Road vehicles — Transport information and control systems — Detection-response task (DRT) for assess...
ISO 17488:2016 provides a detection-response task mainly intended for assessing the attentional effects of cognitive load on attention for secondary tasks involving interaction with visual-manual, voice-based or haptic interfaces. Although this document focuses on the assessment of attentional effects of cognitive load (see Annex A), other effects of secondary task load may be captured by…
Air quality — Bulk materials — Part 3: Quantitative determination of asbestos by X-ray diffraction m...
ISO 22262-3:2016 is primarily intended for quantitative analysis of samples in which asbestos has been identified at estimated mass fractions lower than approximately 5 % by weight.
ISO 22262-3:2016 extends the applicability and limit of detection of quantitative analysis by the use of simple procedures of ashing and/or acid treatment prior to XRD quantification.
ISO 22262-3:2016 is applicable to…
Transmissions hydrauliques — Étalonnage des compteurs automatiques de particules en suspension dans ...
ISO 11171:2016 spécifie des modes opératoires portant sur les aspects suivants:
a) l'étalonnage dimensionnel primaire, la résolution des capteurs et les performances de comptage des compteurs automatiques de particules (CAP) en suspension dans les liquides capables d'analyser des échantillons en flacon;
b) l'étalonnage dimensionnel secondaire avec des suspensions vérifiées au…
Information technology — Security techniques — Key management — Part 6: Key derivation
ISO/IEC 11770-6:2016 specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more "derived" secret keys. Key derivation functions based on MAC algorithms and on hash-functions are specified.
Information technology - Security techniques - Key management - Part 6: Key derivation
ISO/IEC 11770-6:2016 specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more "derived" secret keys. Key derivation functions based on MAC algorithms and on hash-functions are specified.
Information technology - Service management - Part 12: Guidance on the relationship between ISO/IEC ...
ISO/IEC TR 20000-12:2016 provides guidance on the relationship between ISO/IEC 20000‑1:2011 and CMMI-SVC V1.3 (through Maturity Level 3). Service providers can refer to this guidance as a cross-reference between the two documents to help them to plan and implement an SMS. An organization employing the practices in the indicated CMMI-SVC process areas can conform to many of the associated ISO/IEC…
Information technology - Security techniques - Application security - Part 6: Case studies
ISO/IEC 27034-6:2016 provides usage examples of ASCs for specific applications.
NOTE Herein specified ASCs are provided for explanation purposes only and the audience is encouraged to create their own ASCs to assure the application security.
Information technology - Automatic identification and data capture techniques - Optical Character Re...
ISO/IEC 30116:2016
- specifies the methodology for the measurement of specific attributes of OCR-B character strings,
- defines a method for evaluating these measurements and deriving an overall assessment of character string quality,
- defines a reference decode algorithm for OCR-B, and
- gives information on possible causes of deviation from optimum grades to assist users in…