期刊文献+
共找到33篇文章
< 1 2 >
每页显示 20 50 100
程端禮經世致用思想探析
1
作者 蔡春娟 《隋唐辽宋金元史论丛》 2021年第1期310-315,共6页
程端禮(1271-1345),字敬叔,號畏齋,浙江鄞縣(今寧波)人。他一生致力於教書育人,歷任廣德路建平縣儒學、池州路建德縣儒學教諭,信州稼軒書院、建康江東書院山長,鉛山州儒學教授,以將仕佐郎、台州路儒學教授致仕。[1]著《讀書分年日程》... 程端禮(1271-1345),字敬叔,號畏齋,浙江鄞縣(今寧波)人。他一生致力於教書育人,歷任廣德路建平縣儒學、池州路建德縣儒學教諭,信州稼軒書院、建康江東書院山長,鉛山州儒學教授,以將仕佐郎、台州路儒學教授致仕。[1]著《讀書分年日程》一書以資學者讀書應試,就讀何書、如何讀這兩個問題. 展开更多
关键词 儒學 建康 程端 思想探析
下载PDF
一种基于谱优势的混合立体声声学回声抵消方法
2
作者 杨鹤飞 叶青华 李晓东 《声学技术》 CSCD 2013年第S1期215-216,共2页
0引言双边乃至多边通信系统中,回声会降低语音清晰度,影响通信质量,因此需进行声学回声抵消,可采用自适应算法实现该目的[1]。立体声声学回声抵消(Stereo Acoustic Echo Cancellation,SAEC,见图1)较复杂:由于源自同一声源,远程端的两个... 0引言双边乃至多边通信系统中,回声会降低语音清晰度,影响通信质量,因此需进行声学回声抵消,可采用自适应算法实现该目的[1]。立体声声学回声抵消(Stereo Acoustic Echo Cancellation,SAEC,见图1)较复杂:由于源自同一声源,远程端的两个传声器信道间存在强相关性;从而导致自适应算法的最优解不唯一[2],失调性能差。为了改善上述性能,需先对两个传声器信道进行去相关预处理, 展开更多
关键词 信道间 程端 语音清晰度 去相关 STEREO 非线性变换 通信质量 通信系统 混响时间 传递函数
下载PDF
《读书分年日程》在元代引发的质疑与论辩
3
作者 蔡春娟 《河北师范大学学报(哲学社会科学版)》 2022年第2期28-35,共8页
程端礼《读书分年日程》在元代得到官方认可,国子监和中书省相继申令地方学校以之为教学范式。从现存资料看,自该书问世,元明清人对此书的评价以正面为主。其实,细品时人文字可发现,该书在元代也引起一些人的质疑,时人对之也有一些微辞... 程端礼《读书分年日程》在元代得到官方认可,国子监和中书省相继申令地方学校以之为教学范式。从现存资料看,自该书问世,元明清人对此书的评价以正面为主。其实,细品时人文字可发现,该书在元代也引起一些人的质疑,时人对之也有一些微辞。注目于这些非议与就此引发的论辩,可以更客观地看待此书在元代教育中发挥的作用,也可以看到当时的学风、文化趋向与价值取向。 展开更多
关键词 程端 《读书分年日程》 学风 价值取向
下载PDF
SDN Orchestration for Dynamic End-to-End Control of Data Center Multi-Domain Optical Networking 被引量:3
4
作者 LIU Lei 《China Communications》 SCIE CSCD 2015年第8期10-21,共12页
New and emerging use cases, such as the interconnection of geographically distributed data centers(DCs), are drawing attention to the requirement for dynamic end-to-end service provisioning, spanning multiple and hete... New and emerging use cases, such as the interconnection of geographically distributed data centers(DCs), are drawing attention to the requirement for dynamic end-to-end service provisioning, spanning multiple and heterogeneous optical network domains. This heterogeneity is, not only due to the diverse data transmission and switching technologies, but also due to the different options of control plane techniques. In light of this, the problem of heterogeneous control plane interworking needs to be solved, and in particular, the solution must address the specific issues of multi-domain networks, such as limited domain topology visibility, given the scalability and confidentiality constraints. In this article, some of the recent activities regarding the Software-Defined Networking(SDN) orchestration are reviewed to address such a multi-domain control plane interworking problem. Specifically, three different models, including the single SDN controller model, multiple SDN controllers in mesh, and multiple SDN controllers in a hierarchical setting, are presented for the DC interconnection network with multiple SDN/Open Flow domains or multiple Open Flow/Generalized Multi-Protocol Label Switching( GMPLS) heterogeneous domains. I n addition, two concrete implementations of the orchestration architectures are detailed, showing the overall feasibility and procedures of SDN orchestration for the end-to-endservice provisioning in multi-domain data center optical networks. 展开更多
关键词 software-defined networking(SDN) generalized multi-protocol labelswitching (GMPLS) path computationelement (PCE) data center ORCHESTRATION multi-domain optical network
下载PDF
Effect of typhoon with extreme precipitation on mountain reservoir drinking water treatment: a case study in Ningbo, China 被引量:8
5
作者 Wei Chen Zhengxie Zhou +2 位作者 Jianrong He Hui Tao Zhigang Liu 《Chinese Journal of Population,Resources and Environment》 2017年第2期103-108,共6页
