured with the intent that the cellular phone is stationary and
powered on. They generally have the same features and it is questionable whether or not they actually
detect a cellular phone. The two most popular cellular phone detectors available on the market today are
produced by Berkeley Varitronics Systems and Mobile Security Products. These companies produce the
wolfhound cell phone detector and Cell buster respectively.
2.3. Detecting and Locating Cell Phones in Correctional Facilities
This article details the growing problem with cellular phones in correctional facilities and lays out the
constraints used to develop their solution. According to the research, cellular phones in a correctional
facility are used to operate criminal enterprises, threaten witnesses, harass victims, plan uprisings, and
undermine security. Their problem is monitoring, controlling, and locating cellular phones in a
correctional facility.
This solution was developed for detecting cellular phones in a prison. It relies on the cellular phone
remaining stationary which, in prison facilities makes sense since movement is limited. EVI's detection
system finds cellular phones after they have already been in the facility for at least 30 minutes or if
someone is making a cell phone call .EVI doesn't provide any details on the signal detection technique
used since it is all proprietary. Also, there are no reviews or articles stating that this system works as
advertised.

2.4. Cell Phone Detection Techniques


This study examines detecting cellular phones when a person is entering a secure facility or cellular
phone restricted area. The detection technique studied requires measuring a cell phone's electromagnetic
properties and determining an identifiable signature.
Measuring the RF spectrum around 240 - 400 MHz (outside the cellular phone band) shows the most
potential. The DOE Contractor recommends developing a cellular phone detector by measuring the RF
spectrum. Spurious emissions from cellular phones are monitored and recorded when the phone is in
standby or transmitting.
Using this method has some advantages:
• No external signal required for detecting the phone
The band of frequencies is limited by the FCC and is likely to be used by most manufacturers.
• System could potentially detect more than cellular phones.
• This method should work on future generations of cellular phones.
• System could potentially detect cellular phones even when they are off.
CHAPTER THREE
Method of study
3.1 Design Description
3.1.1Components used In Cell Phone Detector

 ANTENNA
 IC CA3130
 NE555 TIMER
 BC548 TRANSISTOR
 LED
 PIEZO BUZZER
 12V SUPPLY
 RESISTORS
 CAPACITORS
1. Antenna
The size and shape of the antenna and the way it is constructed determine the gain and directivity of the
antenna. The antenna transmits and receives electromagnetic signals. When gain increases, the amount
of desired signal energy that can be captured increase but the amount of environmental noise of
interferences that captured increases by the same amount.
Antenna receives the radio frequency signals (RF signals) from the mobile phone. The radio
frequency signals are grasped by the antenna. An antenna (or aerial) is an electrical device which converts
electrical currents into radial waves and vice versa. It is usually used with a radio transmitter or radio
receiver. In transmission, a radio transmitter applies an oscillating radio frequency electric current to
antenna’s terminals and the antenna radiates the energy from the current as electromagnetic waves
(radio waves). In reception, an antenna intercepts some of the power of an electromagnetic wave in
order to produce a tiny voltage at its terminals that is applied to a receiver to be amplified. An
antenna can be used for both transmitting and receiving.
2. IC CA3130

Figure 2 .Pin diagram of IC CA3130


This IC is a 15 MHz Bi MOS Operational amplifier with MOSFET inputs and Bipolar output. The
inputs contain MOSFET transistors to provide very high input impedance and very low input current as
low as 10pA. It has high speed of performance and suitable for low input current applications.
The CA3130 series circuits operate as supply voltages ranging from 5v to 16v, (±2.5v to ± 8v).
They can be phase compensated with a single external capacitor, and have terminals for adjustment of
offset voltage for applications requiring offset-null capability.

Features
 MOSFET Input Stage Provides Very High Z = 1.5 T.
 Very Low current=5pA at 15V Operation.
 Ideal for Single-Supply Applications.
 Common-Mode Input-Voltage Range Includes Negative Supply Rail.
 Input Terminals can Swung 0.5VBelow Negative Supply Rail.
 CMOS Output Stage Permits Signal Swing to Either (or both) Supply Rails.

