Home

Results 21 - 30 of 846,631 for Alarm Systems. Search took 7.655 seconds.  
Sort by date/Sort by relevance
The experts are looking at how to better plan for these outbreaks, which includes early detection of outbreaks through alarm signals. Coming up with better contingency planning “The problem is always about report systems and how they work,” noted TDR’s Axel Kroeger. (...) “The idea is to identify alarms systems and to predict when an outbreak is coming.” (...) “The idea is to develop alarm systems and to predict when an outbreak is coming,” said Kroeger.
Language:English
Score: 1107508.9 - https://www.who.int/tdr/news/2...gue-surveill-outbreak-resp/en/
Data Source: un
M.32 : Principles for using alarm information for maintenance of international transmission systems and equipment   Français   Español     Home : ITU-T : Publications : Recommendations : M Series : M.32 Recently posted  -  Search Recommendations     M.32 : Principles for using alarm information for maintenance of international transmission systems and equipment Recommendation M.32 In force components Number Title Status M.32 (11/88)   Principles for using alarm information for maintenance of international transmission systems and equipment   Former M.22 (1984) In force   Top  -  Feedback  -  Contact us  -  Copyright © ITU  2008 All Rights Reserved Contact for this page :  ITU-T Publications Updated : 2006/07/31  
Language:English
Score: 1106900.6 - https://www.itu.int/rec/T-REC-M.32
Data Source: un
Mapping of IMDRF essential principles to AI for health software - Att.1 - Spreadsheets for cluster creation Cover FGAI4H-G-038-A01 New Delhi, 13-15 November 2019 Source: WG DAISAM chairs Title: Mapping of IMDRF essential principles to AI for health software - Attachment 1 - Spreadsheets for cluster creation Abstract: This spreadsheet contains four worksheets that document how clusters were created for the main contribution. key concepts Chronology Keyword Section 5 Acceptable risks 5.1.1 109 Accuracy 5.8.1 197 Accuracy 5.12.2 245 Accuracy of measurements (trueness and precision) 7.2.1 40 Alarms 5.1.3 44 Alarms 5.1.3 235 Analytical performance 7.2.1 247 Analytical sensitivity/Limit of detection 7.2.1 249 Analytical specificity 7.2.1 301 Appropriate representation 7.2.4 77 Benefit-risk determination 5.2.1 275 Calibrators 7.2.2 136 Change management process 5.8.2 75 Clinical evaluation 5.2.1 83 Clinical experience 5.2.1 79 Clinical investigation report 5.2.1 237 Clinical performance 7.2.1 255 Clinical performance 7.2.1 145 Connectivity 5.8.3 57 Consider user knowledge 5.1.5 15 Continuous, iterative risk management 5.1.2 27 Continuous, iterative risk management 5.1.2 28 Continuous, iterative risk management 5.1.2 143 Contrast ratio of the screen 5.8.3 277 Control materials 7.2.2 271 Control procedures 7.2.1 161 Cybersecurity 5.8.5 88 Declaration of Helsinki 5.2.2 257 Diagnostic/clinical sensitivity 7.2.1 259 Diagnostic/clinical specificity 7.2.1 171 Easily understood 5.10.1 186 Easy to apply 5.12.1 184 Easy to understand 5.12.1 86 Ehtical prinicples 5.2.2 103 Electronic programmable systems 5.8.1 303 Ethnicity 7.2.4 63 Expected life of device 5.1.6 267 Expected values in normal and affected populations. 