Due to frequent drinking water pollution accidents in the past decade, it is common that mountain reservoirs were used as the source of drinking water in China. However, some coastal areas frequently suffer from typho... Due to frequent drinking water pollution accidents in the past decade, it is common that mountain reservoirs were used as the source of drinking water in China. However, some coastal areas frequently suffer from typhoon with extreme precipitation, which results in the water quality deterioration of the reservoirs. The influence of typhoons with extreme precipitation on Jiaokou reservoir and the emergency treatment process of Maojiaping water treatment plant in the past three typical typhoons with extreme precipitation from the year of 2012-2015 were studied. It was found that the degradation of water quality, such as the increase of turbidity and bacteria index, may not merely appear during the events, but last for several days. Changing the dosage of water purification agent, such as coagulant and disinfectant at right time and place may be an efficient emergency water treatment process. Based on the analysis of water quality variation rule during and after the events, it was also found that emergency treatment can be fully prepared before the arrival of a typhoon with extreme precipitation. And in order to better respond to the typhoon with extreme precipitation, several suggestions are also proposed in this paper as follows: establishing vegetated buffers at right place, such as macrophanerophytes,shrub or herbage, increasing investments in infrastructure management, merging or cancelling the small-scale water treatment plants, preparing adequate water purification agent before the typhoon comes, etc. 展开更多
关键词 Typhoon with extreme precipitation mountain reservoir emergency drinking water treatment microorganisms
下载PDF
Two-Phased Method for Detecting Evasive Network Attack Channels 被引量:2
6
作者 CAO Zigang XIONG Gang +2 位作者 ZHAO Yong GUO Li FANG Binxing 《China Communications》 SCIE CSCD 2014年第8期47-58,共12页
With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontation... With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontations,evasive network attacks on information infrastructures with high-tech,high concealment and longterm sustainability become severe threats to national security.In this paper,we propose a novel two-phased method for the detection of evasive network attacks which exploit or pretend to be common legal encryption services in order to escape security inspection.Malicious communications which camouflage themselves as legal encryption application are identified in the SSL'session structure verification phase firstly,and then by serverside X.509 certificate based anomaly detection,suspicious attack behaviors are further distinguished effectively.Experiment results show that our method is very useful for detecting the network activities of certain unknown threats or new malwares.Besides,the proposed method can be applied to other similar services easily. 展开更多
关键词 evasiveencryption SSL X.509detectionnetwork attacks CERTIFICATE ANOMALY
下载PDF
Mobile Business Process Personalization for End Users
7
作者 XUE Sida WU Budan +2 位作者 CHENG Bo QIAO Xiuquan CHEN Junliang 《China Communications》 SCIE CSCD 2015年第12期1-12,共12页
Many specified business needs in enterprise context cannot be effectively satisfied using current business process technology.This phenomenon is called the "long tail" of business processes.In addition,more ... Many specified business needs in enterprise context cannot be effectively satisfied using current business process technology.This phenomenon is called the "long tail" of business processes.In addition,more and more business applications need to be accessed from mobile devices such as smartphones by enterprise end users.This paper attempts to solve both two challenges above.A lightweight event-driven process model is proposed aiming at satisfying the spontaneous business needs in enterprise.And we design an innovative wizard,which works like a tutorial,guiding end users in creating this lightweight process model.Moreover,end users are allowed to interact with the process created by themselves on smartphones.Finally,the usability of our approach was evaluated on a small set of users in a real business scenario.The results show that end users can effectively build their personalized business processes using our approach and interact with them in mobile environment. 展开更多
关键词 users satisfying lightweight innovative interact created engineer aiming repair scenario
下载PDF
Online Internet Traffic Identification Algorithm Based on Multistage Classifier 被引量:3
