期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
On the Generation Algorithm of VRS Virtual Observations 被引量:3
1
作者 WEI Erhu CHAI Hua +1 位作者 LIU Jingnan AN Zhiguo 《Geo-Spatial Information Science》 2007年第2期91-95,共5页
In the past few years, network RTK positioning technology, especially the VRS technology, has been widely used in some parts of China and in many countries around the world. The principle of the VRS technology is disc... In the past few years, network RTK positioning technology, especially the VRS technology, has been widely used in some parts of China and in many countries around the world. The principle of the VRS technology is discussed with corresponding formula deduction, and detailed descriptions and applications of VRS corrections and virtual observations generation algorithm are given. 展开更多
关键词 network-RTK MRS corrections generation algorithm virtual observation
下载PDF
Solving open vehicle problem with time window by hybrid column generation algorithm 被引量:1
2
作者 YU Naikang QIAN Bin +2 位作者 HU Rong CHEN Yuwang WANG Ling 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第4期997-1009,共13页
This paper addresses the open vehicle routing problem with time window(OVRPTW), where each vehicle does not need to return to the depot after completing the delivery task.The optimization objective is to minimize the ... This paper addresses the open vehicle routing problem with time window(OVRPTW), where each vehicle does not need to return to the depot after completing the delivery task.The optimization objective is to minimize the total distance. This problem exists widely in real-life logistics distribution process.We propose a hybrid column generation algorithm(HCGA) for the OVRPTW, embedding both exact algorithm and metaheuristic. In HCGA, a label setting algorithm and an intelligent algorithm are designed to select columns from small and large subproblems, respectively. Moreover, a branch strategy is devised to generate the final feasible solution for the OVRPTW. The computational results show that the proposed algorithm has faster speed and can obtain the approximate optimal solution of the problem with 100 customers in a reasonable time. 展开更多
关键词 open vehicle routing problem with time window(OVRPTW) hybrid column generation algorithm(HCGA) mixed integer programming label setting algorithm
下载PDF
ALGORITHMS FOR TETRAHEDRAL NETWORK(TEN) GENERATION 被引量:11
3
作者 LI Qingquan LI Deren 《Geo-Spatial Information Science》 2000年第1期11-16,共6页
The Tetrahedral Network(TEN) is a powerful 3-D vector structure in GIS, which has a lot of advantages such as simple structure, fast topological relation processing and rapid visualization. The difficulty of TEN appli... The Tetrahedral Network(TEN) is a powerful 3-D vector structure in GIS, which has a lot of advantages such as simple structure, fast topological relation processing and rapid visualization. The difficulty of TEN application is automatic creating data structure. Although a raster algorithm has been introduced by some authors, the problems in accuracy, memory requirement, speed and integrity are still existent. In this paper, the raster algorithm is completed and a vector algorithm is presented after a 3-D data model and structure of TEN have been introducted. Finally, experiment, conclusion and future work are discussed. 展开更多
关键词 3-D GIS tetrahedral network(TEN) generation algorithm
下载PDF
Short-term power generation scheduling rules for cascade hydropower stations based on hybrid algorithm 被引量:2
4
作者 Wei XIE Chang-ming JI +1 位作者 Zi-jun YANG Xiao-xing ZHANG 《Water Science and Engineering》 EI CAS 2012年第1期46-58,共13页
Power generation dispatching is a large complex system problem with multi-dimensional and nonlinear characteristics. A mathematical model was established based on the principle of reservoir operation. A large quantity... Power generation dispatching is a large complex system problem with multi-dimensional and nonlinear characteristics. A mathematical model was established based on the principle of reservoir operation. A large quantity of optimal scheduling processes were obtained by calculating the daily runoff process within three typical years, and a large number of simulated daily runoff processes were obtained using the progressive optimality algorithm (POA) in combination with the genetic algorithm (GA). After analyzing the optimal scheduling processes, the corresponding scheduling rules were determined, and the practical formulas were obtained. These rules can make full use of the rolling runoff forecast and carry out the rolling scheduling. Compared with the optimized results, the maximum relative difference of the annual power generation obtained by the scheduling rules is no more than 1%. The effectiveness and practical applicability of the scheduling rules are demonstrated by a case study. This study provides a new perspective for formulating the rules of power generation dispatching. 展开更多