7.2.1 149 External factors related to their use (varying environment as regards level of light or noise) 5.8.3 228 Failure 5.12.3 24 Foreseeable misuse 5.1.2 305 Gender 7.2.4 307 Genetic diversity 7.2.4 210 Handling 5.12.2 153 Hardware 5.8.4 7 Health 5.1.1 21 Identify and analyze hazards 5.1.2 165 Information [Manual] 5.10.1 130 Information security (e.g., safely implement updates) 5.8.2 98 Informed consent 5.2.2 182 Instructions 5.12.1 199 Instructions 5.12.2 54 Intended usage environment 5.1.5 23 Intended use 5.1.2 62 Intended use 5.1.6 178 Intended use 5.12.1 222 Intended use 5.12.3 273 Intended use 7.2.1 293 Intended use 7.2.4 297 Intended use environment 7.2.4 295 Intended user 7.2.4 2 Intendeded conditions of use 5.1.1 212 Interpretation of results 5.12.2 155 IT networks characteristics 5.8.4 157 IT security measures 5.8.4 174 Lay user 5.12.1 188 Lay user 5.12.2 214 Lay users 5.12.3 100 Leftover specimen 5.2.2 265 Likelihood ratios 7.2.1 17 MD life cycle 5.1.2 251 Measuring interval/range 7.2.1 147 Memory 5.8.3 151 Minimum requirements 5.8.4 139 Mobile computing platforms 5.8.3 192 Near-patient testing 5.12.2 218 Near-patient testing 5.12.3 263 Negative predictive value 7.2.1 285 Numerical values 7.2.3 6 Patient benefits 5.1.1 4 Perform as intended 5.1.1 1 Performance 5.1.1 14 Performance 5.1.2 117 Performance 5.8.1 169 Performance 5.10.1 224 Performance 5.12.3 233 Performance characteristics 7.2.1 291 Performance evaluation 7.2.4 261 Positive predictive value 7.2.1 96 Pre-study protocol review 5.2.2 113 Precision 5.8.1 311 Prevalence rates 7.2.4 126 Principles of development life cycle (e.g., rapid development cycles, frequent changes, the cumulative effect of changes) 5.8.2 159 Protection against unauthorized access 5.8.4 163 Protection against unauthorized access 5.8.5 81 Published scientific literature 5.2.1 11 Quality 5.1.2 283 Reference materials of higher order 7.2.2 281 Reference measurement procedures 7.2.2 299 Relevant population 7.2.4 111 Reliability 5.8.1 309 Representative population 7.2.4 48 Residual risk information for user 5.1.4 90 Rights 5.2.2 22 Risk 5.1.2 70 Risk 5.1.9 26 Risk control 5.1.2 38 Risk control 5.1.3 32 Risk control measures 5.1.3 25 Risk elimination 5.1.2 128 Risk management (e.g., changes to system, environment, and data) 5.8.2 20 Risk management plan 5.1.2 9 Risk management system 5.1.2 208 Risk of error 5.12.2 50 Risk reduction 5.1.5 52 Risk reduction 5.1.5 121 Risk reduction 5.8.1 201 Risk reduction 5.12.2 206 Risk reduction 5.12.2 42 Risks that cannot be eliminated 5.1.3 39 Safe design 5.1.3 3 Safety 5.1.1 12 Safety 5.1.2 92 Safety 5.2.2 115 Safety 5.8.1 167 Safety 5.10.1 195 Safety 5.12.2 34 Safety principles compliance 5.1.3 176 Self-testing 5.12.1 190 Self-testing 5.12.2 216 Self-testing 5.12.3 67 Shelf life 5.1.8 72 Side-effects 5.1.9 119 Single fault conditions 5.8.1 141 Size 5.8.3 105 Software 5.8.1 107 Software as a medical device 5.8.1 253 Specimen stability 7.2.1 65 Stability 5.1.8 287 Standardized units 7.2.3 36 State of the art 5.1.3 124 State of the art 5.8.2 241 State of the art 7.2.1 60 Stress resistance 5.1.6 243 Traceability of calibrators and controls 7.2.1 279 Traceability of values 7.2.2 203 Training 5.12.2 30 Update control measures 5.1.2 18 Updating 5.1.2 180 Usage variations (user technique, usage environment) 5.12.1 46 User training 5.1.3 289 User understanding 7.2.3 230 Valid result 5.12.3 134 Validation 5.8.2 239 Validation 7.2.1 269 Validation 7.2.1 132 Verification 5.8.2 220 Verification 5.12.3 226 Warning 5.12.3 94 Well-being 5.2.2 &A Page &P ep key concepts with clusters Chronology Keyword Section Cluster 1 Cluster 2 Cluster 3 1 Performance 5.1.1 Analytical performance Clinical performance 2 Intendeded conditions of use 5.1.1 Intended use 3 Safety 5.1.1 Safety 4 Perform as intended 5.1.1 Intended use Safety 5 Acceptable risks 5.1.1 Risk and Alarms 6 Patient benefits 5.1.1 Benefit-risk Clinical performance 7 Health 5.1.1 Clinical performance 9 Risk management system 5.1.2 Risk and Alarms 11 Quality 5.1.2 Analytical performance Clinical performance 12 Safety 