8
作者 杜敏 陈兴蜀 谭骏 《China Communications》 SCIE CSCD 2013年第2期89-97,共9页
Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age c... Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age contexts that restrict their ability when they are applied in the current network envi-ronment. For example, the port based ap-proach cannot identify network applications with dynamic ports; the deep packet inspec-tion approach is invalid for encrypted network applications; and the statistical based approach is time-onsuming. In this paper, a novel tech-nique is proposed to classify different catego-ries of network applications. The port based, deep packet inspection based and statistical based approaches are integrated as a multi-stage classifier. The experimental results demonstrate that this approach has high rec-ognition rate which is up to 98% and good performance of real-time for traffic identifica-tion. 展开更多
关键词 traffic identification multistageclassifier SELECTION statistical characteristic featuresupport vector machine
下载PDF
The Legal Regulations on Dams Construction on International Rivers: The Compliance of the Nile Basin Upstream States of the Regulations
9
作者 Mosaed Abd Elatty Shetwey 《Journal of Earth Science and Engineering》 2014年第12期718-735,共18页
The process of constructing hydraulic projects on international rivers is governed by several legal regulations, among the most important of these regulations are: the Principle of no harm, and the Principle of Prior... The process of constructing hydraulic projects on international rivers is governed by several legal regulations, among the most important of these regulations are: the Principle of no harm, and the Principle of Prior Notification, protection of the river's environment and the Principle of Settling the International Disputes via Peaceful Means, which is considered one of the most important principles called for by the UN Pact, as it provides for adopting the peaceful means by the member states of the organization to settle international disputes through peaceful means, in addition to an applied study on the Nile Basin's projects. 展开更多
关键词 No-harm principle hydraulic project Prior Notification dispute settlement legal regulations.
下载PDF
Development and Implementation of GSM-Based Distribution Automation System with Graphic User Interface in Nigeria Electric Power Distribution Network
10
作者 Oyetunji Samson Adenle Edeko Fred Oba 《Journal of Energy and Power Engineering》 2013年第11期2181-2187,共7页
Lack of up-to-date information on efficient operation and maintenance of EPDS (electric power distribution systems), Nigeria is addressed by designing and implementing an indigenous real-time monitoring and diagnosi... Lack of up-to-date information on efficient operation and maintenance of EPDS (electric power distribution systems), Nigeria is addressed by designing and implementing an indigenous real-time monitoring and diagnosis system. The system encompasses the development of software driven hardware positioned at the remotely located sub-stations at the low voltage level to keep track of the network in real-time. The detection of faults exploits threshold passing algorithm through continuous monitoring of the network power quality. Communication between the RTU (remote terminal unit) and the DCC (distribution control center) which is based on GSM is initiated by disturbance. The DCC performs fault evaluation processing using the received data and predetermined faults signatures to determine the nature of disturbance and presents the result in graphic user interface environment. A fault reporting time of 2 s was achieved. The developed system exhibits a high degree of accuracy and manifests no spurious reports during testing. The resultant system limits the effects of interruption and increases power availability by reducing the down time. The system strengthens engineering and management capabilities required to enhance reliability by providing information about the network health status. 展开更多
关键词 AUTOMATION communication media current and electric power distribution.
