期刊文献+
共找到44篇文章
< 1 2 3 >
每页显示 20 50 100
Design of two-dimensional spatially coupled LDPC codes for combating burst erasures
1
作者 刘洋 HE Jinglin +1 位作者 WANG Bin ZHANG Yuzhi 《High Technology Letters》 EI CAS 2023年第3期288-294,共7页
Spatially-coupled low-density parity-check(SC-LDPC)codes are prominent candidates for fu-ture communication standards due to their‘threshold saturation’properties.However,when facing burst erasures,the decoding proc... Spatially-coupled low-density parity-check(SC-LDPC)codes are prominent candidates for fu-ture communication standards due to their‘threshold saturation’properties.However,when facing burst erasures,the decoding process will stop and the decoding performances will dramatically de-grade.To improve the ability of burst erasure corrections,this paper proposes a two-dimensional SC-LDPC(2D-SC-LDPC)codes constructed by parallelly connecting two asymmetric SC-LDPC coupled chains for resistance to burst erasures.Density evolution algorithm is presented to evaluate the as-ymptotic performances against burst erasures,by which the maximum correctable burst erasure length can be computed.The analysis results show that the maximum correctable burst erasure lengths of the proposed 2D-SC-LDPC codes are much larger than the SC-LDPC codes and the asym-metric SC-LDPC codes.Finite-length performance simulation results of the 2D-SC-LDPC codes over the burst erasure channel confirm the excellent asymptotic performances. 展开更多
关键词 burst erasure channel SC-LDPC code density evolution decoding performance
下载PDF
A Hybrid ARQ System with Erasures Correction and Parity Retransmission
2
作者 L. GOLDFELD A. HOFMAN V. LYANDRES 《International Journal of Communications, Network and System Sciences》 2009年第7期619-626,共8页
A modified type of Hybrid ARQ system with erasures correction and parity bits retransmission is considered. Performance of the system is analyzed under assumption that the forward channel suffers from Nakagami common ... A modified type of Hybrid ARQ system with erasures correction and parity bits retransmission is considered. Performance of the system is analyzed under assumption that the forward channel suffers from Nakagami common fading and additive white Gaussian noise. A good agreement between theoretical results and simulation is achieved. The proposed ARQ protocol is compared with other known Hybrid ARQ algorithms. It demonstrates significantly higher throughput efficiency in a range of SNR. 展开更多
关键词 Hybrid ARQ Scheme erasures CORRECTION Decoding FADING Channel
下载PDF
Priority-Based Real-Time Stream Coding over Multi-Channel with Packet Erasures
3
作者 Yunkai Wei Qianyu Liu +1 位作者 Zhoucha Hu Yuming Mao 《China Communications》 SCIE CSCD 2017年第1期72-85,共14页
Multi-channel can be used to provide higher transmission ability to the bandwidth-intensive and delay-sensitive real-time streams. However, traditional channel capacity theories and coding schemes are seldom designed ... Multi-channel can be used to provide higher transmission ability to the bandwidth-intensive and delay-sensitive real-time streams. However, traditional channel capacity theories and coding schemes are seldom designed for the real-time streams with strict delay constraint, especially in multi-channel context. This paper considers a real-time stream system, where real-time messages with different importance should be transmitted through several packet erasure channels, and be decoded by the receiver within a fixed delay. Based on window erasure channels and i.i.d.