Monday, December 8, 2025
Search

intruder - search results

Filter by Categories

Long-range Burglar Alarm Using Laser Torch

Burglar alarm using laser torches, normally work in darkness only. But this long-range photoelectric alarm can work reliably in daytime also to warn you...

Technology Update (February 2016)

Drone that can catch another by firing a net at it Engineers from Human-Interactive Robotics Lab (HIRoLab) at Michigan Technological University have filed a patent...

MCUs in Electronics Toy applications

Microcontrollers in current Electronic toy applications is mainly used for IR interface, External EEPROM interface, Analog inputs using external ADCs and comparators, Battery input...

Internet Traffic Management Using MPLS

Multi-protocol label switching (MPLS) is a telecommunication transport mechanism that directs data from one network node to the next by using labels instead of...

Managing The IoT Lifecycle From Design Through End-of-Life

Developing applications and devices for the Internet of Things (IoT) poses unique challenges. Because IoT systems may be expected to perform for many years,...

Monitoring and Tracking Hackers’ Activities Using Honeynets

According to the Honeynet Project and Research Alliance, a honeynet is a tool that can be used to learn about targets, and methods and...

Glass Break Alarm

This circuit can be used for sounding an alarm to detect the breaking of a glass window by an intruder, even when the intruder...

Cyber Threats And Their Various Types

With so many government, commercial, defence and private systems connected to the ubiquitous Internet, cyber threats are becoming a major concern. It is important...

Be Safe With B-Safe

B-Safe is a security system that can detect and intimate the users about any intrusion or fire in a locked/closed space. A loud alarm...

Broadband over Power Lines

Despite the proliferation of broadband Internet technology in the last few years, many regions of the world, particularly rural and low-income areas, still do...
×