期刊文献+
共找到4,440篇文章
< 1 2 222 >
每页显示 20 50 100
Research on Construction of Pharmacovigilance System for Marketing Authorization Holders in China
1
作者 Zhao Jiai Tian Lijuan 《Asian Journal of Social Pharmacy》 2024年第2期106-116,共11页
Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the m... Objective To provide suggestions for helping marketing authorization holders(MAHs)to develop an effective and compliant pharmacovigilance system.Methods The construction strategies of pharmacovigilance system of the multinational pharmaceutical companies were analyzed based on the requirements of regulations and laws.Results and Conclusion There are some gaps between local and multinational pharmaceutical companies in the construction of pharmacovigilance system.We can learn from the experience of multinational pharmaceutical companies to improve the pharmacovigilance system,which includes building a sound pharmacovigilance organizational structure,establishing a series of operational system files and cultivating professional talents.MAHs of China should improve the structure of enterprise pharmacovigilance system.Besides,members of Drug Safety Committee should be department managers with higher position so that they can fulfil the responsibilities of risk assessment.If MAHs possess a large variety and quantity of products,a Drug Safety Committee should be established to ensure the timely discovery of risks.In addition,MAHs should pay attention to the implementation of related regulations and laws on pharmacovigilance and establish compliant,effective and operatable files combing with the actual operation of pharmacovigilance system.Finally,MAHs should introduce and train pharmacovigilance talents,and hire pharmacovigilance experts as consultants to solve the problem of talent shortage. 展开更多
关键词 marketing authorization holder(MAH) pharmacovigilance system good pharmacovigilance practice
下载PDF
Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization 被引量:2
2
作者 Youngho Park Mi Hyeon Jeon Sang Uk Shin 《Computers, Materials & Continua》 SCIE EI 2023年第8期1871-1890,共20页
These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairnes... These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system. 展开更多
关键词 Bilateral authorization blockchain data marketplace fair exchange policy matching secure data trading
下载PDF
Blockchain-based cross-domain authorization system for user-centric resource sharing
3
作者 Yuki Ezawa Shohei Kakei +2 位作者 Yoshiaki Shiraishi Masami Mohri Masakatu Morii 《Blockchain(Research and Applications)》 EI 2023年第2期67-81,共15页
User-centric data sharing is essential to encourage citizens'active participation in the digital economy.One key to smart cities,a form of the digital economy,is the promotion of public use of citizen data.Neverth... User-centric data sharing is essential to encourage citizens'active participation in the digital economy.One key to smart cities,a form of the digital economy,is the promotion of public use of citizen data.Nevertheless,it is not easy to utilize data without citizens’consent.In this study,we took a technological approach to these issues.Usermanaged access(UMA)is a well-known framework for delegating resource access rights to others on the Internet.In UMA,authorization mechanisms are designed to be centralized so that resource owners can centrally manage access rights for various resources stored in different domains.However,the lack of transparency in the authorization mechanism is a barrier to its implementation in large-scale systems such as smart cities.In this study,we developed a blockchain-based cross-domain authorization architecture that enables a resource-sharing ecosystem in which organizations that wish to utilize data can freely trade with each other.The proposed architecture solves the transparency problem that conventional authorization systems have had by designing the authorization mechanism on blockchain technology.We implemented the proposed architecture as smart contracts and evaluated its processing performance.The resultant time required for delegating access rights and accessing resources was less than 500 ms.Furthermore,we found that the fluctuation in the processing time overhead was small.Based on these results,we concluded that performance degradation with the proposed architecture is minor. 展开更多
关键词 Access control authorization Blockchain Hyperledger fabric User-managed access
原文传递
Hybrid Scalable Researcher Recommendation System Using Azure Data Lake Analytics
4
作者 Dinesh Kalla Nathan Smith +1 位作者 Fnu Samaah Kiran Polimetla 《Journal of Data Analysis and Information Processing》 2024年第1期76-88,共13页
This research paper has provided the methodology and design for implementing the hybrid author recommender system using Azure Data Lake Analytics and Power BI. It offers a recommendation for the top 1000 Authors of co... This research paper has provided the methodology and design for implementing the hybrid author recommender system using Azure Data Lake Analytics and Power BI. It offers a recommendation for the top 1000 Authors of computer science in different fields of study. The technique used in this paper is handling the inadequate Information for citation;it removes the problem of cold start, which is encountered by very many other recommender systems. In this paper, abstracts, the titles, and the Microsoft academic graphs have been used in coming up with the recommendation list for every document, which is used to combine the content-based approaches and the co-citations. Prioritization and the blending of every technique have been allowed by the tuning system parameters, allowing for the authority in results of recommendation versus the paper novelty. In the end, we do observe that there is a direct correlation between the similarity rankings that have been produced by the system and the scores of the participant. The results coming from the associated scrips of analysis and the user survey have been made available through the recommendation system. Managers must gain the required expertise to fully utilize the benefits that come with business intelligence systems [1]. Data mining has become an important tool for managers that provides insights about their daily operations and leverage the information provided by decision support systems to improve customer relationships [2]. Additionally, managers require business intelligence systems that can rank the output in the order of priority. Ranking algorithm can replace the traditional data mining algorithms that will be discussed in-depth in the literature review [3]. 展开更多