(identically and independently distributed) erasure channels, we derive the Multi-channel Real-time Stream Transmission(MRST) capacity models for Symmetric Real-time(SR) streams and Asymmetric Real-time(AR) streams respectively. Moreover, for window erasures, a Maximum Equilibrium Intra-session Code(MEIC) is presented for SR and AR streams, and is shown able to asymptotically achieve the theoretical MRST capacity. For i.i.d. erasures, we propose an Adaptive Maximum Equilibrium Intra-session Code(AMEIC), and then prove AMEIC can closely approach the MRST transmission capacity. Finally, the performances of the proposed codes are verified by simulations. 展开更多
关键词 real-time stream MULTI-CHANNEL channel coding erasure model transmission capacity
下载PDF
Stable recovery of signals from frame coefficients with erasures at unknown locations 被引量:1
4
作者 Deguang Han Fusheng Lv Wenchang Sun 《Science China Mathematics》 SCIE CSCD 2018年第1期151-172,共22页
In an earlier work, we proposed a frame-based kernel analysis approach to the problem of recovering erasures from unknown locations. The new approach led to the stability question on recovering a signal from noisy par... In an earlier work, we proposed a frame-based kernel analysis approach to the problem of recovering erasures from unknown locations. The new approach led to the stability question on recovering a signal from noisy partial frame coefficients with erasures occurring at unknown locations. In this continuing work, we settle this problem by obtaining a complete characterization of frames that provide stable reconstructions. We show that an encoding frame provides a stable signal recovery from noisy partial frame coefficients at unknown locations if and only if it is totally robust with respect to erasures. We present several characterizations for either totally robust frames or almost robust frames. Based on these characterizations several explicit construction algorithms for totally robust and almost robust frames are proposed. As a consequence of the construction methods, we obtain that the probability for a randomly generated frame to be totally robust with respect to a fixed number of erasures is one. 展开更多
关键词 FRAMES erasures signal recovery almost robust frames totally robust frames
原文传递
AVirtual Cloud Storage Architecture for Enhanced Data Security
5
作者 M.Antony Joans Kumar C.Christopher Columbus +1 位作者 E.Ben George T.Ajith Bosco Raj 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1735-1747,共13页
The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and hackers.The proposed Virtual Cloud Storag... The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and hackers.The proposed Virtual Cloud Storage Archi-tecture is primarily concerned with data integrity and confidentiality,as well as availability.To provide confidentiality and availability,thefile to be stored in cloud storage should be encrypted using an auto-generated key and then encoded into distinct chunks.Hashing the encoded chunks ensured thefile integrity,and a newly proposed Circular Shift Chunk Allocation technique was used to determine the order of chunk storage.Thefile could be retrieved by performing the opera-tions in reverse.Using the regenerating code,the model could regenerate the missing and corrupted chunks from the cloud.The proposed architecture adds an extra layer of security while maintaining a reasonable response time and sto-rage capacity.Experimental results analysis show that the proposed model has been tested with storage space and response time for storage and retrieval.The VCSA model consumes 1.5x(150%)storage space.It was found that total storage required for the VCSA model is very low when compared with 2x Replication and completely satisfies the CIA model.The response time VCSA model was tested with different sizedfiles starting from 2 to 16 MB.The response time for storing and retrieving a 2 MBfile is 4.96 and 3.77 s respectively,and for a 16 MBfile,the response times are 11.06 s for storage and 5.6 s for retrieval. 展开更多