Applications
 Ground-Referenced Single Supply Amplifiers.
 Fast Sample-Hold Amplifiers.
 Long-Duration Timers/ Mono stables.
 High-Input-Impedance Comparators (Ideal Interface with Digital CMOS).
 High-Input-Impedance Wideband Amplifiers.
 Voltage Followers (e.g. Follower for Single-Supply D/A Converter).
 Voltage Regulators (Permits Control of Output Voltage Down to 0V).
 Peak Detector Single-Supply Full-Wave Precision Rectifier.
 Photo-Diode Sensor Amplifier.

Figure 3 Top View of IC CA3130

3. IC 555 TIMERS
The 555 timer is an integrated circuit (chip) used in variety of timer, pulse generation and
oscillator applications. The part is still in wide spread use, low price and good stability. As of 2003, it
was estimated that 1 billion units are manufactured every year.
Figure 4 Pin Diagram Of IC 555 Timer

Design
The NE555 IC is a highly stable controller capable of producing accurate timing pulses. With a
mono stable operation, the time delay is controlled by one external resistor and one capacitor. With a
stable operation, the frequency and duty cycle are accurately controlled by two external resistors and one
capacitor.
Sigenetics took over the design and production, and released the first 555’s in 1971.Depending on the
manufacturer, the standard 555 package includes over 20 transistors, 2 diodes and 15 resistors on a silicon
chip installed in an 8-pin dual-in line package (DIP8).

DETAILS OF PIN
1. Ground: is the input pin of the source of the negative DC voltage.
2. Trigger: negative input from the lower comparators (comparator B) that maintain oscillation
capacitor voltage in the lowest Vcc and set RS flip-flop.
3. Output: the output pin of the IC 555.
4. Reset: the pin that serves to reset the latch inside the IC to be influential to reset the IC work. This pin
is connected to a PNP-type transistor gate, so the transistor will be active if given a logic low. Normally
this pin is connected directly Vcc to prevent reset.
5. Control voltage: this pin serves to regulate the stability of the reference voltage negative input
(comparator A). This pin can be left hanging, but to ensure the stability of the reference
comparator A, usually associated with a capacitor of about 10nF to be rorde pin ground.
6. Threshold: this pin is connected to the positive input (comparator A) which will reset the RS flip-flop
when the voltage on the capacitor from exceeding VCC.
7. Discharge: this pin is connected to an open collector transistor Q1 is connected to ground emitter.
Switching transistor serves to clamp the corresponding node to ground on the timing of certain
8. VCC: pin it to receive a DC voltage supply. Usually this will work optimally if given a 5-15V. The
current supply can be seen in the datasheet, which is about 10-15mA.
MODES
 Mono stable mode: In this mode, the 555 functions as a “one shot” pulse generator. Applications
include timers, missing pulse detection, bounce free switches, touch switches, frequency
divider, capacitance measurement, pulse width modulation (PWM) and so on.
 A stable mode- free running mode: The 555 can operate as an oscillator. Uses include LED and
lamp flashers, pulse generation, security alarms, pulse position modulation and so on. Selecting
a thermistor as timing resistor allows the use of 555 in a temperature sensor.
 Bi stable mode or Schmitt Trigger: The 555 can operate as a flip-flop, if the DIS pin is not
connected and no capacitor is used. Uses include bounce free latched switches.

Mono stable operation


The relationships of a trigger signal, the voltage on C and the pulse width in mono stable mode in this
mono stable mode, the 555 timer receives a signal at the trigger input that falls below a third of the
voltage supply. The width of the output pulse is determined by the time constant of an RC network, which
consists of a capacitor (C) and a resistor (R). The output pulse ends when the voltage on the capacitor
equals 2/3 of the supply voltage. The output pulse width can be enlightened or shortened to the need
of the specific application by adjusting the values of R and C .The output pulse width of time t, which
is the time it takes to charge C to 2/3of the supply voltage, is given by

Where t is in seconds, R is in ohms and C is in farads. See RC circuit for an explanation to this effect.
While using the timer IC in mono stable mode, the main disadvantage is that the time span between the
two straighten two triggering pulses must be greater than the RC time constant.
Figure 5 Mono stable Mode of IC 555 Timer

Features of 555 Timers


 Turn-off time less than 2ms.
 Maximum operating frequency greater than 500KHZ.
 Timing from microseconds to hours.
 Operates in both a stable and mono stable modes.
 Adjustable duty cycle.
 TTL compatible.
 Temperature stability of 0.005% per ºC.

