期刊文献+
共找到90,892篇文章
< 1 2 250 >
每页显示 20 50 100
Research on the Mechanism of Qihuang Zhuyu Formula in Alleviating Depression after Myocardial Infarction through the TNF Signaling Pathway
1
作者 LI Jianghong SUN Tong +3 位作者 YU Peng SHEN Le SUN Weixin CHEN Xiaohu 《南京中医药大学学报》 北大核心 2025年第9期1148-1165,共18页
OBJECTIVE To explore the mechanism of action of Qihuang Zhuyu formula(QHZYF)in improving depression after myocardial infarction(MI),with a focus on revealing its regulatory effect on the inflammatory response of the h... OBJECTIVE To explore the mechanism of action of Qihuang Zhuyu formula(QHZYF)in improving depression after myocardial infarction(MI),with a focus on revealing its regulatory effect on the inflammatory response of the heart and brain.METHODS The active ingredients of QHZYF and the action targets for intervening in depression after MI were analyzed by using ultra-performance liquid chromatography-high-resolution mass spectrometry(UPLC-Q-TOF/MS)combined with network pharmacology and molecular docking.A rat model of depression after MI was established by ligation of the left anterior descending coronary artery combined with chronic restraint stress.Echocardiography was used to evaluate cardiac function,hematoxylin-eosin(HE)and Masson staining were used to evaluate myocardial injury,behavioral tests were used to detect melancholic behaviors,Nissl staining was used to evaluate hippocampal neuron injury.Western blot detection of tumor necrosis factor receptor 2(TNFR2),phosphatidylinositol-3-kinase(PI3K),phosphorylated seronine protein kinase(p-AKT),seronine protein kinase(AKT),tumor necrosis factor receptor 1(TNFR1),phosphorylated nuclear factorκB(p-NF-κB),and nuclear factorκB(NF-κB)in cardiac and hippocampal tissues was conducted.The levels of serum IL-6 and IL-10 were detected by enzyme-linked immunosorbent assay(ELISA),and the expression of TNFR1 and TNFR2 was detected by immunohistochemical technique(IHC).In vitro experiments,co-culture of rat cardiomyocyte line H9C2 cells and rat adrenal pheochromocytoma cell line with high differentiation PC12 cells was conducted,TNFR1 inhibitor(H398)and TNFR2 agonist(C-6His)were administered for intervention,and the expression of TNFR2,PI3K,p-AKT,AKT,TNFR1,NF-κB,p-NF-κB was detected by Western blot.Observe the apoptosis of cells by TUNEL staining,ELISA was used to detect the levels of IL-6 and IL-10 in the cell supernatant.RESULTS Network pharmacological analysis indicates that the TNF signaling pathway was a key target for the treatment of depression after MI with the QHZYF.In vivo experiments have confirmed that the intervention of QHZYF could significantly improve the cardiac function,myocardial tissue and hippocampal neuron structure damage of depressed rats after MI,and improve their depression-like behaviors.At the molecular level,the high-dose group of QHZYF significantly upregulated TNFR2,p-AKT/AKT,and IL-10 in cardiac and hippocampal tissues(P<0.01),and downregulated TNFR1,p-NF-κB/NF-κB and IL-6(P<0.01).In vitro experiments showed that the drug-containing serum of QHZYF significantly upregulated the expression of TNFR2,p-AKT/AKT and IL-10 in H9C2 and PC12 cells(P<0.01),downregulated the expression of TNFR1,p-NF-κB/NF-κB and IL-6(P<0.01),and significantly inhibited cell apoptosis(P<0.01).Furthermore,experiments on the combined application of H398 or C-6His further confirmed that its protective and anti-inflammatory effects were mediated by regulating the TNFR2/PI3K/AKT and TNFR1/NF-κB pathways.CONCLUSION QHZYF improves the homeostasis of heart and brain inflammation by regulating the TNF pathway,and ameliorates myocardial injury and depressive state in depressed rats after MI. 展开更多
关键词 myocardial infarction DEPRESSION INFLAMMATION Qihuang Zhuyu formula
