Photovoltaic (PV) modules - Test methods for the detection of potential-induced degradation - Part 1...
IEC TS 62804-1:2015(E) defines procedures to test and evaluate the durability of crystalline silicon photovoltaic (PV) modules to the effects of short-term high-voltage stress including potential-induced degradation (PID). Two test methods are defined that do not inherently produce equivalent results. They are given as screening tests; neither test includes all the factors existing in the natural…
Road vehicles — Information for first and second responders — Part 1: Rescue sheet for passenger car...
ISO 17840-1:2015 defines the content and the layout of the rescue sheet providing necessary and useful information about a vehicle involved in an accident to support the rescue team extricating the occupants as fast and as safe as possible. The contents and layout takes into account that the rescue sheet has to be easy to use by rescue teams of all over the world and can be available in paper or…
Road vehicles — Wheels/rims for commercial vehicles — Test methods
ISO 3894:2015 specifies two laboratory methods for testing certain essential strength characteristics of disc wheels intended for road use on commercial vehicles, buses, trailers, and multipurpose passenger vehicles, as defined in ISO 3833.
The test methods are
? dynamic cornering fatigue test and
? dynamic radial fatigue test.
Aerospace series — Fluid, hydraulic, phosphate ester-base, fire resistant — Technical specification
ISO 9940:2015 defines technical requirements, qualification and quality control conditions (product qualification, batch control, acceptance) test and measurement methods to be used by manufacturers for qualification of fire-resistant phosphate-ester-base fluids used for hydraulic transmissions in aircrafts.
Device embedded substrate - Guidelines - Data format
IEC PAS 62878-2-5:2015(E) defines the data format for active and passive devices embedded inside an organic board whose electrical connections are made by means of a via, electroplating, conductive paste or printing of conductive material. This PAS describes the expression of 3D data information, the concept of layers, the structure of board data, and definitions of information repeatedly used in…
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of…
Geographic information — Geography Markup Language (GML) — Part 2: Extended schemas and encoding rul...
The Geography Markup Language (GML) is an XML encoding in compliance with ISO 19118 for the transport and storage of geographic information modelled in accordance with the conceptual modelling framework used in the ISO 19100‑ series of International Standards and including both the spatial and non-spatial properties of geographic features.
ISO 19136-2:2015 defines the XML Schema syntax,…
Information technology — Metadata registries (MDR) — Part 6: Registration
ISO/IEC 11179-6:2015 defines the type of information to be specified, the conditions to be met, and the procedure(s) to be followed for each metadata item to be registered in a metadata registry. The requirements and procedures contained herein apply to all metadata items specified in ISO/IEC 11179‑3 and those specified in ISO/IEC 19763. Some Registration Authorities may want to use this part of…
Information technology - Metadata registries (MDR) - Part 6: Registration
ISO/IEC 11179-6:2015 defines the type of information to be specified, the conditions to be met, and the procedure(s) to be followed for each metadata item to be registered in a metadata registry. The requirements and procedures contained herein apply to all metadata items specified in ISO/IEC 11179‑3 and those specified in ISO/IEC 19763. Some Registration Authorities may want to use this part of…
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of…