下载PDF
Damming of Large River by Debris Flow: Dynamic Process and Particle Composition 被引量:5
11
作者 DU Cui YAO Ling-kan +2 位作者 SHAKYA Subhashsagar LI Lun-gui SUN Xiao-dan 《Journal of Mountain Science》 SCIE CSCD 2014年第3期634-643,共10页
The frequency and extent of debris flows have increased tremendously due to the extreme weather and the Wenchuan earthquake on May 12, 2008. Previous studies focused on the debris flow from gullies damming the mountai... The frequency and extent of debris flows have increased tremendously due to the extreme weather and the Wenchuan earthquake on May 12, 2008. Previous studies focused on the debris flow from gullies damming the mountain streams. In this paper, an equation for the run-out distance of debris flow in the main river is proposed based on the dynamic equation of debris flow at different slopes given by Takahashi. By undertaking field investigations and flume experiments, a new calculation method of the volume of debris flow damming large river is obtained. Using the percolation theory and the renormalization group theory it was deduced that the large particles should comprise more than 50% for forming a stable debris flow dam. Hence, the criteria of damming large river by debris flow is presented in terms of run-out distance and grain composition which was then validated through the event of damming river by debris flow at Gaojia gully, the upper reaches of the Minjiang River, Sichuan, China, on July 3, 2011. 展开更多
关键词 Debris flow Damming.large river CRITERIA Run-out distance Grain composition
下载PDF
Develop and Implement of Real-time Network Monitoring Software based on C/S
12
作者 Shefeng Yuan 《International Journal of Technology Management》 2015年第1期62-64,共3页
This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communicatio... This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communication with the application server. The network administrator can monitor and intelligent management of the client computer through the server program, the computer will execute the corresponding operation according to the server to send command instructions. The system realize the main module of the whole system framework, network monitoring data initialization module, network data transmission module, image coding and decoding module, the advantages of system make full use of existing LAN resources, timely delivery and manaRement information. 展开更多
关键词 COMPUTER INTELLIGENT C/S mode network monitoring system
下载PDF
Remote-Controlled Ambidextrous Robot Hand Concept
13
作者 Emre Akyurek Alexandre Dilly Fabrice Jourdan Zhu Liu Souraneel Chattoraj Itziar Berruezo Juandeaburre Michel Heinrich Leonid Paramonov Peter Turner Stelarc Tatiana Kalganova 《Computer Technology and Application》 2013年第11期569-574,共6页
In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients su... In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients suffering arms or legs injuries, fn this paper, the concept of an ambidextrous design lbr robot hands is introduced. The fingers can curl in one xvay or another, to imitate either a right hand or a left hand. The advantages and inconveniences of different models have been investigated to optimise the range and the maximum force applied by fingers. Besides, a remote control interthce is integrated to the system, allowing both to send comrnands through internet and to display a video streaming of the ambidextrous hand as feedback. Therefore, a robotic prosthesis could be used for the first time in telerehabilitation. The main application areas targeted are physiotherapy alter strokes or management of phantom pains/br amputees by/earning to control the ambidextrous hand. A client application is also accessible on Facehook social network, making the robotic limb easily reachable for the patients. Additionally the ambidextrous hand can be used tbr robotics research as well as artistic performances. 展开更多
关键词 Robot hand pneumatic muscles remote platform video streaming TELEREHABILITATION hand recognition
下载PDF
Delay-Based User Association in Heterogeneous Networks with Backhaul 被引量:5
14
作者 Wenchao Xia Jun Zhang +1 位作者 Shi Jin Hongbo Zhu 《China Communications》 SCIE CSCD 2017年第10期130-141,共12页
