Solenoid Bolt
A solenoid bolt is a type of electronic-mechanical locking mechanism. This type of lock is characterized by the use of a solenoid to throw the bolt. Pawl & solenoid locking mechanism, Inventor(s): BUTTERWECK DIETER E PHILLIPS PETER J S GARTNER KLAUS W S/ref> Sophisticated solenoid bolt locks may use microprocessors to perform voltage regulation, reduce power consumption, and/or provide access control. Depending on the strength of the solenoid, some models can provide a holding force on the order of 1000 kg. A solenoid bolt can be designed either to fail open (the lock opens on power loss) or to fail closed (the device is locked upon power loss). Some models may be suitable for high-security Security is protection from, or resilience against, potential harm (or other unwanted coercion). Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or ... sites. References Lock ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Lock (security Device)
A lock is a mechanics, mechanical or Electronics, electronic fastening device that is released by a physical object (such as a key, Keycard lock, keycard, fingerprint, Radio-frequency identification, RFID card, security token or coin), by supplying secret information (such as a number or letter permutation or password), by a combination thereof, or it may only be able to be opened from one side, such as a door chain. A key is a device that is used to operate a lock (to lock or unlock it). A typical key is a small piece of metal consisting of two parts: the ''Bit (key), bit'' or ''blade'', which slides into the keyhole, keyway of the lock and distinguishes between different keys, and the ''bow'', which is left protruding so that torque can be applied by the user. In its simplest implementation, a key operates one lock or set of locks that are keyed alike, a lock/key system where each similarly keyed lock requires the same, unique key. The key serves as a security token for access ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Solenoid
upright=1.20, An illustration of a solenoid upright=1.20, Magnetic field created by a seven-loop solenoid (cross-sectional view) described using field lines A solenoid () is a type of electromagnet formed by a helix, helical coil of wire whose length is substantially greater than its diameter, which generates a controlled magnetic field. The coil can produce a uniform magnetic field in a volume of space when an electric current is passed through it. André-Marie Ampère coined the term ''solenoid'' in 1823, having conceived of the device in 1820. The French term originally created by Ampère is ''solénoïde'', which is a French transliteration of the Greek word '' σωληνοειδὴς'' which means ''tubular''. The helical coil of a solenoid does not necessarily need to revolve around a straight-line axis; for example, William Sturgeon's electromagnet of 1824 consisted of a solenoid bent into a horseshoe shape (similarly to an arc spring). Solenoids provide magnetic ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Microprocessor
A microprocessor is a computer processor (computing), processor for which the data processing logic and control is included on a single integrated circuit (IC), or a small number of ICs. The microprocessor contains the arithmetic, logic, and control circuitry required to perform the functions of a computer's central processing unit (CPU). The IC is capable of interpreting and executing program instructions and performing arithmetic operations. The microprocessor is a multipurpose, Clock signal, clock-driven, Processor register, register-based, digital integrated circuit that accepts binary code, binary data as input, processes it according to instruction (computing), instructions stored in its computer memory, memory, and provides results (also in binary form) as output. Microprocessors contain both combinational logic and sequential logic, sequential digital logic, and operate on numbers and symbols represented in the binary number system. The integration of a whole CPU on ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Voltage Regulation
In electrical engineering, particularly power engineering, voltage regulation is a measure of change in the voltage magnitude between the sending and receiving end of a component, such as a transmission line, transmission or distribution line. Voltage regulation describes the ability of a system to provide near constant voltage over a wide range of Electrical load, load conditions. The term may refer to a passive property that results in more or less voltage drop under various load conditions, or to the active intervention with devices for the specific purpose of adjusting voltage. Electrical power systems In electrical power systems, voltage regulation is a dimensionless quantity defined at the receiving end of a transmission line as: :\text VR = \frac \times 100 where ''Vnl'' is voltage at no load and ''Vfl'' is voltage at full load. The percent voltage regulation of an ideal transmission line, as defined by a transmission line with zero Electrical resistance and conductance, res ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Electrical Power
Electric power is the rate of transfer of electrical energy within a electric circuit, circuit. Its SI unit is the watt, the general unit of power (physics), power, defined as one joule per second. Standard prefixes apply to watts as with other SI units: thousands, millions and billions of watts are called kilowatts, megawatts and gigawatts respectively. In common parlance, electric power is the production and delivery of electrical energy, an essential public utility in much of the world. Electric power is usually produced by electric generators, but can also be supplied by sources such as Electric battery, electric batteries. It is usually supplied to businesses and homes (as domestic mains electricity) by the electric power industry through an electrical grid. Electric power can be delivered over long distances by electric power transmission, transmission lines and used for applications such as Electric motor, motion, Electric light, light or Electric heat, heat with high ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Access Control
In physical security and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example, a place or a resource). The act of ''accessing'' may mean consuming, entering, or using. It is often used interchangeably with authorization, although the authorization may be granted well in advance of the access control decision. Access control on digital platforms is also termed admission control. The protection of external databases is essential to preserve digital security. Access control is considered to be a significant aspect of privacy that should be further studied. Access control policy (also access policy) is part of an organization’s security policy. In order to verify the access control policy, organizations use an access control model. General security policies require designing or selecting appropriate security controls to satisfy an organization's risk appetite - access policies ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Orders Of Magnitude
In a ratio scale based on powers of ten, the order of magnitude is a measure of the nearness of two figures. Two numbers are "within an order of magnitude" of each other if their ratio is between 1/10 and 10. In other words, the two numbers are within about a factor of 10 of each other. For example, 1 and 1.02 are within an order of magnitude. So are 1 and 2, 1 and 9, or 1 and 0.2. However, 1 and 15 are not within an order of magnitude, since their ratio is 15/1 = 15 > 10. The reciprocal ratio, 1/15, is less than 0.1, so the same result is obtained. Difference (mathematics), Differences in order of magnitude can be measured on a base-10 logarithmic scale in "Decade (log scale), decades" (i.e., factors of ten). For example, there is one order of magnitude between 2 and 20, and two orders of magnitude between 2 and 200. Each division or multiplication by 10 is called an order of magnitude. This phrasing helps quickly express the difference in scale between 2 and 2,000,000: they di ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Physical Security
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property. Overview Physical security systems for protected facilities can be intended to: * deter potential intruders (e.g. warning signs, security lighting); * detect intrusions, and identify, monitor and record intruders (e.g. security alarms, access control and CCTV systems); * trigger appropriate incident responses (e.g. by security guards and police); * delay or prevent hostile movements (e.g. door reinforcements, grilles); * protect the as ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |