期刊文献+
共找到894篇文章
< 1 2 45 >
每页显示 20 50 100
HIGH RESOLUTION PARAMETRIC MODELLING FOR TWO-DIMENSIONAL RADAR TARGET USING PRONY ALGORITHM 被引量:2
1
作者 Wang Jun (Institute of Electronic Engineering, Chinese Academy of Engineering and Physics, Mianyang 621900) 《Journal of Electronics(China)》 2000年第1期38-45,共8页
On the conditions of low-resolution radar, a parametric model for two-dimensional radar target is described here according to the theory of electromagnetic scattering and the geometrical theory of diffraction. A high ... On the conditions of low-resolution radar, a parametric model for two-dimensional radar target is described here according to the theory of electromagnetic scattering and the geometrical theory of diffraction. A high resolution estimation algorithm to extract the model parameters is also developed by building the relation of the scattering model and Prony model. The analysis of Cramer-Rao bound and simulation show that the method here has better statistical performance. The simulated analysis also indicates that the accurate extraction of the diffraction coefficient of scattering center is restricted by signal to noise ratio, radar center frequency and radar bandwidth. 展开更多
关键词 two-dimensional RADAR SCATTERING center attributes PARAMETRIC modelling PRONY algorithm RESOLUTION
在线阅读 下载PDF
Two-dimensional cross entropy multi-threshold image segmentation based on improved BBO algorithm 被引量:2
2
作者 LI Wei HU Xiao-hui WANG Hong-chuang 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2018年第1期42-49,共8页
In order to improve the global search ability of biogeography-based optimization(BBO)algorithm in multi-threshold image segmentation,a multi-threshold image segmentation based on improved BBO algorithm is proposed.Whe... In order to improve the global search ability of biogeography-based optimization(BBO)algorithm in multi-threshold image segmentation,a multi-threshold image segmentation based on improved BBO algorithm is proposed.When using BBO algorithm to optimize threshold,firstly,the elitist selection operator is used to retain the optimal set of solutions.Secondly,a migration strategy based on fusion of good solution and pending solution is introduced to reduce premature convergence and invalid migration of traditional migration operations.Thirdly,to reduce the blindness of traditional mutation operations,a mutation operation through binary computation is created.Then,it is applied to the multi-threshold image segmentation of two-dimensional cross entropy.Finally,this method is used to segment the typical image and compared with two-dimensional multi-threshold segmentation based on particle swarm optimization algorithm and the two-dimensional multi-threshold image segmentation based on standard BBO algorithm.The experimental results show that the method has good convergence stability,it can effectively shorten the time of iteration,and the optimization performance is better than the standard BBO algorithm. 展开更多
关键词 two-dimensional cross entropy biogeography-based optimization(BBO)algorithm multi-threshold image segmentation
在线阅读 下载PDF
Design of a Two-dimensional Recursive Filter Using the Bees Algorithm 被引量:1
3
作者 D.T.Pham Ebubekir Koc 《International Journal of Automation and computing》 EI 2010年第3期399-402,共4页
This paper presents the first application of the bees algorithm to the optimisation of parameters of a two-dimensional (2D) recursive digital filter. The algorithm employs a search technique inspired by the foraging... This paper presents the first application of the bees algorithm to the optimisation of parameters of a two-dimensional (2D) recursive digital filter. The algorithm employs a search technique inspired by the foraging behaviour of honey bees. The results obtained show clear improvement compared to those produced by the widely adopted genetic algorithm (GA). 展开更多
关键词 Bees algorithm swarm intelligence optimisation two-dimensional digital filter design.