关键词 Azure Data Lake U-SQL Author Recommendation system Power BI Microsoft Academic Big Data Word Embedding
下载PDF
Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization 被引量:1
5
作者 P.Prathap Nayudu Krovi Raja Sekhar 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3801-3813,共13页
Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challen... Due to the mobility of users in an organization,inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption(CP-ABE).By considering this challenge;we focus to present dynamic time and location information in CP-ABE with mul-ti-authorization.Atfirst,along with the set of attributes of the users,their corre-sponding location is also embedded.Geohash is used to encode the latitude and longitude of the user’s position.Then,decrypt time period and access time period of users are defined using the new time tree(NTT)structure.The NTT sets the encrypted duration of the encrypted data and the valid access time of the private key on the data user’s private key.Besides,single authorization of attribute authority(AA)is extended as multi authorization for enhancing the effectiveness of key generation.Simulation results depict that the proposed CP-ABE achieves better encryption time,decryption time,security level and memory usage.Namely,encryption time and decryption time of the proposed CP-ABE are reduced to 19%and 16%than that of existing CP-ABE scheme. 展开更多
关键词 CP-ABE geohash new time tree(NTT) multi authorization dynamic attribute
下载PDF
A Privacy-Preserving System Design for Digital Presence Protection
6
作者 Eric Yocam Ahmad Alomari +1 位作者 Amjad Gawanmeh Wathiq Mansoor 《Computers, Materials & Continua》 SCIE EI 2023年第5期3091-3110,共20页
A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and storage.This paper presents an innovative system design based on a... A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and storage.This paper presents an innovative system design based on a privacy-preserving model.The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameterbased access control protection mechanism for digital privacy preservation.The enhanced capability combines multiple access control parameters:facial expression,resource,environment,location,and time.The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.The findings resulted in different facial expressions successfully triggering a person’s face to be blurred and a person’s privacy when using a real-time video conferencing service captured from a webcam or virtual webcam.A comparison analysis of capabilities between existing designs and the proposed system design shows enhancement of the capabilities of the proposed system.A series of experiments exercising the enhanced,real-time multi-parameterbased system was shown as a viable path forward for preserving a person’s privacy while using a webcam or virtual webcam to capture,stream,and store videos. 展开更多
关键词 Attribute-based access control authentication authorization BIOMETRICS facial recognition IDENTITY PRIVACY machine learning deep learning
下载PDF
Development of an Integrated System to Enhance Spatial Data Processing & Management for Planning Authorities
7
作者 Clayton Lumwaya Jackson Phiri 《Journal of Geoscience and Environment Protection》 2023年第3期17-29,共13页
In a world where there is constant data generation and processing, the need for an integrated system cannot be overemphasized. The systems that enable storage of large amounts of spatial data and must be made availabl... In a world where there is constant data generation and processing, the need for an integrated system cannot be overemphasized. The systems that enable storage of large amounts of spatial data and must be made available to multiple users in real time. Studies have shown that standalone desktop spatial systems are often rigid and inflexible to support multiple data processing or demands from multiple users. The integrated spatial management system was designed to address the above highlighted challenges by bringing enhanced possibilities of utilization of spatial data though improving accessibility, visualization, and processing spatial information. The present work employed a mixed approach of qualitative and quantitative techniques to obtain the desired result. Qualitative data collection tools were used to collect field data required to design the prototype. The research sought to establish whether the integrated systems are in use by the targeted institutions, the findings highlighted that 71.4% have no integrated spatial data systems while 28.6% have partial-integrated systems. An overview of the architecture of integrated spatial systems consists of a well distributed database linked to multiple tools and platforms to query both the spatial and non-spatial data. The WEB-GIS and Mobile GIS interfaces were developed to allow multiple users to access information through the web in real time and data collection, respectively. 展开更多
关键词 Integrated Information Management system Geographical Information system Planning Authority
下载PDF
