| Sign In | Join Free | My burrillandco.com |
|
...Access Control and Monitoring System 8inch, Android 7.1, RK3399 6 cores CPU, 2G+16G storage, Infrared binocular wide dynamic liveness detection camera Support time attendance, access control by face, card an...
...detection camera Support time attendance, access control by face, card and password. Support multiple face recognition. Support remote access control and monitoring by the mobile phone in LAN enviroment Supp...
...Access Control Machine With 4G Module Face recognition access control terminal machine which integrates Beward Bi-Scan face recognition technology,it's suitable for office areas,hotels,office buildings,schoo...
...Access Control and Monitoring System 8inch, Android 7.1, RK3399 6 cores CPU, 2G+16G storage, Infrared binocular wide dynamic liveness detection camera Support time attendance, access control by face, card an...
...detection camera Support time attendance, access control by face, card and password. Support multiple face recognition. Support remote access control and monitoring by the mobile phone in LAN enviroment Supp...
... type metal case is a type of RFID standalone access control system that is designed to be compact and durable. The slim type metal case design makes this type of RFID standalone access control system ideal ...
HF-A5 Free SDK WIFI TCP/IP Android OS Fingerprint Access Control And Time Attendance Management Specifications *Hardware Configuration 1 Central Processor Quad-core processor 2 Memory DDR SDRAM 3 Flash NandFlas...
... design, shows shinny and elegant outlook with attractive colors which will suit any kinds of offices. Able to do both time attendance and access controller functions. Able to communicate with TCP (LAN), USB...
... wiring can be composed of a high-performance low-cost real-time networking IC card management system end equipment, after reading the real-time transmission card number information to the remote computer, c...
...access control with time attendance device system none chips AI dedicated chip algorithm faceos living detection photo/video ant-fake recognition speed 0.1s boot speed 0.1s recognition distance 0.5-1m recogn...
...Access Control Linux Face Recognition Features: Support Real Time Human Body Detection . Using Linux operating system, better system stability. Face recognition algorithm to accurately recognize faces, face ...
...Access Control Systems Features: Support Real Time Human Body Detection . Using Linux operating system, better system stability. Face recognition algorithm to accurately recognize faces, face recognition tim...
HFSecurity RA05M Linux Palm Face Recognition Fac Mask Detect Time Attendance Access Control Device GB Face Recognition detector Accurately verify facial features, even wearing glasses, masks, a hat or makeup, H...
HF Security HF-A5 Price Of Granding Fingerprint Time WIFI TCP/IP Android OS Fingerprint Access Control Fingerprint Specifications *Hardware Configuration 1 Central Processor Quad-core processor 2 Memory DDR SDR...
...Access Control Linux Face Recognition Features: Support Real Time Human Body Detection . Using Linux operating system, better system stability. Face recognition algorithm to accurately recognize faces, face ...
...Access Control Systems Features: Support Real Time Human Body Detection . Using Linux operating system, better system stability. Face recognition algorithm to accurately recognize faces, face recognition tim...
...access control device supporting iris, face, password, and optional IC card authentication. It features automatic lens pitching to adapt to users of different heights. Equipped with a 7-inch touch display, a...
Product Overview The D20 binocular iris access control device supports iris, IC card, and password multi-authentication methods. It can communicate with the access control management platform via RS-485 and TCP...
... attendees enter or leave the site, they can use the device rules to identify the device, perform face punching on the device, and cooperate with the opening control of the gates or access control devices to...
... attendees enter or leave the site, they can use the device rules to identify the device, perform face punching on the device, and cooperate with the opening control of the gates or access control devices to...