5.1.2 Safety 14 Performance 5.1.2 Analytical performance Clinical performance 15 Continuous, iterative risk management 5.1.2 Risk and Alarms 17 MD life cycle 5.1.2 Life cycle 18 Updating 5.1.2 Control Safety 20 Risk management plan 5.1.2 Risk and Alarms 21 Identify and analyze hazards 5.1.2 Risk and Alarms Safety 22 Risk 5.1.2 Risk and Alarms 23 Intended use 5.1.2 Intended use 24 Foreseeable misuse 5.1.2 Safety Risk and Alarms 25 Risk elimination 5.1.2 Risk and Alarms 26 Risk control 5.1.2 Risk and Alarms 27 Continuous, iterative risk management 5.1.2 Risk and Alarms 28 Continuous, iterative risk management 5.1.2 Risk and Alarms 30 Update control measures 5.1.2 Control Safety 32 Risk control measures 5.1.3 Risk and Alarms 34 Safety principles compliance 5.1.3 Safety 36 State of the art 5.1.3 38 Risk control 5.1.3 Risk and Alarms 39 Safe design 5.1.3 Safety 40 Alarms 5.1.3 Risk and Alarms Safety 42 Risks that cannot be eliminated 5.1.3 Risk and Alarms Documentation 44 Alarms 5.1.3 Risk and Alarms 46 User training 5.1.3 Documentation Intended user 48 Residual risk information for user 5.1.4 Documentation Intended use 50 Risk reduction 5.1.5 Risk and Alarms 52 Risk reduction 5.1.5 Risk and Alarms 54 Intended usage environment 5.1.5 Intended use Documentation 57 Consider user knowledge 5.1.5 Intended user 60 Stress resistance 5.1.6 Safety External factors 62 Intended use 5.1.6 Intended use 63 Expected life of device 5.1.6 Documentation Safety 65 Stability 5.1.8 Life cycle Change management Data quality 67 Shelf life 5.1.8 Life cycle 70 Risk 5.1.9 Risk and Alarms 72 Side-effects 5.1.9 Risk and Alarms 75 Clinical evaluation 5.2.1 Clinical performance 77 Benefit-risk determination 5.2.1 Benefit-risk 79 Clinical investigation report 5.2.1 Clinical performance 81 Published scientific literature 5.2.1 Clinical performance 83 Clinical experience 5.2.1 Clinical performance 86 Ehtical prinicples 5.2.2 Ethical compliance 88 Declaration of Helsinki 5.2.2 Ethical compliance 90 Rights 5.2.2 Ethical compliance 92 Safety 5.2.2 Safety 94 Well-being 5.2.2 Benefit-risk Clinical performance 96 Pre-study protocol review 5.2.2 Ethical compliance 98 Informed consent 5.2.2 Ethical compliance 100 Leftover specimen 5.2.2 Ethical compliance 103 Electronic programmable systems 5.8.1 Software 105 Software 5.8.1 107 Software as a medical device 5.8.1 109 Accuracy 5.8.1 Analytical performance Safety 111 Reliability 5.8.1 Analytical performance Technical interfaces 113 Precision 5.8.1 Safety Analytical performance 115 Safety 5.8.1 Safety 117 Performance 5.8.1 Analytical performance Intended use 119 Single fault conditions 5.8.1 Risk and Alarms 121 Risk reduction 5.8.1 Risk and Alarms 124 State of the art 5.8.2 126 Principles of development life cycle (e.g., rapid development cycles, frequent changes, the cumulative effect of changes) 5.8.2 Life cycle Safety 128 Risk management (e.g., changes to system, environment, and data) 5.8.2 Risk and Alarms 130 Information security (e.g., safely implement updates) 5.8.2 Technical interfaces 132 Verification 5.8.2 Analytical performance Control 134 Validation 5.8.2 Analytical performance Control 136 Change management process 5.8.2 Change management 139 Mobile computing platforms 5.8.3 Technical interfaces 141 Size 5.8.3 Technical interfaces 143 Contrast ratio of the screen 5.8.3 Technical interfaces 145 Connectivity 5.8.3 Technical interfaces 147 Memory 5.8.3 Technical interfaces 149 External factors related to their use (varying environment as regards level of light or noise) 5.8.3 External factors 151 Minimum requirements 5.8.4 Technical interfaces 153 Hardware 5.8.4 Technical interfaces 155 