期刊文献+
共找到88篇文章
< 1 2 5 >
每页显示 20 50 100
Algorithm and evaluation of generating pseudo-datasets for integrated circuit power analysis
1
作者 Zejia LYU Jizhong SHEN Xi CHEN 《Frontiers of Information Technology & Electronic Engineering》 2025年第9期1596-1608,共13页
Average power analysis plays a crucial role in the design of large-scale digital integrated circuits(ICs).The integration of data-driven machine learning(ML)methods into the electronic design automation(EDA)fields has... Average power analysis plays a crucial role in the design of large-scale digital integrated circuits(ICs).The integration of data-driven machine learning(ML)methods into the electronic design automation(EDA)fields has increased the demand for extensive datasets.To address this need,we propose a novel pseudo-circuit generation algorithm rooted in graph topology.This algorithm efficiently produces a multitude of power analysis examples by converting randomly generated directed acyclic graphs(DAGs)into gate-level Verilog pseudo-combinational circuit netlists.The subsequent introduction of register units transforms pseudo-combinational netlists into pseudo-sequential circuit netlists.Hyperparameters facilitate the control of circuit topology,while appropriate sequential constraints are applied during synthesis to yield a pseudo-circuit dataset.We evaluate our approach using the mainstream power analysis software,conducting pre-layout average power tests on the generated circuits,comparing their performance against benchmark datasets,and verifying the results through circuit topology complexity analysis and static timing analysis(STA).The results confirm the effectiveness of the dataset,and demonstrate the operational efficiency and robustness of the algorithm,underscoring its research value. 展开更多
关键词 Graph computation Electronic design automation(EDA) Pseudo-dataset Average power analysis
原文传递
A Standard Cell-Based Leakage Power Analysis Attack Countermeasure Using Symmetric Dual-Rail Logic
2
作者 朱念好 周玉洁 刘红明 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第2期169-172,共4页
Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the lea... Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor(CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic(SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor. 展开更多
关键词 correlation power analysis cryptograph differential power analysis leakage power analysis(LPA) power analysis simple power analysis
原文传递
SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm
3
作者 Jiahui Liu Lang Li +1 位作者 Di Li Yu Ou 《Computers, Materials & Continua》 SCIE EI 2024年第6期4641-4657,共17页
Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key de... Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys simultaneously.However,two issues in GA-based CPA still need to be addressed:key degeneration and slow evolution within populations.These challenges significantly hinder key recovery efforts.This paper proposes a screening correlation power analysis framework combined with a genetic algorithm,named SFGA-CPA,to address these issues.SFGA-CPA introduces three operations designed to exploit CPA characteris-tics:propagative operation,constrained crossover,and constrained mutation.Firstly,the propagative operation accelerates population evolution by maximizing the number of correct bytes in each individual.Secondly,the constrained crossover and mutation operations effectively address key degeneration by preventing the compromise of correct bytes.Finally,an intelligent search method is proposed to identify optimal parameters,further improving attack efficiency.Experiments were conducted on both simulated environments and real power traces collected from the SAKURA-G platform.In the case of simulation,SFGA-CPA reduces the number of traces by 27.3%and 60%compared to CPA based on multiple screening methods(MS-CPA)and CPA based on simple GA method(SGA-CPA)when the success rate reaches 90%.Moreover,real experimental results on the SAKURA-G platform demonstrate that our approach outperforms other methods. 展开更多
关键词 Side-channel analysis correlation power analysis genetic algorithm CROSSOVER MUTATION
在线阅读 下载PDF
DESIGN OF DIFFERENTIAL POWER ANALYSIS RESISTANT CRYPTO CHIP BASED ON TIME RANDOMIZATION 被引量:1
4
作者 Ren Fang Yan Yingjian Fu Xiaobing 《Journal of Electronics(China)》 2010年第2期237-242,共6页
Differential Power Analysis (DPA) is an effective attack method to break the crypto chips and it has been considered to be a threat to security of information system. With analyzing the prin-ciple of resisting DPA,an ... Differential Power Analysis (DPA) is an effective attack method to break the crypto chips and it has been considered to be a threat to security of information system. With analyzing the prin-ciple of resisting DPA,an available countermeasure based on randomization is proposed in this paper. Time delay is inserted in the operation process and random number is precharged to the circuit during the delay time,the normal schedule is disturbed and the power is randomized. Following this meth-odology,a general DPA resistance random precharge architecture is proposed and DES algorithm following this architecture is implemented. This countermeasure is testified to be efficient to resist DPA. 展开更多