Study on Emergency Use Authorization and Risk Control of Pfizer-BioNTech Vaccine
8
作者 Wang Yiran Yang Yue 《Asian Journal of Social Pharmacy》 2023年第1期24-29,共6页
Objective To analyze the methods and policies for emergency use authorization(EUA)and risk control of COVID-19 vaccines.Methods The legal basis,safety,and effectiveness evaluation criteria for Pfizer-BioNTech vaccine ... Objective To analyze the methods and policies for emergency use authorization(EUA)and risk control of COVID-19 vaccines.Methods The legal basis,safety,and effectiveness evaluation criteria for Pfizer-BioNTech vaccine under EUA,as well as the continuation of phase III clinical trials and pharmacovigilance plans were sorted out.And attention was paid to the safety surveillance actions and risk control measures of vaccines under EUA.Results and Conclusion The methods and policies for EUA and risk control of Pfizer-BioNTech vaccine were made clear and we could provide a reference for the pharmacovigilance action after the COVID-19 vaccines were put on the market in China.In the case of EUA,it is necessary to analyze the existing clinical safety data.Based on this,the risk control process should be confirmed at the time of formal marketing approval and after listing.Finally,the risk control should be adjusted at any time. 展开更多
关键词 COVID-19 vaccine emergency use authorization surveillance
下载PDF
Beyond authorship: Analyzing contributions in PLOS ONE and the challenges of appropriate attribution 被引量:1
9
作者 Abdelghani Maddi Jaime A.Teixeira da Silva 《Journal of Data and Information Science》 CSCD 2024年第3期88-115,共28页
Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approa... Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approach:The study analyzes 81,823 publications from the journal PLOS ONE,covering the period from January 2018 to June 2023.It examines the authorship attributions within these publications to try and determine the prevalence of inappropriate authorship.It also investigates the demographic and professional profiles of affected authors,exploring trends and potential factors contributing to inaccuracies in authorship.Findings:Surprisingly,9.14%of articles feature at least one author with inappropriate authorship,affecting over 14,000 individuals(2.56%of the sample).Inappropriate authorship is more concentrated in Asia,Africa,and specific European countries like Italy.Established researchers with significant publication records and those affiliated with companies or nonprofits show higher instances of potential monetary authorship.Research limitations:Our findings are based on contributions as declared by the authors,which implies a degree of trust in their transparency.However,this reliance on self-reporting may introduce biases or inaccuracies into the dataset.Further research could employ additional verification methods to enhance the reliability of the findings.Practical implications:These findings have significant implications for journal publishers,Beyond authorship:Analyzing contributions in PLOS ONE and Maddi,A.,&the challenges of appropriate attribution highlighting the necessity for robust control mechanisms to ensure the integrity of authorship attributions.Moreover,researchers must exercise discernment in determining when to acknowledge a contributor and when to include them in the author list.Addressing these issues is crucial for maintaining the credibility and fairness of academic publications.Originality/value:This study contributes to an understanding of critical issues within academic authorship,shedding light on the prevalence and impact of inappropriate authorship attributions.By calling for a nuanced approach to ensure accurate credit is given where it is due,the study underscores the importance of upholding ethical standards in scholarly publishing. 展开更多
关键词 Authorship Funding acquisition Research integrity Author contributions CREDIT Inappropriate authorship APC ring
下载PDF
Modeling mitochondria,where are the numbers?
10
作者 Adrian M.Davies Alan G.Holt 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第7期1435-1436,共2页
Models and simulations are particularly useful for exploring ideas and concepts in the biological sciences that are expe rimentally impracticable.in silico methods are also gaining acceptance with regulatory authoriti... Models and simulations are particularly useful for exploring ideas and concepts in the biological sciences that are expe rimentally impracticable.in silico methods are also gaining acceptance with regulatory authorities as an alternative to animal testing.For example,the Environmental Protection Agency aims to eliminate animal testi ng by 2035. 展开更多
关键词 eliminate authorities ACCEPTANCE
下载PDF
Information for Authors
11
《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第3期I0001-I0001,共1页
Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launche... Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 asthe flagship journal of CPS,CPL has become one of the mostprestigious periodicals published in China,and been among thegood choices for worldwide physicists to disseminate their mostimportant breakthroughs. 展开更多
关键词 JOURNAL BREAKTHROUGH AUTHORS
下载PDF
Guide for Authors
12
《Water Science and Engineering》 EI CAS CSCD 2024年第1期I0003-I0007,共5页
Introduction Types ofpaper Contributions falling into the following categories will be considered for publication:Reviews,Technical papers,Theoretical papers,and Editorial.Please ensure that you select the appropriate... Introduction Types ofpaper Contributions falling into the following categories will be considered for publication:Reviews,Technical papers,Theoretical papers,and Editorial.Please ensure that you select the appropriate article type from the list of options when making your submission.Authors contributing to special issues should ensure that they select the special issue article type from this list. 展开更多
