摘要:
Steam turbine nozzle blades and buckets are profiled in accordance with Tables I and II or multiples of the X,Y and R coordinates of the charts. The profiles of the nozzle blades impose a parabolic flow distribution at the throat and the buckets accommodate the incoming flow. The nozzle blades and buckets are over-cambered at their roots and tips to constrict flow from the roots and tips into the mid-regions of the blades and buckets. Improved aerodynamic efficiencies are obtained by directing the flow away from the end walls of the blades and buckets toward the efficient mid-region of the blades and buckets whereby flow velocity and angle leaving the nozzle has a non-linear distribution and the bucket velocity leaving angles are similarly non-linear.
摘要:
Security systems, such as in a home or other building, periodically transmit status data to a remote facility so that the remote facility is continuously informed of the security systems' status. A user interface device at one security system, or a web browser at a personal computer, can obtain information regarding, or provide commands to, one or more other security systems at remote locations by communicating with the remote facility. The remote facility also reports specified events, such as alarms, that occur at a security system to one or more other security systems. Other information, such as video and audio data from a security system, can also be provided to the remote facility for sharing with other security systems. An intercom feature can also be established via the remote facility.
摘要:
Security systems, such as in a home or other building, periodically transmit status data to a remote facility so that the remote facility is continuously informed of the security systems' status. A user interface device at one security system, or a web browser at a personal computer, can obtain information regarding, or provide commands to, one or more other security systems at remote locations by communicating with the remote facility. The remote facility also reports specified events, such as alarms, that occur at a security system to one or more other security systems. Other information, such as video and audio data from a security system, can also be provided to the remote facility for sharing with other security systems. An intercom feature can also be established via the remote facility.
摘要:
A method and apparatus for detecting intruders. The method includes the steps of a control panel of a security system detecting an intrusion of a secured area, the control panel entering a delay period before reporting the intrusion in order to allow entry of a disarm code through a control panel disposed on a structural surface proximate an entrance to the secured area, a sensor monitoring the control panel for movement and the control panel reporting the intrusion before expiration of the delay period upon detecting movement.
摘要:
A turbine engine includes a gear driven booster connected to a high pressure shaft of the engine. A gear assembly connects the booster to the high pressure shaft. The booster is a high speed orthogonal booster that includes a plurality of rotor blades and a plurality of stator vanes. The booster rotates in a direction that is opposite to a direction the high pressure shaft rotates.
摘要:
A variable area turbine nozzle includes a plurality of circumferentially adjoining nozzle segments. Each nozzle segment includes outer and inner bands, with a plurality of first vane segments fixedly joined therebetween. A plurality of second vane segments adjoin respective ones of the first vane segments to define therewith corresponding vanes which are spaced apart to define respective throats of minimum flow area for channeling therethrough combustion gas. The second vane segments are pivotable to selectively vary the throat area.
摘要:
A variable cycle jet engine is provided with a mixing duct assembly which mixes core engine exhaust gas with bypass air when the engine is operating in a turbofan mode and which blocks flow from the core engine and isolates the core engine from the bypass flow when the engine is operating as a ramjet.
摘要:
An optical beam switching mechanism is used from switching a light beam between a plurality of light beam paths. A rhombic prism is mounted for rotation on an axis and is rotated between positions by a geneva mechanism. A plurality of microswitches are positioned to reposition the prism after rotation to a predetermined position. The geneva mechanism is driven by an electric motor and has an index wheel attached to a cradle supporting the prism which index wheel is rotated by a drive arm connected to the electric motor.
摘要:
A security system comprising a plurality of security subsystems each of the security subsystems being discretely located, typically in separate buildings. The security subsystems are interconnected by a system communications bus to enable bi-directional communication between the security subsystems. Each of the security subsystems comprises a user interface, a control panel, a plurality of security devices, a local communications bus, and a panel linking gateway. The panel linking gateway allows data on the local communications bus of each security subsystem to be transmitted to and received from the system communications bus. The security system allows a keypad or other user interface from one security subsystem to access and control a second remote security subsystem.
摘要:
An apparatus and method for wireless doorbell and security control panel interaction is provided. The system includes a wireless doorbell, a security control panel, and at least one control panel activation device having a transmitter and a manually activated switch or button. The control panel is in communication with the at least one control panel activation device by way of the transmitter. The control panel includes a receiver for receiving signals transmitted from the at least one control panel activation device via the transmitter. A security keypad having a speaker device for broadcasting an alarm or message related to functions of the security system is in communication with the control panel as well. At least one auxiliary security device is also in communication with the control panel. The auxiliary security device may include an assortment of devices that perform ancillary functions that enhance the functionality of the security control panel.