Search
intruder - search results
Long-range Burglar Alarm Using Laser Torch
Burglar alarm using laser torches, normally work in darkness only. But this long-range photoelectric alarm can work reliably in daytime also to warn you...
Technology Update (February 2016)
Drone that can catch another by firing a net at it
Engineers from Human-Interactive Robotics Lab (HIRoLab) at Michigan Technological University have filed a patent...
MCUs in Electronics Toy applications
Microcontrollers in current Electronic toy applications is mainly used for IR interface, External EEPROM interface, Analog inputs using external ADCs and comparators, Battery input...
Internet Traffic Management Using MPLS
Multi-protocol label switching (MPLS) is a telecommunication transport mechanism that directs data from one network node to the next by using labels instead of...
Managing The IoT Lifecycle From Design Through End-of-Life
Developing applications and devices for the Internet of Things (IoT) poses unique challenges. Because IoT systems may be expected to perform for many years,...
Monitoring and Tracking Hackers’ Activities Using Honeynets
According to the Honeynet Project and Research Alliance, a honeynet is a tool that can be used to learn about targets, and methods and...
Glass Break Alarm
This circuit can be used for sounding an alarm to detect the breaking of a glass window by an intruder, even when the intruder...
Cyber Threats And Their Various Types
With so many government, commercial, defence and private systems connected to the ubiquitous Internet, cyber threats are becoming a major concern. It is important...
Be Safe With B-Safe
B-Safe is a security system that can detect and intimate the users about any intrusion or fire in a locked/closed space. A loud alarm...
Broadband over Power Lines
Despite the proliferation of broadband Internet technology in the last few years, many regions of the world, particularly rural and low-income areas, still do...



