期刊文献+
共找到108篇文章
< 1 2 6 >
每页显示 20 50 100
A data-driven identification method for reaction rate constant and diffusion coefficient in the P2D model
1
作者 Gaoyang Li Xiaoyu Guo +8 位作者 Yongshuai Li Jialong Huang Zhirui Wang Yizheng Ma Litao Zhu Hui Pan Feng Shao Hao Ling Yulin Min 《Chinese Journal of Chemical Engineering》 2025年第12期188-197,共10页
To ensure the safe operation of batteries,accurately obtaining key internal state parameters is essential.However,traditional parameter measurement methods either require opening the battery or long-term measurements,... To ensure the safe operation of batteries,accurately obtaining key internal state parameters is essential.However,traditional parameter measurement methods either require opening the battery or long-term measurements,which are impractical.Therefore,the fixed values are commonly used for these parameters in electrochemical models and have significant limitations.To overcome these limitations,this paper proposes a deep neural network(DNN)based data-driven evaluation method to determine model parameters.By coupling an improved one-dimensional isothermal pseudo-twodimensional(P2D)model with DNN,this study identified concentration-dependent parameters through detailed discharge curve analysis.The results show that the data-driven method can effectively obtain the change trend of concentration-dependent parameters through the charge and discharge curve,and the method can be extended to different battery systems in different discharge rates and aging applications.This work is expected to provide new parameter selection insights for data-driven battery prediction and monitoring models. 展开更多
关键词 Internal state parameters of batteries p2D model parameter identification Deep neural network(DNN) Data-driven evaluation method
在线阅读 下载PDF
P2P与Grid的结合:P2P-Grid模型研究 被引量:8
2
作者 叶从欢 江武汉 孙世新 《微型机与应用》 北大核心 2005年第5期4-6,45,共4页
分析P2P和网格技术各自的特点,对超级Peer内部的资源模型进行了讨论,提出了全局P2P-Grid网格资源组织模型。
关键词 p2p-grid模型 网格技术 资源组织 资源发现 资源调度 超级peer
在线阅读 下载PDF
P-Grid:一种高效的自组织P2P系统 被引量:2
3
作者 张洪军 《计算机工程与设计》 CSCD 北大核心 2006年第24期4767-4769,共3页
P2P(peertopeer)技术在分布计算时代发挥着越来越重要的作用,但在数据管理方面,P2P的应用表现出较大的局限性。作为一种快速高效的P2P信息系统P-Grid,它能够极大地减少其它P2P系统所需要的网络带宽。P-Grid系统的构造和维护严格依照本... P2P(peertopeer)技术在分布计算时代发挥着越来越重要的作用,但在数据管理方面,P2P的应用表现出较大的局限性。作为一种快速高效的P2P信息系统P-Grid,它能够极大地减少其它P2P系统所需要的网络带宽。P-Grid系统的构造和维护严格依照本地交互的随机算法,即使在不可靠的节点也能提供可靠的访问,并且能够较好地衡量存取和通信代价。 展开更多
关键词 p2p p-grid 节点 搜索 模型
在线阅读 下载PDF
P2P-Grid环境中基于流言传播的资源查找方法研究
4
作者 王瑞锋 刘方爱 《计算机工程与设计》 CSCD 北大核心 2008年第1期56-58,108,共4页
对两层结构的P2P-Grid网格模型进行了改进,在超级节点层上增加了分类节点层,即选择超级节点中性能较高的节点存放分类信息。给出了基于流言传播机制的分布式资源查找算法,该算法利用流言传播机制具有传播流言的兴趣随着重复收到某个流... 对两层结构的P2P-Grid网格模型进行了改进,在超级节点层上增加了分类节点层,即选择超级节点中性能较高的节点存放分类信息。给出了基于流言传播机制的分布式资源查找算法,该算法利用流言传播机制具有传播流言的兴趣随着重复收到某个流言而减少的特点,避免某个节点处理查找信息的负载过大,实现负载平衡,并与传统的泛洪算法进行了比较。模拟实验证明该算法能够缩短资源请求的响应时间,并且减少网格通信开销。 展开更多
关键词 p2p—Grid模型 超级节点 分类节点 泛洪机制 流言传播机制 广播开销
在线阅读 下载PDF
METrust: A Mutual Evaluation-based Trust Model for P2P Networks 被引量:3
5
作者 Chun-Ling Cheng Xiao-Long Xu Bing-Zhen Gao 《International Journal of Automation and computing》 EI 2012年第1期63-71,共9页
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only fo... It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors. 展开更多
关键词 peer-to-peer p2p network REpUTATION trust model mutual evaluation similarity risk
在线阅读 下载PDF