关键词 Differential power analysis (DPA) resistant Random precharge architecture Time randomization
在线阅读 下载PDF
A Combinational Power Analysis Method against Cryptographic Hardware
5
作者 GUO Zheng GU Dawu +4 位作者 LU Haining LIU Junrong XU Sen BAO Sigang GU Haihua 《China Communications》 SCIE CSCD 2015年第1期99-107,共9页
Power analysis is a non-invaslve attack against cryptographic hardware, which effectively exploits runtime power consumption characteristics of circuits. This paper proposes a new power model which combines Hamming Di... Power analysis is a non-invaslve attack against cryptographic hardware, which effectively exploits runtime power consumption characteristics of circuits. This paper proposes a new power model which combines Hamming Distance model and the model based on the template value of power consumption in combinational logic circuit. The new model can describe the power consumption characteristics of sequential logic circuits and those of combinational logic as well. The new model can be used to improve the existing power analysis methods and detect the information leakage of power consumption. Experimental results show that, compared to CPA(Correlation Power Analysis) method, our proposed attack which adopt the combinational model is more efficient in terms of the number of required power traces. 展开更多
关键词 cryptographic hardware side channel attack power analysis combinational logic
在线阅读 下载PDF
Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks
6
作者 Nadia Mustaqim Ansari Rashid Hussain +1 位作者 Sheeraz Arif Syed Sajjad Hussain 《Computers, Materials & Continua》 SCIE EI 2022年第7期1861-1875,共15页
The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the informat... The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the information by observing the power consumption,electromagnetic(EM)field,timing analysis,and acoustics of the device.Later,the attackers perform statistical functions to recover the key.Advanced Encryption Standard(AES)algorithm has proved to be a good security solution for constrained IoT devices.This paper implements a simulation model which is used to modify theAES algorithm using logicalmasking properties.This invariant of the AES algorithm hides the array of bits during substitution byte transformation of AES.This model is used against SCAand particularly Power Analysis Attacks(PAAs).Simulation model is designed on MATLAB simulator.Results will give better solution by hiding power profiles of the IoT devices against PAAs.In future,the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic(WDDL)will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array(FPGA). 展开更多
关键词 Side channel attacks power analysis attacks network security MASKING advance encryption standard
在线阅读 下载PDF
Design of Feedback Shift Register of Against Power Analysis Attack
7
作者 Yongbin Zhao XuYang RanranLi 《Computers, Materials & Continua》 SCIE EI 2019年第2期517-527,共11页
Stream ciphers based on linear feedback shift register(LFSR)are suitable for constrained environments,such as satellite communications,radio frequency identification devices tag,sensor networks and Internet of Things,... Stream ciphers based on linear feedback shift register(LFSR)are suitable for constrained environments,such as satellite communications,radio frequency identification devices tag,sensor networks and Internet of Things,due to its simple hardware structures,high speed encryption and lower power consumption.LFSR,as a cryptographic primitive,has been used to generate a maximum period sequence.Because the switching of the status bits is regular,the power consumption of the LFSR is correlated in a linear way.As a result,the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks.In this paper,a new design of LFSR against power attacks is proposed.The power consumption characteristics of LFSR can be masked by using an additional LFSR and confused by adding a new filter Boolean function and a flip-flop.The design method has been implemented easily by circuits in this new design in comparison with the others. 展开更多
关键词 Stream cipher feedback shift register power analysis Boolean function
在线阅读 下载PDF
Dynamic inhomogeneous S-Boxes in AES: a novel countermeasure against power analysis attacks
8
作者 陈毅成 《High Technology Letters》 EI CAS 2008年第4期390-393,共4页
Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.Th... Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.The masking strategies in algorithm level view each S-Box as an independent moduleand mask them respectively,which are costly in size and power for non-linear characteristic of S-Boxes.The new method uses dynamic inhomogeneous S-Boxes instead of traditional homogeneous S-Boxes,andarranges the S-Boxes randomly.So the power and data path delay of substitution unit become unpre-dictable.The experimental results demonstrate that this scheme takes advantages of the circuit character-istics of various S-Box implementations to eliminate the correlation between crypto operation and power.Itneeds less extra circuits and suits resource constrained applications. 展开更多
关键词 advanced encryption standard (AES) substitution box (S-Box) correlation power analysis
在线阅读 下载PDF
In‑depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS‑Dilithium
