Electrical energy storage (EES) systems - Part 2-2: Unit parameters and testing methods - Applicatio...
IEC TS 62933-2-2:2022(E) defines testing methods and duty cycles to validate the EES system’s technical specification for the manufacturers, designers, operators, utilities and owners of the EES systems which evaluate the performance of the EES systems for various applications. The following items are covered in this document. The energy storage devices and technologies are outside the scope of…
Piston-operated volumetric apparatus — Part 1: Terminology, general requirements and user recommenda...
This document specifies general requirements for piston-operated volumetric apparatus (POVA). It is applicable to pipettes, burettes, dilutors, dispensers and manually operated precision laboratory syringes. It furthermore defines terms for the use of piston-operated volumetric apparatus and gives user recommendations.
This document does not apply to medical products intended for use on humans, e…
Information technology — MPEG audio technologies — Part 7: Unified speech and audio coding conforman...
This document specifies conformance criteria for both bitstreams and decoders compliant with the MPEG-D Unified speech and audio coding standard as defined in ISO/IEC 23003‑3. This is done to assist implementers and to ensure interoperability.
Reciprocating internal combustion engines — Vocabulary of components and systems — Part 10: Ignition...
This document establishes a vocabulary for ignition systems of reciprocating internal combustion engines.
In this document, the terms are classified as follows:
a) types of ignition system;
b) conventional ignition systems;
c) electronic ignition systems;
d) computer-controlled ignition systems;
e) parameters for ignition systems.
NOTE ISO 2710-1 gives a classification of reciprocating…
Information technology - MPEG audio technologies - Part 7: Unified speech and audio coding conforman...
This document specifies conformance criteria for both bitstreams and decoders compliant with the MPEG-D Unified speech and audio coding standard as defined in ISO/IEC 23003‑3. This is done to assist implementers and to ensure interoperability.
This document provides requirements for the evaluation and use of test method for snow depth sensors. This document is applicable to the following types of automatic snow depth sensors which employ different ranging technologies by which the sensors measure the distance from the snow surface to the sensor:
a) Ultrasonic type, also known as sonic ranging depth sensors;
b) Optical laser snow depth…
Information technology — Automatic identification and data capture techniques — JAB Code polychrome ...
This document defines the requirements for the symbology known as JAB Code. It specifies the JAB Code symbology characteristics, symbol structure, symbol dimensions, symbol cascading rules, data character encodation, error correction rules, user-selectable application parameters, print quality requirements and a reference decode algorithm.
Information technology - Automatic identification and data capture techniques - JAB Code polychrome ...
This document defines the requirements for the symbology known as JAB Code. It specifies the JAB Code symbology characteristics, symbol structure, symbol dimensions, symbol cascading rules, data character encodation, error correction rules, user-selectable application parameters, print quality requirements and a reference decode algorithm.
This document specifies design, construction, installation and test requirements for remote mechanical cable steering systems and the output ram interface point to rudders, jet drives, outboard and sterndrive engines for small craft.
It is applicable to three distinct classes of steering systems for use on various types of craft:
— standard duty steering systems, for small craft with single…
Information security — Encryption algorithms — Part 7: Tweakable block ciphers
This document specifies tweakable block ciphers. A tweakable block cipher is a family of n-bit permutations parametrized by a secret key value and a public tweak value. Such primitives are generic tools that can be used as building blocks to construct cryptographic schemes such as encryption, Message Authentication Codes, authenticated encryption, etc.
A total of five different tweakable block…