IT networks characteristics 5.8.4 Technical interfaces 157 IT security measures 5.8.4 Technical interfaces 159 Protection against unauthorized access 5.8.4 Safety Technical interfaces 161 Cybersecurity 5.8.5 Technical interfaces Safety Documentation 163 Protection against unauthorized access 5.8.5 Safety Technical interfaces 165 Information [Manual] 5.10.1 Documentation Intended use 167 Safety 5.10.1 Safety 169 Performance 5.10.1 Documentation Intended user 171 Easily understood 5.10.1 Explainability Intended user Intended use 174 Lay user 5.12.1 Intended user 176 Self-testing 5.12.1 Intended use Intended user 178 Intended use 5.12.1 Intended use 180 Usage variations (user technique, usage environment) 5.12.1 Intended use Intended user 182 Instructions 5.12.1 Documentation Intended use 184 Easy to understand 5.12.1 Explainability Intended user 186 Easy to apply 5.12.1 Intended user Documentation 188 Lay user 5.12.2 Intended user 190 Self-testing 5.12.2 Intended use Intended user 192 Near-patient testing 5.12.2 Safety Intended user Intended use 195 Safety 5.12.2 Safety 197 Accuracy 5.12.2 Analytical performance 199 Instructions 5.12.2 Documentation Intended use 201 Risk reduction 5.12.2 Risk and Alarms 203 Training 5.12.2 Documentation Intended user 206 Risk reduction 5.12.2 Risk and Alarms 208 Risk of error 5.12.2 Risk and Alarms 210 Handling 5.12.2 Documentation Intended use 212 Interpretation of results 5.12.2 Interpretability Intended user 214 Lay users 5.12.3 Intended user 216 Self-testing 5.12.3 Intended use Intended user 218 Near-patient testing 5.12.3 Safety Intended user 220 Verification 5.12.3 Analytical performance Control 222 Intended use 5.12.3 Intended use 224 Performance 5.12.3 Safety Intended user 226 Warning 5.12.3 Risk and Alarms Safety 228 Failure 5.12.3 Safety Risk and Alarms 230 Valid result 5.12.3 233 Performance characteristics 7.2.1 Analytical performance Clinical performance 235 Analytical performance 7.2.1 Analytical performance 237 Clinical performance 7.2.1 Clinical performance 239 Validation 7.2.1 Analytical performance Control 241 State of the art 7.2.1 243 Traceability of calibrators and controls 7.2.1 Analytical performance 245 Accuracy of measurements (trueness and precision) 7.2.1 Analytical performance Measurements 247 Analytical sensitivity/Limit of detection 7.2.1 Analytical performance 249 Analytical specificity 7.2.1 Analytical performance 251 Measuring interval/range 7.2.1 Analytical performance 253 Specimen stability 7.2.1 Analytical performance 255 Clinical performance 7.2.1 Clinical performance 257 Diagnostic/clinical sensitivity 7.2.1 Clinical performance 259 Diagnostic/clinical specificity 7.2.1 Clinical performance 261 Positive predictive value 7.2.1 Clinical performance 263 Negative predictive value 7.2.1 Clinical performance 265 Likelihood ratios 7.2.1 Clinical performance 267 Expected values in normal and affected populations. 7.2.1 Clinical performance 269 Validation 7.2.1 Analytical performance Control 271 Control procedures 7.2.1 Safety Control 273 Intended use 7.2.1 Intended use 275 Calibrators 7.2.2 Measurements Analytical performance 277 Control materials 7.2.2 Measurements Analytical performance 279 Traceability of values 7.2.2 Measurements Data quality 281 Reference measurement procedures 7.2.2 Measurements Data quality 283 Reference materials of higher order 7.2.2 Measurements Data quality 285 Numerical values 7.2.3 Interpretability 287 Standardized units 7.2.3 Measurements Data quality Change management 289 User understanding 7.2.3 Documentation Intended user Change management 291 Performance evaluation 7.2.4 Intended user Intended use 293 