在线阅读 下载PDF
A Two-dimensional Genetic Algorithm Based on the Eno-Haar Wavelet Transform
4
作者 宋锦萍 赵晨萍 李登峰 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2007年第3期377-383,共7页
A two-dimensional genetic algorithm of wavelet coefficient is presented by using the ENO wavelet transform and the decomposed characterization of the two-dimensional Haar wavelet. And simulated by the ENO interpolatio... A two-dimensional genetic algorithm of wavelet coefficient is presented by using the ENO wavelet transform and the decomposed characterization of the two-dimensional Haar wavelet. And simulated by the ENO interpolation the article shows the affectivity and the superiority of this algorithm. 展开更多
关键词 wavelet transform ENO-Haar wavelet transform two-dimensional genetic algorithm
在线阅读 下载PDF
基于Python语言和Hash算法的双关键字查找算法应用研究
5
作者 卢志刚 陈平 《安徽水利水电职业技术学院学报》 2025年第1期43-48,共6页
大数据量环境下,在2个二维表之间进行双关键字等值查找是一项挑战。传统的顺序查找算法在这种情况下效率较低。二分查找算法虽然更高效,但在处理大规模及非排序数据时仍有局限性。针对这一问题,文章提出了一种基于Hash算法的查找方法,... 大数据量环境下,在2个二维表之间进行双关键字等值查找是一项挑战。传统的顺序查找算法在这种情况下效率较低。二分查找算法虽然更高效,但在处理大规模及非排序数据时仍有局限性。针对这一问题,文章提出了一种基于Hash算法的查找方法,并使用Python语言开发了使用该算法的软件。对比分析结果表明,该方法在处理大规模数据时,相比传统顺序查找和二分查找,不仅简化了实现过程,而且显著提高了查找效率。 展开更多
关键词 二维表 hash table 查找算法
在线阅读 下载PDF
A Review of Image Steganography Based on Multiple Hashing Algorithm 被引量:1
6
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
在线阅读 下载PDF
Study on An Absolute Non-Collision Hash and Jumping Table IP Classification Algorithms
7
作者 SHANG Feng-jun 1,2 ,PAN Ying-jun 1 1. Key Laboratory of Opto-Electronic Technology and System of Ministry of Education/College of Opto-Electronic Engineering,Chongqing University, Chongqing 400044,China 2. College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065,China 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期835-838,共4页
In order to classify packet, we propose a novel IP classification based the non-collision hash and jumping table trie-tree (NHJTTT) algorithm, which is based on noncollision hash Trie-tree and Lakshman and Stiliadis p... In order to classify packet, we propose a novel IP classification based the non-collision hash and jumping table trie-tree (NHJTTT) algorithm, which is based on noncollision hash Trie-tree and Lakshman and Stiliadis proposing a 2-dimensional classification algorithm (LS algorithm). The core of algorithm consists of two parts: structure the non-collision hash function, which is constructed mainly based on destination/source port and protocol type field so that the hash function can avoid space explosion problem; introduce jumping table Trie-tree based LS algorithm in order to reduce time complexity. The test results show that the classification rate of NHJTTT algorithm is up to 1 million packets per second and the maximum memory consumed is 9 MB for 10 000 rules. Key words IP classification - lookup algorithm - trie-tree - non-collision hash - jumping table CLC number TN 393.06 Foundation item: Supported by the Chongqing of Posts and Telecommunications Younger Teacher Fundation (A2003-03).Biography: SHANG Feng-jun (1972-), male, Ph.D. candidate, lecture, research direction: the smart instrument and network. 展开更多
关键词 IP classification lookup algorithm trie-tree non-collision hash jumping table
在线阅读 下载PDF
Vertical two-dimensional non-hydrostatic pressure model with single layer
8
作者 康玲 郭晓明 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2013年第6期721-730,共10页
The vertical two-dimensional non-hydrostatic pressure models with multiple layers can make prediction more accurate than those obtained by the hydrostatic pres- sure assumption. However, they are time-consuming and un... The vertical two-dimensional non-hydrostatic pressure models with multiple layers can make prediction more accurate than those obtained by the hydrostatic pres- sure assumption. However, they are time-consuming and unstable, which makes them unsuitable for wider application. In this study, an efficient model with a single layer is developed. Decomposing the pressure into the hydrostatic and dynamic components and integrating the x-momentum equation from the bottom to the free surface can yield a horizontal momentum equation, in which the terms relevant to the dynamic pressure are discretized semi-implicitly. The convective terms in the vertical momentum equation are ignored, and the rest of the equation is approximated with the Keller-box scheme. The velocities expressed as the unknown dynamic pressure are substituted into the continuity equation, resulting in a tri-diagonal linear system solved by the Thomas algorithm. The validation of solitary and sinusoidal waves indicates that the present model can provide comparable results to the models with multiple layers but at much lower computation cost. 展开更多
关键词 vertical two-dimensional model non-hydrostatic pressure single layer Thomas algorithm WAVE
在线阅读 下载PDF
Numeric Identifier Transmission Algorithm Using Hash Function
9
作者 Vladyslav Kutsman 《Open Journal of Applied Sciences》 2023年第9期1581-1587,共7页
