"anti uav module"
5.2GHz Drone Jamming Module 100 Watt an toàn ổn định chống UAV Module
Model1:5800-100W-SG Parameters Test item Metric Unit Remarks frequency range 5150-5350 /5725-5850 MHz With an efficient sweep source/Customizable frequency band working voltage 32 V / gain 45-50 db / Output Power 50±0.5 dBm 7.5A Output port in SWR ≤1.30 / No power supply, the grid points the test High and low temperature test Working environment temperature: (℃) -40~+55 ℃ Power stability 1.0 dB -40℃~+55℃ Power supply requirements ≥15A / A CW output of 100W Power supply
10W 1.2GHz Drone Jamming Module Custom Signal Jammer Module Với Công nghệ GaN Lora
Test item Metric Unit Remarks frequency range 2400-2500/1550-1 620/1180-1280/84 0-930/420-450 MHz With an efficient sweep source/Customizable frequency band working voltage 28 V / gain 38-40 db / Output Power 40±0.5 dBm 1. 1A Output port in SWR ≤1.30 / No power supply, the grid points the test High and low temperature test Working environment temperature: (℃) -40~+55 ℃ Power stability 1.0 dB -40℃~+55℃ Power supply requirements ≥2A / A CW output of 20W Power supply interface
Máy dò chống máy bay không người lái gắn trên mái nhà 100MHz-6GHz, Máy dò UAV di động có điều khiển từ xa
1,Overview The TQ02 vehicle mounted drone detection and control integrated equipment integrates detection, positioning, and countermeasures units, which can achieve detection, identification, positioning, tracking, and interference disposal of invasive drones. This device can monitor the serial number, model, position (longitude, latitude, azimuth), speed, altitude, takeoff point, return point, trajectory, remote control position (longitude, latitude, azimuth) and other
70-6200MHz Thiết bị chặn truyền hình chống máy bay không người lái tích hợp
1. Introduction With the rapid development and popularization of drone technology, drones have shown great application potential in aerial photography, agriculture, rescue, security and other fields, but at the same time they have also brought increasingly serious safety risks. Incidents such as illegal intrusions, malicious reconnaissance, and privacy violations occur frequently, posing serious threats to national security, public safety, and personal privacy. Therefore, the