NAPCO IQ Profiler Intruder detector
Technical Specification
- Make: NAPCO
- Model code: IQ Profiler
- PIR Detectors: Yes
- Coverage/ Range m: 15.2 x 15.2
- Angle of Detection o: 85
Uses Microprocessor PIR Technology. 22.7 kg Pet Immunity and Superior False Alarm Discrimination with Unique Dual Focal Lenses. Bi-Optic Contour Case and Dual Focal Lenses provide exceptional distance profiling. Sealed Sensor Chamber prevents insects, draft and dust interference. Utilises analog to digital conversion.Sheilded high-performance aspheric lenses plus look-down/creep zone.
Read moreMake | NAPCO |
---|---|
Manufacturer | NAPCO Security Systems Inc |
Category | Intruder Alarms>Intruder detectors |
Model code | IQ Profiler |
PIR Detectors | Yes |
Coverage/ Range m | 15.2 x 15.2 |
Angle of Detection o | 85 |
Pet Tolerance | Yes |
Power Consumption | 28 |
Sealed Optics | Yes |
Creep Zone | Look-Down/Creep Zone |
Wall/Ceiling Mount | Wall or Corner |
Electrical Specifications | Power Supply: 10.6 ~ 16 |
Physical Specifications | Dimensions mm: 1140 x 640 x 460 |
Environmental Specifications | Operating Temp oC: -10 ~ +50 |
Additional info | Uses Microprocessor PIR Technology. 22.7 kg Pet Immunity and Superior False Alarm Discrimination with Unique Dual Focal Lenses. Bi-Optic Contour Case and Dual Focal Lenses provide exceptional distance profiling. Sealed Sensor Chamber prevents insects, draft and dust interference. Utilises analog to digital conversion.Sheilded high-performance aspheric lenses plus look-down/creep zone. |
Download PDF version Download PDF version |
You might be interested in these products
- See other NAPCO products
- NAPCO Intruder alarm system control panels & accessories
- NAPCO Intruder alarm communicators
Related Whitepapers
Market Report: Cannabis at a glance
Optimise your business with analytics and AI
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download