Search

intruder - search results

Filter by Categories

Directed Energy Weapons: Less-Lethal Laser Weapons

Under directed energy weapons, so far we have covered particle beam weapons and high-power microwaves. Let us now take a look at some less-lethal...

Long-range Burglar Alarm Using Laser Torch

Burglar alarm using laser torches, normally work in darkness only. But this long-range photoelectric alarm can work reliably in daytime also to warn you...

Technology Update (February 2016)

Drone that can catch another by firing a net at it Engineers from Human-Interactive Robotics Lab (HIRoLab) at Michigan Technological University have filed a patent...

MCUs in Electronics Toy applications

Microcontrollers in current Electronic toy applications is mainly used for IR interface, External EEPROM interface, Analog inputs using external ADCs and comparators, Battery input...

Internet Traffic Management Using MPLS

Multi-protocol label switching (MPLS) is a telecommunication transport mechanism that directs data from one network node to the next by using labels instead of...

Managing The IoT Lifecycle From Design Through End-of-Life

Developing applications and devices for the Internet of Things (IoT) poses unique challenges. Because IoT systems may be expected to perform for many years,...

Monitoring and Tracking Hackers’ Activities Using Honeynets

According to the Honeynet Project and Research Alliance, a honeynet is a tool that can be used to learn about targets, and methods and...

Glass Break Alarm

This circuit can be used for sounding an alarm to detect the breaking of a glass window by an intruder, even when the intruder...

What are the different types of Cyberthreats

With so many government, commercial, defence and private systems connected to the ubiquitous Internet, cyber threats are becoming a major concern. It is important...

Be Safe With B-Safe

B-Safe is a security system that can detect and intimate the users about any intrusion or fire in a locked/closed space. A loud alarm...