在线阅读 下载PDF
FedCLCC:A personalized federated learning algorithm for edge cloud collaboration based on contrastive learning and conditional computing
2
作者 Kangning Yin Xinhui Ji +1 位作者 Yan Wang Zhiguo Wang 《Defence Technology(防务技术)》 2025年第1期80-93,共14页
Federated learning(FL)is a distributed machine learning paradigm for edge cloud computing.FL can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure ... Federated learning(FL)is a distributed machine learning paradigm for edge cloud computing.FL can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure challenges in edge environments.However,the diversity of clients in edge cloud computing presents significant challenges for FL.Personalized federated learning(pFL)received considerable attention in recent years.One example of pFL involves exploiting the global and local information in the local model.Current pFL algorithms experience limitations such as slow convergence speed,catastrophic forgetting,and poor performance in complex tasks,which still have significant shortcomings compared to the centralized learning.To achieve high pFL performance,we propose FedCLCC:Federated Contrastive Learning and Conditional Computing.The core of FedCLCC is the use of contrastive learning and conditional computing.Contrastive learning determines the feature representation similarity to adjust the local model.Conditional computing separates the global and local information and feeds it to their corresponding heads for global and local handling.Our comprehensive experiments demonstrate that FedCLCC outperforms other state-of-the-art FL algorithms. 展开更多
关键词 Federated learning Statistical heterogeneity Personalized model Conditional computing Contrastive learning
在线阅读 下载PDF
Physical-layer secure hybrid task scheduling and resource management for fog computing IoT networks
3
作者 ZHANG Shibo GAO Hongyuan +1 位作者 SU Yumeng SUN Rongchen 《Journal of Systems Engineering and Electronics》 2025年第5期1146-1160,共15页
Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems... Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems are susceptible to malicious eavesdropping attacks during the information transmission,and this issue has not been adequately addressed.In this paper,we propose a physical-layer secure fog computing IoT system model,which is able to improve the physical layer security of fog computing IoT networks against the malicious eavesdropping of multiple eavesdroppers.The secrecy rate of the proposed model is analyzed,and the quantum galaxy–based search algorithm(QGSA)is proposed to solve the hybrid task scheduling and resource management problem of the network.The computational complexity and convergence of the proposed algorithm are analyzed.Simulation results validate the efficiency of the proposed model and reveal the influence of various environmental parameters on fog computing IoT networks.Moreover,the simulation results demonstrate that the proposed hybrid task scheduling and resource management scheme can effectively enhance secrecy performance across different communication scenarios. 展开更多
关键词 fog computing Internet-of-Things(IoT) physical layer security hybrid task scheduling and resource management quantum galaxy-based search algorithm(QGSA)
在线阅读 下载PDF
Magic Formula轮胎模型参数辨识的一种混合优化方法 被引量:15
4
作者 张云清 陈伟 +1 位作者 陈立平 杨景周 《汽车工程》 EI CSCD 北大核心 2007年第3期250-253,225,共5页
Magic Formula(MF)轮胎模型能够准确描述轮胎的侧偏特性,广泛应用于车辆动力学的研究。由于MF轮胎模型参数多,且高度非线性,从大量的试验数据中准确辨识这些参数相当困难。提出一种基于遗传算法和数值优化算法的混合优化方法,采用由粗... Magic Formula(MF)轮胎模型能够准确描述轮胎的侧偏特性,广泛应用于车辆动力学的研究。由于MF轮胎模型参数多,且高度非线性,从大量的试验数据中准确辨识这些参数相当困难。提出一种基于遗传算法和数值优化算法的混合优化方法,采用由粗到精的辨识过程,先利用遗传算法得出近似最优解,再利用数值优化算法辨识出精确的参数。利用辨识出的参数计算轮胎的侧偏特性,计算结果与试验数据吻合良好,表明该方法是辨识MF轮胎模型参数的有效手段。 展开更多
