Wednesday, September 11, 2024
Home Search

security systems - search results

If you're not happy with the results, please do another search
RFID based security system

RFID Based Security System

A radio-frequency identification (RFID) based access-control system allows only authorised people to enter a particular area of an establishment. Authorised people are provided with...

Digital Lock Using Web Serial

A digital lock using WebSerial leverages modern microcontroller technology to create a secure and convenient access control system. This setup typically involves an ESP32...

Automatic Login System Using IndusBoard Coin

An automatic login system using the IndusBoard Coin involves setting up the board to authenticate users and grant access to a system without manual...

Car Access Bluetooth And CAN Module Reference Design

The BLE and CAN satellite module streamlines automotive design with high bandwidth, low power consumption, auto-addressing, and precise Bluetooth localization. Integrating Bluetooth Low Energy (BLE)...
BLE based Nearby Person Notifier

Transform Your Home with BLE: Set Up A Smart Notifier System

Ever thought about your home anticipating your arrival and responding accordingly? With our Bluetooth Low Energy (BLE) notifier setup, you can bring this futuristic...

RFID-Based Authentication System Using Arduino

The radio frequency identification (RFID) system used for the identification and tracking of objects makes use of an RFID reader and a tag. The...

Integration of Mixed Signal Processing Into Smart Locking Systems Using Finite State Machine

In the era of advancing technology, the need for security has become an essential part of everyday life. One of the  basic and most...

RFID Hacking Cloning RFID Tags

RFID and NFC tags are now used almost everywhere, from metro cards to bus cards, parking lots, office attendance systems, entry gates, hotel rooms,...

Smart Home Lock Reference Design

Smart home lock reference design kits offer convenience and security, eliminating physical keys, enabling remote access, and integrating cloud services.  With the proliferation of smart...
RPi AI camera

AI Camera For Tracking Suspicious Activities

Tracking and detecting suspicious activities is one of the most demanding tasks for security personnel and systems. If a security system fails in a...