Listing 1 - 10 of 337 | << page >> |
Sort by
|
Choose an application
Abstract: Recommended practices for specifying Thyristor-Controlled Series Capacitor (TCSC) installations used in series with transmission lines are provided. Ratings for TCSC thyristor valve assemblies, capacitors, and reactors as well as TCSC control characteristics, protective features, cooling systems, testing, commissioning, training, documentation, operation, and maintenance are addressed.
Choose an application
Abstract: Recommended practices for specifying Thyristor-Controlled Series Capacitor (TCSC) installations used in series with transmission lines are provided. Ratings for TCSC thyristor valve assemblies, capacitors, and reactors as well as TCSC control characteristics, protective features, cooling systems, testing, commissioning, training, documentation, operation, and maintenance are addressed.
Choose an application
Choose an application
The dazzling spectacle presented by the armies of medieval Japan owed much to the highly developed family and personal heraldry of samurai society. From simple personal banners, this evolved over centuries of warfare into a complex system of flags worn or carried into battle, together with the striking 'great standards' of leading warlords. While not regulated in the Western sense, Japanese heraldry developed as a series of widely followed practices, while remaining flexible enough to embrace constant innovation. Scores of examples, in monochrome and full colour, illustrate this fascinating
Choose an application
Accounting --- Financial statements --- Standards --- Standards.
Choose an application
Accounting --- -Accounting --- -International accounting standard --- Standards --- -Standards --- -Standards -
Choose an application
Voting-machines --- Voting-machines --- Standards --- Testing --- Standards
Choose an application
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating interconnections between information technology (IT) systems that are owned and operated by different organizations. The guidelines are consistent with the requirements specified in the Office of Management and Budget (OMB) Circular A-130, Appendix III, for system interconnection and information sharing. A system interconnection is defined as the direct connection of two or more IT systems for the purpose of sharing data and other information resources. The document describes various benefits of interconnecting IT systems, identifies the basic components of an interconnection, identifies methods and levels of interconnectivity, and discusses potential security risks associated with an interconnection. The document then presents a "life-cycle management" approach for interconnecting IT systems, with an emphasis on security. The four phases of the interconnection life cycle are addressed: 1) Planning the interconnection: the participating organizations perform preliminary activities; examine all relevant technical, security, and administrative issues; and form an agreement governing the management, operation, and use of the interconnection. 2) Establishing the interconnection: the organizations develop and execute a plan for establishing the interconnection, including implementing or configuring appropriate security controls. 3) Maintaining the interconnection: the organizations actively maintain the interconnection after it is established to ensure that it operates properly and securely. 4) Disconnecting the interconnection: one or both organizations may choose to terminate the interconnection. The termination should be conducted in a planned manner to avoid disrupting the other party's system. In response to an emergency, however, one or both organizations may decide to terminate the interconnection immediately. The document provides recommended steps for completing each phase, emphasizing security measures that should be taken to protect the connected systems and shared data. The document also contains guides and samples for developing an Interconnection Security Agreement (ISA) and a Memorandum of Understanding/Agreement (MOU/A). The ISA specifies the technical and security requirements of the interconnection, and the MOU/A defines the responsibilities of the participating organizations. Finally, the document contains a guide for developing a System Interconnection Implementation Plan, which defines the process for establishing the interconnection, including scheduling and costs.
Computer networks --- Standards --- Security measures. --- Standards.
Choose an application
Voting-machines --- Voting-machines --- Standards --- Testing --- Standards
Choose an application
Superseded by IEEE Std C57.12.20-2005.This standard covers certain electrical, dimensional, and mechanical characteristics and takes into consideration certain safety features of single- and three-phase, 60-Hz, mineral-oil-immersed, self-cooled, overhead-type distribution transformers 500 kVA and smaller, with high voltages 34500 volts and below and low voltages 7970/13800Y volts and below. Such transformers may include one or more of the following features: (1) High-voltage, overcurrent protection; (2) High-voltage, overvoltage protection. (3) Low-voltage, overcurrent protection; (4) Low-voltage, overvoltage protection.
Listing 1 - 10 of 337 | << page >> |
Sort by
|