Intended use 7.2.4 Intended use 295 Intended user 7.2.4 Intended user Explainability 297 Intended use environment 7.2.4 Intended use 299 Relevant population 7.2.4 Clinical performance Data quality 301 Appropriate representation 7.2.4 Intended use Data quality 303 Ethnicity 7.2.4 Data quality Clinical performance 305 Gender 7.2.4 Clinical performance 307 Genetic diversity 7.2.4 Clinical performance 309 Representative population 7.2.4 Clinical performance Data quality 311 Prevalence rates 7.2.4 Clinical performance Data quality &"Times New Roman,Regular"&12&A &"Times New Roman,Regular"&12Page &P ai4h concepts with clusters Super-cluster name Cluster-name AI4H concept name Super-cluster ID Cluster ID AI4H concept ID Performance Analytical performance Two-class classification metrics A a 1 Performance Analytical performance Mutli-class classification metrics A a 2 Performance Analytical performance Regression metrics A a 3 Life Cycle Change management Evolution of the AI algorithm D a 1 Risk and Control Control Cross-validation B a 1 Risk and Control Control Statistical tests B a 2 Risk and Control Control Information criteria B a 3 Risk and Control Control Robustness validation B a 4 Risk and Control Control Out of sample testing B a 5 Risk and Control Control Attribution methods B a 6 Risk and Control Data quality Data diversity B b 1 Risk and Control Data quality Preprocessing B b 2 Risk and Control Data quality Normalization B b 3 Risk and Control Data quality Expert labels B b 4 Risk and Control Data quality Data collection procedure B b 5 Usability and Documentation Documentation Datasheets for data sets C a 1 Usability and Documentation Documentation Modelcards for ML models C a 2 Ethical Compliance Ethical Compliance FAT optimization objectives (“FAT training”) F a 1 Ethical Compliance Ethical Compliance FAT validation F a 2 Ethical Compliance Ethical Compliance Data acceptance and handling F a 3 Ethical Compliance Ethical Compliance Patient consent F a 4 Usability and Documentation Explainability see B) Risk and Control a) Control 6) Attribution methods (“Explainable AI (XAI)”) C b 1 Usability and Documentation Explainability Counterfactual explanations C b 2 Usability and Documentation Intended use Specification for inputs C c 1 Usability and Documentation Intended use see C) Usability and Documentation a) Documentation 1) Datasheets for data sets C c 2 Usability and Documentation Intended use see C) Usability and Documentation a) Documentation 2) Modelcards for ML models C c 3 Usability and Documentation Interpretability see B) Risk and Control a) Control 6) Attribution methods (“Explainable AI (XAI)”) C e 1 Life Cycle Life Cycle AI software life cycle D b 1 Performance Measurements see B) Risk and Control b) Data quality A d 1 Risk and Control Risk and Alarms Uncertainty quantification B c 1 Risk and Control Risk and Alarms Outlier detection B c 2 Risk and Control Safety Robust training B d 1 Dependencies Technical Interfaces Compression of AI4H models E b 1 Dependencies Technical Interfaces Response time E b 2 Dependencies Technical Interfaces Memory E b 3 Dependencies Technical Interfaces Compute E b 4 Dependencies Technical Interfaces Networking E b 5 Dependencies Technical Interfaces Operating system E b 6 Dependencies Technical Interfaces Displays E b 7 Dependencies Technical Interfaces Sensors for input data E b 8 &"Times New Roman,Regular"&12&A &"Times New Roman,Regular"&12Page &P clusters with super-clusters Clusters Super-clusters My order Analytical performance Performance 1 Benefit-risk Performance 1 Clinical performance Performance 1 Measurements Performance 1 Control Risk and