Home Search
security systems - search results
If you're not happy with the results, please do another search
RFID Based Security System
A radio-frequency identification (RFID) based access-control system allows only authorised people to enter a particular area of an establishment. Authorised people are provided with...
Digital Lock Using Web Serial
A digital lock using WebSerial leverages modern microcontroller technology to create a secure and convenient access control system. This setup typically involves an ESP32...
Automatic Login System Using IndusBoard Coin
An automatic login system using the IndusBoard Coin involves setting up the board to authenticate users and grant access to a system without manual...
Car Access Bluetooth And CAN Module Reference Design
The BLE and CAN satellite module streamlines automotive design with high bandwidth, low power consumption, auto-addressing, and precise Bluetooth localization.
Integrating Bluetooth Low Energy (BLE)...
Transform Your Home with BLE: Set Up A Smart Notifier System
Ever thought about your home anticipating your arrival and responding accordingly? With our Bluetooth Low Energy (BLE) notifier setup, you can bring this futuristic...
RFID-Based Authentication System Using Arduino
The radio frequency identification (RFID) system used for the identification and tracking of objects makes use of an RFID reader and a tag. The...
Integration of Mixed Signal Processing Into Smart Locking Systems Using Finite State Machine
In the era of advancing technology, the need for security has become an essential part of everyday life. One of the basic and most...
RFID Hacking Cloning RFID Tags
RFID and NFC tags are now used almost everywhere, from metro cards to bus cards, parking lots, office attendance systems, entry gates, hotel rooms,...
Smart Home Lock Reference Design
Smart home lock reference design kits offer convenience and security, eliminating physical keys, enabling remote access, and integrating cloud services.
With the proliferation of smart...
AI Camera For Tracking Suspicious Activities
Tracking and detecting suspicious activities is one of the most demanding tasks for security personnel and systems. If a security system fails in a...