关键词 scheduling rule short-time power generation dispatching hybrid algorithm cascade hydropower station
下载PDF
Genetic Algorithms of Structural Fuzzy Reliability Index
5
作者 Hu, YC Li, XJ Zhang, LY 《China Ocean Engineering》 SCIE EI 1998年第1期33-42,共10页
In this paper the simple generation algorithms are improved. According to the geometric meaning of the structural reliability index, a method is proposed to deal with the variables in the standard normal space. With c... In this paper the simple generation algorithms are improved. According to the geometric meaning of the structural reliability index, a method is proposed to deal with the variables in the standard normal space. With consideration of variable distribution, the correlation coefficient of the variables and its fuzzy reliability index, the feasibility and the reliability of the algorithms are proved with an example of structural reliability analysis and optimization. 展开更多
关键词 structural fuzzy reliability index generation algorithm reliability analysis and optimization correlation coefficient normal space
下载PDF
An efficient algorithm for generating a spherical multiple-cell grid
6
作者 Fang Hou Zhiyi Gao +1 位作者 Jianguo Li Fujiang Yu 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2022年第5期41-50,共10页
This paper presents an efficient algorithm for generating a spherical multiple-cell(SMC)grid.The algorithm adopts a recursive loop structure and provides two refinement methods:(1)an arbitrary area refinement method a... This paper presents an efficient algorithm for generating a spherical multiple-cell(SMC)grid.The algorithm adopts a recursive loop structure and provides two refinement methods:(1)an arbitrary area refinement method and(2)a nearshore refinement method.Numerical experiments are carried out,and the results show that compared with the existing grid generation algorithm,this algorithm is more flexible and operable. 展开更多
关键词 spherical multiple-cell grid wave model WAVEWATCH III grid generation algorithm
下载PDF
Optimization of volume to point conduction problem based on a novel thermal conductivity discretization algorithm
7
作者 杜文静 王沛丽 +1 位作者 宋立鹏 程林 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2015年第7期1161-1168,共8页
A conduction heat transfer process is enhanced by filling prescribed quantity and optimized-shaped high thermal conductivity materials to the substrate. Numerical simulations and analyses are performed on a volume to ... A conduction heat transfer process is enhanced by filling prescribed quantity and optimized-shaped high thermal conductivity materials to the substrate. Numerical simulations and analyses are performed on a volume to point conduction problem based on the principle of minimum entropy generation. In the optimization, the arrangement of high thermal conductivity materials is variable, the quantity of high thermal-conductivity material is constrained, and the objective is to obtain the maximum heat conduction rate as the entropy is the minimum.A novel algorithm of thermal conductivity discretization is proposed based on large quantity of calculations.Compared with other algorithms in literature, the average temperature in the substrate by the new algorithm is lower, while the highest temperature in the substrate is in a reasonable range. Thus the new algorithm is feasible. The optimization of volume to point heat conduction is carried out in a rectangular model with radiation boundary condition and constant surface temperature boundary condition. The results demonstrate that the algorithm of thermal conductivity discretization is applicable for volume to point heat conduction problems. 展开更多
关键词 Volume to point conduction Principle of minimum entropy generation algorithm of thermal conductivity discretization Optimization
下载PDF
Optimization of multi-color laser waveform for high-order harmonic generation 被引量:1
8
作者 金成 林启东 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第9期157-168,共12页