Applications
 Precision timing.
 Pulse generation.
 Sequential timing.
 Time delay generation.
 Pulse width modulation.
4. BC548 Transistor

Figure 6 BC 548 Transistor


A transistor is a semiconductor device commonly used to amplify or switch electronic signals. A
transistor is made of a solid piece of a semiconductor material, with at least three terminals for
connection to an external circuit.
A voltage or current applied to one pair of the transistor's terminals changes the current flowing through
another pair of terminals. Because the controlled(output) power can be much more than the
controlling (input) power, the transistor provides amplification of a signal. Some transistors are
packaged individually but most are found in integrated circuits. The transistor is the fundamental building
block of modern electronic devices.
Usage
The BJT was the most commonly used transistor in the 1960s and70s. Even after MOSFETs became
widely available, the BJT remained the transistor of choice for many analog circuits such as simple
amplifiers because of their greater linearity and ease of manufacture.
Desirable properties of MOSFETs, such as their utility in low-power devices ,usually in the
CMOS configuration, allowed them to capture nearly all market share for digital circuits; more recently
MOSFETs have captured most analog and power applications as well, including modern clocked analog
circuits, voltage regulators, amplifiers, power transmitters, motor drivers, etc.

Applications of BC548 Transistor


 A common application for NPN transistors is to use them as switches in circuits.
 Another application for NPN transistors is to use them as a voltage amplifier.
 It can also be used as current amplifier.

5. LED (Light Emitting Diode)


A light-emitting diode (LED) is an electronic light source. LEDs are used as indicator lamps in many
kinds of electronics and increasingly for lighting. LEDs work by the effect of electroluminescence,
discovered by accident in 1907.
The LED was introduced as a practical electronic component in 1962. All early devices emitted low-
intensity red light, but modern LEDs are available across the visible, ultraviolet and infra-red
wavelengths, with very high brightness.
Figure 7 Structure of Light Emitting Diode
LEDs are based on the semiconductor diode. When the diode is forward biased (switched on), electrons
are able to recombine with holes and energy is released in the form of light. These effects called
electroluminescence and the color of the light is determined by the energy gap of the semiconductor.
The LED is usually small in area (less than 1 mm²) with integrated optical components to shape its
radiation pattern and assist in reflection. The moment the bug detects RF transmission signal from
an activated mobile phone, it starts sounding a beep alarm and the LED blinks.
LED’s contain an integrated multi vibrator circuit inside which causes the LED to flash with a typical
time period. LEDs present many advantages over traditional light sources including lower energy
consumption, longer lifetime, improved robustness, smaller size and faster switching. However, they are
relatively expensive and require more precise current and heat management has traditional light
sources.

Applications of LEDs
They are used as low-energy indicators but also for replacements for traditional light sources in general
lighting, automotive lighting and traffic signals. The compact size of LEDs has allowed new text and
video displays and sensors to be developed, while their high switching rates are useful in
communications technology.
6. Piezo Buzzer
The piezo buzzer produces sound based on reverse of the piezo electric effect. These buzzers can be used
to alert a user of an event corresponding to a switching action, counter signal or sensor input. The buzzer
produces some noisy sound irrespective of the voltage variation applied to it.
It consists of Piezo crystals between two conductors. When a potential is applied across these crystals,
they push on one conductor and pull on other. These push and pull action results in a sound wave. A
piezoelectric disk generates a voltage when deformed (change in shape is greatly created).
A piezo electric sensor is device that uses the piezoelectric effect to measure acceleration, strain or force
by converting them to an electrical charge. Electrical sensors have proven to be versatile tools for the
measurement of various cases. They are used for quality assurance, process control and for research and
development in many different industries.

Figure Structure of Piezo Buzzer

7. Resistors
Figure 8 resistor
A resistor is a two-terminal electronic component that produces a voltage across its terminals that is
proportional to the electric current through it in accordance with Ohm's law:
V = IR
Resistors are elements of electrical networks and electronic circuits and are ubiquitous in most electronic
equipment. Practical resistors can be made of various compounds and films, as well as resistance wire
(wire made of a high resistivity alloy, such as nickel/chrome).
The primary characteristics of a resistor are the resistance, the tolerance, maximum working voltage
and the power rating. Other characteristics include temperature coefficient, noise, and inductance. Less
well-known is critical resistance, the value below which power dissipation limits the maximum permitted
current flow, and above which the limit is applied voltage. Critical resistance depends upon the materials
constituting the resistor as well as its physical dimensions it’s determined by design. Resistors can be
integrated into hybrid and printed circuits, as well as integrated circuits.

8. Capacitors
Figure 9 Different Models of Capacitors
A capacitor or condenser is a passive electronic component consisting of a pair of conductors separated
by a dielectric. When a voltage potential difference exists between the conductors, an electric field is
present in the dielectric. This field stores energy and produces a mechanical force between the plates. The
effect is greatest between wide, flat, parallel, narrowly separated conductors. An ideal capacitor is
characterized by a single constant value, capacitance, which is measured in farads. This is the ratio of
the electric charge on each conductor to the potential between them. In practice, the dielectric between
the plates passes a small amount of leakage current. The conductors and leads introduce an equivalent
series resistance and the dielectric has an electric field strength limit resulting in a breakdown
voltage. Capacitors are widely used in electronic circuits to block the flow of direct current while
allowing alternating current to pass, to filter out interference, to smooth the output of power supplies, and
for many other purposes. They are used in resonant circuits in radio frequency equipment to select
particular frequencies from a signal with many frequencies.

CHAPTER-4
Design of simple cell phone detector and its applications

Figure 10 block diagram

Algorithm:

STEP 1: Supply is given to activate the circuit.


STEP 2: A transaction is made through the mobile.
STEP 3: The antenna receives the IR signals and passes them to op-amp.
STEP 4: LED glows indicating that IR signals are sensed.
STEP 5: The output of op-amp is fed to the timer.
STEP 6: The timer is triggered.
STEP 7 : The timer activates the buzzer.
STEP 8: The buzzer indicates that the cell phone is detected.
Figure 11 Demo circuit

IC1 is designed as a differential amplifier non inverting input is connected to the potential divider R1, R2.
Capacitor C2 keeps the non- inverting input signal stable for easy swing to + or – .R3 is the feedback
resistor IC1 functions as a current to voltage converter, since it converts the tiny current released
by the 0.22capacitor as output voltage.

At power on output go high and LED lights for a short period. This is because + input gets more voltage
than the – input. After a few seconds, output goes low because the output current passes to the –
input through R2. Meanwhile, capacitor C1 also charges. So that both the inputs gets almost equal
voltage and the output remains low. 0.22 capacitor (no other capacitor can be substituted) remains fully
charged in the standby state.

When the high frequency radiation from the mobile phone is sensed by the circuit, 0.22 cap discharges its
stored current to the + input of IC1 and its output goes high momentarily. (In the standby state, output of
the differential amplifier is low since both inputs get equal voltage of 0.5volts or more). Any increase in
voltage at + input will change the output state to high.
Cell phone detector
Normally IC1 is off. So IC2 will be also off. When the power is switched on, as stated above, IC1will
give a high output and T1 conducts to trigger LED and Buzzer .This can be a good indication
for the working of the circuit.

.Figure Circuit Diagram

An ordinary RF detector using tuned LC circuits is not suitable for detecting signals in the GHz
frequency band used in mobile phones. The transmission frequency of mobile phones ranges from0.9 to 3
GHz with a wavelength of 3.3 to 10 cm. So a circuit detecting gigahertz signals is required for a cell
phone detector. Here the circuit uses a 0.22UF disk capacitor (C3) to capture the RF signals from the
mobile phone. The lead length of the capacitor is fixed as 18 mm with as pacing of 8 mm between the
leads to get the desired frequency.
The disk capacitor along with the leads acts as a small gigahertz loop antenna to collect the RF signals
from the mobile phone. Op-amp IC CA3130 (IC1) is used in the circuit as a current-to-voltage converter
with capacitor C3 connected between its inverting and non-inverting inputs. It is a CMOS version
using gate protected p-channel MOSFET transistors in the input to provide very high input impedance,
very low input current and very high speed of performance. The output CMOS transistor is capable
of swinging the output voltage to within 10 mV of either supply voltage terminal.

Capacitor C3 in conjunction with the lead inductance acts as a transmission line that intercepts the signals
from the mobile phone. This capacitor creates a field, stores energy and transfers the stored energy in the
form of minute current to the inputs of IC1. This will upset the balanced input of IC1 and convert the
current into the corresponding output voltage.

