Explosive atmospheres - Part 18: Equipment protection by encapsulation "m"
IEC 60079-18:2009 RLV contains both the official IEC International Standard and its Redline version. The Redline version is available in English only and provides you with a quick and easy way to compare all the changes between the official IEC Standard and its previous edition.
IEC 60079-18:2009 gives the specific requirements for the construction, testing and marking of electrical equipment…
International Electrotechnical Vocabulary (IEV) - Part 617: Organization/Market of electricity
IEC 60050-617:2009 has been published as a consequence of deregulation of the electricity market, it appeared necessary to establish a common glossary with those terms defining actors in the market, interface between actors and the technical or financial terms having a specific meaning in the context of electricity market. This horizontal standard IEC 60050-617:2009 is primarily intended for use…
IEC/PAS 62596:2009(E) is a Publicly Available Specification which provides general sampling guidelines and strategies of sampling for electrotechnical products, electronic assemblies, electronic components. In order to obtain samples that can be used for analytical testing to determine the levels of restricted substances as described in the test methods of IEC 62321. Restrictions for substances…
Guidelines for calculating derived release limits for radioactive material in airborne and liquid ef...
1 Scope
1.1 Facilities
The previous edition of CSA N288.1 and the CDG were intended to apply primarily to CANDU nuclear power stations in Canada; this remains the focus of this Guideline. However, the radionuclides and environmental pathways addressed make this Guideline applicable to releases from many other nuclear facilities, including research reactors, radioisotope processing facilities,…
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2008 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is the result of a data exchange…
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2008 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
Establish a shared secret key for a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is the result of a data exchange…
Safety of laser products - Part 3: Guidance for laser displays and shows
This part of IEC 60825, which is a technical report, gives guidance on the planning and design, set-up and conduct of laser displays and shows that make use of high power lasers. The laser power needed to produce effective theatrical or artistic displays in large spaces such as theatres, arenas, or architectural sites is great enough to pose a severe accidental exposure hazard, even when personal…
Information technology - Automatic identification and data capture techniques - Aztec Code bar code ...
Aztec Code is a two-dimensional matrix symbology whose symbols are nominally square, made up of square modules on a square grid, with a square bullseye pattern at their centre. Aztec Code symbols can encode from small to large amounts of data with user-selected percentages of error correction.
Manufacturers of bar code equipment and users of the technology require publicly available standard…
Information technology — Automatic identification and data capture techniques — Aztec Code bar code ...
Aztec Code is a two-dimensional matrix symbology whose symbols are nominally square, made up of square modules on a square grid, with a square bullseye pattern at their centre. Aztec Code symbols can encode from small to large amounts of data with user-selected percentages of error correction.
Manufacturers of bar code equipment and users of the technology require publicly available standard…
IntelliGrid methodology for developing requirements for energy systems
This Publicly Available Specification (PAS) defines a methodology for power system domain experts to determine and describe their user requirements for automation systems, based on their utility business needs. This methodology was originally developed as part of the IntelliGrid Architecture developed by the Electrical Power Research Institute (EPRI), as a means to implement the "IntelliGrid…