Mathematical Model Validation of Search Protocols in MP2P Networks 被引量:1
6
作者 Ajay Arunachalam Vinayakumar Ravi +2 位作者 Moez Krichen Roobaea Alroobaea Saeed Rubaiee 《Computers, Materials & Continua》 SCIE EI 2021年第8期1807-1829,共23页
Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received pa... Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive flooding technique,floods the network with query messages,while the random walk technique operates by contacting the subsets of every node’s neighbors at each step,thereby restricting the search space.One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource.Many earlier works have mainly focused on the simulation-based analysis of flooding,and its variants under a wired network.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of P2P systems running over MANET.In this paper,we describe how P2P resource discovery protocols perform badly over MANETs.To address the limitations,we propose a new protocol named ABRW(Address Broadcast Random Walk),which is a lightweight search approach,designed considering the underlay topology aimed to better suit the unstructured architecture.We provide the mathematical model,measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques.Further,we also derive three relevant search performance metrics,i.e.,mean no.of steps needed to find a resource,the probability of finding a resource,and the mean no.of message overhead.We validated the analytical expressions through simulations.The simulation results closely matched with our analyticalmodel,justifying our findings.Our proposed search algorithm under such highly dynamic self-evolving networks performed better,as it reduced the search latency,decreased the overall message overhead,and still equally had a good success rate. 展开更多
关键词 Search protocols random walk MANET p2p networks p2p MANET mathematical model peer-to-peer wireless ad hoc network FLOODING mobile p2p UNSTRUCTURED p2p NS-2 network simulator
在线阅读 下载PDF
Cluster based hierarchical resource searching model in P2P network 被引量:1
7
作者 Yang Ruijuan Liu Jian Tian Jingwen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期188-194,共7页
For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P... For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P network, auto-organizes logical layers, and applies a hybrid mechanism of directional searching and flooding. The performance analysis and simulation results show that the proposed hierarchical searching model has availably reduced the generated message load and that its searching-response time performance is as fairly good as that of the Gnutella model. 展开更多
关键词 Communication and information system Resource-searching model in p2p network GNUTELLA CLUSTER Hierarchical network
在线阅读 下载PDF
A process model on P2P lending 被引量:1
8
作者 Huaiqing Wang Kun Chen +1 位作者 Wei Zhu Zhenxia Song 《Financial Innovation》 2015年第1期11-18,共8页