Capacitor C4 along with high-value resistor R1 keeps the non-inverting input stable for easy swing of the
output to high state. Resistor R2 provides the discharge path for capacitor C4.Feedback resistor R3 makes
the inverting input high when the output becomes high. Capacitor C5 (47pF) is connected across ‘strobe’
(pin 0 and ‘null’ inputs (pin 1) of IC1 for phase compensation and gain control to optimize the
frequency response. When the mobile phone signal is detected by C3, the output of IC1 becomes
high and low alternately according to the frequency of the signal as indicated by LED1. This triggers
mono stable timer IC2 through capacitor C7. Capacitor C6 maintains the base bias of transistor T1for fast
switching action. The low-value timing components R6 and C9 produce very short time delay to avoid
audio nuisance

Operation
Ordinary LC (Coil-Capacitor) circuits are used to detect low frequency radiation in the AM and FM
bands. The tuned tank circuit having a coil and a variable capacitor retrieve the signal from the carrier
wave. But such LC circuits cannot detect high frequency waves near the microwave region. Hence in the
circuit, a capacitor is used to detect RF from mobile phone considering that, a capacitor can store energy
even from an outside source and oscillate like L Ordinary LC (Coil-Capacitor) circuits are used to detect
low frequency radiation in the AM and FM bands.

The tuned tank circuit having a coil and a variable capacitor retrieve the signal from the carrier wave. But
such LC circuits cannot detect high frequency waves near the micro wave region. Hence in the circuit, a
capacitor is used to detect RF from mobile phone considering that, a capacitor can store energy even from
an outside source and oscillate like LC circuit.

Use of capacitor
A capacitor has two electrodes separated by a ‘dielectric’ like paper, mica etc. The non-polarized disc
capacitor is used to pass AC and not DC. Capacitor can store energy and pass AC signals during
discharge. 0.22UF capacitor is selected because it is a low value one and has large surface area to accept
energy from the mobile radiation. To detect the signal, the sensor part should be like an aerial. So the
capacitor is arranged as a mini loop aerial (similar to the dipole antenna used in TV).In short with this
arrangement, the capacitor works like an air core coil with ability to oscillate and discharge current.

How the capacitor senses RF?


One lead of the capacitor gets DC from the positive rail and the other lead goes to the negative input of
IC1. So the capacitor gets energy for storage. This energy is applied to the inputs of IC1so that the inputs
of IC are almost balanced with 1.4 volts. In this state output is zero. But at anytime IC can give a high
output if a small current is induced to its inputs. There are natural electromagnetic field around the
capacitor caused by the 50Hz from electrical wiring.

When the mobile phone radiates high energy pulsations, capacitor oscillates and release energy in the
inputs of IC. This oscillation is indicated by the flashing of the LED and beeping of Buzzer. In short,
capacitor carries energy and is in an electromagnetic field. So a slight change in field caused by the RF
from phone will disturb the field and forces the capacitor to release the energy.

Applications of cell phone detector

 Military Basis

In government buildings and military bases the unit should be installed in all sensitive areas. In addition
to potential RAT phones, the cell phone detector can detect bugs emitting RF within the specified band
range. In addition, it can be rigged to trigger a digital camera to capture an image of a person using a
phone in a restricted area by sending a signal to an external trigger mechanism from the remote
alarm terminal.
 Prisons

Cell phone detector may be placed outside cell doors during ‘lock up’ hours within prison to
reduce illicit cellular phone activity. In addition, cell phone detector may be installed in entrance ways,
corridors, waiting and meeting areas where in mates visits are conducted.

 Hospitals

Cell phone detector units are installed in general locations in corridors and waiting rooms to
detect nuisance public cellular phone usage. Sensitive electronic equipment within intensive care wards
and operation theatres that are vulnerable to RF interference will have units installed near them.

 Schools and Colleges

Cell phone detector units are installed in general locations in corridors, assembly points,
concourses, classrooms and lecture theatres to promote conformity and establishment order. Cell phone
detector is deployed in examination halls to deter examination fraud via text messaging and etc.

 Places of Worship

Cell phone detector units are installed as a deterrent at the main entrance. Where cell phone misuse is
severe or persistent then the units can be installed in the main prayer area with audio alert set to low
volume.