关键词 Erasure code regenerating code CRYPTOGRAPHY virtual cloud storage architecture circular shift chunk allocation algorithm
下载PDF
一种基于Erasure Code的分布式文件系统模型 被引量:6
6
作者 董科军 冯家宏 阎保平 《计算机工程》 EI CAS CSCD 北大核心 2005年第20期93-95,共3页
提出了一种基于Erasure code容错理论的分布式文件系统模型并对其关键技术进行了深入的研究和探讨。介绍了文件系统和分布式文件系统的概念,基于Erasure code理论提出了具有适度容错机制的分布式文件系统架构。详细讨论和分析了该系统... 提出了一种基于Erasure code容错理论的分布式文件系统模型并对其关键技术进行了深入的研究和探讨。介绍了文件系统和分布式文件系统的概念,基于Erasure code理论提出了具有适度容错机制的分布式文件系统架构。详细讨论和分析了该系统实现中涉及的一系列关键技术,最后简短描述了本模型的实现,并给出了其性能评价。 展开更多
关键词 文件系统 分布式系统 ERASURE CODE
下载PDF
基于Erasure Code的分割文件P2P存储结构设计 被引量:3
7
作者 陶钧 沙基昌 王晖 《国防科技大学学报》 EI CAS CSCD 北大核心 2008年第6期57-62,共6页
在充分考虑P2P存储特点的前提下,设计了一种新颖的基于Erasure Code的分割文件P2P存储方案,构建Chord协议上的P2P文件存储结构。通过设计有效的文件存储、访问和更新功能,克服传统Erasure Code冗余文件存储方案的不足,使存储文件具有一... 在充分考虑P2P存储特点的前提下,设计了一种新颖的基于Erasure Code的分割文件P2P存储方案,构建Chord协议上的P2P文件存储结构。通过设计有效的文件存储、访问和更新功能,克服传统Erasure Code冗余文件存储方案的不足,使存储文件具有一定的数据修改能力和结构伸缩能力。理论分析和实验仿真验证了设计方案在P2P存储系统中的可行性和有效性。 展开更多
关键词 P2P存储 ERASURE CODE 文件分割 存储策略
下载PDF
基于无比率限制纠错编码的内容分布网络的设计与实现 被引量:1
8
作者 王峰 钱华林 《计算机应用研究》 CSCD 北大核心 2005年第11期214-218,共5页
结合CDN和P2P两种不同网络结构的优点,改善传统内容分布网络的拓扑结构,给出了一种基于无比率限制纠错编码实现的P2P内容分布网络设计。介绍了该内容分布网络的系统结构及相关关键技术等方面内容,以及这种新内容分布网络的特性。
关键词 P2P CDN FEC(Forward Error Correction) Rateless ERASURE Codes MULTICAST
下载PDF
一种安全增强的容灾数据保护体制研究 被引量:1
9
作者 艾小川 余荣威 +2 位作者 夏静波 熊萍 王公宝 《微计算机信息》 2009年第24期44-46,共3页
本文在利用可信计算技术的基础上,结合分布式门限存储思想,提出了一种容灾系统的安全增强体制。该体制引用了嵌有可信平台模块的可信计算平台,这种具有安全存储、远程证明等优势特性的平台有效保证了容灾终端的高可信性;为了保障信息数... 本文在利用可信计算技术的基础上,结合分布式门限存储思想,提出了一种容灾系统的安全增强体制。该体制引用了嵌有可信平台模块的可信计算平台,这种具有安全存储、远程证明等优势特性的平台有效保证了容灾终端的高可信性;为了保障信息数据的存储安全性,则采用基于Erasure码的分布式门限存储的安全增强技术,该技术不仅能解决海量数据的存储问题,而且可以较好地防止单点失效、减轻在容灾过程中网络负载以及解决联合欺骗等安全问题。因此,通过应用这些安全增强技术,可以为容灾系统中的海量数据提供全面的安全保护。 展开更多
关键词 可信计算 门限存储 安全增强 Erasure码
下载PDF
SegEra:一种Erasure Code与分割相结合的P2P存储结构
10
作者 陶钧 沙基昌 王晖 《小型微型计算机系统》 CSCD 北大核心 2009年第7期1453-1457,共5页
基于Erasure Code编码冗余存储技术,结合传统的文件分割存储思想,提出称为SegEra的Erasure Code与分割相结合的P2P存储结构.研究了SegEra的文件构成方式和存储结构特性,讨论其所适合的索引化离散数据存储分布架构;然后,从理论上研究了Se... 基于Erasure Code编码冗余存储技术,结合传统的文件分割存储思想,提出称为SegEra的Erasure Code与分割相结合的P2P存储结构.研究了SegEra的文件构成方式和存储结构特性,讨论其所适合的索引化离散数据存储分布架构;然后,从理论上研究了SegEra的P2P存储节点选择的优化方案,并针对P2P存储环境特点设计了与之相适应的简化算法;并通过仿真实验表明SegEra采用简化节点选择算法能够有效的提高存储文件的可用性水平. 展开更多
关键词 P2P存储 ERASURE CODE 文件分割 存储结构
下载PDF
一种基于Erasure码的数据安全体制研究
11
作者 艾小川 熊萍 《舰船电子工程》 2009年第2期144-147,共4页
在利用可信计算技术的基础上,结合分布式门限存储思想,提出一种容灾系统的安全增强体制。该体制采用基于Erasure码的分布式门限存储的安全增强技术,不仅能解决海量数据的存储问题,而且可以较好地防止单点失效、减轻在容灾过程中网络负... 在利用可信计算技术的基础上,结合分布式门限存储思想,提出一种容灾系统的安全增强体制。该体制采用基于Erasure码的分布式门限存储的安全增强技术,不仅能解决海量数据的存储问题,而且可以较好地防止单点失效、减轻在容灾过程中网络负载以及解决联合欺骗等安全问题,通过应用这些安全增强技术,可以为容灾系统中的海量数据提供全面的安全保护。 展开更多
关键词 门限存储 Erasure码 可信计算 安全增强
下载PDF
基于Erasure Code的分布式文件存储系统 被引量:5
12
作者 潘利伟 谷建华 +1 位作者 朱靖飞 周志超 《计算机工程》 CAS CSCD 北大核心 2010年第17期45-47,共3页
在局域网环境下,实现一种基于Erasure Code的分布式文件存储系统。该系统由元数据服务器和多个文件存储节点组成,通过对元数据与文件数据分离存储以提高文件访问效率,将Erasure Code有效冗余存储技术应用于文件编解码以增强可靠性,采用... 在局域网环境下,实现一种基于Erasure Code的分布式文件存储系统。该系统由元数据服务器和多个文件存储节点组成,通过对元数据与文件数据分离存储以提高文件访问效率,将Erasure Code有效冗余存储技术应用于文件编解码以增强可靠性,采用MD5消息摘要技术保证文件完整性。对30 MB^600 MB大小的文件测试结果表明,该系统具有更高的可靠性、安全性以及资源利用率。 展开更多
关键词 分布式文件存储 ERASURE Code技术 编解码 高可靠
下载PDF
The Erasure of Signifiers and Refusal of Signification in Philip Larkin's Poem“High Window”
13
作者 刁俊春 《海外英语》 2013年第6X期195-197,共3页
This paper tries to analyze Philip Larkin's poem"High Window"from a deconstructive perspective. It is to show that in the poem the key words/signifiers are always under erasure, and thus the chain of sig... This paper tries to analyze Philip Larkin's poem"High Window"from a deconstructive perspective. It is to show that in the poem the key words/signifiers are always under erasure, and thus the chain of signification is endless since the poem is self-deconstructing. Then, the paper argues that the linguistic features of the poem paradoxically meaningful in the sense that it reflects the poet's skepticism and anxiety. 展开更多
关键词 "High Window" ERASURE REFUSAL SKEPTICISM ANXIETY
下载PDF
拜占庭环境下新成员加入容错组状态同步 被引量:2
14
作者 李传佑 汪芸 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第1期23-28,共6页
在主动复制技术下,为了容忍少量节点的拜占庭错误并提高组成员加入时状态同步的效率,提出了快速状态同步协议FSSP.FSSP利用Erasure Coding将状态数据分成P块,经过线性运算,编码成Q块(Q>P).新加入节点只需获得Q块中的任意P块数据即可... 在主动复制技术下,为了容忍少量节点的拜占庭错误并提高组成员加入时状态同步的效率,提出了快速状态同步协议FSSP.FSSP利用Erasure Coding将状态数据分成P块,经过线性运算,编码成Q块(Q>P).新加入节点只需获得Q块中的任意P块数据即可完成解码,获得状态数据.同时FSSP使用Hash技术屏蔽了拜占庭节点带来干扰.仿真实验结果表明:在100M bit/s以太网环境下,网络传输时延是系统的主要瓶颈,无论待同步状态数据驻留在内存还是硬盘中,FSSP均要优于直接同步协议DSSP.这是因为FSSP有效地减少了网络中传输的报文量,以少量的编解码计算代价换取了较大的网络传输时延,最终达到了加快状态同步过程的目的. 展开更多
关键词 ERASURE CODING 拜占庭错误 状态同步
下载PDF
基于Erasure code的实时流媒体传输系统 被引量:1
15
作者 王俊博 邢凯 《计算机应用与软件》 2017年第10期214-218,240,共6页
传统的流媒体传输系统需要一定规模的服务器群和集中式的带宽,在丢包问题中大部分采用丢包重传,即带ACK回执和重传的数据报文。提出一种新的容忍丢包和边缘服务器的传输方式,基于Erasure code的可恢复性,实现容忍丢包的发送接收模型。... 传统的流媒体传输系统需要一定规模的服务器群和集中式的带宽,在丢包问题中大部分采用丢包重传,即带ACK回执和重传的数据报文。提出一种新的容忍丢包和边缘服务器的传输方式,基于Erasure code的可恢复性,实现容忍丢包的发送接收模型。采用边缘计算的思想,将集中式的服务器群分散到任意主机上,通过动态地获取服务端地址,将实时数据流分成多块,经由不连续的边缘服务器进行转发,以降低对边缘服务器的带宽要求。可以根据边缘服务器的服务能力的不同分配传输数据量,达到动态的负载均衡。同时该系统具备隐私保护的功能。实验结果表明,该系统即使在较高丢包率和较差的网络环境下,仍然可以保证较低延迟的正常使用。 展开更多
关键词 ERASURE CODE 网络 流媒体 实时 边缘服务器 边缘计算
下载PDF
Frame erasure concealment in wideband speech coding based on large hidden Markov model
16
作者 王仕奎 汤一彬 +1 位作者 尤红岩 吴镇扬 《Journal of Southeast University(English Edition)》 EI CAS 2009年第2期152-155,共4页
Frame erasure concealment is studied to solve the problem of rapid speech quality reduction due to the loss of speech parameters during speech transmission. A large hidden Markov model is applied to model the immittan... Frame erasure concealment is studied to solve the problem of rapid speech quality reduction due to the loss of speech parameters during speech transmission. A large hidden Markov model is applied to model the immittance spectral frequency (ISF) parameters in AMR-WB codec to optimally estimate the lost ISFs based on the minimum mean square error (MMSE) rule. The estimated ISFs are weighted with the ones of their previous neighbors to smooth the speech, resulting in the actual concealed ISF vectors. They are used instead of the lost ISFs in the speech synthesis on the receiver. Comparison is made between the speech concealed by this algorithm and by Annex I of G. 722. 2 specification, and simulation shows that the proposed concealment algorithm can lead to better performance in terms of frequency-weighted spectral distortion and signal-to-noise ratio compared to the baseline method, with an increase of 2.41 dB in signal-to-noise ratio (SNR) and a reduction of 0. 885 dB in frequency-weighted spectral distortion. 展开更多
关键词 frame erasure concealment wideband speech large hidden Markov model immittance spectral frequency(ISF) parameter
下载PDF
Tree-Structured Parallel Regeneration for Multiple Data Losses in Distributed Storage Systems Based on Erasure Codes 被引量:5
17
作者 孙伟东 王意洁 裴晓强 《China Communications》 SCIE CSCD 2013年第4期113-125,共13页
