Pyronix has announced the first wireless low-mounted external volumetric detector to be added to its range. The new XDL12TT-WE combines Pyronix Enforcer two-way wireless technology with dependable external detection protocols, including: Dual-Vision Pet Immune, Tri-Signal Detection Logic and Gaussian Frequency Modulation (GFM), to deliver a highly dependable wireless external detector.
The new XDL12TT-WE is IP55 weatherproof rated and consists of two independent passive infrared (PIR) sensors and one microwave (MW) sensor in one common housing. This Tri-Technology (TT) of the XDL12TT-WE delivers advanced outdoor protection. To identify the presence of an intruder, the XDL12TT-WE utilises Tri-Signal Detection Logic alongside TT, whereby all three sensors must be activated sequentially in quick succession to create an alarm. This heightens the detector’s immunity to false alarms and ensures optimum detection performance in external conditions.
Along with Tri-Signal Detection Logic and TT, Pyronix has also pre-empted potential false alarm issues from the presence of pets or swaying vegetation, by including Dual-Vision Pet Immune and Anti-Sway Analytics features. The two PIRs of the XDL12TT-WE have a dedicated volumetric field of view, with the top PIR detecting outwards and up, while the bottom PIR detects outwards and down, without either crossing the central horizontal plane between them.
This setup of non-overlapping PIR sensors alongside Tri-Signal Detection Logic, delivers highly secure sequential detection and increases its tolerance to pet immunity. Anti-Sway Analytics digitally filters the environment to distinguish between the movement of trees and plants from the movements of an intruder, so that false alarm activations are kept to an absolute minimum. These external detection protocols then benefit from the advantages of Enforcer two-way wireless technology, with full supervision, anti-jamming and 128-bit wireless protocol encryption, to maximise the new XDL12TT-WE’s reliability; ensuring signals transmitted by the system are protected and any code-grabbing is prevented