Performance optimization of synchronous reluctance machines with two rotor structures
ناشر:
سال
: 2014شناسه الکترونیک: 10.1109/ITNG.2014.77
کلیدواژه(گان): business data processing,n cloud computing,n computer network security,n DDoS,n IDS,n IT-enabled business services,n cloud computing infrastructure,n cloud computing vulnerability,n cloud security vulnerability issues,n distributed denial of service,n security threat,n Availability,n Cloud computing,n Computational modeling,n Computer crime,n Organizations,n Servers,n Cloud,n DDoS,n IDS,n Security,n Vulnerability
کالکشن
:
-
آمار بازدید
Performance optimization of synchronous reluctance machines with two rotor structures
Show full item record
contributor author | Tahi, S. | |
contributor author | Ibtiouen, R. | |
contributor author | Mekhtoub, S. | |
date accessioned | 2020-03-12T21:49:48Z | |
date available | 2020-03-12T21:49:48Z | |
date issued | 2014 | |
identifier other | 6960189.pdf | |
identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1061965 | |
format | general | |
language | English | |
publisher | IEEE | |
title | Performance optimization of synchronous reluctance machines with two rotor structures | |
type | Conference Paper | |
contenttype | Metadata Only | |
identifier padid | 8193856 | |
subject keywords | business data processing | |
subject keywords | n cloud computing | |
subject keywords | n computer network security | |
subject keywords | n DDoS | |
subject keywords | n IDS | |
subject keywords | n IT-enabled business services | |
subject keywords | n cloud computing infrastructure | |
subject keywords | n cloud computing vulnerability | |
subject keywords | n cloud security vulnerability issues | |
subject keywords | n distributed denial of service | |
subject keywords | n security threat | |
subject keywords | n Availability | |
subject keywords | n Cloud computing | |
subject keywords | n Computational modeling | |
subject keywords | n Computer crime | |
subject keywords | n Organizations | |
subject keywords | n Servers | |
subject keywords | n Cloud | |
subject keywords | n DDoS | |
subject keywords | n IDS | |
subject keywords | n Security | |
subject keywords | n Vulnerability | |
identifier doi | 10.1109/ITNG.2014.77 | |
journal title | lectrical Machines (ICEM), 2014 International Conference on | |
filesize | 1126237 | |
citations | 0 |