Microwave Perimeter Protection Detector

March 2006
Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p83
Trade Publication
The article features STR International Inc.'s R-300 microwave perimeter protection detector. It is designed to continuously learn and adjust to changes in weather and terrain height and reduces the frequency of false alarms. It also acts as an early warning system and protects a zone with a length of up to 1,000 feet.


Related Articles

  • Intrusion Detection Using Wavelet Transform and Non Negative Matrix Factorization. Yongzhen KE; Wei SUN; Wenju LIU; Ze WANG // International MultiConference of Engineers & Computer Scientists;2007, p1345 

    We analyzed the vulnerabilities of system calls based intrusion detection systems, considering modeling the transition property and modeling the frequency property for system calls invoked by certain processes, based on the report about using common exploit to fool the detector. We suggest that...

  • Facility Security: Intrusion Systems -- Part 1. Rosenberg, Paul // EC&M Electrical Construction & Maintenance;Jul2000, Vol. 99 Issue 8, p60 

    Differentiates types of intrusion detection systems to help customize a building's security plan. Breaking an electrical circuit; Interruption of a light beam; Detection of vibration, motion and capacitance change in an electrostatic field; Microwave systems.

  • STR Moves Manufacturing Operations to Canada.  // SDM: Security Distributing & Marketing;Mar2008, Vol. 38 Issue 3, p28 

    The article reports on the transfer of STR Inc.'s manufacturing operations from Europe to Toronto in Canada based on its success in the North American market as provider of outdoor microwave intrusion detection systems. STR performs well both in management and sales in Canada since 2004. The...

  • VideoMinex Purchases Remote Video Patrol.  // SDM: Security Distributing & Marketing;Feb2003, Vol. 33 Issue 2, p27 

    Focuses on the move of VideoMinex Inc. to purchase Remote Video Patrol (RVP) in the U.S. Security concepts of RVP; Enhancement of technology and management practices in RVP; Use of RVP for commercial security protection and remote video surveillance.

  • Burglars Can Be Smoked Out.  // SDM: Security Distributing & Marketing;Mar2005, Vol. 35 Issue 3, p13 

    Reports on the intrusion technology being marketed in the U.S. Concept of the technology; Aim for the installation; Features of the product.

  • Wireless Sensors Resolve Problems in Retrofits. Kohl, Jim; Amborn, Randy // Air Conditioning, Heating & Refrigeration News;12/8/2008, Vol. 235 Issue 15, p8 

    The article offers information on the advantages of wireless sensors that can solve problems in retrofits. The authors have observed that wireless technology is evolving quickly. They add that wireless has become the practical alternative to traditional sensors in common application. They claim...

  • Device Designed to Reduce False Alarms.  // SDM: Security Distributing & Marketing;Jun2006, Vol. 36 Issue 6, p51 

    The article focuses on the electronic false alarm reduction device for burglars designed by medical doctor Randall Wang in the U.S. The device is connected to an alarm panel in order for the passive infrared zones be intercepted and interpreted. A real break-in has been installed to identify...

  • SOME CLUSTERING ALGORITHMS TO ENHANCE THE PERFORMANCE OF THE NETWORK INTRUSION DETECTION SYSTEM. Panda, Mrutyunjaya; Patra, Manas Ranjan // Estudios de Economía Aplicada;Aug2008, Vol. 26 Issue 2, p795 

    Most current intrusion detection systems are signature based ones or machine learning based methods. Despite the number of machine learning algorithms applied to KDD 99 cup, none of them have introduced a pre-model to reduce the huge information quantity present in the different KDD 99 datasets....

  • Reserving judgment on IDS death. Dix, John // Network World;7/14/2003, Vol. 20 Issue 28, p32 

    Editorial. Comments on the demise of the intrusion-detection systems. Difference of role from other security components; Popularity of intrusion detection systems.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics