期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
完善审美个性——“语文教学中的审美教育实践”专题七
1
作者 熊芳芳 张冉 《语文教学通讯(高中)(A)》 2018年第4期9-12,共4页
审美的共通性是美育的基础和前提,而审美的个性化是美育的目标和境界。个性是个体生命的本质所在,审美个性的参差多态正是人类幸福的本源。教师应当以明识催生明识,促进学生将审美偏见转化为审美个性;在感受想象力的“自由”的同时,发... 审美的共通性是美育的基础和前提,而审美的个性化是美育的目标和境界。个性是个体生命的本质所在,审美个性的参差多态正是人类幸福的本源。教师应当以明识催生明识,促进学生将审美偏见转化为审美个性;在感受想象力的“自由”的同时,发现文学创作的“限制”———在语言文字运用方面的审美规律。在保持个体独立性的同时,促进个体与群体的和谐:自身的分寸感、与他者的呼应。 展开更多
关键词 审美个性 合法的偏见 明识 合目的性 比德
下载PDF
A Location Privacy Preserving Solution to Resist Passive and Active Attacks in VANET 被引量:2
2
作者 ZHU Xiaoling HU Donghui HOU Zhengfeng DING Liang 《China Communications》 SCIE CSCD 2014年第9期60-67,共8页
Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular a... Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular ad hoc network (VANET). Firstly, the relationship among anonymity degree, expected company area and vehicle density is discussed. Then, a companion set F is set up by k neighbor vehicles. Based on secure multi-party computation, each vehicle in V can compute the centroid, not revealing its location to each other. The centroid as a cloaking location is sent to LBS provider (P) and P returns a point of interest (POI). Due to a distributed secret sharing structure, P cannot obtain the positions of non-complicity vehicles by colluding with multiple internal vehicles. To detect fake data from dishonest vehicles, zero knowledge proof is adopted. Comparing with other related methods, our solution can resist passive and active attacks from internal and external nodes. It provides strong privacy protection for LBS in VANET. 展开更多
关键词 vehicular ad hoc network locationbased services location k-anonymity securemulti-party computation
下载PDF
Natural Philosophy, Inventions and Religion in the Correspondence between John Locke and Nicolas Toinard (1678-1704)
3
作者 Giuliana Di Biase 《Journal of Philosophy Study》 2013年第7期569-595,共27页
The paper examines the copious correspondence between the English philosopher John Locke (1632-1704) and the French intellectual Nicolas Toinard (1629-1706); Locke made the acquaintance of Toinard in Paris in 1677... The paper examines the copious correspondence between the English philosopher John Locke (1632-1704) and the French intellectual Nicolas Toinard (1629-1706); Locke made the acquaintance of Toinard in Paris in 1677 or early in 1678, and the latter remained his lifelong friend and most assiduous correspondent. An Orl6anais and a devout Catholic, Toinard combined an intense interest in the Scriptures with an enthusiasm for experimental science and inventions of every kind; he introduced Locke to all the French official institutions and to a number of private laboratories. Toinard's principal work, Evangeliorum Harmonia Graeco-Latina, was greatly appreciated by Locke for its new method. The paper attempts at exploring the bulk of this correspondence in detail, giving an account of the wide range of topics dealt with in the two hundred letters; it is divided into four paragraphs referring, respectively, to the years 1678-1679, 1679-1681, 1681-1686, and1686-1704. The perspective is diachronic; in some occasions, the focus is on a peculiar topic which is the object of prolonged discussion between the two correspondents. In the conclusion, attention is drawn to the relevance of this correspondence in the context of the 17th century and of Locke's philosophical thought. 展开更多
关键词 astronomic observation MAGNETISM medicine seconds pendulum CALENDAR harmonic writings
下载PDF
Shared Ideas,Divergent Approaches:The Hydromethods of the Great West(Taixi shuifa泰西水法)and the Question on Tides
4
作者 Sabine Kink 《Chinese Annals of History of Science and Technology》 2020年第1期63-101,共39页
One of the questions about natural phenomena asked in the Hydromethods of the Great West(Taixi shuifa泰西水法;1612)(hereafter TXSF),composed by the Italian Jesuit Sabatino de Ursis with the support of the Chinese offi... One of the questions about natural phenomena asked in the Hydromethods of the Great West(Taixi shuifa泰西水法;1612)(hereafter TXSF),composed by the Italian Jesuit Sabatino de Ursis with the support of the Chinese official Xu Guangqi徐光啟,concerns the causes of sea tides.The idiosyncratic answer given in the TXSF serves as an example for the Jesuit missionaries,strategically motivated approach to the transfer of knowledge through the translation of Western scientific thought into