Background:Online peer-to-peer lending(P2P lending)is booming as the popularity of e-finance.To develop a conceptual model for the P2P lending process is great valuable for managers to tack the issues of marketing,man... Background:Online peer-to-peer lending(P2P lending)is booming as the popularity of e-finance.To develop a conceptual model for the P2P lending process is great valuable for managers to tack the issues of marketing,management and operation.Methods:In this paper,we focus on the P2P lending process model and provide a comparative analysis comparing with traditional bank loan process.Results:Firstly,our model shows that the information flow in P2P lending is more frequent and transparent.Secondly,the model reveals that P2P lending uses a quite different credit audition method,which relies on information and the decision model in the P2P systems.Thirdly,the loan management is not complete normally in P2P lending,because most P2P companies do not have the post-loan records of borrowers.Conclusions:These findings inspire future studies and practices on P2P lending process and key technologies. 展开更多
关键词 p2p landing E-finance process model
在线阅读 下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
9
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 Information privacy propagation model EMAIL peer-to-peer p2p
在线阅读 下载PDF
Epidemiological modeling of passive worm propagation on the P2P file-sharing network
10
作者 Feng Chaosheng Qin Zhiguang +1 位作者 Laurissa Tokarchuk Muhammad Adeel 《High Technology Letters》 EI CAS 2011年第3期230-235,共6页
The peer-to-peer(P2P) file-sharing network as a vehicle of disseminating files has become very popular. The appearance of dozens of kinds of passive worms on this network has, however, made it unsecured. This proble... The peer-to-peer(P2P) file-sharing network as a vehicle of disseminating files has become very popular. The appearance of dozens of kinds of passive worms on this network has, however, made it unsecured. This problem has been paid attention and a few of models for passive worm propagation has been presented. Unfortunately, the dynamic properties of this network are ignored in these models. Given the fact, the characteristics of both this network and the passive worm are identified, and on this basis a new mathematical model of passive worm propagation on the P2P network is presented in applying epidemiology in this paper. Note that the dynamic properties of this network are considered in the presented model. The model has been validated by large scale simulation experiments, which demonstrates that the presented model may be used for analyzing the behaviors of passive worms and predicting the trend of their propagation. 展开更多
关键词 passive worms pROpAGATION modeling p2p networks FILE-SHARING simulation
在线阅读 下载PDF
Facile Synthesis of 2, 2-Disubstituted IndanesInitiated by an NAD(P)H Model
11
《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 1999年第S1期261-261,共1页
关键词 Disubstituted IndanesInitiated by an NAD Facile Synthesis of 2 p)H model
在线阅读 下载PDF
Modeling active worm propagation on the P2P network
12
作者 吴国政 Feng Chaosheng Zhlguang Qin 《High Technology Letters》 EI CAS 2012年第4期406-411,共6页
This paper analyzes the characteristics of the Peer-to-Peer (P2P) active worm and its attacking mechanism, and then proposes a mathematical model of propagation of the P2P active worm applying Epidemiology. Based on... This paper analyzes the characteristics of the Peer-to-Peer (P2P) active worm and its attacking mechanism, and then proposes a mathematical model of propagation of the P2P active worm applying Epidemiology. Based on the analysis on the protocols of realistic P2P systems, a software which can be used to simulate the P2P network environment and the propagation of P2P active worm is imple- mented in this paper. A large number of simulation experiments are performed using the developed simulation software. The results from these simulation experiments validate the proposed model, which means that the model can be used to analyze the spreading behaviors of the P2P active worm and predict its trend. 展开更多