The Internet of things(IoT) as an important application of future communication networks puts a high premium on delay issues. Thus when Io T applications meet heterogeneous networks(HetNets) where macro cells are over... The Internet of things(IoT) as an important application of future communication networks puts a high premium on delay issues. Thus when Io T applications meet heterogeneous networks(HetNets) where macro cells are overlaid with small cells, some traditional problems need rethinking. In this paper, we investigate the delay-addressed association problem in two-tier Het Nets considering different backhaul technologies. Specifically, millimeter wave and fiber links are used to provide high-capacity backhaul for small cells. We first formulate the user association problem to minimize the total delay which depends on the probability of successful transmission, the number of user terminals(UTs), and the number of base stations(BSs). And then two algorithms for active mode and mixed mode are proposed to minimize the network delay. Simulation results show that algorithms based on mutual selection between UTs and BSs have better performance than those based on distance. And algorithms for mixed modes have less delay than those for active mode when the number of BSs is large enough, compared to the number of UTs. 展开更多
关键词 user association backhaul delay small cell HetNet heterogeneous networks IoT
下载PDF
Application of the Keyword Recognition in the Network Monitoring
15
作者 杨海燕 景新幸 《Journal of Measurement Science and Instrumentation》 CAS 2011年第2期144-147,共4页
In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network moni... In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network monitoring and keywords spotting. In the part of network monitoring, this paper adopts a method which is based on ARP spoofing technology to monitor the users' data, and to obtain the original audio streams. In the part of keywords spotting, the extraction methods of PLP (one of the main characteristic arameters) is studied, and improved feature parameters- PMCC are put forward. Meanwhile, in order to accurately detect syllable, the paper the double-threshold method with variance of frequency band method, and use the latter to carry out endpoint detection. Finally, keywords recognition module is built by HMM, and identification results are contrasted under Matlab environment. From the experiment results, a better solution for the application of key words recognition technology in network monitoring is found. 展开更多
关键词 network monitoring keywords spotting PLP PMCC Hidden Markwv Model(HMM)
下载PDF
Docking process on hybrid self-reconfigurable modular robots
16
作者 帅立国 Su Huizhe +1 位作者 Zheng Liyuan Fei Yanqiong 《High Technology Letters》 EI CAS 2017年第1期71-76,共6页
A novel hybrid self-reconfigurable modular robot is designed to finish the morphing action from line shape to hexagon shape. The robot is composed of many basic modules,each of which consists of a master module and a ... A novel hybrid self-reconfigurable modular robot is designed to finish the morphing action from line shape to hexagon shape. The robot is composed of many basic modules,each of which consists of a master module and a slave module in the shape of triangular prism. There are four connection ports on each basic module. For the master module there are two holes on each connection port,and for the slave one there are two pegs on each connection. The docking process between two neighboring basic modules is analyzed with a peg-in-hole mechanical structure. A small motion's method is presented and the contact forces are derived. According to the force/moment,the pose of a motion module should be adjusted to make two neighboring modules align and finish the docking process.Finally,a simulation of 3 basic modules is shown to finish the morphing and docking process effectively. The system can finish the morphing task from the line shape to the hexagon shape. 展开更多
关键词 self-reconfigurable robot MORPHING HYBRID MODULE
下载PDF
Empirical Analysis on Continuous Improvement of Mobile Content Services' Effects on Continuance Use Intention 被引量:1
17
作者 Chen Hui Liu Lulu 《China Communications》 SCIE CSCD 2012年第12期164-172,共9页
With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expec... With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expectation-confirmation theory and information system continuance use theory,this paper proposes a mobile content continuance use model and puts forward related assumptions under the mobile commerce environment by introducing the continuous improvement variables.Questionnaire data are collected from 219 mobile content service users for research,and the hypothetical model is validated by the structural equation modeling.Results show that the information system continuance use model is still valid under the mobile commerce environment,and the continuous improvement on mobile content services have positive impacts on user's expectations after they have experienced certain mobile content services. 展开更多