To reduce the time required to complete the regeneration process of erasure codes, we propose a Tree-structured Parallel Regeneration (TPR) scheme for multiple data losses in distributed storage systems. Under the sch... To reduce the time required to complete the regeneration process of erasure codes, we propose a Tree-structured Parallel Regeneration (TPR) scheme for multiple data losses in distributed storage systems. Under the scheme, two algorithms are proposed for the construction of multiple regeneration trees, namely the edge-disjoint algorithm and edge-sharing algorithm. The edge-disjoint algorithm constructs multiple independent trees, and is simple and appropriate for environments where newcomers and their providers are distributed over a large area and have few intersections. The edge-sharing algorithm constructs multiple trees that compete to utilize the bandwidth, and make a better utilization of the bandwidth, although it needs to measure the available band-width and deal with the bandwidth changes; it is therefore difficult to implement in practical systems. The parallel regeneration for multiple data losses of TPR primarily includes two optimizations: firstly, transferring the data through the bandwidth optimized-paths in a pipe-line manner; secondly, executing data regeneration over multiple trees in parallel. To evaluate the proposal, we implement an event-based simulator and make a detailed comparison with some popular regeneration methods. The quantitative comparison results show that the use of TPR employing either the edge-disjoint algorithm or edge-sharing algorithm reduces the regeneration time significantly. 展开更多
关键词 distributed storage system erasure code REPLICATION regeneration tree
下载PDF
Network Coding Cooperation Performance Analysis in Wireless Network over a Lossy Channel, M Users and a Destination Scenario 被引量:7
18
作者 Mohamed El-Hihi Hani Attar +1 位作者 Ahmed A. A. Solyman Lina Stankovic 《Communications and Network》 2016年第4期257-280,共24页
Network coding (NC), introduced at the turn of the century, enables nodes in a network to combine data algebraically before either sending or forwarding them. Random network coding has gained popularity over the years... Network coding (NC), introduced at the turn of the century, enables nodes in a network to combine data algebraically before either sending or forwarding them. Random network coding has gained popularity over the years by combining the received packet randomly before forwarding them, resulting in a complex Jordan Gaussian Elimination (JGE) decoding process. The effectiveness of random NC is through cooperation among nodes. In this paper, we propose a simple, low-complexity cooperative protocol that exploits NC in a deterministic manner resulting in improved diversity, data rate, and less complex JGE decoding process. The proposed system is applied over a lossy wireless network. The scenario under investigation is as follows: M users must send their information to a common destination D and to exchange the information between each others, over erasure channels;typically the channels between the users and the destination are worse than the channels between users. It is possible to significantly reduce the traffic among users and destination, achieving significant bandwidth savings, by combining packets from different users in simple, deterministic ways without resorting to extensive header information before being forwarded to the destination and the M users. The key problem we try to address is how to efficiently combine the packets at each user while exploiting user cooperation and the probability of successfully recovering information from all users at D with k < 2M unique