Integrated Microwave Technologies introduces its CTx-II COFDM Transmitter, which now features Bluetooth® capabilities.

The CTx-II is an ultra-small, low-power, SD, COFDM video/audio transmitter with standard selectable modulation bandwidths of 6, 7 and 8 MHz. It features H.264 SD encoding and operates in the standard 2k DVB-T COFDM mode.

“The Bluetooth-capable CTx-II is specifically designed for integration into a system featuring a 10-pin standard Molex interface connector, which is ideal for the law enforcement market,” says Integrated Microwave Technologies Divisional Chief Executive Stephen Shpock. “Its low power consumption makes the CTx-II ideal for integration with cameras going into very small concealments. It is also versatile enough to be applicable to the robotics and UAV markets.” 

The IMT CTx-II Transmitter can be operated in 1.25- or 2.5-MHz narrow bandwidth COFDM (NBCOFDM) modes (optional). This mode uses the RF spectrum more efficiently, permitting more transmitters to be used simultaneously, or their useful range to be extended. Narrow bandwidth also delivers an extended usable range without requiring additional power output. This saves battery power and extends operational run times.

Users can program the video test pattern generator built into the CTx-II to turn on automatically if video input is lost. The CTx-II also features industry-standard BCRYPT AES encryption, preventing unauthorized viewing of the transmitted video.

The CTx-II requires little setup and is easy to use. Simply connect an antenna, apply power and video, and select a preset. Using IMT’s Smart Phone App, one can make configuration changes on the fly without accessing the unit buried inside concealments. For advanced functions, such as changing frequency plans, AES encryption keys or unit naming, eConn, an easy-to-use Windows administration software package, is supplied. eConn connects to the CTx-II through a mini USB connector or Bluetooth, allowing an administrator to configure up to 16 custom presets. These presets can store as much or as little information as the administrator wishes. Access control ensures that the end user cannot corrupt the configurations set up by the administrator.

More information can be found at



December 18, 2012