9
作者 Huaxin Wang Yiwen Gao +2 位作者 Yuejun Liu Qian Zhang Yongbin Zhou 《Cybersecurity》 2025年第2期229-241,共13页
During the standardisation process of post-quantum cryptography,NIST encourages research on side-channel analysis for candidate schemes.As the recommended lattice signature scheme,CRYSTALS-Dilithium,when implemented o... During the standardisation process of post-quantum cryptography,NIST encourages research on side-channel analysis for candidate schemes.As the recommended lattice signature scheme,CRYSTALS-Dilithium,when implemented on hardware,has seen limited research on side-channel analysis,and current attacks are incomplete or requires a substantial quantity of traces.Therefore,we conducted a more complete analysis to investigate the leakage of an FPGA implementation of CRYSTALS-Dilithium using the Correlation Power Analysis(CPA)method,where with a minimum of 70,000 traces partial private key coefficients can be recovered.Furthermore,we optimise the attack by extracting Point-of-Interests using known information due to parallelism(named CPA-PoI)and by iteratively utilising parallel leakages(named CPA-ITR).Our experimental results show that CPA-PoI reduces the number of traces by up to 16.67%,CPA-ITR by up to 25%,and both increase the number of recovered key coefficients by up to 55.17% and 93.10% using the same number of traces.They outperfom the CPA method.As a result,it suggests that the FPGA implementation of CRYSTALS-Dilithium is more vulnerable than thought before to side-channel analysis. 展开更多
关键词 CRYSTALS-Dilithium Post-Quantum Cryptography Correlation power analysis FPGA Side-Channel Attack
原文传递
Key Recovery Against 3DES in CPU Smart Card Based on Improved Correlation Power Analysis 被引量:3
10
作者 Yanting Ren Liji Wu +4 位作者 Hexin Li Xiangyu Li Xiangmin Zhang An Wang Hongyi Chen 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第2期210-220,共11页
The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the ... The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles. Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware module in a real-life 32-bit CPU smart card. All 112 key bits of the 3DES were recovered with about 80 000 power traces. 展开更多
关键词 Triple Data Encryption Standard (3DES) CPU smart cards power analysis key recovery side-channeanalysis
原文传递
Multi-user rate and power analysis in a cognitive radio network with massive multi-input multi-output
11
作者 Shang LIU Ishtiaq AHMAD +1 位作者 Ping ZHANG Zhi ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第5期674-684,共11页
This paper discusses transmission performance and power allocation strategies in an underlay cognitive radio (CR) network that contains relay and massive multi-input multi-output (MIMO). The downlink transmission ... This paper discusses transmission performance and power allocation strategies in an underlay cognitive radio (CR) network that contains relay and massive multi-input multi-output (MIMO). The downlink transmission performance of a relay-aided massive MIMO network without CR is derived. By using the power distribution criteria, the kth user's asymptotic signal to interference and noise ratio (SINR) is independent of fast fading. When the ratio between the base station (BS) antennas and the relay antennas becomes large enough, the transmission performance of the whole system is independent of BS-to-relay channel parameters and relates only to the relay-to-users stage. Then cognitive transmission performances of primary users (PUs) and secondary users (SUs) in an underlay CR network with massive MIMO are derived under perfect and imperfect channel state information (CSI), including the end-to-end SINR and achievable sum rate. When the numbers of primary base station (PBS) antennas, secondary base station (SBS) antennas, and relay antennas become infinite, the asymptotic SINR of the kth PU and SU is independent of fast fading. The interference between the primary network and secondary network can be canceled asymptotically.Transmission performance does not include the interference temperature. The secondary network can use its peak power to transmit signals without causing any interference to the primary network. Interestingly, when the antenna ratio becomes large enough, the asymptotic sum rate equals half of the rate of a single-hop single-antenna K-user system without fast fading. Next, the PUs' utility function is defined. The optimal relay power is derived to maximize the utility function. The numerical results verify our analysis. The relationships between the transmission rate and the antenna nunber, relay power, and antenna ratio are simulated. We show that the massive MIMO with linear pre-coding can mitigate asymptotically the interference in a multi-user underlay CR network. The primary and secondary networks can operate independently. 展开更多
关键词 Massive multi-input multi-output Cognitive radio Relay network Tiansmission rate power analysis
原文传递
Sample size and power analysis for stepped wedge cluster randomised trials with binary outcomes
12
作者 Jijia Wang Jing Cao +1 位作者 Song Zhang Chul Ahn 《Statistical Theory and Related Fields》 2021年第2期162-169,共8页
