资源描述
题 目:
艺术灯的专利
课 程:
专业技术前沿
姓 名:
秦正阳
学 院:
数理信息与工程
专 业:
计算机科学与技术
班 级:
114班
学 号:
1881110415
教 师:
李德胜
2014年11 月14日
安徽科技学院教务处制
一种艺术吊灯的专利
本实用新型公开了一种艺术吊灯,其包括一半透明筒状外罩及灯头,灯头可拆卸式地设置在外罩上,其前端伸入到外罩内,其特征在于,所述的灯头包括一底座、一灯架、一控制电路及由多个设置在不同位置上的发光体,其中控制电路及多个发光体均设置在同一电路板上,该电路板通过灯架设置在底座上;所述控制电路与多个发光体电性连接并依次驱动其发光或关闭,组成一发光部;该发光部射出的光线依次投射在外罩上,光线在该外罩的内侧壁上产生动态位移视觉。同时,由于本实用新型采用了组合式可拆卸结构及多个LED,其具有不同位置上的多个依次循环点亮的发光、发出的光线经过镂空图案后投射到外罩上,形成不断闪动、且有一定位移的图案动态视觉效果,使其照明艺术效果大大增强。
1. 一种艺术吊灯,其包括一半透明筒状外罩及灯头,灯头可拆卸式地设置在外罩上,其前端伸入到外罩内,其特征在于,所述的灯头包括一底座、一灯架、一控制电路及由多个设置在不同位置上的发光体,其中控制电路及多个发光体均设置在同一电路板上,该电路板通过灯架设置在底座上;所述控制电路与多个发光体电性连接并依次驱动其发光或关闭,组成一发光部;该发光部射出的光线依次投射在外罩上,光线在该外罩的内侧壁上产生动态位移视觉。
2. 根据权利要求1所述的艺术吊灯,其特征在于,所述的外罩上表面中部设有一通孔,所述的灯头前端直径小于该通孔直径而底座大于该通孔的直径,所述底座前部的各部分均穿过该通孔,伸入到所述外罩内。
3. 根据权利要求1所述的艺术吊灯,其特征在于,所述的发光体为单色光或复合色光LED。
4. 根据权利要求1所述的艺术吊灯,其特征在于,所述多个发光体的发光色彩及光线投射角度均不相同。
5. 根据权利要求1所述的艺术吊灯,其特征在于,所述的外罩内侧壁表面上,设有一图案层,该图案层上设有色块、图案或镂空部分。
6. 根据权利要求1所述的艺术吊灯,其特征在于,其还包括一设置在所述外罩和灯头之间的筒状内罩,所述的灯头前端发光部伸入所述的内罩;所述内罩的表面上设有一图案层,该图案层上设有色块、图案或镂空部分。
7. 根据权利要求6所述的艺术吊灯,其特征在于,所述的内罩设有一向外延伸的底座,所述的内罩前端直径小于所述外罩的通孔直径而底座大于所述外罩通孔的直径。
8. 根据权利要求7所述的艺术吊灯,其特征在于,所述的内罩底座上中部设有一通孔,所述的灯头前端直径小于该内罩通孔直径而灯头底座大于该内罩通孔的直径,所述底座前部的各部分均穿过该内罩通孔,伸入到所述内罩内。
9. 根据权利要求1所述的艺术吊灯,其特征在于,所述的电路板朝向发光体的一面设有反射层。
技术领域
本实用新型涉及灯具技术,具体涉及一种可产生动态光效的艺术吊灯。
背景技术
目前,现有的吊灯,一般是采用在透明或半透明材质制成的灯罩内,放置电灯泡、节能灯管或其它光源,使光线柔和的投射出来,形成一种温和、宁静、朦胧、浪漫的氛围。为了使其更具艺术性、观赏性,在灯罩上镀膜或设置图案,并且往往还在灯罩上设置若干镂空的图案或花纹。但是,这些图案或花纹,都只是静态的。
目前,基于LED技术的电子蜡烛等新型节能光源已经得到越来越广泛的应用,但是,其并没有在吊灯等制品中得到相应的运用,特别是LED可发出多种色光,并且环保、安全、节能,完全可以代替传统灯具,并且能够产生较好的艺术效果。
但是,由于单体LED发出的色光波长较短,其直接穿过灯罩时,所投射出来的光线效果比较单调,并缺乏动感,艺术感染力较弱。
实用新型内容
针对现有吊灯制造技术所存在的上述不足,本实用新型目提供一种采用多个LED发光体制备的可产生动态视觉效果的艺术吊灯。
本实用新型为实现上述目的所采用的技术方案是:
一种艺术吊灯,其包括一半透明筒状外罩及灯头,灯头可拆卸式地设置在外罩上,其前端伸入到外罩内,其特征在于,所述的灯头包括一底座、一灯架、一控制电路及由多个设置在不同位置上的发光体,其中控制电路及多个发光体均设置在同一电路板上,该电路板通过灯架设置在底座上;所述控制电路与多个发光体电性连接并依次驱动其发光或关闭,组成一发光部;该发光部射出的光线依次投射在外罩上,光线在该外罩的内侧壁上产生动态位移视觉。
所述的外罩上表面中部设有一通孔,所述的灯头前端直径小于该通孔直径而底座大于该通孔的直径,所述底座前部的各部分均穿过该通孔,伸入到所述外罩内。
所述的发光体为单色光或复合色光LED,所述多个发光体的发光色彩及光线投射角度均不相同。
所述的外罩内侧壁表面上,设有一图案层,该图案层上设有色块、图案或镂空部分。
所述的艺术吊灯,其还包括一设置在所述外罩和灯头之间的筒状内罩,所述的灯头前端发光部伸入所述的内罩;所述内罩的表面上设有一图案层,该图案层上设有色块、图案或镂空部分。
所述的内罩设有一向外延伸的底座,所述的内罩前端直径小于所述外罩的通孔直径而底座大于所述外罩通孔的直径。
所述的内罩底座上中部设有一通孔,所述的灯头前端直径小于该内罩通孔直径而灯头底座大于该内罩通孔的直径,所述底座前部的各部分均穿过该内罩通孔,伸入到所述内罩内。
所述的电路板朝向发光体的一面设有反射层,用于反射各LED光源的光线,使其波长增加。
本实用新型在所述的外罩、内罩的底部均设有通孔,使所述内罩、或灯头可通过所述通孔方便的置入或取出所述外罩;这种结构方便拿取、更换内罩或灯头之一,以获得不同的光影艺术效果。
本实用新型的优点在于:由于其采用了可拆卸组合式结构及多个LED发光体,且其色光、位置、角度均不相同,通过控制电路在不同位置上的依次循环点亮的多个发光体,其发出的光线透过内罩的镂空图案后投射到外罩上,即形成不断闪动、且有一定位移的图案动态视觉效果,器照明艺术效果大大增强,且其节能、环保,拿取、更换方便,通过更换内罩或灯头,即可获得不同的艺术效果,而不必更换整个灯具,可以节约材料、人工及费用。
本实用新型广泛使用于制造舞厅、酒店、家庭等各种场所使用的吊灯,可以制造出多种艺术效果。
下面结合附图与具体实施方式,对本实用新型进一步说明。
附图说明
图1为本实用新型实施例1的整体结构示意图;
图2为图1中外罩结构示意图;
图3为图1中灯头结构示意图;
具体实施方式
实施例1,参见图1~图5,本实施例提供的一种艺术吊灯,其包括一半透明筒状外罩1及灯头2,灯头2可拆卸式地设置在外罩1上,其前端伸入到外罩1内;所述的灯头2包括一底座21、一灯架22、一控制电路、一电路板23及由多个设置在不同位置上的发光体24,其中控制电路及多个发光体24均设置在同一电路板23上,该电路板23通过灯架22设置在底座21上;所述控制电路与多个发光体24电性连接并依次驱动其发光或关闭,组成一发光部;该发光部射出的光线依次投射在外罩1上,光线在该外罩1的内侧壁上产生动态位移视觉;具体的效果可通过调节控制电路控制时间、点亮方式,以及外罩1上的色彩、图案及透明度获得。
所述的外罩1上表面中部设有一通孔11,所述的灯头2前端直径小于该通孔11直径而底座21大于该通孔11的直径,所述底座21前部的各部分均穿过该通孔11,伸入到所述外罩1内。
所述的发光体24为单色光或复合色光LED,该LED可以为红、黄、蓝单色或复合白色,所述多个发光体24的发光色彩及光线投射角度均不相同,以获得较长的波长及多种艺术视觉变化效果。
所述的外罩1内侧壁表面12上,可以设有一图案层13,该图案层13上设有色块、图案或镂空部分,使光线透过这一图案层13进一步获得好的艺术效果。
所述的电路板朝向发光体的一面设有反射层(图中未示出),用于反射各LED光源的光线,使其波长增加。
本实用新型使用时,首先将外罩2吊挂,再将灯头2插入其上部通孔中,通电,灯头的发光体在控制电路的控制下,依次点亮或根据设定的程序进行点亮或关闭,产生动态光线变化效果;设置在外罩内侧的图案即在动态变化的光线作用下,投射在外罩1上,产生柔和连续或者频闪变化的动态艺术效果。
实施例2,参见图6,其基本结构与实施例1相同,其不同之处在于,该艺术吊灯,还包括一设置在所述外罩1和灯头2之间的筒状内罩3,所述的灯头2前端发光部伸入所述的内罩3中;所述内罩3的表面上设有一图案层33,该图案层上设有色块、图案或镂空部分34。
在所述的内罩2底端设有一向外延伸的底座21,所述的内罩2前端直径小于所述外罩的通孔11直径而底座21大于所述外罩通孔11的直径,以便使其插入该通孔11内。
所述的内罩底座31上中部设有一通孔,所述的灯头2前端直径小于该内罩通孔31直径而灯头底座21大于该内罩通孔31的直径,所述灯头底座21前部的各部分均穿过该内罩通孔31,伸入到所述内罩3内。
在其他实施例中,各底座与通孔的连接处,可以采用橡塑磁片材料层进行连接、固定和密封。
本实用新型广泛使用于制造舞厅、餐厅、歌厅、酒店、家庭等各种场所使用的吊灯,可以制造出多种艺术效果,尤其适合于需要经常更换艺术风格、营造不同艺术氛围的舞厅、餐厅、歌厅等场所。
本实用新型并不限于上述实施方式,采用与本实用新型上述实施例相同或近似的结构,而得到的其他艺术吊灯,均在本实用新型的保护范围之内。
12
英文文献原文和翻译原文
Computer Viruses
What are computer viruses?
According to Fred Cohen’s well-known definition, a computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself. Note that a program does not have to perform outright damage (such as deleting or corrupting files) in order to be called a “virus”. However, Cohen uses the terms within his definition (e.g. “program” and “modify”) a bit differently from the way most anti-virus researchers use them, and classifies as viruses some things which most of us would not consider viruses.
Computer viruses are bits of code that damage or erase information, files, or software programs in your computer, much like viruses that infect humans, computer viruses can spread, and your computer can catch a virus when you download an infected file from the Internet or copy an infected file from a diskette. Once the viruses is embedded into your computer’s files, it can immediately start to damage or destroy information, or it can wait for a particular date or event to trigger its activity.
What are the main types of viruses?
Generally, there are two main classes of viruses. The first class consists of the file Infectors which attach themselves to ordinary program files. These usually infect arbitrary .COM and/or .EXE programs, though some can infect any program for which execution is requested, such as .SYS,.OVL,.PRG,&.MNU files.
File infectors can be either direct action or resident. A direct-action virus selects one or more other programs to infect each other time the program which contains it is executed ,and thereafter infects other programs when “they” are executed (as in the case of the Jerusalem) or when certain other conditions are fulfilled. The Vienna is an example of a direct-action virus. Most other viruses are resident.
The second class is system or boot-record infectors: those viruses, which infect executable code, found in certain system areas on a disk that are not ordinary files. On DOS systems, there are ordinary boot-sector viruses, which infect only the DOS boot sector on diskettes. Examples include Brain, Stoned, Empire, Azusa, and Michelangelo. Such viruses are always resident viruses.
Finally, a few viruses are able to infect both (the Tequila virus is one example). There are often called “multipartite” viruses, though there has been criticism of this name; another name is “boot-and -file” virus.
File system or cluster viruses (e.g. Dir-II) are those that modify directory table entries so that the virus is loaded and executed before the desired program is. Note that the program itself is not physically altered; only the directory entry is. Some consider these infectors to be a third category of viruses, while others consider them to be a sub-category of the file infectors.
What are macro viruses?
Many applications provide the functionality to create macros. A macro is a series of commands to perform some application-specific task. Macros are designed to make life easier, for example, to perform some everyday tasks like text-formatting or spreadsheet calculations.
Macros can be saved as a series of keystrokes (the application record what keys you press); or they can be written in special macro languages (usually based on real programming languages like C and BASIC). Modern applications combine both approaches; and their advanced macro languages are as complex as general purpose programming languages. When the macro language allows files to be modified, it becomes possible to create macros that copy themselves from one file to another. Such self-replicating macros are called macro viruses.
Most macro viruses run under Word for Windows. Since this is a very popular word processor, it provides an effective means for viruses to spread. Most macro viruses are written using the macro language WordBasic. WordBasic is based on the good old BASIC programming language. However, it has many (hundreds of) extensions (for example, to deal with documents: edit, replace string, obtain the name of the current document, open new window, move cursor, etc.).
What is a Trojan horse program?
A type of program that is often confused with viruses is a ‘Trojan horse’ program. This is not a virus, but simply a program (often harmful) that pretends to be something else.
For example, you might download what you think is a new game; but when you run it, it deletes files on your hard drive. Or the third time you start the game, the program E-mail your saved passwords to another person.
Note: simply download a file to your computer won’t activate a virus or Trojan horse; you have to execute the code in the file to trigger it. This could mean running a program file, or opening a Word/Excel document in a program (such as Word or Excel) that can execute any macros in the document.
What kind of files can spread viruses?
Viruses have the potential to infect any type of executable code, not just the files that are commonly called “program files”. For example, some viruses infect executable code in the boot sector of floppy disk or in system areas of hard drives. Another type of virus, known as a “macro” virus, can infect word processing and spreadsheet documents that use macros. And it’s possible for HTML documents containing JavaScript or other types of executable code to spread viruses or other malicious code.
Since viruses code must be executed to have any effect, files that the computer treats as pure data are safe. This includes graphics and sound files such as .gif, .jpg, .mp3, .wav, .etc., as well as plain text in .txt files. For example, just viewing picture files won’t infect your computer with a virus. The virus code has to be in a form, such as an .exe program file or a Word .doc file which the computer will actually try to execute.
How do viruses spread?
The methodology of virus infection was pretty straightforward when first computer viruses such as Lehigh and Jerusalem started appearing. A virus is a small piece of computer code, usually form several bytes to a few tens of bytes, that can do, well, something unexpected. Such viruses attach themselves to executable files— programs, so that the infected program, before proceeding with whatever tasks it is supposed to do, calls the virus code. One of the simplest ways to accomplish that is to append the virus code to the end of the file, and insert a command to the beginning of the program file that would jump right to the beginning of the virus code. After the virus is finished, it jumps back to the point of origination in the program. Such viruses were very popular in the late eighties. The earlier ones only knew how to attach themselves to .Com files, since structure of a .COM file is much simpler than that of an .EXE file—yet another executable file format invented for MS-DOS operating system. The first virus to be closely studied was the Lehigh virus. It attached itself to the file that was loaded by the system at boot time—COMMAND.COM. the virus did a lot of damage to its host, so after three-four replications it was no longer usable. For that reason, the virus never managed to escape the university network.
When you execute program code that’s infected by a virus, the virus code will also run and try to infect other programs, either on the same computer or on other computers connected to it over a network. And the newly infected programs will try to infect yet more programs.
When you share a copy of an infected file with other computer users, running the file may also infect their computer; and files from those computers may spread the infection to yet more computers.
If your computer if infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and the virus copy on the hard disk will try to infect still more floppies.
Some viruses, known as ‘multipartite’ viruses, and spread both by infecting files and by infecting the boot areas of floppy disks.
What do viruses do to computers?
Viruses are software programs, and they can do the same things as any other program running on a computer. The accrual effect of any particular virus depends on how it was programmed by the person who wrote the virus.
Some viruses are deliberately designed to damage files or otherwise interfere with your computer’s operation, while other don’t do anything but try to spread themselves around. But even the ones that just spread themselves are harmful, since they damage files and may cause other problems in the process of spreading.
Note that viruses can’t do any damage to hardware: they won’t melt down your CPU, burn out your hard drive, cause your monitor to explode, etc. warnings about viruses that will physically destroy your computer are usually hoaxes, not legitimate virus warnings.
Modern viruses can exist on any system form MS DOS and Window 3.1 to MacOS, UNIX, OS/2, Windows NT. Some are harmless, though hard to catch. They can play a jingle on Christmas or reboot your computer occasionally. Other are more dangerous. They can delete or corrupt your files, format hard drives, or do something of that sort. There are some deadly ones that can spread over networks with or without a host, transmit sensitive information over the network to a third party, or even mess with financial data on-line.
What’s the story on viruses and E-mail?
You can’t get a virus just by reading a plain-text E-mail message or Usenet post. What you have to watch out for are encoded message containing embedded executable code (i.e., JavaScript in HTML message) or message that include an executable file attachment (i.e., an encoded program file or a Word document containing macros).
In order to activate a virus or Trojan horse program, you computer has to execute some type of code .This could be a program attached to an E-mail, a Word document you downloaded from the Internet, or something received on a floppy disk. There’s no special hazard in files attached to Usenet posts or E-mail messages: they’re no more dangerous than any other file.
What can I do to reduce the chance of getting viruses from E-mail?
Treat any file attachments that might contain executable code as carefully as you would any other new files: save the attachment to disk and then check it with an up-to-date virus scanner before opening the file.
If you E-mail or news software has the ability to automatically execute JavaScript, Word macros, or other executable code contained in or attached to a mes
展开阅读全文