{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:31:16Z","timestamp":1730226676765,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,14]]},"DOI":"10.1109\/ic3i59117.2023.10398109","type":"proceedings-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T18:27:08Z","timestamp":1706293628000},"page":"2089-2092","source":"Crossref","is-referenced-by-count":0,"title":["Increasing Automotive Electrical Equipment Effectiveness with Enhanced Iron Loss Estimation Techniques"],"prefix":"10.1109","author":[{"given":"Neetu","family":"Gupta","sequence":"first","affiliation":[{"name":"K. R. Mangalam University,Department of Computer Science and Engineering,Gurugram,India"}]},{"given":"Arjun","family":"Singh","sequence":"additional","affiliation":[{"name":"Dev Bhoomi Uttarakhand University,Electronics and Communications Engineering,Uttarakhand,India"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"Invertis University,Department of Computer Applications,Bareilly,India"}]},{"given":"G.","family":"Ravivarman","sequence":"additional","affiliation":[{"name":"Karpagam Academy of Higher Education,Department of Electrical and Electronics Engineering,Coimbatore,India"}]},{"given":"P","family":"Gajendran","sequence":"additional","affiliation":[{"name":"Karpagam Academy of Higher Education,Department of Electrical and Electronics Engineering,Coimbatore,India"}]},{"given":"Pallavi","family":"Deshpande","sequence":"additional","affiliation":[{"name":"Vishwakarma Institute of Information Technology,Electronics and Telecommunications Engineering Department,Pune,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ECCE47101.2021.9595906"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/pbpo186e"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/OJIES.2022.3162336"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/OJIES.2022.3208329"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2993525"},{"journal-title":"AcademicPress","article-title":"Hysteresis in Magnetism: For Physicists, Materials Scientists and Engineers","year":"1998","author":"Bertotti","key":"ref6"},{"journal-title":"Eddy Currents, Iliffe, 1967.IEC404\u20132andIEC404-3","author":"Lammeranerand","key":"ref7"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1016\/0304-8853(94)90646-7","article-title":"Corelosspredictioncombiningphysicalmodelswithn umerical field analysis","volume":"133","author":"Bertotti","year":"1994","journal-title":"1. Magn. Magn. Mat."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/20.104905"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/20.104797"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/icecaa55415.2022.9936206"},{"issue":"5","key":"ref12","first-page":"4057","article-title":"Stochastic model: reCAPTCHA controller based co-variance matrix analysis","volume":"36","author":"Poongodi","year":"2015","journal-title":"Recommendation model based on trust relations & user credibility. Journal of Intelligent & Fuzzy Systems"},{"key":"ref13","first-page":"223","article-title":"Securing Cloud information with the use of Bastion Algorithm to enhance Confidentiality and Protection","volume":"118","author":"Jeyachandran","year":"2018","journal-title":"Int. J. Pure Appl. Math"},{"issue":"4","key":"ref14","doi-asserted-by":"crossref","first-page":"1549","DOI":"10.1007\/s10586-015-0496-y","article-title":"The probabilistic approach of energy utility and reusability model with enhanced security from the compromised nodes through wireless energy transfer on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET","volume":"18","author":"Poongodi","year":"2017","journal-title":"Cluster Computing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-015-1822-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icses55317.2022.9914108"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/I4Tech55392.2022.9952780"},{"article-title":"Magnetic material optimizationforhybridvehiclePMSMdrives","volume-title":"Inducticaconference,C hicago(USA)","year":"2009","author":"Jacobs","key":"ref18"},{"key":"ref19","first-page":"421","article-title":"Improved iron-loss prediction by a modified loss-equation using a reduced parameter identificationrange","author":"Schmidt","year":"2011","journal-title":"Proc.Can!SoftMagn.Mat.\u2022SMM20"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tmag.2012.2208944"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ECCE47101.2021.9595906"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/pbpo186e"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/OJIES.2022.3162336"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/OJIES.2022.3208329"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2993525"},{"journal-title":"Valutazione sperimentale delle perdite nel ferro e controllo di massima efficienza per motori syr","year":"2020","author":"Ariaudo","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2021.3056745"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2018.2886328"}],"event":{"name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2023,9,14]]},"location":"Gautam Buddha Nagar, India","end":{"date-parts":[[2023,9,16]]}},"container-title":["2023 6th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10397581\/10397594\/10398109.pdf?arnumber=10398109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T18:25:24Z","timestamp":1706898324000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10398109\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ic3i59117.2023.10398109","relation":{},"subject":[],"published":{"date-parts":[[2023,9,14]]}}}