关键词 MAGIC formula轮胎模型 优化方法 参数辨识 遗传算法
在线阅读 下载PDF
MagicFormula减振器数值模型的参数识别与虚拟调校 被引量:1
5
作者 郭孔辉 冯俊 郭耀华 《汽车技术》 北大核心 2013年第6期1-5,共5页
为研究减振器的调校和匹配,需要建立可以完整描述减振器的外特性曲线理论模型。介绍了一种新型减振器模型——Magic Formula减振器数值模型,同时给出了一种有效、精确地模型参数辨识方法。然后将模型参数化,嵌入到7自由度整车Simulink... 为研究减振器的调校和匹配,需要建立可以完整描述减振器的外特性曲线理论模型。介绍了一种新型减振器模型——Magic Formula减振器数值模型,同时给出了一种有效、精确地模型参数辨识方法。然后将模型参数化,嵌入到7自由度整车Simulink模型中,以整车的动力学性能为优化目标,联合Isight软件,使用多目标优化算法,在C级路面对减振器的阻尼特性进行虚拟调校。优化结果表明,调校后的减振器的阻尼特性能够较明显改善车辆的动力学性能。 展开更多
关键词 减振器 MAGIC formula数值模型 参数辨识 虚拟调校
在线阅读 下载PDF
基于动态DW+Formula1技术的集成式通用报表模型研究 被引量:3
6
作者 高鹏 《计算机应用与软件》 CSCD 2009年第11期137-140,共4页
针对当前大部分信息管理系统中普遍存在的自定义报表系统显示格式死板,可挖掘的数据源不够灵活等缺陷,通过分析自定义报表系统的概念模型和功能需求,提出一种借助于PB动态DataWindow技术集成Formula 1专业控件实现的自定义报表的解决方... 针对当前大部分信息管理系统中普遍存在的自定义报表系统显示格式死板,可挖掘的数据源不够灵活等缺陷,通过分析自定义报表系统的概念模型和功能需求,提出一种借助于PB动态DataWindow技术集成Formula 1专业控件实现的自定义报表的解决方案,大大提高了系统的灵活性和可扩展性。 展开更多
关键词 集成式通用报表系统 DATAWINDOW formula1 MIS
在线阅读 下载PDF
用Magic Formula对轮胎特性曲线的拟合与优化 被引量:19
7
作者 任光胜 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2001年第3期22-24,106,共4页
轮胎特性是研究汽车动力学的基础 ,特别是轮胎的侧偏特性对汽车操纵稳定性有着非常重要的影响。在汽车操纵稳定性的仿真研究中 ,用试验的方法来获得轮胎特性已不能满足研究的需要 ,而有必要建立轮胎模型。作者介绍了采用MagicFormula建... 轮胎特性是研究汽车动力学的基础 ,特别是轮胎的侧偏特性对汽车操纵稳定性有着非常重要的影响。在汽车操纵稳定性的仿真研究中 ,用试验的方法来获得轮胎特性已不能满足研究的需要 ,而有必要建立轮胎模型。作者介绍了采用MagicFormula建立轮胎模型的方法 ,包括试验曲线的样条化、优化目标函数的设计和拟合优化方法等 ,得到了MagicFormula轮胎模型中的各参数 ,为进一步对汽车操纵稳定性的仿真研究奠定了基础。 展开更多
关键词 Magicformula 轮胎模型 曲线拟合 优化 仿真 特性
在线阅读 下载PDF
Formula Node在频率特性测量中的应用 被引量:1
8
作者 吉顺祥 刘旺锁 胡金华 《电子测量技术》 2006年第6期17-18,共2页
文中介绍了在LabVIEW开发环境中使用公式节点编程的方法。结合一个应用实例,通过调用公式节点编写频率控制和数据处理代码,实现对M系列多功能数据采集卡模出时的频率控制,以及对采集到的数据进行分析处理,得出被检测电路板的频率特性。... 文中介绍了在LabVIEW开发环境中使用公式节点编程的方法。结合一个应用实例,通过调用公式节点编写频率控制和数据处理代码,实现对M系列多功能数据采集卡模出时的频率控制,以及对采集到的数据进行分析处理,得出被检测电路板的频率特性。通过分析测量结果证明,此方法高效可行,增强了程序的可读性和整体性能。 展开更多
关键词 公式节点 LABVIEW 频率特性
在线阅读 下载PDF
A Tentative Study on the Formula of English Compliment
9
作者 石洛祥 《陕西师范大学学报(哲学社会科学版)》 CSSCI 北大核心 2003年第S2期240-242,共3页
Praising or compliment is a communicative behavior shared by people of different languages. However, due to the influence of unique culture and different society, the language of compliment differs greatly. The author... Praising or compliment is a communicative behavior shared by people of different languages. However, due to the influence of unique culture and different society, the language of compliment differs greatly. The author of this essay is trying to analyze the formula of English compliment shared by all the English speaking nations, esp. in the United States. 展开更多
关键词 formula COMPLIMENT CULTURE SOCIETY
在线阅读 下载PDF
Formula SAE赛车转向节的拓扑优化 被引量:6
10
作者 曾忠敏 张英朝 《汽车工程》 EI CSCD 北大核心 2012年第12期1094-1099,共6页
运用OptiStruct求解器对某一Formula SAE赛车的后转向节进行多工况加权拓扑优化,并将结果和以往的设计方案进行对比。结果表明,优化后在强度和刚度满足要求的条件下,后转向节的质量减轻45.1%,说明了该方法的可行性和有效性。
关键词 formula SAE赛车 轻量化 拓扑优化 转向节
在线阅读 下载PDF
New multi-DSP parallel computing architecture for real-time image processing 被引量:4
11
作者 Hu Junhong Zhang Tianxu Jiang Haoyang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期883-889,共7页
The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is present... The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is presented. It has many promising characteristics such as powerful computing capability, broad I/O bandwidth, topology flexibility, and expansibility. The parallel system performance is evaluated by practical experiment. 展开更多
关键词 parallel computing image processing REAL-TIME computer architecture
在线阅读 下载PDF
Research on Generalized Computing Systems 被引量:3
12
作者 Min, Yao Jianhua, Luo 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1998年第3期39-43,共5页
This paper presents a kind of artificial intelligent system-generalized computing system (GCS for short), and introduces its mathematical description, implement problem and learning problem.
