Home detects
 

Keywords :   


Tag: detects

$34 accessory detects HIV, syphilis, and works with any smartphone

2015-02-06 21:00:01| Extremetech

A new research initiative has created a $34 smartphone accessory that can test blood for both syphilis and HIV, requires no battery, and can be easily deployed at scale.

Tags: any works accessory hiv

 

Laser Sensor detects 1 mm distance changes.

2015-01-27 14:33:24| Industrial Newsroom - All News for Today

Designed for difficult distance-based applications over range of 25–300 mm, Model Q4X detects distance changes as small as 1 mm on targets such as black objects on black backgrounds or reflective items. High excess gain and 64-element imager combine to minimize errors in detection, counting, and validating orientation. Supplied in IP67, IP68, and IP69K rated stainless steel housing, sensor has angled 4-digit, 7-segment LED display and provides bipolar outputs. 

Tags: changes distance laser sensor

 
 

Millimeter Wave Scanner detects concealed weapons.

2015-01-05 14:31:50| Industrial Newsroom - All News for Today

With 2048 sensor elements in its transmitter and receiver, Array60 enables detection of concealed weapons underneath clothing and in backpacks. Portable standoff screening system implements wafer scale beamforming, advanced electronics, and signal processing. In addition to detecting weapons, system can detect heartbeat of person at standoff, offering solution for remote sensing of stress.

Tags: wave weapons scanner detects

 

Crystal Ink Detects Funny Money

2014-12-22 07:28:00| Chemical Processing

New photonic crystal ink developed by a team of Chinese researchers reveals intricate patterns when breathed on, making it extremely hard for counterfeiters to reproduce.

Tags: money funny crystal ink

 

Security Software detects insider and targeted threats.

2014-12-12 14:30:49| Industrial Newsroom - All News for Today

Delivering combination of dynamic community threat analysis and real-time detection of cyber attacks, X-Series Platform puts organization’s key assets at center of real-time investigations of insider and targeted threats. Organizations can identify potentially threatening individuals and hosts, understand details of any anomalous behavior, and perform quick triage and prioritization of incident response to best protect most important assets.

Tags: software security insider targeted

 

Sites : [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] next »