关键词 active worms peer-to-peer p2p networks modelING simulations
在线阅读 下载PDF
Peer selecting model based on FCM for wireless distributed P2P files sharing systems
13
作者 李曦 纪红 郑瑞明 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2010年第5期593-599,共7页
IIn order to improve the performance of wireless distributed peer-to-peer(P2P)files sharing systems,a general system architecture and a novel peer selecting model based on fuzzy cognitive maps(FCM)are proposed in this... IIn order to improve the performance of wireless distributed peer-to-peer(P2P)files sharing systems,a general system architecture and a novel peer selecting model based on fuzzy cognitive maps(FCM)are proposed in this paper.The new model provides an effective approach on choosing an optimal peer from several resource discovering results for the best file transfer.Compared with the traditional min-hops scheme that uses hops as the only selecting criterion,the proposed model uses FCM to investigate the complex relationships among various relative factors in wireless environments and gives an overall evaluation score on the candidate.It also has strong scalability for being independent of specified P2P resource discovering protocols.Furthermore,a complete implementation is explained in concrete modules.The simulation results show that the proposed model is effective and feasible compared with min-hops scheme,with the success transfer rate increased by at least 20% and transfer time improved as high as 34%. 展开更多
关键词 wireless p2p files sharing systems peer selecting model fuzzy cognitive maps
在线阅读 下载PDF
Novel Cyclization of 2-(o-Bromomethyl)benzylidene-1,3-indandione to 7,12-Dihydro-1-oxoindeno [3,2-c] [2]benzooxepine Initiated by an NAD(P)H Model:New Strategy to Seven-membered Oxacycle
14
《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 1999年第S1期262-262,共1页
关键词 benzooxepine Initiated by an NAD o-Bromomethyl)benzylidene-1 3-indandione to 7 12-Dihydro-1-oxoindeno p)H model Novel Cyclization of 2
在线阅读 下载PDF
P2P Model Based on Isolated Broadcast Domains
15
作者 Jianchun Li Gongbing Guo +1 位作者 Jianyong Li Daoying Huang 《Advances in Internet of Things》 2012年第3期74-77,共4页
Resource location is the most important issue for Peer-to-Peer (P2P) system and flooding is the fundamental mechanism for unstructured P2P systems. Redundant messages will exponential growth with flooding scope increa... Resource location is the most important issue for Peer-to-Peer (P2P) system and flooding is the fundamental mechanism for unstructured P2P systems. Redundant messages will exponential growth with flooding scope increasing which severely influences the scalability of the system. In this paper, a new P2P model based on isolated broadcast domains is given to reduce the amount of redundant messages by limiting the radius of messages transmitted. Analysis and experiments show that this model can guarantee coverage of nodes and significantly reduce the amount of redundant messages generated. 展开更多
