Author of the publication

Cooling of Automotive Traction Motors: Schemes, Examples, and Computation Methods.

, , , , , , , , and . IEEE Trans. Ind. Electron., 66 (3): 1681-1692 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Design Techniques Applied to Hybrid Vehicle Drive Machines - Assessment of Alternative IPM and Induction Motor Topologies., , , and . IEEE Trans. Ind. Electron., 59 (10): 3690-3699 (2012)Considerations on Estimating the Minimal Level of Attenuation in TEMPEST Filtering for IT Equipments., , , , and . FABULOUS, volume 241 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 9-15. Springer, (2017)A method for determining ipm motor parameters from simple torque test data., and . IECON, page 7290-7294. IEEE, (2013)MMF Harmonics Effect on the Embedded FE-Analytical Computation of PM Motors., , , and . IAS, page 1544-1551. IEEE, (2007)A Unified Approach to the Synchronous Performance Analysis of Single and Poly-Phase Line-Fed Interior Permanent Magnet Motors., , , , and . IAS, page 148-153. IEEE, (2007)Numerical and Experimental Calculation of CHTC in an Oil-Based Shaft Cooling System for a High-Speed High-Power PMSM., , , , , , and . IEEE Trans. Ind. Electron., 67 (6): 4371-4380 (2020)Cooling of Automotive Traction Motors: Schemes, Examples, and Computation Methods., , , , , , , , and . IEEE Trans. Ind. Electron., 66 (3): 1681-1692 (2019)Intelligent Blocking System for Mobile Communications Initiated by Unauthorized Users., , , and . ECAI, page 1-6. IEEE, (2023)Analytical modeling of eddy current loss in retaining sleeve of surface-mounted PM machines accounting for influence of slot opening., , , , and . ISIE, page 611-616. IEEE, (2012)Security Risk: Detection of Compromising Emanations Radiated or Conducted by Display Units., , , , and . FABULOUS, volume 241 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 45-51. Springer, (2017)