Information technology — Determination of chemical emission rates from electronic equipment — Part 1...
This document (all parts) specifies methods to determine chemical emission rates of analytes from ICT & CE equipment during intended operation in an Emission Test Chamber (ETC).
This document (all parts) includes specific methods for equipment using consumables, such as printers, and equipment not using consumables, such as monitors and PC’s.
Part 1 specifies the methods to determine the…
Photovoltaic devices - Procedures for temperature and irradiance corrections to measured I-V charact...
IEC 60891:2021 defines procedures to be followed for temperature and irradiance corrections to the measured I-V (current-voltage) characteristics (also known as I-V curves) of photovoltaic (PV) devices. It also defines the procedures used to determine factors relevant to these corrections. Requirements for I-V measurement of PV devices are laid down in IEC 60904-1 and its relevant subparts.
This…
Dispositifs photovoltaïques - Procédures pour les corrections en fonction de la température et de l&...
IEC 60891:2021 définit des procédures à suivre pour les corrections en fonction de la température et de l'éclairement appliquées aux caractéristiques I-V (courant-tension) mesurées (également appelées courbes I-V) des dispositifs photovoltaïques (PV). Il définit également les procédures utilisées pour déterminer les facteurs appropriés pour ces corrections. Les exigences pour le mesurage I-V…
Traceability of rare earths in the supply chain from mine to separated products
This document specifies requirements for, and gives guidance on, the design and use of a traceability system in a rare earth supply chain. It specifies the information to be recorded by supply chain businesses for rare earth materials or products passing through the supply chain from mine to separated products.
Machinery for forestry — Safety requirements and testing for pole-mounted powered pruners — Part 1: ...
This document specifies safety requirements and measures for their verification for the design and construction of portable, hand-held, pole-mounted powered pruners (hereafter named “machine”), including extendable and telescopic machines, having an integral combustion engine as their power source. These machines use a power transmission shaft to transmit power to a cutting attachment consisting…
Machinery for forestry — Safety requirements and testing for pole-mounted powered pruners — Part 2: ...
This document specifies safety requirements and measures for their verification for the design and construction of portable, hand-held, pole-mounted powered pruners with a backpack power unit (hereafter referred to as “machine”). These machines use a power transmission shaft to transmit power to a cutting attachment consisting of a combination of saw-chain and guide bar, a reciprocating saw blade…
Matériel forestier — Exigences de sécurité et essais pour les perches élagueuses à moteur — Partie 2...
Le présent document spécifie les exigences de sécurité, et les mesures pour leur vérification, pour la conception et la construction des perches élagueuses portatives à moteur, équipées d'une source motrice portée à dos et fonctionnant avec un arbre de transmission pour alimenter le dispositif de coupe consistant en une chaîne de scie, lame de scie alternative ou lame de scie circulaire…
Matériel forestier — Exigences de sécurité et essais pour les perches élagueuses à moteur — Partie 1...
Le présent document spécifie les exigences de sécurité, et les mesures pour leur vérification, pour la conception et la construction des perches élagueuses portatives à moteur (ci-après appelées «machines») y compris des machines en extension et les machines télescopiques équipées d'un moteur à combustion interne intégré comme source motrice. Ces machines utilisent un arbre de transmission…
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data…
Information technology — Coded representation of immersive media — Part 17: Reference software and c...
This document specifies the conformance and reference software for omnidirectional media format (specified in ISO/IEC 23090‑2). This document describes the reference software modules and the features that is supports. It also provides a description of how the reference software can be utilized.
In addition, the document lists and describes test vectors comprising ISO base media file format files…