 Museums and Libraries

Cell phone detector units are installed in all areas in museums and Libraries with audio warning on low
volume.

 Court Rooms

Cell phone detector units are installed directly outside courtrooms with range set to near. Inside
courtroom itself, a wall-mounted unit silently flashing in the public gallery may alert security staff.
 General Application
Cellular phone detection and deterrence is an additional layer of security for your organization. How
effective this layer of security will be dependent on the environment, the number of devices installed and
how the detectors are integrated with other layers of security such as metal detection and access
control systems. Confidential advice and assistance regarding this product can be used is available from
your computer.

 Limitations

Range of the circuit

 The prototype version has only limited range of a few meters.


 But if a preamplifier stage using JFET or MOSFET transistor is used as an interface
between the capacitor and IC, range can be increased .

Future Work
 Trying to increase the detecting range of cell phone detector to few more meters for
observing wide range of area.

CHAPTER FIVE

Simulation
A simulation of the circuit in MATLAB, Advanced Design System (ADS), and Orcad P Spice was
created to show that this technique is very effective. The MATLAB simulation shows that mathematically
the circuit work correctly.
MATLAB Simulation
The following MATLAB code multiplies an 800 MHz sinusoid (VCO) and an 832 MHz sinusoid (input
from signal generator) together. It then filters the output using a band pass filter impulse response with a
center frequency of 32 MHz and frequency pass band of 29 - 35 MHZ.

MATLAB Code

Figure shows the frequency spectrum after the two signals have been multiplied together. This produces
the sum and the difference of the signals at 1632MHz and 32 MHz respectively. The output from
MATLAB is very similar to the down converter used on the circuit board. Looking at Figure 3 from of
the band pass filter, signals in the range of the sum and difference can be seen.
Figure shows the impulse response of the band pass filter that was designed in MATLAB. The filter
peaks at 32 MHz and cuts all other signals down significantly as it increases or decreases in frequency.
Figure shows the output of the band pass filter. All signals except for the 32 MHz signal have been
cutoff. This proves that a down converter in combination with a good band pass filter will mathematically
work for detecting a cellular phone.

Advanced design System (ADS) Simulation

The following simulation in ADS shows how the down converter works with the Band pass filter in a
circuit. Figure 7 is a schematic of the simulated circuit which includes an RF input (input from the
antenna), a LO input (voltage controlled oscillator input), down converter, and band pass filter. Figure 8
shows the output of the circuit with an RF input signal at 832 MHZ. The input spectrum graph shows a
LO signal at 800 MHz and an RF signal at 832MHz. The mixer output spectrum shows the sum inputs,
difference of the inputs, and the original input signals. The band pass output spectrum graph shows the
frequency spectrum from 0 – 7.5 GHz. All signals except the 32 MHz difference of the two signals have
been eliminated. Figure 9 shows the output of the circuit with an RF input signal at 900 MHZ.

The Band pass output spectrum graph shows that all frequencies above 838 MHz are eliminated. Figure
10 shows that all frequencies below 826 MHz are eliminated.

900 MHz RF Frequency


Orcad P Spice Simulation

After filtering out the signal it needs to be converted to a digital output. This will allow easy connection
to a computer or display. Figure 11 is the schematic for the analog to digital converter. It consist of two
100 nf capacitors and a diode. The diode only allows the positive part of the AC wave to pass through
while the two capacitors smooth the wave out to a steady DC voltage. The top graph in Figure 12 (voltage
vs time) shows the 32 MHz signal as it leaves V1. Figure 12 bottom graph shows the signal after the
diode and two capacitors have converted it to a DC voltage around 4 volts.

Figure Analog to Digital Converter Schematic


Figure Analog to Digital Converter Schematic

Design Conclusions
The simulations in MATLAB, ADS, and P Spice prove that using a down converter in conjunction with a
band pass filter can accurately detect a cellular phone that is transmitting in the area. MATLAB proved
that it is mathematically possible to multiplying two signals together (down converter) and filter them
with a band pass impulse response to accurately detect a signal. ADS proved that a circuit consisting of a
down converter, band pass filter, and VCO can accurately detect a signal. P Spice showed that this signal
can then easily be converted to digital for input to a computer or display.