关键词 AUTHORS SUBMISSION contributing
下载PDF
Information for Authors
13
《Journal of Beijing Institute of Technology》 EI CAS 2024年第1期F0003-F0003,共1页
General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Informat... General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992. 展开更多
关键词 China. REPUBLIC AUTHORS
下载PDF
Information for Authors
14
《Journal of Beijing Institute of Technology》 EI CAS 2024年第5期F0003-F0003,共1页
General.Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information... General.Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992. 展开更多
关键词 China. REPUBLIC AUTHORS
下载PDF
Predicting Age and Gender in Author Profiling: A Multi-Feature Exploration
15
作者 Aiman Muhammad Arshad +2 位作者 Bilal Khan Sadique Ahmad Muhammad Asim 《Computers, Materials & Continua》 SCIE EI 2024年第5期3333-3353,共21页
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g.... Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction. 展开更多
关键词 Digital forensics author profiling for security AdaBoostM1 random forest ensemble learning
下载PDF
Information for Authors
16
《Journal of Beijing Institute of Technology》 EI CAS 2024年第4期F0003-F0003,共1页
General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information... General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992. 展开更多
关键词 China REPUBLIC AUTHORS
下载PDF
Analysis of articles on hepatitis C by scientific mapping:1989-2022
17
作者 Duran Tok 《World Journal of Clinical Cases》 SCIE 2024年第20期4301-4316,共16页
BACKGROUND Hepatitis C virus(HCV)poses a significant quandary about public health.It is challenging to study the literature in a particular discipline comprehensively today.One solution is bibliometric analysis,which ... BACKGROUND Hepatitis C virus(HCV)poses a significant quandary about public health.It is challenging to study the literature in a particular discipline comprehensively today.One solution is bibliometric analysis,which is often used to track the attributes and evolutionary trajectories of scientific outputs.AIM To examine the 35-year scientific evolution of articles focused on HCV.METHODS This study examined the 35-year scientific evolution of articles focused on HCV.Our study utilized the Web of Science database.The study encompassed a total of 11930 articles.RESULTS Regarding the cumulative count of articles,the leading countries are the United States,Japan,and Italy.Rice CM is the author with the highest recorded H-index and G-index values.The journal with the highest recorded H-index and G-index values is the Journal of Virology.The Journal of Viral Hepatitis contributed 10.94%of the articles,whereas the Journal of Virology published 9.68%.According to the strategic diagram,the keywords most frequently used in 2020-2022 are HCV,epidemiology,and sofosbuvir.CONCLUSION This study provides valuable information about 40 years of academic knowledge on HCV. 展开更多
关键词 Hepatitis C Bibliometric analysis Science Mapping AUTHOR JOURNAL
下载PDF
A Brief Introduction to Contemporary Social Sciences
18
《Contemporary Social Sciences》 2024年第5期F0002-F0002,共1页
Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of soc... Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of social sciences,as well as Sichuan’s only English academic journal in humanities and social sciences with a CN serial number.As a publication run in line with the requirements of China’s press and publication authority,Contemporary Social Sciences publishes outstanding research in the field of social sciences in China and also includes high-quality research work by foreign scholars on the development of China’s western regions and its reform and opening up.The aim is to help promote China’s academic achievements to the world and give China a stronger voice in the global community of social sciences. 展开更多
关键词 JOURNAL CONTEMPORARY AUTHORITY
下载PDF
Submissions Invited
19
《Contemporary Social Sciences》 2024年第5期I0004-I0004,共1页
Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of soc... Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of social sciences,as well as Sichuan’s only English academic journal in humanities and social sciences with a CN serial number.As a publication run in line with the requirements of China’s press and publication authority,Contemporary Social Sciences publishes outstanding research in the field of social sciences in China and also includes high-quality research work by foreign scholars on the development of China’s western regions and its reform and opening up.The aim is to help promote China’s academic achievements to the world and give China a stronger voice in the global community of social sciences. 展开更多
关键词 JOURNAL NUMBER AUTHORITY
下载PDF
A Brief Introduction to Contemporary Social Sciences
20
《Contemporary Social Sciences》 2024年第4期F0002-F0002,共1页
Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of soc... Contemporary Social Sciences is an English-language journal founded by Sichuan Academy of Social Sciences(SASS)in March 2016.It is China’s first and only English academic journal established by a local academy of social sciences,as well as Sichuan’s only English academic journal in humanities and social sciences with a CN serial number.As a publication run in line with the requirements of China’s press and publication authority,Contemporary Social Sciences publishes outstanding research in the field of social sciences in China and also includes high-quality research work by foreign scholars on the development of China’s western regions and its reform and opening up.The aim is to help promote China’s academic achievements to the world and give China a stronger voice in the global community of social sciences. 展开更多
关键词 JOURNAL CONTEMPORARY AUTHORITY
下载PDF
上一页 1 2 222 下一页 到第
使用帮助 返回顶部