关键词 p2p model ISOLATED BROADCAST DOMAINS REDUNDANT MESSAGES
在线阅读 下载PDF
一种基于层次化兴趣的非结构化P2P拓扑形成模型 被引量:18
16
作者 周晓波 周健 +1 位作者 卢汉成 洪佩琳 《软件学报》 EI CSCD 北大核心 2007年第12期3131-3138,共8页
在非结构化P2P系统中有两个根本性的问题需要研究:拓扑的自动生成和查询算法.其中前者更为重要:虽然查询算法通常是独立于拓扑结构的,但一个结构良好的拓扑会极大地改善查询算法的性能.提出一种基于层次化兴趣表达的拓扑生成模型(self a... 在非结构化P2P系统中有两个根本性的问题需要研究:拓扑的自动生成和查询算法.其中前者更为重要:虽然查询算法通常是独立于拓扑结构的,但一个结构良好的拓扑会极大地改善查询算法的性能.提出一种基于层次化兴趣表达的拓扑生成模型(self adaptive community-based model,简称SACM).在这种模型里,每个节点由自身的资源整体类型倾向决定自己的兴趣(interest),并且采用树形结构来表达兴趣;然后节点由兴趣产生一个二进制序列的CID(community ID),CID将成为拓扑形成的主要依据——具有相近CID的节点能聚集成一个连通性较高的子图(社区).SACM不仅提供了生成聚类拓扑的算法,更为重要的是,它通过兴趣的定义及维护从统计上在资源和网络拓扑之间建立了联系.是否存在这种联系正是结构化P2P于非结构化P2P的本质区别. 展开更多
关键词 SACM(selfadaptive COMMUNITY-BASED model) 非构化p2p 兴趣 小世界
在线阅读 下载PDF
雌激素及雌激素受体拮抗剂对乳腺癌信号传导通路中MEK-2和p-ERK病理形态的影响 被引量:11
17
作者 孙慧 张静 +2 位作者 战忠利 孙保存 郝希山 《中国肿瘤临床》 CAS CSCD 北大核心 2008年第4期219-223,共5页
目的:探讨乳腺癌中雌激素受体与细胞信号传导通路MAPK上游激酶MEK-2和下游激酶p-ERK的作用机制。方法:应用雌激素(雌二醇)与雌激素受体拮抗剂(三苯氧胺)诱导BCML-TA299小鼠原位移植乳腺癌组织,通过病理形态学、免疫组织化学法检测ERβ、... 目的:探讨乳腺癌中雌激素受体与细胞信号传导通路MAPK上游激酶MEK-2和下游激酶p-ERK的作用机制。方法:应用雌激素(雌二醇)与雌激素受体拮抗剂(三苯氧胺)诱导BCML-TA299小鼠原位移植乳腺癌组织,通过病理形态学、免疫组织化学法检测ERβ、MEK-2和p-ERK的表达。结果:雌二醇(E2)促进细胞增殖,核分裂多见,肿瘤有丰富的血管,第20天时肺组织中血管腔及心腔内可见大量瘤栓。E2可激活MEK-2,p-ERK明显上调,ERβ与其基因有协同作用;而三苯氧胺(TAM)抑制细胞增殖,癌细胞明显受到损伤,核碎裂、凋亡小体多见,可见多灶性变性坏死区。同时出现ERβ、MEK-2和p-ERK下调,亦有协同作用。三苯氧胺与环磷酰胺联合应用效应优于单药的应用(F=211.88,F=179.08,F=156.44;P<0.05)。结论:ERβ与MAPK信号途径中上游激酶MEK-2和下游激酶p-ERK关系密切,并有协同作用,是乳腺癌发展中重要的调节信号。 展开更多
关键词 乳腺癌 ERΒ MEK-2 p-ERK 动物模型
暂未订购
一种基于P2P的PKI体系 被引量:3
18
作者 李之棠 陈福生 《计算机工程与科学》 CSCD 2006年第9期1-3,32,共4页
利用公钥基础设施PKI来解决网络通信中的信息安全问题日渐普及,但目前的PKI大多为集中式,存在扩展性较差、单点失效等缺陷。针对这些问题,本文提出了一种基于P2P的非集中式PKI体系,并在一个具体的P2P查询技术P-Grid的基础上给出了新体... 利用公钥基础设施PKI来解决网络通信中的信息安全问题日渐普及,但目前的PKI大多为集中式,存在扩展性较差、单点失效等缺陷。针对这些问题,本文提出了一种基于P2P的非集中式PKI体系,并在一个具体的P2P查询技术P-Grid的基础上给出了新体系的实现方法。 展开更多
关键词 pKI 信息安全 p2p p-grid
在线阅读 下载PDF
川芎嗪在Caco-2细胞单层模型的转运特征及对P-糖蛋白表达的影响 被引量:13
19
作者 杨雯 周惠芬 +3 位作者 杨洁红 张宇燕 来丽丽 万海同 《中草药》 CAS CSCD 北大核心 2013年第5期581-585,共5页
目的研究川芎嗪在Caco-2细胞单层模型的转运特征以及对P-糖蛋白(P-gp)表达的影响。方法 MTT法确定川芎嗪对Caco-2细胞单层模型作用的安全浓度范围;以Caco-2细胞单层模型研究川芎嗪的双向转运机制,以表观渗透系数(Papp)为检测指标,考察... 目的研究川芎嗪在Caco-2细胞单层模型的转运特征以及对P-糖蛋白(P-gp)表达的影响。方法 MTT法确定川芎嗪对Caco-2细胞单层模型作用的安全浓度范围;以Caco-2细胞单层模型研究川芎嗪的双向转运机制,以表观渗透系数(Papp)为检测指标,考察时间、药物浓度以及P-gp抑制剂维拉帕米对川芎嗪转运的影响;Western blotting法检测川芎嗪对P-gp表达的影响。结果从顶侧(AP)到底侧(BL)(AP→BL),川芎嗪的Papp>10 6cm/s,表明其吸收性良好;川芎嗪的转运量与其浓度和时间呈正相关,且川芎嗪AP→BL的转运量明显大于BL→AP的转运量;川芎嗪不仅受到P-gp的外排作用,同时也抑制P-gp表达。结论川芎嗪在Caco-2细胞模型的转运方式为被动转运,且受到P-gp的外排作用,并对P-gp的表达有抑制作用。 展开更多
关键词 川芎嗪 吸收机制 CACO-2细胞单层模型 p-糖蛋白 被动转运
原文传递
异补骨脂素对人皮肤角质形成细胞光老化模型p-ERK1/2及炎症因子影响 被引量:10
20
作者 杨柳 王业秋 +1 位作者 张宁 李建民 《中药新药与临床药理》 CAS CSCD 北大核心 2016年第6期775-778,共4页
目的研究异补骨脂素对人皮肤角质形成细胞(Ha Ca T)光老化模型p-ERK1/2表达的影响及对光老化细胞分泌的白介素1α(IL-1α)、肿瘤坏死因子-α(TNF-α)等炎症因子的影响。方法使用照射强度为0.61m W·cm^(-2),照射时间为5min的UVB,建... 目的研究异补骨脂素对人皮肤角质形成细胞(Ha Ca T)光老化模型p-ERK1/2表达的影响及对光老化细胞分泌的白介素1α(IL-1α)、肿瘤坏死因子-α(TNF-α)等炎症因子的影响。方法使用照射强度为0.61m W·cm^(-2),照射时间为5min的UVB,建立光老化模型;雌二醇(阳性对照)及异补骨脂素(10^(-7),10^(-6),10-5 mol·L^(-1))处理光老化模型。MTT法检测细胞的活性;GSH、LDH及MDA试剂盒检测雌二醇及不同浓度异补骨脂素对细胞氧化酶活性的影响;Western Blot法检测雌二醇及不同浓度的异补骨脂素对细胞p-ERK1/2、IL-1α及TNF-α蛋白表达量的影响。结果与空白组比较,模型组GSH活性降低,LDH活性升高,MDA含量升高,p-ERK1/2、IL-1α及TNF-α蛋白表达量升高(P<0.01,P<0.05);与模型组比较,雌二醇及不同浓度异补骨脂素可以显著的升高GSH的活性,降低LDH活性,降低MDA含量,降低p-ERK1/2、IL-1α及TNF-α蛋白表达量(P<0.01,P<0.05)。结论异补骨脂素可通过抑制ERK磷酸化,抑制炎症因子的分泌。 展开更多
关键词 异补骨脂素 HACAT 光老化模型 p-ERK1/2 炎症因子
原文传递
上一页 1 2 6 下一页 到第
使用帮助 返回顶部