摘要:
Security systems, such as in a home or other building, periodically transmit status data to a remote facility so that the remote facility is continuously informed of the security systems' status. A user interface device at one security system, or a web browser at a personal computer, can obtain information regarding, or provide commands to, one or more other security systems at remote locations by communicating with the remote facility. The remote facility also reports specified events, such as alarms, that occur at a security system to one or more other security systems. Other information, such as video and audio data from a security system, can also be provided to the remote facility for sharing with other security systems. An intercom feature can also be established via the remote facility.
摘要:
Security systems, such as in a home or other building, periodically transmit status data to a remote facility so that the remote facility is continuously informed of the security systems' status. A user interface device at one security system, or a web browser at a personal computer, can obtain information regarding, or provide commands to, one or more other security systems at remote locations by communicating with the remote facility. The remote facility also reports specified events, such as alarms, that occur at a security system to one or more other security systems. Other information, such as video and audio data from a security system, can also be provided to the remote facility for sharing with other security systems. An intercom feature can also be established via the remote facility.
摘要:
A method and apparatus for detecting intruders. The method includes the steps of a control panel of a security system detecting an intrusion of a secured area, the control panel entering a delay period before reporting the intrusion in order to allow entry of a disarm code through a control panel disposed on a structural surface proximate an entrance to the secured area, a sensor monitoring the control panel for movement and the control panel reporting the intrusion before expiration of the delay period upon detecting movement.
摘要:
A safety light is activated by a wireless signal from a control panel in a home security system is response to detection of a fire by the system. The safety light alerts rescuers of rooms in a home in which children may be located. The light may be window, door or wall-mounted, and have a single, or dual opposing, backlit faces. The backlit face includes a logo and/or text that is quickly recognized by rescuers. For example, a logo of a firefighter carrying a baby may be used with the text “tot rescue”. The safety light may communicate status information to the control panel, such as a low battery condition or a tamper alert. A tamper alert switch detects tampering with the housing of the safety light or its installation. Additional safety lights provide ambient illumination and directional information to an exit.
摘要:
Security systems, such as in a home or other building, are interfaced with one another so that alarm messages and other information regarding a first security system are communicated to a second security system. In response, a user at the second system can send commands to the first system, such as for arming or disarming the first system. A user interface device at the second system includes an output component, such as a display screen, for displaying alarm messages from both the first and second systems. Other information, such as video and audio data from the first system, can also be provided at the second system. An input component, such as a keypad, allows the user to enter commands for controlling both the first and second systems. Communication between the security systems may be realized via an RF link, telephone link, and/or computer network.
摘要:
A home or other building security system is interfaced with a vehicle control system, such as for an automobile. The vehicle control system includes a transceiver for receiving commands from the home security system for performing certain actions, such as arming or disarming an alarm system, unlocking or locking doors, opening or closing windows, and starting or stopping the engine. The vehicle control system also transmits status information regarding the vehicle to the home security system. The vehicle can be protected as a zone or partition of the home security system. Furthermore, a remote vehicle monitoring apparatus may be provided that triggers an alarm or annunciation based on its control mode when a change of status signal is received from the vehicle. The control mode is optionally tied to the status of a home security system.
摘要:
A security system comprising a plurality of security subsystems each of the security subsystems being discretely located, typically in separate buildings. The security subsystems are interconnected by a system communications bus to enable bi-directional communication between the security subsystems. Each of the security subsystems comprises a user interface, a control panel, a plurality of security devices, a local communications bus, and a panel linking gateway. The panel linking gateway allows data on the local communications bus of each security subsystem to be transmitted to and received from the system communications bus. The security system allows a keypad or other user interface from one security subsystem to access and control a second remote security subsystem.
摘要:
A security system comprising a plurality of security subsystems each of the security subsystems being discretely located, typically in separate buildings. The security subsystems are interconnected by a system communications bus to enable bi-directional communication between the security subsystems. Each of the security subsystems comprises a user interface, a control panel, a plurality of security devices, a local communications bus, and a panel linking gateway. The panel linking gateway allows data on the local communications bus of each security subsystem to be transmitted to and received from the system communications bus. The security system allows a keypad or other user interface from one security subsystem to access and control a second remote security subsystem.
摘要:
Steam turbine nozzle blades and buckets are profiled in accordance with Tables I and II or multiples of the X,Y and R coordinates of the charts. The profiles of the nozzle blades impose a parabolic flow distribution at the throat and the buckets accommodate the incoming flow. The nozzle blades and buckets are over-cambered at their roots and tips to constrict flow from the roots and tips into the mid-regions of the blades and buckets. Improved aerodynamic efficiencies are obtained by directing the flow away from the end walls of the blades and buckets toward the efficient mid-region of the blades and buckets whereby flow velocity and angle leaving the nozzle has a non-linear distribution and the bucket velocity leaving angles are similarly non-linear.
摘要:
A turbine engine includes a gear driven booster connected to a high pressure shaft of the engine. A gear assembly connects the booster to the high pressure shaft. The booster is a high speed orthogonal booster that includes a plurality of rotor blades and a plurality of stator vanes. The booster rotates in a direction that is opposite to a direction the high pressure shaft rotates.