Chinese.From a chronological overview of the attempts made both in the East and in the West to theoretically conceptualize the causes of the cyclical occurrence of ebb and flow,the comparison reveals that despite being based on totally different cosmologies,the related insights were virtually on a par.The aim to nevertheless convince the audience of the TXSF of the superiority of Western sciences resulted in a particular rhetoric and a division of tasks in the composition of the tides paragraph.In order to verify the success of this joint effort of de Ursis and Xu Guangqi,a change of perspective from the transmitter to the receiver side is necessary.Thus,the paper also explores the work's reception in later Chinese works dealing with this topic. 展开更多
关键词 Jesuts TIDES Hydromethods of the Great West Sabatino de Ursis Xu Guangqi knowledge transfer late Ming
下载PDF
The Decisive Moment as an Event in Photographic Discourse
5
作者 Leny Pimenta Dionéia M. Monte-Serrat 《Sino-US English Teaching》 2015年第12期984-991,共8页
We propose using the concept of decisive moment in order to deconstruct the obvious ideological effects found in discourse. The subject is constituted in enunciation, and its polysemic discourse clashes with the trans... We propose using the concept of decisive moment in order to deconstruct the obvious ideological effects found in discourse. The subject is constituted in enunciation, and its polysemic discourse clashes with the transparency of meaning. According to Pêcheux (1988), the contradictions in discourse simultaneously establish regularity and instability of meanings, leading it to misunderstanding, to the event. Photography destabilizes that which is already formulated and brings out that which is new, the unexpected meaning, the decisive moment. We analyze this process in the picture by Sebastiao Salgado---"The cradle of inequality lies in the inequality of the cradle". (CAPES-BEX 4394/10-0, FAPESP 09/54417-4, CNPq.) 展开更多
关键词 DISCOURSE IDEOLOGY SUBJECT EVENT decisive moment
下载PDF
Recognition of human face based on improved multi-sample
6
作者 刘侠 李雷雷 +2 位作者 李廷军 刘露 张颖 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第3期424-427,共4页
In order to solve the problem caused by variation illumination in human face recognition,we bring forward a face recognition algorithm based on the improved multi-sample. In this algorithm,the face image is processed ... In order to solve the problem caused by variation illumination in human face recognition,we bring forward a face recognition algorithm based on the improved multi-sample. In this algorithm,the face image is processed with Retinex theory,meanwhile,the Gabor filter is adopted to perform the feature extraction. The experimental results show that the application of Retinex theory improves the recognition accuracy,and makes the algorithm more robust to the variation illumination. The Gabor filter is more effective and accurate for extracting more useable facial local features. It is proved that the proposed algorithm has good recognition accuracy and it is stable under variation illumination. 展开更多
关键词 face recognition Gabor wavelet Retinex theory
下载PDF
Study on RFID Authentication Protocol Theory 被引量:3
7
作者 齐勇 姚青松 +1 位作者 陈滢 钟虓 《China Communications》 SCIE CSCD 2011年第1期65-71,共7页
Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ... Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future. 展开更多
关键词 RFID security and privacy authentica- tion protocol THEORY
下载PDF
Natural Philosophy, Inventions and Religion in the Correspondence between John Locke and Nicolas Toinard (1678-1704)
8
作者 Giuliana Di Biase 《Journal of Philosophy Study》 2013年第8期724-738,共15页
The paper examines the copious correspondence between the English philosopher John Locke (1632-1704) and the French intellectual Nicolas Toinard (1629-1706); Locke made the acquaintance of Toinard in Paris in 1677... The paper examines the copious correspondence between the English philosopher John Locke (1632-1704) and the French intellectual Nicolas Toinard (1629-1706); Locke made the acquaintance of Toinard in Paris in 1677 or early in 1678, and the latter remained his lifelong friend and most assiduous correspondent. An Orleanais and a devout Catholic, Toinard combined an intense interest in the Scriptures with an enthusiasm for experimental science and inventions of every kind; he introduced Locke to all the French official institutions and to a number of private laboratories. Toinard's principal work, Evangeliorum Harmonia Graeco-Latina, was greatly appreciated by Locke for its new method. The paper attempts to explore the bulk of this correspondence in detail, giving an account of the wide range of topics dealt with in the two hundred letters; it is divided into four paragraphs referring, respectively, to the years 1678-1679, 1679-1681, 1681-1686, and1686-1704. The perspective is diachronic; on some occasions, the focus is on a particular topic which is the object of prolonged discussion between the two correspondents. In the conclusion, attention is drawn to the relevance of this correspondence in the context of the 17th century and of Locke's philosophical thought. 展开更多
关键词 astronomic observation MAGNETISM medicine seconds pendulum CALENDAR harmonic writings
下载PDF
The Relation between Theory and Practice in Muslim Sages' Thoughts in the Third and Fourth Hijra Centuries and Its Effects on Concept of Craft (Sana'at) and Art in Islamic Civilization
9
作者 Hasan Bolkhari Ghehi 《Journal of Philosophy Study》 2013年第6期517-528,共12页
Farabi defines "Ilm al-Hiyal" (mechanic) in Ihsa al-Ulum as "knowing a way by which, human can adjust all of the concepts that have been proved in mathematics with verification to exotic objects, and helps their ... Farabi defines "Ilm al-Hiyal" (mechanic) in Ihsa al-Ulum as "knowing a way by which, human can adjust all of the concepts that have been proved in mathematics with verification to exotic objects, and helps their states in exotic objects to be carried". He believes this will be recognized and be attained by craft (sana'at, art). This was the common view in Islamic wisdom and philosophy in third and fourth Hijra centuries (9 & 10 CE). Researchers believe that the unique emphasis on parallelism between theoretical science and practical work is an important feature of Baghdad school and affected Islamic visual culture. Baghdad school had been affected by translation. In this way, Ikhwan-al-Safa, whom wrote the first encyclopedia of science in Islamic culture, had a very efficient role. They devised geometry into intellectual and sensual ones in the second part of their book, al-Rasa-el, and considered intellectual geometry as one of the middle philosophy and recognition and understanding factor for meaning of sensual geometry evidences. They insisted on basic situation of intellectual geometry in guidance of whom, want to learn intellectual things from sensual ones. They knew intellectual geometry as the factor for requiring skill in scientific crafts (sana'at), and sensual geometry as the factor of practical crafts, and made a vast relation between them. They also defined end of intellectual geometry understanding the base of all sciences and the main factor of wise, essence of self (nafs). Important feature of Ikhwan-al-Safa's wisdom is omitting the gap between theory and practice, making a vast relation between them, which affected the meaning of crafts in Islamic culture, and rendered a spiritual feature to crafts and arts. It seems this relation has created the concept of traditional arts, and integrating wisdom and crafts in Iranian-Islamic culture constructed all of the Fotowat-Nam e (book of Chivalry). This article reviews the concept, which affiliates theory and practice in third and fourth centuries and has a deep effect on recognition of art and craft in Islamic culture. 展开更多
关键词 PHILOSOPHY ART Islamic civilization theory practice
下载PDF
Art and Design in context of the new economic era
10
作者 Bo Zhang 《International Journal of Technology Management》 2013年第11期106-108,共3页
Human beings realize we have entered a modem society because of their awareness and understanding of social responsibility, recognizing that art is not only as a mirror to reflect the results of the present social pro... Human beings realize we have entered a modem society because of their awareness and understanding of social responsibility, recognizing that art is not only as a mirror to reflect the results of the present social processes, but also as a necessary means to promote social progress, that is to say that there is no modern society without modenl art. Modem design is closely related to human life. With twenty-first century the process of globalization accelerating, modem design in the promotion of modern human civilization takes responsibility, and also raises the batmer of human civilization, standing on high level of awareness of globalization and development of modem design. 展开更多
关键词 Art and Design Designing new economic era AESTHETICS
下载PDF
Mathematics Knowledge of Proof in Geometry: Pre-Service Teachers' Perspectives
11
作者 Jayaluxmi Naidoo Bongani Ndlovu 《Journal of Mathematics and System Science》 2014年第12期769-780,共12页
This article is based on research on pre-service teachers' perspectives on their mathematics knowledge of proof in geometry. The study was framed using tile mathematical knowledge for teaching framework. This qualita... This article is based on research on pre-service teachers' perspectives on their mathematics knowledge of proof in geometry. The study was framed using tile mathematical knowledge for teaching framework. This qualitative study employed the use of a task-based worksheet, focus group sessions and semi-structured individual interviews. The task-based worksheet was completed by 180 pre-service mathematics teachers (second, third and fourth year mathematics education students). Pre-service mathematics teachers are student teachers who have not yet completed their training to become teachers. After the analysis of the task-based worksheet, 20 participants were invited to participate in focus group sessions and individual interviews. The findings of the study reveal that the participants possess peripheral mathematics knowledge of proof in geometry. The study aims at assisting pre-service teachers and interested educationists to explore innovative methods of acquiring and imparting mathematics knowledge of proof in geometry. The study proposes possible changes in curriculum at school and university level. 展开更多
关键词 GEOMETRY KNOWLEDGE MATHEMATICS pedagogical content knowledge pre-service teacher PROOF
下载PDF
An Analysis of Japan's Interpretation of History over the Seven Postwar Decades
12
作者 Han Dongyu 《Social Sciences in China》 2017年第3期47-64,共18页
During the seven decades since the war ended, Japan has undergone "changes of direction" involving group expressions of regret, accompanied by the intellectual "soul- searching" of quite a few academics. Ultimatel... During the seven decades since the war ended, Japan has undergone "changes of direction" involving group expressions of regret, accompanied by the intellectual "soul- searching" of quite a few academics. Ultimately, however, the country has been unable to complete the "transformation" of its political values. Its consciousness of superiority, dating back to the Meiji era, and its dream of being restored to the status of a "normal country" have distorted Japan's idea of the war and its interpretation of history. As a result, at the critical postwar moment when Japan most needed to develop a truthful view of its history, its national will expressed itself in the rejection of this possibility. Japan has manufactured Sino-Japanese friction and manipulated the United States, on the pretext of a supposed "China threat" into relaxing the constraints upon Japan, and has attempted to abandon the thought and deeds of the postwar international order. Not only has this repeatedly subverted the standards by which the intemational "left" and "right" assess Japan; it has also once again placed the Asia-Pacific region in a precarious position. 展开更多
关键词 postwar Japan interpretation of history Meiji era normal country "left" and"right"
原文传递
Identity-based Broadcast Encryption with Shorter Transmissions 被引量:2
13
作者 张乐友 胡予濮 牟宁波 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期641-645,共5页
This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphe... This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphertexts. Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network. Finally, the proposed schemes are provable security under the decision generalized bilinear Diffi-Hellman (GBDH) assumption in the random oracles model. 展开更多
关键词 broadcast encryption identity-based encryption short transmissions provable security
原文传递
Adaptive Illumination Normalization Approach Based on Denoising Technique for Face Recognition
14
作者 练智超 宋杰 李杨 《Journal of Shanghai Jiaotong university(Science)》 EI 2017年第1期45-49,共5页
A novel adaptive illumination normalization approach is proposed to eliminate the effects caused by illumination variations for face recognition. The proposed method divides an image into blocks and performs discrete ... A novel adaptive illumination normalization approach is proposed to eliminate the effects caused by illumination variations for face recognition. The proposed method divides an image into blocks and performs discrete cosine transform(DCT) in blocks independently in the logarithm domain. For each block-DCT coefficient except the direct current(DC) component, we take the illumination as main signal and take the reflectance as "noise". A data-driven and adaptive soft-thresholding denoising technique is employed in each block-DCT coefficient except the DC component. Illumination is estimated by applying the inverse DCT in the block-DCT coefficients, and the indirectly obtained reflectance can be used in further recognition task. Experimental results show that the proposed approach outperforms other existing methods. Moreover, the proposed method does not need any prior information, and none of the parameters can be determined by experience. 展开更多
关键词 face recognition illumination variation soft-thresholding denoising TP 391.4 A
原文传递
Precise Zero-Knowledge Arguments with Poly-logarithmic Efficiency
15
作者 丁宁 谷大武 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第5期584-589,共6页
Precise zero-knowledge was introduced by Micali and Pass in STOC06. This notion captures the idea that the view of a verifier can be reconstructed in almost same time. Following the notion, they constructed some preci... Precise zero-knowledge was introduced by Micali and Pass in STOC06. This notion captures the idea that the view of a verifier can be reconstructed in almost same time. Following the notion, they constructed some precise zero-knowledge proofs and arguments, in which the communicated messages are polynomial bits. In this paper, we employ the new simulation technique introduced by them to provide a precise simulator for a modified Kilian's zero-knowledge arguments with poly-logarithmic efficiency (this modification addressed by Rosen), and as a result we show this protocol is a precise zero-knowledge argument with poly-logaxithmic efficiency. We also present an alternative construction of the desired protocols. 展开更多
关键词 CRYPTOGRAPHY ZERO-KNOWLEDGE precise zero-knowledge
原文传递
The Animals of China in the Eighteenth-Century British Imagination
16
作者 Jane Spencer 《Fudan Journal of the Humanities and Social Sciences》 2015年第2期167-177,共11页
In eighteenth-century Britain, knowledge about animals from around the world was rapidly increasing. This paper focuses on what the British knew and imagined about the animals of China from reading the works of Europe... In eighteenth-century Britain, knowledge about animals from around the world was rapidly increasing. This paper focuses on what the British knew and imagined about the animals of China from reading the works of European travellers and natural historians. Whereas the animals of Africa and America served to foster a growing sense of European mastery of less civilized parts of the world through trade and possession, those of China were understood as embedded in a highly advanced civilization and therefore as sources of knowledge about that civilization. This paper examines the way in which British understandings of China were mediated through accounts of Chinese animals and of human-animal relations in China. Looking at works of popular natural history and at Oliver Goldsmith's fictional letters of a "Chinese philosopher" in The Citizen of the World (1762), I argue that the animals of China bore several messages about their country. Focusing on the particular examples of the golden pheasant, the horse, the cormorant, and the cat, I suggest that British writing about Chinese animals served as a way of expressing mixed feelings about the value of advanced civilizations, whether Chinese or European. 展开更多
关键词 Natural history ENLIGHTENMENT Buffon Du Halde Goldsmith ANIMALS CORMORANT Cat HORSE
原文传递
Filling the Gap between Voters and Cryptography in e-Voting
17
作者 韩玮 郑东 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第3期257-260,共4页