control 2 Data quality Risk and control 2 Risk and Alarms Risk and control 2 Safety Risk and control 2 Documentation Usability and documentation 3 Explainability Usability and documentation 3 Intended use Usability and documentation 3 Intended user Usability and documentation 3 Interpretability Usability and documentation 3 Change management Life cycle 4 Life cycle Life cycle 4 External factors Dependencies 5 Technical interfaces Dependencies 5 Ethical compliance Ethical compliance 6 Software &"Times New Roman,Regular"&12&A &"Times New Roman,Regular"&12Page &P
Language:English
Score: 1104448.6 - https://www.itu.int/en/ITU-T/f...ents/all/FGAI4H-G-038-A01.xlsx
Data Source: un
Context IPTV ServerData Center IPTV TerminalMobile AppOn demand data System overview Features • Provide real time information. • Easy access for quick response. • Personalized alarm system, integrated with mobile platforms. • On demand critical information. • You have to register your Zip Code and your mobile number. (...) Maps consult Function Personalized Map Maps: The alarm is activated when the rivers level reaches the quota for the place. To do this register, the function of registration is available on the Portal Alarm Function Alarms: Thank you!
Language:English
Score: 1100311.9 - https://www.itu.int/en/ITU-T/c...es/iptv/Documents/lifeboat.pdf
Data Source: un
. */ module ProbableCauseConst { const string moduleName = "itut_m3120::ProbableCauseConst"; const short indeterminate = 0; /** The following are used with communications alarms. */ const short aIS = 1 ; const short callSetUpFailure = 2; const short degradedSignal = 3; const short farEndReceiverFailure = 4; const short framingError = 5; const short lossOfFrame = 6; const short lossOfPointer = 7; const short lossOfSignal = 8; const short payloadTypeMismatch = 9; const short transmissionError = 10; const short remoteAlarmInterface = 11; const short excessiveBER = 12; const short pathTraceMismatch = 13; const short unavailable = 14; const short signalLabelMismatch = 15; const short lossOfMultiFrame = 16; const short receiveFailure = 17; const short transmitFailure = 18; const short modulationFailure = 19; const short demodulationFailure = 20; const short broadcastChannelFailure = 21; const short connectionEstablishmentError = 22; const short invalidMessageReceived = 23; const short localNodeTransmissionError = 24; const short remoteNodeTransmissionError = 25; const short routingFailure = 26; /** Values 27-50 are reserved for communications alarm related probable causes. */ /** The following are used with equipment alarms. */ const short backplaneFailure = 51; const short dataSetProblem = 52; const short equipmentIdentifierDuplication = 53; const short externalIFDeviceProblem = 54; const short lineCardProblem = 55; const short multiplexerProblem = 56; const short nEIdentifierDuplication = 57; const short powerProblem = 58; const short processorProblem = 59; const short protectionPathFailure = 60; const short receiverFailure = 61; const short replaceableUnitMissing = 62; const short replaceableUnitTypeMismatch = 63; const short synchronizationSourceMismatch = 64; const short terminalProblem = 65; const short timingProblem = 66; const short transmitterFailure = 67; const short trunkCardProblem = 68; const short replaceableUnitProblem = 69; /** an equipment alarm to be issued if the system detects that the real time clock has failed. */ const short realTimeClockFailure = 70; const short antennaFailure = 71; const short batteryChargingFailure = 72; const short diskFailure = 73; const short frequencyHoppingFailure = 74; const short iODeviceError = 75; const short lossOfSynchronisation = 76; const short lossOfRedundancy = 77; const short powerSupplyFailure = 78; const short signalQualityEvaluationFailure = 79; const short tranceiverFailure = 80; /** Values 81-100 are reserved for equipment alarm related probable causes. */ /** The following are used with environmental alarms. */ const short airCompressorFailure = 101; const short airConditioningFailure = 102; const short airDryerFailure = 103; const short batteryDischarging = 104; const short batteryFailure = 105; const short commercialPowerFailure = 106; const short coolingFanFailure = 107; const short engineFailure = 108; const short fireDetectorFailure = 109; const short fuseFailure = 110; const short generatorFailure = 111; const short lowBatteryThreshold = 112; const short pumpFailure = 113; const short rectifierFailure = 114; const short rectifierHighVoltage = 115; const short rectifierLowFVoltage = 116; const short ventilationsSystemFailure = 117; const short enclosureDoorOpen = 118; const short explosiveGas = 119; const short fire = 120; const short flood = 121; const short highHumidity = 122; const short highTemperature = 123; const short highWind = 124; const short iceBuildUp = 125; const short intrusionDetection = 126; const short lowFuel = 127; const short lowHumidity = 128; const short lowCablePressure = 129; const short lowTemperature = 130; const short lowWater = 131; const short smoke = 132; const short toxicGas = 133; const short coolingSystemFailure = 134; const short externalEquipmentFailure = 135; const short externalPointFailure = 136; /** Values 137-150 are reserved for environmental alarm related probable causes. */ /** The following are used with Processing error alarms. */ const short storageCapacityProblem = 151; const short memoryMismatch = 152; const short corruptData = 153; const short outOfCPUCycles = 154; const short sfwrEnvironmentProblem = 155; const short sfwrDownloadFailure = 156; /** A processing error alarm to be issued if the system detects that it has lost the time in the real time clock but the clock itself is working. This could happen e.g. during a power cut in a small NE which does not have battery backup for the real time clock. */ const short lossOfRealTime = 157; /** A processing error alarm to be issued after the system has reinitialised. (...) Usage example: The managed system issues this alarm after a reinitialization with severity warning to inform the management system about the event.
Language:English
Score: 1099430.2 - https://www.itu.int/wftp3/Publ...3120/2001/itut_m3120const.html
Data Source: un
The integration of the systems includes access control, intrusion, surveillance, hold up alarms, elevators, fire alarm system, paging system, television displays throughout the building, emergency evacuation systems/address systems, ice surface management, voice, data and restaurant systems, beer dispensing systems, food storage and kitchen systems, parking systems, water leakage systems, electronic photoflash systems and systems for the hard of hearing or simultaneous translation. (...) The Authorities Having Jurisdiction (AHJ) permitted the use of the public address system for emergency evacuation purposes providing certain safeguards were fully demonstrated (which were successfully accomplished). (...) Aberrations and unexpected delays automatically initiate alarms. These same cards can function as a signal to activate or extinguish selected lights.
Language:English
Score: 1097508.6 - https://www.itu.int/en/publica.../files/basic-html/page485.html
Data Source: un
The OS in a client role is called managing system, and the OS in a server role is called managed system. (...)

