Author of the publication

A new selective harmonic elimination pulse-width and amplitude modulation (SHE-PWAM) for drive applications.

, , , , and . IECON, page 234-239. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Electric Vehicle Based on Bidirectional Z-Source Nine-Switch Inverter., , and . IEEE Trans. Veh. Technol., 59 (6): 2641-2653 (2010)Petri net model of insider attacks in SCADA system., and . ISCISC, page 55-60. IEEE, (2014)New rule-based phishing detection method., and . Expert Syst. Appl., (2016)Using Fuzzy Controller in Induction Motor Speed Control with Constant Flux., , and . WEC (5), page 307-310. Enformatika, Çanakkale, Turkey, (2005)Carrier-based PWM and space vector modulation of three single phase PFC rectifier as generator-side converter of PM WECS., , and . IAS, page 1-8. IEEE, (2012)Toward Operator Access Management in SCADA System: Deontological Threat Mitigation., and . IEEE Trans. Ind. Informatics, 14 (8): 3314-3324 (2018)A Graph Theory-Based Approach to Detect False Data Injection Attacks in Power System AC State Estimation., , and . IEEE Trans. Ind. Informatics, 17 (4): 2465-2475 (2021)Vienna-Rectifier-Based Direct Torque Control of PMSG for Wind Energy Application., , and . IEEE Trans. Ind. Electron., 60 (7): 2919-2929 (2013)A High Step-Up Transformerless DC-DC Converter With New Voltage Multiplier Cell Topology and Coupled Inductor., , and . IEEE Trans. Ind. Electron., 69 (10): 10162-10171 (2022)An Optimization-Based Approach to Recover the Detected Attacked Grid Variables After False Data Injection Attack., , , and . IEEE Trans. Smart Grid, 12 (6): 5322-5334 (2021)