With the development of laser technologies,multi-color light-field synthesis with complete amplitude and phase control would make it possible to generate arbitrary optical waveforms.A practical optimization algorithm ... With the development of laser technologies,multi-color light-field synthesis with complete amplitude and phase control would make it possible to generate arbitrary optical waveforms.A practical optimization algorithm is needed to generate such a waveform in order to control strong-field processes.We review some recent theoretical works of the optimization of amplitudes and phases of multi-color lasers to modify the single-atom high-order harmonic generation based on genetic algorithm.By choosing different fitness criteria,we demonstrate that:(i) harmonic yields can be enhanced by 10 to 100 times,(ii) harmonic cutoff energy can be substantially extended,(iii) specific harmonic orders can be selectively enhanced,and(iv) single attosecond pulses can be efficiently generated.The possibility of optimizing macroscopic conditions for the improved phase matching and low divergence of high harmonics is also discussed.The waveform control and optimization are expected to be new drivers for the next wave of breakthrough in the strong-field physics in the coming years. 展开更多
关键词 high-order harmonic generation waveform optimization genetic algorithm single-attosecond pulse
下载PDF
Complete Real Solution of the Five-orientation Motion Generation Problem for a Spherical Four-bar Linkage 被引量:1
9
作者 ZHUANG Yufeng ZHANG Ying DUAN Xuechao 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2015年第2期258-266,共9页
For a spherical four-bar linkage,the maximum number of the spherical RR dyad(R:revolute joint)of five-orientation motion generation can be at most 6.However,complete real solution of this problem has seldom been st... For a spherical four-bar linkage,the maximum number of the spherical RR dyad(R:revolute joint)of five-orientation motion generation can be at most 6.However,complete real solution of this problem has seldom been studied.In order to obtain six real RR dyads,based on Strum's theorem,the relationships between the design parameters are derived from a 6th-degree univariate polynomial equation that is deduced from the constraint equations of the spherical RR dyad by using Dixon resultant method.Moreover,the Grashof condition and the circuit defect condition are taken into account.Given the relationships between the design parameters and the aforementioned two conditions,two objective functions are constructed and optimized by the adaptive genetic algorithm(AGA).Two examples with six real spherical RR dyads are obtained by optimization,and the results verify the feasibility of the proposed method.The paper provides a method to synthesize the complete real solution of the five-orientation motion generation,which is also applicable to the problem that deduces to a univariate polynomial equation and requires the generation of as many as real roots. 展开更多
关键词 spherical four-bar linkage five-orientation motion generation Sturm's theorem adaptive genetic algorithm(AGA
下载PDF
Optimal hydrogen-battery energy storage system operation in microgrid with zero-carbon emission
10
作者 Huayi Wu Zhao Xu Youwei Jia 《Global Energy Interconnection》 EI CSCD 2024年第5期616-628,共13页
To meet the greenhouse gas reduction targets and address the uncertainty introduced by the surging penetration of stochastic renewable energy sources,energy storage systems are being deployed in microgrids.Relying sol... To meet the greenhouse gas reduction targets and address the uncertainty introduced by the surging penetration of stochastic renewable energy sources,energy storage systems are being deployed in microgrids.Relying solely on short-term uncertainty forecasts can result in substantial costs when making dispatch decisions for a storage system over an entire day.To mitigate this challenge,an adaptive robust optimization approach tailored for a hybrid hydrogen battery energy storage system(HBESS)operating within a microgrid is proposed,with a focus on efficient state-of-charge(SoC)planning to minimize microgrid expenses.The SoC ranges of the battery energy storage(BES)are determined in the day-ahead stage.Concurrently,the power generated by fuel cells and consumed by electrolysis device are optimized.This is followed by the intraday stage,where BES dispatch decisions are made within a predetermined SoC range to accommodate the uncertainties realized.To address this uncertainty and solve the adaptive optimization problem with integer recourse variables in the intraday stage,we proposed an outer-inner column-and-constraint generation algorithm(outer-inner-CCG).Numerical analyses underscored the high effectiveness and efficiency of the proposed adaptive robust operation model in making decisions for HBESS dispatch. 展开更多