linear equations, accounting for the fact that the remaining packets will be lost in the network and there are two transmission stages. Simulation results show the behaviour for two and three transmission stages. Our results show that applying NC protocols in two or three stages decreases the traffic significantly, beside the fact that the proposed protocols enable the system to retrieve the lost packets rather than asking for ARQ, resulting in improved data flow, and less power consumption. In fact, in some protocols the ARQ dropped from the rate 10ˉ<sup>1</sup> to 10ˉ<sup>4</sup>, because of the proposed combining algorithm that enables the nodes to generate additional unique linear equations to broadcast rather than repeating the same ones via ARQ. Moreover, the number of the transmitted packets in each cooperative stage dropped from M (M - 1) to just M packets, resulting to 2 M packets instead 2 (M<sup>2</sup> - 1) when three stages of transmission system are used instead of one stage (two cooperative stages). 展开更多
关键词 Network Coding Cooperative System Erasure Channel Diversity
下载PDF
A Fault Detection Mechanism in Erasure-Code Byzantine Fault-Tolerance Quorum 被引量:1
19
作者 LIU Gang ZHOU Jingli SUN Yufen QIN Leihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1453-1456,共4页
Fault-tolerance is increasingly significant for large-scale storage systems in which Byzantine failure of storage nodes may happen. Traditional Byzantine Quorum systems that tolerate Byzantine failures by using replic... Fault-tolerance is increasingly significant for large-scale storage systems in which Byzantine failure of storage nodes may happen. Traditional Byzantine Quorum systems that tolerate Byzantine failures by using replication have two main limitations: low space-efficiency and static quorum variables. We propose an Erasure-code Byzantine Fault-tolerance Quorum that can provide high reliability with far lower storage overhead than replication by adopting erasure code as redundancy scheme. Through read/write operations of clients and diagnose operation of supervisor, our Quorum system can detect Byzantine nodes, and dynamically adjust system size and fault threshold. Simulation results show that our method improves performance for the Quorum with relatively small quorums. 展开更多
关键词 fault detection erasure code Byzantine fault-tolerance QUORUM
下载PDF
Performance Analysis and Parameter Optimizing Rules of LT Codes 被引量:1
20
作者 GUO Chunmei BI Xueya 《China Communications》 SCIE CSCD 2010年第4期103-107,共5页
As a new class of forward error correcting encoding algorithm,Luby Transform codes are suitable for the erasure channel environment based on the packet communication.The encoding,decoding algorithms and the implementa... As a new class of forward error correcting encoding algorithm,Luby Transform codes are suitable for the erasure channel environment based on the packet communication.The encoding,decoding algorithms and the implementation of LT codes are summarized in the paper.Meanwhile simulations of the ideal soliton distribution and robust soliton distribution are conducted to evaluate the performance of LT codes in terms of successful decoding probability,mean degree and decoding time over the erasure channel.The parameter optimization rules of LT codes are deeply discussed and proposed in the paper.The research results are of great practical importance for improving the real time performance in the erasure correction applications. 展开更多
关键词 Digital Fountain Codes LT Codes Degree Distribution Algorithm Erasure channel
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部