Saturday, November 9, 2024
Home Search

security systems - search results

If you're not happy with the results, please do another search

RFID-Based Authentication System Using Arduino

The radio frequency identification (RFID) system used for the identification and tracking of objects makes use of an RFID reader and a tag. The...

Integration of Mixed Signal Processing Into Smart Locking Systems Using Finite State Machine

In the era of advancing technology, the need for security has become an essential part of everyday life. One of the  basic and most...

RFID Hacking Cloning RFID Tags

RFID and NFC tags are now used almost everywhere, from metro cards to bus cards, parking lots, office attendance systems, entry gates, hotel rooms,...

Smart Home Lock Reference Design

Smart home lock reference design kits offer convenience and security, eliminating physical keys, enabling remote access, and integrating cloud services.  With the proliferation of smart...
RPi AI camera

AI Camera For Tracking Suspicious Activities

Tracking and detecting suspicious activities is one of the most demanding tasks for security personnel and systems. If a security system fails in a...
Coal Mining Robot Prototype

Coal Mining Safety Robot Using Arduino

The main objective of this project is to design a coal mining safety robot to detect toxic gases emitted in coal mines. It is...

Top 10 Raspberry Pi Project Ideas

Let’s look at some new Raspberry Pi project ideas for you to get busy with this year. Interested in exploring an even wider range of...
The Kria SOM Developer kit

Streamlining Embedded Design using FPGAs

FPGAs have always been at the forefront of innovation in telecommunication and networking. For a long time, they had been an unexplored realm when...

Arduino-Based Wireless Visitors Counter

Information about the total number of persons present inside a building such as a hospital, shopping mall, or factory helps provide crucial information to...

Suspicious Activity Tracking AI Camera

Tracking and detecting suspicious activity is one of the most demanding tasks for many security personnel and systems. If a security system fails in...