In stepped wedge cluster randomised trials(SW-CRTs),clusters of subjects are randomly assigned to sequences,where they receive a specific order of treatments.Compared to conventional cluster randomised studies,one uni... In stepped wedge cluster randomised trials(SW-CRTs),clusters of subjects are randomly assigned to sequences,where they receive a specific order of treatments.Compared to conventional cluster randomised studies,one unique feature of SW-CRTs is that all clusters start from control and gradually transition to intervention according to the randomly assigned sequences.This feature mitigates the ethical concern of withholding an effective treatment and reduces the logistic burden of implementing the intervention at multiple clusters simultaneously.This feature,however,presents challenges that need to be addressed in experimental design and data analysis,i.e.,missing data due to prolonged follow-up and complicated correlation structures that involve between-subject and longitudinal correlations.In this study,based on the generalised estimating equation(GEE)approach,we present a closed-form sample size formula for SW-CRTs with a binary outcome,which offers great flexibility to account for unbalanced randomisation,missing data,and arbitrary correlation structures.We also present a correction approach to address the issue of under-estimated variance by GEE estimator when the sample size is small.Simulation studies and application to a real clinical trial are presented. 展开更多
关键词 Stepped wedge GEE clinical trials power analysis sample size
原文传递
Performance analysis of an improved dynamic power management model in wireless sensor node 被引量:3
13
作者 Anuradha Pughat Vidushi Sharma 《Digital Communications and Networks》 SCIE 2017年第1期19-29,共11页
The energy consumption in the wireless sensor networks is a very critical issue which attracts immediate attention for the sake of the growing demand of the billion dollar market in future. The Dynamic Power Manageme... The energy consumption in the wireless sensor networks is a very critical issue which attracts immediate attention for the sake of the growing demand of the billion dollar market in future. The Dynamic Power Management (DPM) technique is a way of controlling and saving the energy usage in a sensor node. Previously, researchers have proposed lifetime improving stochastic models for wireless sensor networks and limited work has been done focusing on the wireless sensor node. This paper proposes an analyser based Semi-Markov model for DPM in the event-driven sensor node. The power consumption comparison with previously proposed models without this analyser shows the analyser significant contributes to lifetime improvement. The improved model is more power efficient, presents how the DPM model observes the input event arrival and power states of the sensor node components, and then dynamically manages the power consumption of the overall system. Further, to observe the effect of event arrival, missed events, waiting time, processor utilization on the power consumption and lifetime, the proposed DPM system with the single server queuing model is developed. 展开更多
关键词 Dynamic power managementStochastic modelLifetime improvementEvent drivenpower consumptionWireless sensor nodeAnalyser basedEvent arrivalSimulation modelpower analysis
在线阅读 下载PDF
POWER FLOW ANALYSIS AND APPLICATION SIMULATION OF ELECTROMAGNETIC CONTINUOUSLY VARIABLE TRANSMISSION 被引量:3
14
作者 LUO Yutao TAN Di MENG Fanzhen 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2008年第6期48-56,共9页
With the structure of two air gaps and two rotors, the electromagnetic continuously variable transmission(EMCVT) is a novel power-split continuously variable transmission(CVT). There are two kinds of power flowing... With the structure of two air gaps and two rotors, the electromagnetic continuously variable transmission(EMCVT) is a novel power-split continuously variable transmission(CVT). There are two kinds of power flowing through the EMCVT, one is mechanical power and the other is electric power. In the mean time, there are three power ports in the EMCVT, one is the outer rotor named mechanical power port and the other two are the inner rotor and the stator named electric power ports. The mechanical power port is connected to the driving wheels through the final gear and the electric ports are connected to the batteries through the transducers. The two kinds of power are coupled on the outer rotor of the EMCVT. The EMCVT can be equipped on the conventional vehicle being regarded as the CVT and it also can be equipped on the hybrid electric vehicle(HEV) as the multi-energy sources assembly. The power flows of these two kinds of applications are analysed. The back electromotive force(EMF) equations are illatively studied and so the dynamic mathematic model is theorized. In order to certify the feasibility of the above theories, three simulations are carried out in allusion to the above two kinds of mentioned applications of the EMCVT and a five speed automatic transmission(AT) vehicle. The simulation results illustrate that the efficiency of the EMCVT vehicles is higher than that of the AT vehicle owed to the optimized operation area of the engine. Hence the fuel consumption of the EMCVT vehicles is knock-down. 展开更多