Cryptography is an important tool in the design and implementation of e-voting schemes since it can provide verifiability, which is not provided in the traditional voting. But in the real life, most voters can neither... Cryptography is an important tool in the design and implementation of e-voting schemes since it can provide verifiability, which is not provided in the traditional voting. But in the real life, most voters can neither understand the profound theory of cryptography nor perform the complicated cryptographic computation. An e-voting system is presented in this paper to leverage the use of cryptography. It combines the advantages of voting scheme of Moran-Naor and voting scheme based on homomorphic encryption. It makes use of the cryptographic technique, but it hides the details of cryptographic computation from voters. Compared with voting scheme of Moran-Naor, the new system has three advantages: the ballots can be recovered when the voting machine breaks down, the costly cut-and-choose zero-knowledge proofs for shuffling votes made by the voting machine are avoided and the partial tally result in each voting machine can be kept secret. 展开更多
关键词 E-VOTING homomorphic commitment homomorphic encryption threshold decryption
原文传递
SEVERAL CRYPTOGRAPHIC APPLICATIONS OF ∑-PROTOCOL
18
作者 Chunming TANG Zheng-an YAO 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2009年第2期260-279,共20页
∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the f... ∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the following difficult problems 1-3 and to construct three ettlcient cryptographic protocols 4 6:1) How to construct a protocol for proving a secret integer to be a Blum integer with form PQ, where P, Q are two different primes and both -- 3(mod 4);2) How to construct a protocol for proving a secret polynomial with exact degree t - 1 iil a (t, n)- threshold secret sharing scheme:3) How to construct witness indistinguishable and witness hiding protocol not from zero-knowledge proof;4) A publicly verifiable secret sharing scheme with information-theoretic security;5) A delegateable signature scheme under the existence of one-way permutations;6) Non-interactive universal designated verifier signature schemes. 展开更多
关键词 ∑-protocol Blum integer delegateable signature secret sharing witness hiding protocol witness indistinguishable protocol universal designated verifier signature.
原文传递
Unbiased Condition of the Dispersion Effects Estimator in Unreplicated Two-Level Factorial Experiments
19
作者 YANG Liu LI Jihong WANG Yu 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2016年第6期1716-1736,共21页
This article presents a general form of the estimator for identifying dispersion effects from unreplicated two-level factorial experiments,and shows that the widely used estimators such as the BH,MH,and AMH estimators... This article presents a general form of the estimator for identifying dispersion effects from unreplicated two-level factorial experiments,and shows that the widely used estimators such as the BH,MH,and AMH estimators are all special cases of the proposed one,designated as the G estimator.The unbiased condition of the G estimator is proved,and a lower bound of variance of the G estimator is provided.A simulation based on a realistic design illustrates the variation of the variance and MSE(mean square error) of the G estimator on different coefficients.This estimator may be more flexible and has better performance than other methods such as the BH and MH estimators by appropriately selecting the coefficients. 展开更多
关键词 Dispersion effects location-dispersion model unreplicated factorial experiments.
原文传递
The Many Sounds of Civilization
20
作者 Emad El-Din Aysha 《Beijing Review》 2015年第32期48-48,共1页
British-American historian Bernard Lewis famously condemned Arab and Islamic civilization for not having a polyphonic sense of music,even accusing them of accepting totalitarian ideologies and regimes because of their... British-American historian Bernard Lewis famously condemned Arab and Islamic civilization for not having a polyphonic sense of music,even accusing them of accepting totalitarian ideologies and regimes because of their taste for"monophonic"music.That is,having one single singer with all the music following the ups and downs of his or her voice.Polyphonic music,by contrast,is when a piece of music has two or more independent melodies in it.As for the related notion of counterpoint,this is from many voices present in the chorus of a classical Greek drama and a reference to the coordination evident in choir singing. 展开更多
关键词 music downs taste drama singer evident notion civilization piece Greek
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部