ISO/TR 10828:2015, thread profiles of the five most common types of worms at the date of publication are described and formulae of their axial profiles are given.
The five worm types covered in this technical report are designated by the letters A, C, I, K and N.
The formulae to calculate the path of contact, the conjugate profile of the worm wheel, the lines of contact, the radius of curvature…
Engrenages à vis cylindriques — Géométrique des profils de vis et des engrènements
Dans l'ISO/TR 10828:2015, les cinq types de profils de filets de vis les plus courants à la date de la publication sont décrits et les formules de leur profil axial sont données.
Les cinq types de vis couverts dans le présent rapport technique sont désignés par les lettres A, C, I, K et N.
Les formules pour calculer la ligne de conduite, le profil conjugué de la roue creuse, les lignes de…
Household and similar electrical appliances - Safety - Part 2-54:Particular requirements for surface...
IEC 60335-2-54:2008+A1:2015 deals with the safety of electric cleaning appliances for household use that are intended for cleaning surfaces such as windows, walls and empty swimming pools by using liquid cleansing agents or steam, their rated voltage being not more than 250 V. It also covers wallpaper strippers. The principal change in this edition as compared with the third edition of IEC 60335-…
Noise suppression sheet for digital devices and equipment - Part 2:Measuring methods
IEC 62333-2:2006+A1:2015 specifies the methods for measuring the electromagnetic characteristics of a noise suppression sheet. Those methods are intended to provide useful and repeatable measurements to characterize the performance of the noise suppression sheets, so that manufacturers and their customers are able to obtain the same results.
This publication is to be read in conjunction with…
Plaque réduisant le bruit des dispositifs et appareils numériques -Partie 2: Méthodes de mesure
L'IEC 62333-2:2006+A1:2015 spécifie les méthodes de mesure des caractéristiques électromagnétiques d'une plaque réduisant le bruit. Ces méthodes sont destinées à fournir des mesures utiles et reproductibles pour caractériser les performances des plaques réduisant le bruit, de sorte que les fabricants et leurs clients puissent obtenir les mêmes résultats.
Cette publication doit être…
Household and similar electrical appliances - Safety - Part 2-54:Particular requirements for surface...
IEC 60335-2-54:2008+A1:2015 deals with the safety of electric cleaning appliances for household use that are intended for cleaning surfaces such as windows, walls and empty swimming pools by using liquid cleansing agents or steam, their rated voltage being not more than 250 V. It also covers wallpaper strippers. The principal change in this edition as compared with the third edition of IEC 60335-…
Appareils électrodomestiques et analogues - Sécurité - Partie 2-54: Règles particulières pour les ap...
L'IEC 60335-2-54:2008+A1:2015 traite de la sécurité des appareils de nettoyage électriques à usage domestique, destinés au nettoyage des surfaces telles que les vitres, les murs et les piscines vides, en utilisant des agents de nettoyage liquides ou de la vapeur, et dont la tension assignée n'est pas supérieure à 250 V. Elle s'applique également aux décolleuses de papier peint. La…
Activities relating to drinking water and wastewater services — Crisis management of water utilities
ISO 24518:2015 provides general guidance to water utilities to develop and implement a crisis management system.
ISO 24518:2015 may be applicable to all sizes of public or private water utilities that want to prepare, respond, and recover from a crisis.
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of…
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of…