Within the context of the ISO/IEEE 11073 family of standards for device communication, this standard establishes a normative definition of the communication between personal cardiovascular fitness and activity monitoring devices and managers (e.g. cell phones, personal computers, personal health appliances, set top boxes) in a manner that enables plug-and-play interoperability. It leverages appropriate portions of existing standards including ISO/IEEE 11073 terminology, information models and… read more application profile standards. It specifies the use of specific term codes, formats, and behaviors in telehealth environments restricting optionality in base frameworks in favor of interoperability. This standard defines a common core of communication functionality for personal telehealth cardiovascular fitness and activity monitor devices. In this context, cardiovascular fitness and activity monitor devices are being used broadly to cover cardiovascular fitness and activity monitor devices that measure physical actions and the body's various physiological responses to that activity. read less
Within the context of the ISO/IEEE 11073 family of standards for device communication, this standard establishes a normative definition of the communication between personal strength fitness devices and managers (e.g., cell phones, personal computers [PCs], personal health appliances, and set top boxes) in a manner that enables plug-and-play interoperability. It leverages appropriate portions of existing standards, including ISO/IEEE 11073 terminology and information models. It specifies the… read more use of specific term codes, formats, and behaviors in telehealth environments restricting optionality in base frameworks in favor of interoperability. This standard defines a common core of communication functionality for personal telehealth strength fitness devices. In this context, strength fitness devices are being used broadly to cover strength fitness devices that measure musculo-skeletal strength-conditioning activities. read less
Within the context of the ISO/IEEE 11073 family of standards for device communication, this standard establishes a normative definition of the communication between independent living activity hubs and managers (e.g., cell phones, personal computers, personal health appliances, and set top boxes) in a manner that enables plug-and-play interoperability. It leverages appropriate portions of existing standards, including ISO/IEEE 11073 terminology and information models. It specifies the use of… read more specific term codes, formats, and behaviors in telehealth environments restricting ambiguity in base frameworks in favor of interoperability. This standard defines a common core of communication functionality for independent living activity hubs. In this context, independent living activity hubs are defined as devices that communicate with simple situation monitors (binary sensors), normalize information received from the simple environmental monitors, and provide this normalized information to one or more managers. This information can be examined, for example, to determine when a person's activities/behaviors have deviated significantly from what is normal for them such that relevant parties can be notified. Independent living activity hubs will normalize information from the following simple situation monitors (binary sensors) for the initial release of the proposed standard: fall sensor, motion sensor, door sensor, bed/chair occupancy sensor, light switch sensor, smoke sensor, (ambient) temperature threshold sensor, personal emergency response system (PERS), and enuresis sensor (bed-wetting). read less
Within the context of the ISO/IEEE 11073 family of standards for device communication, this standard establishes a normative definition of the communication between medication monitoring devices and managers (e.g., cell phones, personal computers, personal health appliances, set top boxes) in a manner that enables plug-and-play interoperability. It leverages appropriate portions of existing standards, including ISO/IEEE 11073 terminology, information models and application profile. It specifies… read more the use of specific term codes, formats, and behaviors in telehealth environments restricting ambiguity in base frameworks in favor of interoperability. This standard defines a common core of communication functionality for medication monitors. In this context, medication monitors are defined as devices that have the ability to determine and communicate (to a manager) measures of a user's adherence to a medication regime. read less
This standard specifies the base set of Participant Key Purposes (PKPs) for the Service-oriented Device Connectivity (SDC) series of standards. PKPs are role-based sets of requirements for products in order to support safe, effective, and secure interoperability in medical IT networks at point-of-care environments such as the intensive care unit (ICU), operating room (OR) or other acute care settings. This standard specifies both product development process and technical requirements.
Within the context of the ISO/IEEE 11073 personal health device standard family, this standard defines an optimized exchange protocol and modeling techniques to be used by implementers of personal health devices to create interoperability between device types and vendors. This standard establishes a common framework for an abstract model of personal health data available in transport-independent transfer syntax required to establish logical connections between systems and to provide… read more presentation capabilities and services needed to perform communication tasks. The protocol is optimized to personal health usage requirements and leverages commonly used methods and tools wherever possible. read less
The scope of this standard is a communication protocol specification for a distributed system of point-of-care (PoC) medical devices and medical IT systems that need to exchange data or safely control networked PoC medical devices by defining a profile for Web Service specifications and defining additional Web Service specifications as part of this standard.
Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of preventing unauthorized access or modification, misuse, denial of use, or the unauthorized use of information that is stored on, accessed from, or transferred to and from a PHD/PoCD. The process part of cybersecurity is risk analysis of use cases specific to a PHD/PoCD. For PHDs/PoCDs, this standard defines an iterative, systematic, scalable, and auditable approach to identification of… read more cybersecurity vulnerabilities and estimation of risk. This iterative vulnerability assessment uses the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) classification scheme and the embedded Common Vulnerability Scoring System (eCVSS). The assessment includes system context, system decomposition, pre-mitigation scoring, mitigation, and post-mitigation scoring and iterates until the remaining vulnerabilities are reduced to an acceptable level of risk. read less
Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of preventing unauthorized access or modification, misuse, denial of use, or the unauthorized use of information that is stored on, accessed from, or transferred to and from a PHD/PoCD. The capability part of cybersecurity is information security controls related to both digital data and the relationships to safety and usability. For PHDs/PoCDs, this standard defines a security baseline of application layer cybersecurity mitigation techniques for certain use cases or for times when certain criteria are met. This standard provides a scalable information security toolbox appropriate for PHD/PoCD interfaces, which fulfills the intersection of requirements and recommendations from National Institute of Standards and Technology (NIST) and the European Network and Information Security Agency (ENISA). This standard maps to the NIST cybersecurity framework [B15]; IEC TR 80001-2-2 [B8]; and the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) classification scheme. The mitigation techniques are based on the extended CIA triad (Clause 4) and are described generally to allow manufacturers to determine the most appropriate algorithms and implementations.