关键词 MICROGRID Hybrid hydrogen-battery storage Outer-inner column-and-constraint generation algorithm Adaptive robust optimization Integer recourse variables
下载PDF
MCL4DGA:基于多视角对比学习的DGA域名检测方法
11
作者 王继虎 刘子雁 +2 位作者 倪金超 孔凡玉 史玉良 《软件学报》 EI CSCD 北大核心 2024年第11期5228-5248,共21页
在网络安全领域,由域名生成算法(domain generation algorithm,DGA)产生的虚假域名被称为DGA域名.与正常域名类似的是,DGA域名通常是字母或数字的随机组合,这使得DGA域名具有较强的伪装性.网络黑客利用DGA域名的伪装性实施网络攻击,以... 在网络安全领域,由域名生成算法(domain generation algorithm,DGA)产生的虚假域名被称为DGA域名.与正常域名类似的是,DGA域名通常是字母或数字的随机组合,这使得DGA域名具有较强的伪装性.网络黑客利用DGA域名的伪装性实施网络攻击,以达到绕过安全检测的目的.如何有效地对DGA域名进行检测,进而维护信息系统安全,成为当前的研究热点.传统的统计机器学习检测方法需要人工构建域名字符特征集合.然而,人工或者半自动化方式构建的域名特征存在质量参差不齐的情况,进而影响检测的准确性.鉴于深度神经网络强大的特征自动化抽取和表示能力,提出一种基于多视角对比学习的DGA域名检测方法(MCL4DGA).与现有方法不同的是,所提方法结合了注意力神经网络、卷积神经网络和循环神经网络,能够有效地捕获域名字符序列中的全局、局部和双向多视角特征依赖关系.除此之外,通过多视角表示向量之间的对比学习而产生的自监督信号,能够增强模型的学习能力,进而提高检测的准确性.通过在真实数据集上与当前DGA域名检测方法实验对比验证了所提方法的有效性. 展开更多
关键词 网络安全 DGA(domain generation algorithm)域名检测 深度神经网络 对比学习
下载PDF
Graph-Theoretic Approach to Network Analysis
12
作者 Nabil Hassan 《Computer Technology and Application》 2013年第12期625-634,共10页
Networks are a class of general systems represented by becomes a weighted graph visualizing the constraints imposed their UC-structure. Suppressing the nature of elements the network by interconnections rather than th... Networks are a class of general systems represented by becomes a weighted graph visualizing the constraints imposed their UC-structure. Suppressing the nature of elements the network by interconnections rather than the elements themselves. These constraints follow generalized Kirchhoff's laws derived from physical constraints. Once we have a graph; then the working environment becomes the graph-theory. An algorithm derived from graph theory is developed within the paper in order to analyze general networks. The algorithm is based on computing all the spanning trees in the graph G with an associated weight. This weight is the product ofadmittance's of the edges forming the spanning tree. In the first phase this algorithm computes a depth first spanning tree together with its cotree. Both are used as parents for controlled generation of off-springs. The control is represented in selecting the off-springs that were not generated previously. While the generation of off-springs, is based on replacement of one or more tree edges by cycle edges corresponding to cotree edges. The algorithm can generate a frequency domain analysis of the network. 展开更多
关键词 UC-structure NETWORK spanning tree depth-first search spanning trees generation algorithm.
下载PDF
A Complete Critical Path Algorithm for Test Generation of Combinational Circuits
13
作者 周权 魏道政 《Journal of Computer Science & Technology》 SCIE EI CSCD 1991年第1期74-82,共9页
It is known that critical path test generation method is not a complete algorithm for combinational circuits with reconvergent-fanout.In order to make it a complete algorithm,we put forward a reconvergent-fanout- orie... It is known that critical path test generation method is not a complete algorithm for combinational circuits with reconvergent-fanout.In order to make it a complete algorithm,we put forward a reconvergent-fanout- oriented technique,the principal critical path algorithm,propagating the critical value back to primary inputs along a single path,the principal critical path,and allowing multiple path sensitization if needed.Relationship among test patterns is also discussed to accelerate test generation. 展开更多
关键词 PATH A Complete Critical Path algorithm for Test generation of Combinational Circuits TEST
原文传递
Health Data Deduplication Using Window Chunking-Signature Encryption in Cloud
14
作者 G.Neelamegam P.Marikkannu 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期1079-1093,共15页
Due to the development of technology in medicine,millions of health-related data such as scanning the images are generated.It is a great challenge to store the data and handle a massive volume of data.Healthcare data ... Due to the development of technology in medicine,millions of health-related data such as scanning the images are generated.It is a great challenge to store the data and handle a massive volume of data.Healthcare data is stored in the cloud-fog storage environments.This cloud-Fog based health model allows the users to get health-related data from different sources,and duplicated informa-tion is also available in the background.Therefore,it requires an additional sto-rage area,increase in data acquisition time,and insecure data replication in the environment.This paper is proposed to eliminate the de-duplication data using a window size chunking algorithm with a biased sampling-based bloomfilter and provide the health data security using the Advanced Signature-Based Encryp-tion(ASE)algorithm in the Fog-Cloud Environment(WCA-BF+ASE).This WCA-BF+ASE eliminates the duplicate copy of the data and minimizes its sto-rage space and maintenance cost.The data is also stored in an efficient and in a highly secured manner.The security level in the cloud storage environment Win-dows Chunking Algorithm(WSCA)has got 86.5%,two thresholds two divisors(TTTD)80%,Ordinal in Python(ORD)84.4%,Boom Filter(BF)82%,and the proposed work has got better security storage of 97%.And also,after applying the de-duplication process,the proposed method WCA-BF+ASE has required only less storage space for variousfile sizes of 10 KB for 200,400 MB has taken only 22 KB,and 600 MB has required 35 KB,800 MB has consumed only 38 KB,1000 MB has taken 40 KB of storage spaces. 展开更多
关键词 Health data ENCRYPTION chunks CLOUD FOG DEDUPLICATION bloomfilter algorithm 3:generation of Key
下载PDF
Multi-objective optimization of cooling air distribution of grate cooler with different inlet temperatures by using genetic algorithm 被引量:4
15
作者 SHAO Wei CUI Zheng CHENG Lin 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2017年第3期345-354,共10页
The paper discussed a multi-objective optimization model of the cooling air distribution of a grate cooler according to the analogy
关键词 cooling air distribution grate cooler multi-objective genetic algorithm entropy generation
原文传递
Generation method of minimal-complete-coverage interoperability test sequence based on digraph
16
作者 LIN Huahui ZHAO Baohua QU Yugui 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2007年第1期29-33,共5页
Even if two implementations of a protocol pass the conformance testing,it cannot guarantee that they can interoperate properly;so direct testing of interoperation is considered indispensable.During the interoperabilit... Even if two implementations of a protocol pass the conformance testing,it cannot guarantee that they can interoperate properly;so direct testing of interoperation is considered indispensable.During the interoperability testing,a minimal number of test sequences are expected to check as many as possible implementation errors.By using minimal-complete-coverage criterion,the test sequence generation based on digraph can produce more effective test sequences. 展开更多
关键词 interoperability test interoperability equiva-lence minimal-complete-coverage criterion algorithm of test sequence generation DIGRAPH
原文传递
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network 被引量:9
17
作者 Fangli Ren Zhengwei Jiang +1 位作者 Xuren Wang Jian Liu 《Cybersecurity》 CSCD 2020年第1期71-83,共13页
Command and control(C2)servers are used by attackers to operate communications.To perform attacks,attackers usually employee the Domain Generation Algorithm(DGA),with which to confirm rendezvous points to their C2 ser... Command and control(C2)servers are used by attackers to operate communications.To perform attacks,attackers usually employee the Domain Generation Algorithm(DGA),with which to confirm rendezvous points to their C2 servers by generating various network locations.The detection of DGA domain names is one of the important technologies for command and control communication detection.Considering the randomness of the DGA domain names,recent research in DGA detection applyed machine learning methods based on features extracting and deep learning architectures to classify domain names.However,these methods are insufficient to handle wordlist-based DGA threats,which generate domain names by randomly concatenating dictionary words according to a special set of rules.In this paper,we proposed a a deep learning framework ATT-CNN-BiLSTMfor identifying and detecting DGA domains to alleviate the threat.Firstly,the Convolutional Neural Network(CNN)and bidirectional Long Short-Term Memory(BiLSTM)neural network layer was used to extract the features of the domain sequences information;secondly,the attention layer was used to allocate the corresponding weight of the extracted deep information from the domain names.Finally,the different weights of features in domain names were put into the output layer to complete the tasks of detection and classification.Our extensive experimental results demonstrate the effectiveness of the proposed model,both on regular DGA domains and DGA that hard to detect such as wordlist-based and part-wordlist-based ones.To be precise,we got a F1 score of 98.79%for the detection and macro average precision and recall of 83%for the classification task of DGA domain names. 展开更多
关键词 Domain generation algorithm MALWARE Attention mechanism Deep learning
原文传递
