SourceSecurity.com US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Detailed technical specifications of Radiocontact Leaky Feeder, one of over 1 Intruder detectors from Radiocontact
  • Technical spec

Radiocontact Leaky Feeder

Contact companySaveSaveSend to a friendSend to a friend
Manufacturer: Radiocontact Ltd Radiocontact LtdDownload DatasheetDownload Datasheet
Radiocontact Leaky Feeder Intruder detector
BrandRadiocontact
Model CodeLeaky Feeder
AccessoriesPerimeter Intruder Detection System
Model InfoThe Detection system detects movement of an intruder approaching and attacking a perimeter fence. A typical perimeter fence may consist of 300 to 400 zones, all linked together by computer with outputs displayed on a screen as programmed by the customer. Other applications include volumetric detection both portable and permanent, were a centrally mounted antenna is used to generate the electromagnetic field along with a "ring" of Radiating Cable laid on the surface of the ground around the perimeter of the protected area.

Download Technical spec

Product News

border

See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition