ImageVerifierCode 换一换
格式:DOC , 页数:37 ,大小:327.19KB ,
资源ID:7492704      下载积分:10 金币
快捷注册下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

开通VIP
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.zixin.com.cn/docdown/7492704.html】到电脑端继续下载(重复下载【60天内】不扣币)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

开通VIP折扣优惠下载文档

            查看会员权益                  [ 下载后找不到文档?]

填表反馈(24小时):  下载求助     关注领币    退款申请

开具发票请登录PC端进行申请

   平台协调中心        【在线客服】        免费申请共赢上传

权利声明

1、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
2、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
3、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
4、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前可先查看【教您几个在下载文档中可以更好的避免被坑】。
5、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
6、文档遇到问题,请及时联系平台进行协调解决,联系【微信客服】、【QQ客服】,若有其他问题请点击或扫码反馈【服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【版权申诉】”,意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:0574-28810668;投诉电话:18658249818。

注意事项

本文(专业技术前沿.doc)为本站上传会员【pc****0】主动上传,咨信网仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知咨信网(发送邮件至1219186828@qq.com、拔打电话4009-655-100或【 微信客服】、【 QQ客服】),核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载【60天内】不扣币。 服务填表

专业技术前沿.doc

1、 题 目: 艺术灯的专利 课 程: 专业技术前沿 姓 名: 秦正阳 学 院: 数理信息与工程 专 业: 计算机科学与技术 班 级: 114班 学 号: 18

2、81110415 教 师: 李德胜 2014年11 月14日 安徽科技学院教务处制 一种艺术吊灯的专利 本实用新型公开了一种艺术吊灯,其包括一半透明筒状外罩及灯头,灯头可拆卸式地设置在外罩上,其前端伸入到外罩内,其特征在于,所述的灯头包括一底座、一灯架、一控制电路及由多个设置在不同位置上的发光体,其中控制电路及多个发光体均设置在同一电路板上,该电路板通过灯架设置在底座上;所述控制电路与多个发光体电性

3、连接并依次驱动其发光或关闭,组成一发光部;该发光部射出的光线依次投射在外罩上,光线在该外罩的内侧壁上产生动态位移视觉。同时,由于本实用新型采用了组合式可拆卸结构及多个LED,其具有不同位置上的多个依次循环点亮的发光、发出的光线经过镂空图案后投射到外罩上,形成不断闪动、且有一定位移的图案动态视觉效果,使其照明艺术效果大大增强。 1. 一种艺术吊灯,其包括一半透明筒状外罩及灯头,灯头可拆卸式地设置在外罩上,其前端伸入到外罩内,其特征在于,所述的灯头包括一底座、一灯架、一控制电路及由多个设置在不同位置上的发光体,其中控制电路及多个发光体均设置在同一电路板上,该电路板通过灯架设置在底座上

4、所述控制电路与多个发光体电性连接并依次驱动其发光或关闭,组成一发光部;该发光部射出的光线依次投射在外罩上,光线在该外罩的内侧壁上产生动态位移视觉。 2. 根据权利要求1所述的艺术吊灯,其特征在于,所述的外罩上表面中部设有一通孔,所述的灯头前端直径小于该通孔直径而底座大于该通孔的直径,所述底座前部的各部分均穿过该通孔,伸入到所述外罩内。 3. 根据权利要求1所述的艺术吊灯,其特征在于,所述的发光体为单色光或复合色光LED。 4. 根据权利要求1所述的艺术吊灯,其特征在于,所述多个发光体的发光色彩及光线投射角度均不相同。 5. 根据权利要求1所述的艺术吊灯,其特征在于,所述的外罩内侧壁表

5、面上,设有一图案层,该图案层上设有色块、图案或镂空部分。 6. 根据权利要求1所述的艺术吊灯,其特征在于,其还包括一设置在所述外罩和灯头之间的筒状内罩,所述的灯头前端发光部伸入所述的内罩;所述内罩的表面上设有一图案层,该图案层上设有色块、图案或镂空部分。 7. 根据权利要求6所述的艺术吊灯,其特征在于,所述的内罩设有一向外延伸的底座,所述的内罩前端直径小于所述外罩的通孔直径而底座大于所述外罩通孔的直径。 8. 根据权利要求7所述的艺术吊灯,其特征在于,所述的内罩底座上中部设有一通孔,所述的灯头前端直径小于该内罩通孔直径而灯头底座大于该内罩通孔的直径,所述底座前部的各部分均穿过该内罩通孔,

6、伸入到所述内罩内。 9. 根据权利要求1所述的艺术吊灯,其特征在于,所述的电路板朝向发光体的一面设有反射层。 技术领域 本实用新型涉及灯具技术,具体涉及一种可产生动态光效的艺术吊灯。 背景技术 目前,现有的吊灯,一般是采用在透明或半透明材质制成的灯罩内,放置电灯泡、节能灯管或其它光源,使光线柔和的投射出来,形成一种温和、宁静、朦胧、浪漫的氛围。为了使其更具艺术性、观赏性,在灯罩上镀膜或设置图案,并且往往还在灯罩上设置若干镂空的图案或花纹。但是,这些图案或花纹,都只是静态的。 目前,基于LED技术的电子蜡烛等新型节能光源已经得到越来越广泛的应用,但是,其并没有在吊灯等制品中得到相应的

7、运用,特别是LED可发出多种色光,并且环保、安全、节能,完全可以代替传统灯具,并且能够产生较好的艺术效果。 但是,由于单体LED发出的色光波长较短,其直接穿过灯罩时,所投射出来的光线效果比较单调,并缺乏动感,艺术感染力较弱。 实用新型内容 针对现有吊灯制造技术所存在的上述不足,本实用新型目提供一种采用多个LED发光体制备的可产生动态视觉效果的艺术吊灯。 本实用新型为实现上述目的所采用的技术方案是: 一种艺术吊灯,其包括一半透明筒状外罩及灯头,灯头可拆卸式地设置在外罩上,其前端伸入到外罩内,其特征在于,所述的灯头包括一底座、一灯架、一控制电路及由多个设置在不同位置上的发光体,其中控制

8、电路及多个发光体均设置在同一电路板上,该电路板通过灯架设置在底座上;所述控制电路与多个发光体电性连接并依次驱动其发光或关闭,组成一发光部;该发光部射出的光线依次投射在外罩上,光线在该外罩的内侧壁上产生动态位移视觉。 所述的外罩上表面中部设有一通孔,所述的灯头前端直径小于该通孔直径而底座大于该通孔的直径,所述底座前部的各部分均穿过该通孔,伸入到所述外罩内。 所述的发光体为单色光或复合色光LED,所述多个发光体的发光色彩及光线投射角度均不相同。 所述的外罩内侧壁表面上,设有一图案层,该图案层上设有色块、图案或镂空部分。 所述的艺术吊灯,其还包括一设置在所述外罩和灯头之间的筒状内罩,所述的灯

9、头前端发光部伸入所述的内罩;所述内罩的表面上设有一图案层,该图案层上设有色块、图案或镂空部分。 所述的内罩设有一向外延伸的底座,所述的内罩前端直径小于所述外罩的通孔直径而底座大于所述外罩通孔的直径。 所述的内罩底座上中部设有一通孔,所述的灯头前端直径小于该内罩通孔直径而灯头底座大于该内罩通孔的直径,所述底座前部的各部分均穿过该内罩通孔,伸入到所述内罩内。 所述的电路板朝向发光体的一面设有反射层,用于反射各LED光源的光线,使其波长增加。 本实用新型在所述的外罩、内罩的底部均设有通孔,使所述内罩、或灯头可通过所述通孔方便的置入或取出所述外罩;这种结构方便拿取、更换内罩或灯头之一,以获得不

10、同的光影艺术效果。 本实用新型的优点在于:由于其采用了可拆卸组合式结构及多个LED发光体,且其色光、位置、角度均不相同,通过控制电路在不同位置上的依次循环点亮的多个发光体,其发出的光线透过内罩的镂空图案后投射到外罩上,即形成不断闪动、且有一定位移的图案动态视觉效果,器照明艺术效果大大增强,且其节能、环保,拿取、更换方便,通过更换内罩或灯头,即可获得不同的艺术效果,而不必更换整个灯具,可以节约材料、人工及费用。 本实用新型广泛使用于制造舞厅、酒店、家庭等各种场所使用的吊灯,可以制造出多种艺术效果。 下面结合附图与具体实施方式,对本实用新型进一步说明。 附图说明 图1为本实用新型实施例

11、1的整体结构示意图; 图2为图1中外罩结构示意图; 图3为图1中灯头结构示意图; 具体实施方式 实施例1,参见图1~图5,本实施例提供的一种艺术吊灯,其包括一半透明筒状外罩1及灯头2,灯头2可拆卸式地设置在外罩1上,其前端伸入到外罩1内;所述的灯头2包括一底座21、一灯架22、一控制电路、一电路板23及由多个设置在不同位置上的发光体24,其中控制电路及多个发光体24均设置在同一电路板23上,该电路板23通过灯架22设置在底座21上;所述控制电路与多个发光体24电性连接并依次驱动其发光或关闭,组成一发光部;该发光部射出的光线依次投射在外罩1上,光线在该外罩1的内侧壁上产生动态位移视觉;具

12、体的效果可通过调节控制电路控制时间、点亮方式,以及外罩1上的色彩、图案及透明度获得。 所述的外罩1上表面中部设有一通孔11,所述的灯头2前端直径小于该通孔11直径而底座21大于该通孔11的直径,所述底座21前部的各部分均穿过该通孔11,伸入到所述外罩1内。 所述的发光体24为单色光或复合色光LED,该LED可以为红、黄、蓝单色或复合白色,所述多个发光体24的发光色彩及光线投射角度均不相同,以获得较长的波长及多种艺术视觉变化效果。 所述的外罩1内侧壁表面12上,可以设有一图案层13,该图案层13上设有色块、图案或镂空部分,使光线透过这一图案层13进一步获得好的艺术效果。 所述的电路板朝

13、向发光体的一面设有反射层(图中未示出),用于反射各LED光源的光线,使其波长增加。 本实用新型使用时,首先将外罩2吊挂,再将灯头2插入其上部通孔中,通电,灯头的发光体在控制电路的控制下,依次点亮或根据设定的程序进行点亮或关闭,产生动态光线变化效果;设置在外罩内侧的图案即在动态变化的光线作用下,投射在外罩1上,产生柔和连续或者频闪变化的动态艺术效果。 实施例2,参见图6,其基本结构与实施例1相同,其不同之处在于,该艺术吊灯,还包括一设置在所述外罩1和灯头2之间的筒状内罩3,所述的灯头2前端发光部伸入所述的内罩3中;所述内罩3的表面上设有一图案层33,该图案层上设有色块、图案或镂空部分34。

14、 在所述的内罩2底端设有一向外延伸的底座21,所述的内罩2前端直径小于所述外罩的通孔11直径而底座21大于所述外罩通孔11的直径,以便使其插入该通孔11内。 所述的内罩底座31上中部设有一通孔,所述的灯头2前端直径小于该内罩通孔31直径而灯头底座21大于该内罩通孔31的直径,所述灯头底座21前部的各部分均穿过该内罩通孔31,伸入到所述内罩3内。 在其他实施例中,各底座与通孔的连接处,可以采用橡塑磁片材料层进行连接、固定和密封。 本实用新型广泛使用于制造舞厅、餐厅、歌厅、酒店、家庭等各种场所使用的吊灯,可以制造出多种艺术效果,尤其适合于需要经常更换艺术风格、营造不同艺术氛围的舞厅、餐厅、歌

15、厅等场所。 本实用新型并不限于上述实施方式,采用与本实用新型上述实施例相同或近似的结构,而得到的其他艺术吊灯,均在本实用新型的保护范围之内。 12 英文文献原文和翻译原文 Computer Viruses What are computer viruses? According to Fred Cohen’s well-known definition, a computer virus is a computer program that can infect other computer programs by m

16、odifying them in such a way as to include a (possibly evolved) copy of itself. Note that a program does not have to perform outright damage (such as deleting or corrupting files) in order to be called a “virus”. However, Cohen uses the terms within his definition (e.g. “program” and “modify”) a bit

17、differently from the way most anti-virus researchers use them, and classifies as viruses some things which most of us would not consider viruses. Computer viruses are bits of code that damage or erase information, files, or software programs in your computer, much like viruses that infect huma

18、ns, computer viruses can spread, and your computer can catch a virus when you download an infected file from the Internet or copy an infected file from a diskette. Once the viruses is embedded into your computer’s files, it can immediately start to damage or destroy information, or it can wait for a

19、 particular date or event to trigger its activity. What are the main types of viruses? Generally, there are two main classes of viruses. The first class consists of the file Infectors which attach themselves to ordinary program files. These usually infect arbitrary .COM and/or .EXE programs, thoug

20、h some can infect any program for which execution is requested, such as .SYS,.OVL,.PRG,&.MNU files. File infectors can be either direct action or resident. A direct-action virus selects one or more other programs to infect each other time the program which contains it is executed ,and thereafter in

21、fects other programs when “they” are executed (as in the case of the Jerusalem) or when certain other conditions are fulfilled. The Vienna is an example of a direct-action virus. Most other viruses are resident. The second class is system or boot-record infectors: those viruses, which infect execut

22、able code, found in certain system areas on a disk that are not ordinary files. On DOS systems, there are ordinary boot-sector viruses, which infect only the DOS boot sector on diskettes. Examples include Brain, Stoned, Empire, Azusa, and Michelangelo. Such viruses are always resident viruses. Fin

23、ally, a few viruses are able to infect both (the Tequila virus is one example). There are often called “multipartite” viruses, though there has been criticism of this name; another name is “boot-and -file” virus. File system or cluster viruses (e.g. Dir-II) are those that modify directory table ent

24、ries so that the virus is loaded and executed before the desired program is. Note that the program itself is not physically altered; only the directory entry is. Some consider these infectors to be a third category of viruses, while others consider them to be a sub-category of the file infectors. W

25、hat are macro viruses? Many applications provide the functionality to create macros. A macro is a series of commands to perform some application-specific task. Macros are designed to make life easier, for example, to perform some everyday tasks like text-formatting or spreadsheet calculations. Mac

26、ros can be saved as a series of keystrokes (the application record what keys you press); or they can be written in special macro languages (usually based on real programming languages like C and BASIC). Modern applications combine both approaches; and their advanced macro languages are as complex as

27、 general purpose programming languages. When the macro language allows files to be modified, it becomes possible to create macros that copy themselves from one file to another. Such self-replicating macros are called macro viruses. Most macro viruses run under Word for Windows. Since this is a very

28、 popular word processor, it provides an effective means for viruses to spread. Most macro viruses are written using the macro language WordBasic. WordBasic is based on the good old BASIC programming language. However, it has many (hundreds of) extensions (for example, to deal with documents: edit, r

29、eplace string, obtain the name of the current document, open new window, move cursor, etc.). What is a Trojan horse program? A type of program that is often confused with viruses is a ‘Trojan horse’ program. This is not a virus, but simply a program (often harmful) that pretends to be something el

30、se. For example, you might download what you think is a new game; but when you run it, it deletes files on your hard drive. Or the third time you start the game, the program E-mail your saved passwords to another person. Note: simply download a file to your computer won’t activate a virus or Troja

31、n horse; you have to execute the code in the file to trigger it. This could mean running a program file, or opening a Word/Excel document in a program (such as Word or Excel) that can execute any macros in the document. What kind of files can spread viruses? Viruses have the potential to infect an

32、y type of executable code, not just the files that are commonly called “program files”. For example, some viruses infect executable code in the boot sector of floppy disk or in system areas of hard drives. Another type of virus, known as a “macro” virus, can infect word processing and spreadsheet do

33、cuments that use macros. And it’s possible for HTML documents containing JavaScript or other types of executable code to spread viruses or other malicious code. Since viruses code must be executed to have any effect, files that the computer treats as pure data are safe. This includes graphics and s

34、ound files such as .gif, .jpg, .mp3, .wav, .etc., as well as plain text in .txt files. For example, just viewing picture files won’t infect your computer with a virus. The virus code has to be in a form, such as an .exe program file or a Word .doc file which the computer will actually try to execute

35、 How do viruses spread? The methodology of virus infection was pretty straightforward when first computer viruses such as Lehigh and Jerusalem started appearing. A virus is a small piece of computer code, usually form several bytes to a few tens of bytes, that can do, well, something unexpected.

36、Such viruses attach themselves to executable files— programs, so that the infected program, before proceeding with whatever tasks it is supposed to do, calls the virus code. One of the simplest ways to accomplish that is to append the virus code to the end of the file, and insert a command to the be

37、ginning of the program file that would jump right to the beginning of the virus code. After the virus is finished, it jumps back to the point of origination in the program. Such viruses were very popular in the late eighties. The earlier ones only knew how to attach themselves to .Com files, since s

38、tructure of a .COM file is much simpler than that of an .EXE file—yet another executable file format invented for MS-DOS operating system. The first virus to be closely studied was the Lehigh virus. It attached itself to the file that was loaded by the system at boot time—COMMAND.COM. the virus did

39、a lot of damage to its host, so after three-four replications it was no longer usable. For that reason, the virus never managed to escape the university network. When you execute program code that’s infected by a virus, the virus code will also run and try to infect other programs, either on the sa

40、me computer or on other computers connected to it over a network. And the newly infected programs will try to infect yet more programs. When you share a copy of an infected file with other computer users, running the file may also infect their computer; and files from those computers may spread the

41、 infection to yet more computers. If your computer if infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and the virus copy on the hard disk w

42、ill try to infect still more floppies. Some viruses, known as ‘multipartite’ viruses, and spread both by infecting files and by infecting the boot areas of floppy disks. What do viruses do to computers? Viruses are software programs, and they can do the same things as any other program running on

43、 a computer. The accrual effect of any particular virus depends on how it was programmed by the person who wrote the virus. Some viruses are deliberately designed to damage files or otherwise interfere with your computer’s operation, while other don’t do anything but try to spread themselves around

44、 But even the ones that just spread themselves are harmful, since they damage files and may cause other problems in the process of spreading. Note that viruses can’t do any damage to hardware: they won’t melt down your CPU, burn out your hard drive, cause your monitor to explode, etc. warnings abo

45、ut viruses that will physically destroy your computer are usually hoaxes, not legitimate virus warnings. Modern viruses can exist on any system form MS DOS and Window 3.1 to MacOS, UNIX, OS/2, Windows NT. Some are harmless, though hard to catch. They can play a jingle on Christmas or reboot your co

46、mputer occasionally. Other are more dangerous. They can delete or corrupt your files, format hard drives, or do something of that sort. There are some deadly ones that can spread over networks with or without a host, transmit sensitive information over the network to a third party, or even mess with

47、 financial data on-line. What’s the story on viruses and E-mail? You can’t get a virus just by reading a plain-text E-mail message or Usenet post. What you have to watch out for are encoded message containing embedded executable code (i.e., JavaScript in HTML message) or message that include an ex

48、ecutable file attachment (i.e., an encoded program file or a Word document containing macros). In order to activate a virus or Trojan horse program, you computer has to execute some type of code .This could be a program attached to an E-mail, a Word document you downloaded from the Internet, or som

49、ething received on a floppy disk. There’s no special hazard in files attached to Usenet posts or E-mail messages: they’re no more dangerous than any other file. What can I do to reduce the chance of getting viruses from E-mail? Treat any file attachments that might contain executable code as care

50、fully as you would any other new files: save the attachment to disk and then check it with an up-to-date virus scanner before opening the file. If you E-mail or news software has the ability to automatically execute JavaScript, Word macros, or other executable code contained in or attached to a mes

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2026 宁波自信网络信息技术有限公司  版权所有

客服电话:0574-28810668  投诉电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服