| Availability: | |
|---|---|
| Quantity: | |
THOR M10
1. Long-Range Detection & Precision Jamming
Detection Radius ≥5 km, Jamming Radius ≥3 km: It utilizes passive radio frequency scanning to detect drone signals (control, video transmission, and navigation) within 5 km, with electromagnetic jamming covering 3 km.
Selective Targeting: It is capable of disabling a specific drone in a swarm while leaving others operational, ensuring minimal collateral impact.
2. AI-Powered Autonomous Database
Adaptive Learning: AI deep learning algorithms automatically analyze spectrum data, update drone model libraries, and adapt to new drone iterations without manual intervention.
Low False Alarm/Missed Detection Rates: Effective in complex electromagnetic environments, reducing false alerts for consumer, industrial, and non-standard drones.
3. Full-Spectrum Drone Identification
Comprehensive Data Extraction: It accurately identifies drone serial numbers, model, location, speed, altitude, flight path, and remote controller position.
360° Omnidirectional & Directional Search: It switches from omnidirectional scanning to directional tracking upon threat detection, pinpointing drone approach angles.
4. Rapid Deployment & Network Integration
Portable Design: It supports vehicle-mounted, handheld, or backpack deployment for patrols or stationary monitoring.
Centralized Command Compatibility: It integrates with backend platforms to report detection data, jamming logs, and system status in real time.
1. Long-Range Detection & Precision Jamming
Detection Radius ≥5 km, Jamming Radius ≥3 km: It utilizes passive radio frequency scanning to detect drone signals (control, video transmission, and navigation) within 5 km, with electromagnetic jamming covering 3 km.
Selective Targeting: It is capable of disabling a specific drone in a swarm while leaving others operational, ensuring minimal collateral impact.
2. AI-Powered Autonomous Database
Adaptive Learning: AI deep learning algorithms automatically analyze spectrum data, update drone model libraries, and adapt to new drone iterations without manual intervention.
Low False Alarm/Missed Detection Rates: Effective in complex electromagnetic environments, reducing false alerts for consumer, industrial, and non-standard drones.
3. Full-Spectrum Drone Identification
Comprehensive Data Extraction: It accurately identifies drone serial numbers, model, location, speed, altitude, flight path, and remote controller position.
360° Omnidirectional & Directional Search: It switches from omnidirectional scanning to directional tracking upon threat detection, pinpointing drone approach angles.
4. Rapid Deployment & Network Integration
Portable Design: It supports vehicle-mounted, handheld, or backpack deployment for patrols or stationary monitoring.
Centralized Command Compatibility: It integrates with backend platforms to report detection data, jamming logs, and system status in real time.
Detection Modes: it supports both omnidirectional detection and directional direction finding.
Algorithms: it is compatible with spectrum recognition, DroneID, and RemoteID technologies.
Detection Frequency Range: 300 MHz to 6000 MHz.
Weight: 6.5 kg.
Protection Rating: IP65 (dust-tight and protected against water jets).
Maximum Power Consumption: 480 W.
Control Method: 10.1-inch touchscreen operation.
Detection Modes: it supports both omnidirectional detection and directional direction finding.
Algorithms: it is compatible with spectrum recognition, DroneID, and RemoteID technologies.
Detection Frequency Range: 300 MHz to 6000 MHz.
Weight: 6.5 kg.
Protection Rating: IP65 (dust-tight and protected against water jets).
Maximum Power Consumption: 480 W.
Control Method: 10.1-inch touchscreen operation.
Protection of Sensitive Areas: Government facilities, military bases, and other high-security zones.
Event Security: Low-altitude safety assurance during major public events.
Critical Infrastructure Defense: Safeguarding airports, nuclear power plants, and other essential facilities.
Border Patrol: Preventing illegal drone intrusions in border regions.
Protection of Sensitive Areas: Government facilities, military bases, and other high-security zones.
Event Security: Low-altitude safety assurance during major public events.
Critical Infrastructure Defense: Safeguarding airports, nuclear power plants, and other essential facilities.
Border Patrol: Preventing illegal drone intrusions in border regions.