关键词 mobile content services continuous improvement continuance use intention
下载PDF
Experimental Research of Tankyrase1 Antisense Oligodeoxynucleotides on the Proliferation of Lung Cancer Cell Nodules
18
作者 Chong LI Tan LI Zhong-li ZHAN 《Clinical oncology and cancer researeh》 CAS CSCD 2010年第3期181-186,共6页
OBJECTIVE To observe the effects of sense and antisense oligodeoxynucleotides of tankyrase 1 (TANK1-SODN and TANK1-ASODN) on murine tumor growth following intratumoral injection, investigate the actual suppressing r... OBJECTIVE To observe the effects of sense and antisense oligodeoxynucleotides of tankyrase 1 (TANK1-SODN and TANK1-ASODN) on murine tumor growth following intratumoral injection, investigate the actual suppressing result and mechanism of TANK1-ASODN on cancer cell proliferation, and discuss the possibility of using it in gene therapy on human lung cancer cells. METHODS After BALB/c nude mice had been subcutaneously inoculated with human lung cancer cell line CALU and it had grown into tumor nodules, we distributed these mice randomly into 3 groups: 4 in saline treatment group, and 5 each in TANK1-SODN group, and TANK1-ASODN groups. Then multiple direct intratumoral injections of synthesized TANK1-ASODN given continuously into tumor nodules for 16 days, this was compared with TANK1-SODN and saline control groups. During the experiment we measured the tumor volume every 5 days with vernier calipers; observed the histopathological characteristics of tumor tissues under microscope; went further to detect the minute changing of ultrastructure of cancer cells by electron microscope; tested the expression levels of ki67 and hTERT protein by means of SABC immunohistochemical method; and detected the lung cancer cells' hTERT mRNA expression level by hybridization in situ (ISH) in each group. RESULTS After 16 days of continuous injection, the tumor volume in TANK1-ASODN group was significantly smaller than the other 2 groups (both P 〈 0.01); quite a lot of tumor cell degeneration and necrosis were observed in mice given TANK1-ASODN. The results of electron microscope also showed that TANK1-ASODN has the power to kill cancer cells in various ways. Moreover, statistically signi.cant decreases in the positive expression ratio of Ki67 Labeling Index (P 〈 0.01), hTERT protein (P 〈 0.01), and hTERT mRNA (P 〈 0.01) were consistently observed in the TANK1-ASODN group. CONCLUSION Human lung cancer cell line CALU expressed high telomerase activity. TANK1-ASODN had the ability to decline the high expression level of hTERT; inhibit the activity of telomerase, accelerate tumor cell degeneration and necrosis; and then suppress the proliferation of cancer cells. 展开更多
关键词 TANK1-ASOND intratumoral injection CALU gene therapy
下载PDF
Analysis of Relation Between Binding and Magnetic Force in Generators in Extreme Conditions
19
《Electricity》 2013年第1期26-30,共5页
Because of the action of strong magnetic forces, it's difficult to avoid end winding vibration in the large turbo-generator stator. Sometimes it leads to the occurrence of accidents and affects the normal operatio... Because of the action of strong magnetic forces, it's difficult to avoid end winding vibration in the large turbo-generator stator. Sometimes it leads to the occurrence of accidents and affects the normal operation of the generator. This paper firstly lays out the calculation method for end winding magnetic force. Second, based on the structure of large machines, the natural vibration frequency equation and forced oscillation equation is set up. Third, through the analysis of magnetic force calculation and vibration on the end winding of turbo-generator, it will be shown that the end winding vibration is related to the magnetic force and the position of winding binds as well as binding tightness. We can ease the winding vibration by distributing binding position appropriately or add more bindings, and test the concept through experimental data. 展开更多
关键词 TURBO-GENERATOR vibration magnetic force winding binding
下载PDF
夯实战斗力工程——重庆预师高标准加强营房基础设施建设纪实
20
作者 伍海泉 何洪元 陈良泽 《西南民兵》 2002年第3期4-4,共1页
新年伊始,万象更新。 2002年元月7日,重庆警备区营建现场会正在举行。当警备区首长和全市人武部、预备役部队主官,后勤部(科、股)长,参观了重庆预师机关和二团的营院后,发出了这样的赞语:“花园式的营院,服务战斗力的精品工程!”
关键词 预备役部队 营院 营区道路 基础设施 区委书记 七无 程端 部队营房 筹措经费 指挥中心
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部