Electromagnetic compatibility (EMC) — Part 3-11: Limits — Limitation of voltage changes, voltage flu...
1 Scope
This part of IEC 61000 is concerned with the emission of voltage changes, voltage
fluctuations and flicker produced by equipment and impressed on the public low-voltage
supply system.
It specifies the limits of voltage changes produced by equipment tested under specified
conditions.
This document is primarily applicable to electrical and electronic equipment having a rated
input…
Scope
Purpose
CAN/HSO 76000:2021(E) Integrated People-Centred Health Systems outlines evidence-informed requirements to design, implement, and evaluate integrated health and social service systems. It is targeted to policy makers and system partners that are responsible for funding, planning, coordinating, delivering, and evaluating integrated health and social services in a designated…
Glass-reinforced thermosetting plastics (GRP) pipes and fittings — Determination of the resistance t...
This document specifies a method for determining the chemical resistance properties of glass-reinforced thermosetting plastics (GRP) pipes and fittings in a deflected condition for nominal sizes DN 100 and larger.
In conjunction with ISO 10928, this document provides a method for evaluating the effect of a chemical environment on the interior of a pipe or fitting after a specified period of time…
Health software and health IT systems safety, effectiveness and security - Part 1: Principles and co...
This document provides the principles, concepts, terms and definitions for health software and health IT systems, key properties of safety, effectiveness and security, across the full life cycle, from concept to decommissioning, as represented in Figure 1. It also identifies the transition points in the life cycle where transfers of responsibility occur, and the types of multi-lateral…
Information technology - Generic applications of ASN.1 - Part 4: Cryptographic message syntax
This Recommendation | International Standard enhances the existing cryptographic message syntax (CMS) protocol by adding signcryption techniques and providing a new Abstract Syntax Notation One (ASN.1) module which conforms to the latest edition of the ASN.1 standard which can be used with all standardized encoding rules of ASN.1.
Health software and health IT systems safety, effectiveness and security — Part 1: Principles and co...
This document provides the principles, concepts, terms and definitions for health software and health IT systems, key properties of safety, effectiveness and security, across the full life cycle, from concept to decommissioning, as represented in Figure 1. It also identifies the transition points in the life cycle where transfers of responsibility occur, and the types of multi-lateral…
Information technology — Generic applications of ASN.1 — Part 4: Cryptographic message syntax
This Recommendation | International Standard enhances the existing cryptographic message syntax (CMS) protocol by adding signcryption techniques and providing a new Abstract Syntax Notation One (ASN.1) module which conforms to the latest edition of the ASN.1 standard which can be used with all standardized encoding rules of ASN.1.
1 Scope
1.1 This Part is intended to be read together with the Standard for Fuseholders – Part 1: General
Requirements, hereafter referred to as Part 1. The titles of the Clauses in this Part correspond to the
similarly titled Clauses in Part 1. The requirements of Part 1 apply unless modified by this Part. For the
Part 1 requirements, refer to the Standard for Fuseholders – Part 1: General…
Aerospace — Bolts, normal bihexagonal head, normal shank, short or medium length MJ threads, metalli...
This document specifies the dimensions of normal bihexagonal head bolts, with close or large tolerance normal shank and short or medium length MJ threads, in metallic material, coated or uncoated, with strength classes less than or equal to 1 100 MPa.
This document is applicable to the compilation of aerospace product standards.
The measures in this standard were calculated from detecting and counting violations of good architectural and coding practices in the source code that could result in unacceptable operational risks or excessive costs. Establishing standards for these measures at the source code level is important because they have been used in outsourcing and system development contracts without having…