This standard provides a checklist and selected guidance, for persons not normally practicing in this specialized field, of major technical design areas that should be considered when interconnecting user-owned and utility-owned facilities at substations. Only medium- and high-voltage purchased-power interconnections are addressed. This guide does not discuss the considerable implications of interactive power systems design and operation, nor does it present criteria or directions for the design of substations.
This standard pertains to electronics wide-band transformers transmitting power within a wide band of frequencies covering typically at least one decade in the frequency spectrum. It is not intended to apply to transformers optimized to operate within a narrow band of frequencies. Transformers used in, or in conjunction with, wire line communication facilities serving power stations are excluded due to the special protection requirements involved. Provision is made for including data for use in… read more the design of feedback amplifiers and control networks, or other circuits in which the knowledge of the transformer amplitude and phase frequency response is needed by the system designer. These transformers are required to transform voltage within specified tolerances of amplitude and phase when operating between specified impedances. Guides to application and test procedures are included. The annexes within this standard contain certain precautions and recommended practices. This standard also pertains to hybrid transformers, primarily used in the telecommunications industry. The hybrid transformer is a wide-band transformer used in a manner which makes it part of a capacitance, resistance, and/or inductance network, and it must have characteristics which permit it to match the network for proper overall performance. read less
This guide contains instructions for modeling synchronous machines in direct- and quadrature-axis equivalent circuits, along with the basic transient and subtransient reactance/time-constants model in view of stability studies. It discusses assumptions made in using various models and presents the fundamental equations and concepts involved in generator/system interfacing. The manner in which generator saturation is treated in network studies, both in the initialization process as well as… read more during large or small disturbance stability analysis procedures is addressed. Approaches for improving the accuracy of field and excitation system quantities are identified and conversion factors are given for transferring field parameters from one base to another for correct generator/excitation system interface modeling. Parameter determination and translation from equivalent-circuits to operational impedances or vice-versa is covered. Data analysis methods for obtaining these parameters using measurements from field tests or finite-element computations are explained and illustrated with a wide range of generator and test data. However, this guide refers to applicable standards (such as IEEE Std 115) or contract specification for scheduling such tests. Also, this guide does not attempt to recommend specific procedures for machine representation in non-standard or atypical cases such as generator tripping and overspeed operation or models for harmonics or unbalanced operation. read less
This recommended practice covers the sizing of nickel-cadmium batteries used for standby operation in stationary applications. Recommendations are provided for applications including, but not limited to, generating stations, substations, telecommunications, switchgear and control systems, compressor stations, emergency lighting, and uninterruptible power supplies. Guidance is provided for sizing for engine-starting applications. The following topics are beyond the scope of this document: Installation, maintenance, qualification, and testing procedures; Consideration of battery types other than nickel-cadmium; Renewable energy systems (e.g., wind turbines and photovoltaic systems) that may provide only partial or intermittent charging; Design of the dc system and sizing of the battery charger(s)
This document is intended to establish a basic philosophy and guidelines for the design and implementation of monitoring systems for cylindrical rotor, synchronous turbine generators. Monitoring systems are used to display the status of the generator and auxiliary systems while these systems are operating on line. This document does not specify actual equipment or instrumentation, but it does indicate some critical areas where it is important to provide monitoring capability. Generator-protection techniques are not discussed in this document. There is a fine line of distinction between instrumentation that is used for monitoring and instrumentation used for protection, and there are many instruments that play a dual role. The purpose of monitoring is to provide information to the operator to guide appropriate action. This action may be maintenance planning, maintaining load, tripping the unit, or load reduction. The key distinction between monitoring and protection is that with monitoring, the action taken (if any) is not automatic but is initiated by the operator. Some users may choose to include some of the items listed here as part of the generator-protection scheme. Monitoring of basic generator parameters is routinely performed on commercial generators. It is only recently, however, that the economics of power generation has created the need, and advancing technology provided the ability, to monitor nearly all aspects of generator operation. This should allow the operation of large-capacity machines with increased reliability and availability and with reduced downtime for outages. However, care must be exercised to avoid "overmonitoring." While there is no doubt that great quantities of data may be useful to review when (and if) time permits, the operator should not be subjected to an overload of unessential data. The use of diagnostic systems may facilitate handling of multitudinous data to assist the operator. This document provides the basic information needed to choose the monitoring schemes that are best suited for each application. Not all items discussed in this document are necessary for all generators. Some users may wish to add additional monitoring systems beyond those presented in this document. The user should refer to the manufacturer's monitoring recommendations