Fusion Of All Cognitive Spectra Can Completely Solve Aerospace UAV Detector In Harsh Environments
Introduction
Parameters
Function |
Descriptions |
UAV detection |
Detection spectrum bandwidth: 70 MHZ - 6GHZ, detection focus on the 433Mhz, 868Mhz, 915Mhz, 2.4Ghz, 5.2Ghz, 5.8Ghz FPV Detection:300Mhz-6.2Ghz Analog Signal of FPV Drones Simultaneous screening number of UAV: ≧150pcs The lowest detection height: ≤0 meters Detection rate: ≧99.99 %s |
Drones Location |
For UAVs with Remote ID and Drone ID, it can parse detailed information such as drone location and pilot location. |
White and Blacklist |
The Systemcan identify ≧ 400 different model UAV including DJI series drones,and it has the autonomous learning ability. The Systemcan carry on the accurate identification of target, in-depth analysis of UAV signal, the identification of unique ID, and the black and whitelist to distinguish. Whitelist and a blacklist can be set for different targets of the same position, same frequency band, same manufacturer, same type of UAV respectively. |
Defensive Interference |
PS The Systemhas interference capabilities of 900MHz, 433Mhz; 1.5ghz, 2.4ghz, 5.8ghz; 5.2Ghz and other customized frequency bands, and covers most of the UAV communication available in market. |
Remote OAM |
After turning on the fully self-movable defense, it can enter unattended mode, detect, and strike autonomously. And a variety of OAM features are available when used with the remote server, including firmware updating, resetting, status inquiry, self-testing, parameter configuration, and more. |
GPS |
The Systemcan detect its current position using its built-in GPS. |
Networking |
The Systemcan network multiple devices through the cloud server, observe the online/abnormal status of each device, and control the device remotely through the mobile terminal (mobile phone IPAD), including but not limited to viewing the operating interface of the device system, receiving alarm information, viewing the black and whitelist, and turning on defense functions. |
Data security |
Use certificate management and data encryption between the equipment and server to ensure data reliability and security. |
Details Display