Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
What to Upload to SlideShare
What to Upload to SlideShare
Loading in …3
×
1 of 8

Perimeter security with lidar technology

1

Share

Perimeter security with Lidar technology

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Perimeter security with lidar technology

  1. 1. Perimeter security with LiDAR technology
  2. 2. Two-dimensional scanning of the environment with laser scanners,
  3. 3. A pulse time measurement to detect the exact localisation of objects and people through reflected light and transmit the size, distance and speed
  4. 4. Very low rate of false alarms
  5. 5. Adjustable detection range and object characteristics (size, duration within detection range)
  6. 6. Hidden installation is also possible
  7. 7. Several alarm zones with different parameters can be set
  8. 8. Sabotage monitoring

×