关键词 Electromagnetic continuously variable transmission power flow analysis back electromotive force application simulation
在线阅读 下载PDF
Numerical Analysis of Magnetic-Shielding Effectiveness for Magnetic Resonant Wireless Power Transfer System 被引量:1
15
作者 卢伟国 李惠荣 +1 位作者 陈伟铭 刘黎辉 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第8期148-151,共4页
Magnetic radiation phenomena appear inevitably in the magnetic-resonance wireless power transfer (MR-WPT) system, and regarding this problem the magnetic-shielding scheme is applied to improve the electromagnetic pe... Magnetic radiation phenomena appear inevitably in the magnetic-resonance wireless power transfer (MR-WPT) system, and regarding this problem the magnetic-shielding scheme is applied to improve the electromagnetic performance in engineering. In this study, the shielding effectiveness of a two-coil MR-WPT system for different material shields is analyzed in theory using Moser's formula and Schelkunoff's formula. On this basis a candidate magnetic-shielding scheme with a double-layer structure is determined, which has better shielding effectiveness and coils coupling coefficient. Finally, some finite element simulation results validate the correctness of the theoretical analysis, and the shielding effectiveness with the double-layer shield in maximum is 30?dB larger than the one with the single-layer case. 展开更多
关键词 MR WPT Numerical analysis of Magnetic-Shielding Effectiveness for Magnetic Resonant Wireless power Transfer System
原文传递
Theoretical Studies of Active Power/angle Sub-matrix in Power Flow Jacobian for Power System Analysis
16
作者 曹国云 张卿 +1 位作者 钟德成 陈陈 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第5期562-567,共6页
Properties of the active power/angle sub-matrix in the power flow Jacobian for power system analysis are studied. The sub-matrix is a dominant and irreducible matrix under very general conditions of power systems, so ... Properties of the active power/angle sub-matrix in the power flow Jacobian for power system analysis are studied. The sub-matrix is a dominant and irreducible matrix under very general conditions of power systems, so that it is invertible. Also the necessary conditions for its singularity are given. These theoretical results can be used to clarify the ambiguous understanding of the sub-matrix in current literature, and also provide the theoretical foundations for the applications based on reduced power flow Jaeobian. Numerical simulation on the IEEE 118-bus power system is used to illustrate our results. 展开更多
关键词 dominant matrix irreducible matrix power flow Jacobian reduced power flow aacobian power system analysis V-Q sensitivity
原文传递
Analysis of Chinese Power Market in 2007 and Its Forecast
17
作者 Department of Development and Planning, State Grid Corporation, and State Power Economic Research Institute Jia Yulu 《Electricity》 2008年第2期41-45,共5页
Power supply and demand inJanuary-September, 2007Since 2007, the national economy developed continu-ously, showing a situation of rapid growth, more optimizedstructure, increased efficiency and improvement of people&#... Power supply and demand inJanuary-September, 2007Since 2007, the national economy developed continu-ously, showing a situation of rapid growth, more optimizedstructure, increased efficiency and improvement of people'slivelihood. In the first three quarters, GDP achieved 16.6043trillion Yuan, and its year-on-year growth rate was 11.5%; 展开更多
关键词 WILL analysis of Chinese power Market in 2007 and Its Forecast rate THAN
在线阅读 下载PDF
Basic Structure and Its Analysis of Nationwide Power System Interconnection
18
作者 Zeng Dewen 《Electricity》 2000年第3期11-17,共7页
关键词 WORK In Basic Structure and Its analysis of Nationwide power System Interconnection
在线阅读 下载PDF
Traction Power Supply and Electric Power Technology Analysis of Urban Rail Transit
19
作者 CHI Yunzheng 《外文科技期刊数据库(文摘版)工程技术》 2021年第6期422-424,共5页
In recent years, with the expansion of the urban area and the increase of the urban population, the urban traffic problem is gradually prominent. China's transportation system is mature and the technical means are... In recent years, with the expansion of the urban area and the increase of the urban population, the urban traffic problem is gradually prominent. China's transportation system is mature and the technical means are high, but the problems also increase. The improvement of China's scientific and technological level has provided a stronger support for the transportation system of China, which has a vast territory and abundant resources. As a new mode of transportation, urban rail transit has many advantages, such as high speed, low pollution, relieving urban traffic congestion and so on. It is the main direction of urban transportation development in China in the future. In order to give full play to the use of power technology skills, our scientific and technical personnel have to continue to innovate equipment and artificial technical means, attention and attention to traction power supply system and other very important core technology, continuous optimization and improvement. 展开更多
关键词 urban rail transit traction power supply power technical analysis
原文传递
上一页 1 2 5 下一页 到第
使用帮助 返回顶部