**/ module notifications { /** Object Creation Notification (OCN) */ const string NT_OBJECT_CREATION = "NT_OBJECT_CREATION"; /** Object Deletion Notification (ODN) */ const string NT_OBJECT_DELETION = "NT_OBJECT_DELETION"; /** Attribute Value Change notification (AVC) */ const string NT_ATTRIBUTE_VALUE_CHANGE = "NT_ATTRIBUTE_VALUE_CHANGE"; /** State Change Notification (SCN) */ const string NT_STATE_CHANGE = "NT_STATE_CHANGE"; /** File Transfer Status notification (FTS) */ const string NT_FILE_TRANSFER_STATUS = "NT_FILE_TRANSFER_STATUS"; /** Backup Status Event notification (BSE) */ const string NT_BACKUP_STATUS = "NT_BACKUP_STATUS"; /** Heartbeat Event notification (HBE) */ const string NT_HEARTBEAT = "NT_HEARTBEAT"; /** Alarm notification (ALM) */ const string NT_ALARM = "NT_ALARM"; /** Threshold Crossing Alert notification (TCA) */ const string NT_TCA = "NT_TCA"; /** *

The structure of any notification is an OMG Structured Event. (...)

* *

For alarms, the object type value OT_AID denotes an Alarm Identifier * (AID) and is used to represent the EMS object types that are not modelled * (at the interface) but can emit alarms.

Language:English
Score: 1092290.2 - https://www.itu.int/wftp3/Publ...x/x780.2/2007/itut_x780_2.html
Data Source: un
X.800 A vulnerability is any weakness that could be exploited to violate a system or the information it contains. A threat is a potential violation of security. security alarm A message generated when a security-related event that is defined by ITU-T security policy as being an alarm condition has been detected. X.816 A security alarm is intended to come to the attention of appropriate entities in a timely manner. security audit An independent review and examination of system records and ITU-T activities in order to test for adequacy of system controls, to ensure X.800 compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy and procedures. security audit trail Data collected and potentially used to facilitate a security audit. (...) ITU-T X.810 security management Security management comprises all activities to establish, maintain ITU-T and terminate the security aspects of a system. Topics covered are: M.3016.0 management of security services; installation of security mechanisms; key management (management part); establishment of identities, keys, access control information, etc.; management of security audit trail and security alarms. security model A framework for describing the security services that counter ITU-T potential threats to the MTS and the security elements that support X.402 those services. security policy 1.
Language:English
Score: 1091163.9 - https://www.itu.int/wftp3/Publ.../files/basic-html/page184.html
Data Source: un
Cold Chain Equipment by Level of Use For the purpose of this guideline, Temperature Monitoring Devices are categorized by level of application, as follows:  Devices for Cold Rooms and Freezer Rooms  Devices for Refrigerators and Freezers  Devices for Transportation in Cold Boxes and Vaccine Carriers Procurement Manual: Temperature Monitoring Devices Page 3 2.2 Devices for Cold Rooms and Freezer Rooms 2.2.1 Central Temperature Monitoring System These are programmable temperature and event logger systems with integral alarm and auto-dialler options, principally used for monitoring storage conditions in primary and intermediate vaccine stores where WICs and/or WIFs are installed. (...) The device should be fitted with alarm contacts and a door open sensor linked to the alarm system. (...) If the indicator is exposed to conditions exceeding the alarm setting, the display changes from a “√” to an “X”, informing the user of the triggered alarm state.
Language:English
Score: 1087742.1 - https://www.unicef.org/supply/...ces-procurement-guidelines.pdf
Data Source: un
Patients can identify each figure themselves daily, weekly, and monthly charts. An alarm function gives to patient, blood pressure and blood sugar levels that can be measured by adding known. (...) The exercise record - the daily recommendation and alarm function can help to fill the patient exercises when the additional momentum needed. The diabetic common sense - when an alarm rings, a dialog box shows more than 70 different diabetes common senses at random so that patients can reduce boredom and reluctance of the alarm.
Language:English
Score: 1083567 - https://www.itu.int/en/ITU-T/W..._abstract_Heung_Kook_Choi.docx
Data Source: un