DGA-Based Botnet Detection Toward Imbalanced Multiclass Learning 被引量:4
18
作者 Yijing Chen Bo Pang +2 位作者 Guolin Shao Guozhu Wen Xingshu Chen 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第4期387-402,共16页
Botnets based on the Domain Generation Algorithm(DGA) mechanism pose great challenges to the main current detection methods because of their strong concealment and robustness. However, the complexity of the DGA family... Botnets based on the Domain Generation Algorithm(DGA) mechanism pose great challenges to the main current detection methods because of their strong concealment and robustness. However, the complexity of the DGA family and the imbalance of samples continue to impede research on DGA detection. In the existing work, the sample size of each DGA family is regarded as the most important determinant of the resampling proportion;thus,differences in the characteristics of various samples are ignored, and the optimal resampling effect is not achieved.In this paper, a Long Short-Term Memory-based Property and Quantity Dependent Optimization(LSTM.PQDO)method is proposed. This method takes advantage of LSTM to automatically mine the comprehensive features of DGA domain names. It iterates the resampling proportion with the optimal solution based on a comprehensive consideration of the original number and characteristics of the samples to heuristically search for a better solution around the initial solution in the right direction;thus, dynamic optimization of the resampling proportion is realized.The experimental results show that the LSTM.PQDO method can achieve better performance compared with existing models to overcome the difficulties of unbalanced datasets;moreover, it can function as a reference for sample resampling tasks in similar scenarios. 展开更多
关键词 BOTNET Domain generation algorithm(DGA) multiclass imbalance RESAMPLING
原文传递
A highly efficient reconfigurable rotation unit based on an inverse butterfly network
19
作者 Chao MA Zi-bin DAI +1 位作者 Wei LI Hai-juan ZANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第11期1784-1794,共11页
We propose a reeonfigurable control-bit generation algorithm for rotation and sub-word rotation operations. The algorithm uses a self-routing characteristic to configure an inverse butterfly network. In addition to be... We propose a reeonfigurable control-bit generation algorithm for rotation and sub-word rotation operations. The algorithm uses a self-routing characteristic to configure an inverse butterfly network. In addition to being highly parallelized and inexpensive, the algorithm integrates the rotation-shift, bi-directional rotation-shift, and sub-word rotation-shift operations. To our best knowledge, this is the first scheme to accommodate a variety of rotation operations into the same architecture. We have developed the highly efficient reconfigurable rotation unit (HERRU) and synthesized it into the Semiconductor Manufacturing International Corporation (SMIC)'s 65-nm process. The results show that the overall efficiency (relative areaxrelative latency) of our HERRU is higher by at least 23% than that of other designs with similar functions. When executing the bi-directional rotation operations alone, HERRU occupies a significantly smaller area with a lower latency than previously proposed designs. 展开更多
关键词 Rotation operations Self-routing Control-bit generation algorithm Inverse butterfly network
原文传递
A Machine Learning-Based Botnet Malicious Domain Detection Technique for New Business
20
作者 Aohan Mei Zekun Chen +1 位作者 Jing Zhao Dequan Yang 《国际计算机前沿大会会议论文集》 EI 2023年第2期191-201,共11页
In the new network business,the danger of botnets should not be underestimated.Botnets often generatemalicious domain names through DGAs to enable communication with command and control servers(C&C)and then receiv... In the new network business,the danger of botnets should not be underestimated.Botnets often generatemalicious domain names through DGAs to enable communication with command and control servers(C&C)and then receive commands from the botmaster,carrying out further attack activities.Therefore,a system based onmachine learning to dichotomizeDNSdomain access is designed,which can instantly detectDGAdomain names and thus quickly dispose of infected computers to avoid spreading the virus and further damage.In the comparison,the bidirectional LSTM model slightly outperformed the unidirectional LSTM network and achieved 99%accuracy in the open dataset classification task. 展开更多
关键词 BOTNET Machine Learning LSTM Domain generation algorithm Detection
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部