关键词 Artificial intelligence Generalized computing Generalized computing systems Generalized learning
在线阅读 下载PDF
A network pharmacology approach to decipher the mechanisms of anti-depression of Xiaoyaosan formula 被引量:2
13
作者 GAO Yao TIAN Jun-sheng QIN Xue-mei 《中国药理学与毒理学杂志》 CAS CSCD 北大核心 2017年第5期477-477,共1页
OBJECTIVE Depression is one of the prevalent and prominent complex psychiatric diseases and the number of depressed patients has been on the rise globally during the recent decades.Xiaoyaosan,as a famous Chinese herba... OBJECTIVE Depression is one of the prevalent and prominent complex psychiatric diseases and the number of depressed patients has been on the rise globally during the recent decades.Xiaoyaosan,as a famous Chinese herbal formula,has been widely used in depression patients for a long time. However,the therapeutic mechanisms remain uncertain because of difficulty of depression pathophysiology and the lack of bioinformatic approach to understand the molecular connection. METHODS In this thesis,we applied a network pharmacology approach to explain the potential mechanisms between Xiaoyaosan and depression involved in oral bioavailability screening,drug-likeness assessment,caco-2 permeability,blood-brain barrier target recognition and network analysis. RESULTS 66 active compounds in Xiaoyaosan formula with favorable pharmacokinetic profiles are predicted as active compounds for anti-depression treatment. Network analyses show that these 66 compounds target 40depression-associated proteins including especially HTR2A,NR 3C1,MAOB,XDH and CNR2. These proteins are mainly involved in the neuroactive ligand-receptor interaction,serotonergic synapse,cAMP signaling pathways and calcium signaling pathways. CONCLUSION The integrated network pharmacology method is an effective approach to illustrate the anti-depression mechanisms of herbs,and this in silico approach can be applied in drug discovery. 展开更多
关键词 network pharmacology Xiaoyaosan formula DEPRESSION
在线阅读 下载PDF
利用Formula One控件实现数据窗口及其信息交换
14
作者 刘娟 段成华 《计算机应用》 CSCD 北大核心 2003年第z2期51-53,共3页
为了满足一定的数据组织格式以及实现数据交换与共享 ,在数据窗口设计中引入了FormulaOneActiveX控件。介绍了一种通用的设计方法 ,在此基础上实现一个应用实例 ,并对其开发程序的性能进行了总结。
关键词 formula One ACTIVEX 数据窗口 信息交换 船期表
在线阅读 下载PDF
SATVPC:Secure-agent-based trustworthy virtual private cloud model in open computing environments 被引量:2
15
作者 徐小龙 涂群 +2 位作者 BESSIS Nik 杨庚 王新珩 《Journal of Central South University》 SCIE EI CAS 2014年第8期3186-3196,共11页
Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and soft... Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally. 展开更多
关键词 cloud computing trustworthy computing VIRTUALIZATION agent
在线阅读 下载PDF
Task scheduling and virtual machine allocation policy in cloud computing environment 被引量:3
16
作者 Xiong Fu Yeliang Cang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第4期847-856,共10页
Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time o... Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time of data intensive tasks. How- ever, most of the current resource allocation policies focus only on network conditions and physical hosts. And the computing power of VMs is largely ignored. This paper proposes a comprehensive resource allocation policy which consists of a data intensive task scheduling algorithm that takes account of computing power of VMs and a VM allocation policy that considers bandwidth between storage nodes and hosts. The VM allocation policy includes VM placement and VM migration algorithms. Related simulations show that the proposed algorithms can greatly reduce the task comple- tion time and keep good load balance of physical hosts at the same time. 展开更多
关键词 cloud computing resource allocation task scheduling virtual machine (VM) allocation.
在线阅读 下载PDF
Calculation of angular glint in near field utilizing graphical electromagnetic computing 被引量:2
17
作者 Guangfu Zhang Chao Wang +2 位作者 Liguo Liu Yunqi Fu Naichang Yuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第6期906-911,共6页
The angular glint in the near field plays an important role on radar tracking errors. To predict it more efficiently for electrically large targets, a new method based on graphical electromagnetic computing (GRECO) ... The angular glint in the near field plays an important role on radar tracking errors. To predict it more efficiently for electrically large targets, a new method based on graphical electromagnetic computing (GRECO) is proposed. With the benefit of the graphic card, the GRECO prediction method is faster and more accurate than other methods. The proposed method at the first time considers the special case that the targets cannot be completely covered by radar beams, which makes the prediction of radar tracking errors more self-contained in practical circumstances. On the other hand, the process of the scattering center extraction is omitted, resulting in possible angular glint prediction in real time. Comparisons between the simulation results and the theoretical ones validate its correctness and value to academic research and engineering applications. 展开更多
关键词 angular glint near field tracking error graphical electromagnetic computing (GRECO)
在线阅读 下载PDF
Low-cost cloud computing solution for geo-information processing 被引量:3
18
作者 高培超 刘钊 +1 位作者 谢美慧 田琨 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第12期3217-3224,共8页
Cloud computing has emerged as a leading computing paradigm,with an increasing number of geographic information(geo-information) processing tasks now running on clouds.For this reason,geographic information system/rem... Cloud computing has emerged as a leading computing paradigm,with an increasing number of geographic information(geo-information) processing tasks now running on clouds.For this reason,geographic information system/remote sensing(GIS/RS) researchers rent more public clouds or establish more private clouds.However,a large proportion of these clouds are found to be underutilized,since users do not deal with big data every day.The low usage of cloud resources violates the original intention of cloud computing,which is to save resources by improving usage.In this work,a low-cost cloud computing solution was proposed for geo-information processing,especially for temporary processing tasks.The proposed solution adopted a hosted architecture and can be realized based on ordinary computers in a common GIS/RS laboratory.The usefulness and effectiveness of the proposed solution was demonstrated by using big data simplification as a case study.Compared to commercial public clouds and dedicated private clouds,the proposed solution is more low-cost and resource-saving,and is more suitable for GIS/RS applications. 展开更多
关键词 cloud computing geo-information processing geo-processing
在线阅读 下载PDF
General calculation formulas and recurrence relations of radial matrix elements for relativistic n-dimensional hydrogen atom of spin S=0 被引量:1
19
作者 CHENChang-yuan LUFa-lin SUNDong-sheng 《原子与分子物理学报》 CAS CSCD 北大核心 2004年第3期432-440,共9页
In this paper, the general calculation formulas of radial matrix elements for relativistic n-dimensional hydrogen atom of spin S=0 are obtained, and the recurrence relation of different power order radial matrix eleme... In this paper, the general calculation formulas of radial matrix elements for relativistic n-dimensional hydrogen atom of spin S=0 are obtained, and the recurrence relation of different power order radial matrix elements are also derived. 展开更多
关键词 n-dimensional hydrogen atom-type potential Klein-Cordon equation Radial matrix dements GENERAL calculation formulaS RECURRENCE relations
在线阅读 下载PDF
Energy-efficient and security-optimized AES hardware design for ubiquitous computing 被引量:2
20
作者 Chen Yicheng Zou Xuecheng Liu Zhenglin Han Yu Zheng Zhaoxia 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期652-658,共7页
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H... Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost. 展开更多
关键词 encryption and decryption power analysis model inhomogeneous S-Boxes ubiquitous computing advanced encryption standard.
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部