CHAPTER SIX

Summary/Discussion
Cellular phone technology is gaining new data capabilities very rapidly. New features like Bluetooth,
high resolution cameras, memory cards, and Internet make them ideal for getting data in and out of
secure facilities. A cellular phone uses many different transmission protocols such as FDMA or CDMA.
These protocols dictate how a cellular phone communicates with the tower.

Typically cellular phones in the United States operate between 824 - 894 MHZ. Many businesses depend
on keeping information protected and build fortresses that called secure facilities to protect their
investment.

Currently the only way to ensure that no one is bringing a cellular phone into a secure facility is to search
everyone entering and exiting. This requires a lot of manpower and money to implement. The existing
technology available off the shelf does not accurately detect cellular phones in a secure facility. Detectors
like the Wolfhound or Cell busters sit in the entry way of a facility and randomly detect cellular phones or
devices in the area.

A better technique for accurately detecting cellular phones is needed. The first signal detection technique,
a design from circuit-projects.com was built and tested. This technique utilizes two antennas that are
tuned to 900 MHZ. The antennas resonate at this frequency and the signal is then demodulated. After
demodulation, the signal is amplified and sent to a pair of headphones for monitoring. After building the
circuit-projects design using wire wrap, two conclusions were made. Using wire wrap at these frequencies
changes the impedance of the circuit and BNC connectors make a much better connection. With this new
information an even better design was conceived. The second signal detection technique, a design
utilizing a down converter in conjunction with a band pass filter was built and tested. A VCO at 800 MHz
and an 800MHz antenna is fed into the down converter. The VCO frequency is then subtracted from the
cellular phone signal coming in around 832MHz. This produces an output from the down converter
around 32 MHz which is sent to a band pass filter with a pass band of 29 - 35 MHz leaving just the
32MHz signal. It can then be converted to a digital output using an analog to digital converter. This
design was built and tested in the lab and proven MATLAB, ADS, and P Spice simulation software.

Lab results show that a down converter and VCO circuit works, but requires a finely tuned band pass
filter which can cost a lot of time and money. Therefore computer simulation results proved that this
design will work with an Effective band pass filter. This technique, if fully implemented would greatly
improve cellular phone detection technology. Businesses would save money on security and save money
by not allowing any sensitive information to leak out.

Conclusion
Cellular phone technology is gaining new data capabilities very rapidly. Features like Bluetooth, high
resolution cameras, memory cards, and internet make them ideal for getting data in and out of secure
facilities. A cellular phone uses many different transmission protocols such as FDMA or CDMA. These
protocols dictate how a cellular phone communicates with a tower. Typically cellular phones in United
States operate between 824-894 MHZ. Many businesses depend on keeping information protected and
build fortresses that called secure facilities to protect their investment.

Currently the only way to ensure that no one is bringing cell phone into a secure facility is to search
everyone entering and exiting. This requires a lot of manpower and money to implement. This project
is used for military and civil defense for mobile radiation detecting and spying the unauthorized video
transmission in mobile phones. This is used to prevent usage of mobile phones in examination and
seminar halls. The signals emitted by the phones can interfere with some electronic equipment inside the
hospital. This could have fatal consequences. So we can use this project to detect the usage of mobile
phones in the above places.

References

[1] “Cell buster Cell Phone Detector”, Cell busters INC.2004. Accessed

September, 2008. Website http://www.cellbusters.com

[2] “Wolfhound Cell phone Detector”, Berkeley Varitronics Systems. 2010.

Accessed March, 2009.Website http://www.bysystems.com

[3] “Cell Phone Detection Techniques”, U.S. Department of Energy. October

2007. Accessed January, 2010. Website http://inspire.ornl.gov

[4] “Detecting and Locating Cell Phones in Correctional Facilities”, EVI Technology LLC. June 2007.
Accessed February, 2010.Website.

http://iiw.itt.com/files/cellHound_wpCellPhonesInPrison.pdf

[5] “Cell Phone Detector”, Circuit-Projects.com Quality Circuits Archive.

Accessed March, 2009.Website http://www.circuit-projects.com/rf-radiofrequency-circuits/cell-phone-


detector.html

[6] "How Cell Phones Work", How Stuff Works A Discovery Company. Accessed April, 2009. Website
http://www.howstuffworks.com/cellphone.htm/printable

[7] www.electronicsforu.com
[8] www.wikipedia.org

[9] www.geosites.com

[10] www.tutorials.com

[11] www.alldatasheets.com

You might also like