
【国外标准】 Methods of testing protective helmets Determination of stability of protective helmets - Dynamic stability
本网站 发布时间:
2021-03-22
开通会员免费在线看70000余条国内标准,赠送文本下载次数,单本最低仅合13.3元!还可享标准出版进度查询、定制跟踪推送、标准查新等超多特权!  
查看详情>>

适用范围:
暂无
标准号:
AS/NZS 2512.7.2:1998
标准名称:
Methods of testing protective helmets Determination of stability of protective helmets - Dynamic stability
英文名称:
Methods of testing protective helmets Determination of stability of protective helmets - Dynamic stability标准状态:
被代替-
发布日期:
1998-09-05 -
实施日期:
出版语种:
- 推荐标准
- AG 201-1998 (Amdts) Approval requirements for manual shut-off valves
- AG 202-1998 (Amdts) Approval requirements for gas appliance regulators (incorporates Amendments)
- AG 204-1998 (Amdts) Approval requirements for thermoelectric flame safeguards
- AG 205-1998 (Amdts) Approval requirements for regulators for use with Liquefied Petroleum Gases
- AG 210-1998 (Amdts) Approval requirements for electronic flame safeguards and flame detectors
- AG 212-1998 (Amdts) Approval requirements for quick-connect devices
- AG 213-1998 (Amdts) Approval requirements for pressure and temperature limit devices
- AG 214-1998 (Amdts) Approval requirements for automatic shut-off valves and vent valves
- ANSI INCITS 135-1992 (R1998) Information Systems - Database Language - SQL (includes ANSI X3.168-1989) (formerly ANSI X3.135-1992 (R1998))
- ANSI INCITS 317-1998 (R2008) AT Attachment with Packet Interface Extension (ATA/ATAPI-4)
- ANSI INCITS TR-7-1989 Information Processing Systems Technical Report - Real-Time Extensions for PL/I (NOT AN AMERICAN NATIONAL STANDARD) (formerly ANSI X3/TR-7-1989)
- ANSI X9.100-160-2-2020 Magnetic Ink Printing (MICR) - Part 2 EPC Field Use
- ANSI X9.104-2-2004 (R2023) Financial transaction card originated messages - Card acceptor to acquiring host messages - Part 2: Convenience store and petroleum marketing industry
- ANSI X9.112-2-2020 Wireless Management and Published Security - Part 2: POS and ATM
- ANSI X9.24-2-2021 Retail Financial Services Symmetric Key Management - Part 2: Using Asymmetric Techniques for the Distribution of Symmetric Keys