When developing programs or websites, it is very convenient to use relational databases, which contain powerful and convenient tools that allow to work with data very flexibly and get the necessary information in a ma... When developing programs or websites, it is very convenient to use relational databases, which contain powerful and convenient tools that allow to work with data very flexibly and get the necessary information in a matter of milliseconds. A relational database consists of tables and records in these tables, each table must have a primary key, in particular, it can be a number of BIGINT type, which is a unique index of a record in the table, which allows to fetch operation with maximum speed and O (1) complexity. After the operation of writing a row to the table of database, the program receives the row identifier ID in the form of a number, and in the future this ID can be used to obtain this record. In the case of a website, this could be the GET method of the http protocol with the entry ID in the request. But very often it happens that the transmission of an identifier in the clear form is not safe, both for business reasons and for security reasons of access to information. And in this case, it is necessary to create additional functionality for checking access rights and come up with a way to encode data in such a way that it would be impossible to determine the record identifier, and this, in turn, leads to the fact that the program code becomes much more complicated and also increases the amount of data, necessary to ensure the operation of the program. This article presents an algorithm that solves these problems “on the fly” without complicating the application logic and does not require resources to store additional information. Also, this algorithm is very reliable since it is based on the use of hash functions and synthesized as a result of many years of work related to writing complex systems that require an increased level of data security and program performance. 展开更多
关键词 CRYPTOGRAPHY Security CODING hash Functions algorithmS Fintech BANKING Golang POSTGRESQL
在线阅读 下载PDF
Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm
10
作者 Dognery Sinaly Silue Wanggen Wan Muhammad Rizwan 《Open Journal of Applied Sciences》 2016年第13期893-902,共10页
With the rapid development of information technology, demand of network & information security has increased. People enjoy many benefits by virtue of information technology. At the same time network security has b... With the rapid development of information technology, demand of network & information security has increased. People enjoy many benefits by virtue of information technology. At the same time network security has become the important challenge, but network information security has become a top priority. In the field of authentication, dynamic password technology has gained users’ trust and favor because of its safety and ease of operation. Dynamic password, SHA (Secure Hash Algorithm) is widely used globally and acts as information security mechanism against potential threat. The cryptographic algorithm is an open research area, and development of these state-owned technology products helps secure encryption product and provides safeguard against threats. Dynamic password authentication technology is based on time synchronization, using the state-owned password algorithm. SM3 hash algorithm can meet the security needs of a variety of cryptographic applications for commercial cryptographic applications and verification of digital signatures, generation and verification of message authentication code. Dynamic password basically generates an unpredictable random numbers based on a combination of specialized algorithms. Each password can only be used once, and help provide high safety. Therefore, the dynamic password technology for network information security issues is of great significance. In our proposed algorithm, dynamic password is generated by SM3 Hash Algorithm using current time and the identity ID and it varies with time and changes randomly. Coupled with the SM3 hash algorithm security, dynamic password security properties can be further improved, thus it effectively improves network authentication security. 展开更多
关键词 Dynamic Password Authentication SM3 hash algorithm Network Authentication Security One Time Password
在线阅读 下载PDF
Hash-based FDI attack-resilient distributed self-triggered secondary frequency control for islanded microgrids
11
作者 Xing Huang Yulin Chen +4 位作者 Donglian Qi Yunfeng Yan Shaohua Yang Ying Weng Xianbo Wang 《Global Energy Interconnection》 2025年第1期1-12,共12页
Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sam... Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sampling time period inevitably causes the wasteful use of communication resources.This paper proposes a self-triggered secondary control scheme under perturbations from false data injection(FDI)attacks.We designed a linear clock for each DG to trigger its controller at aperiodic and intermittent instants.Sub-sequently,a hash-based defense mechanism(HDM)is designed for detecting and eliminating malicious data infiltrated in the MGs.With the aid of HDM,a self-triggered control scheme achieves the secondary control objectives even in the presence of FDI attacks.Rigorous theoretical analyses and simulation results indicate that the introduced secondary control scheme significantly reduces communication costs and enhances the resilience of MGs under FDI attacks. 展开更多
关键词 MICROGRIDS Distributed secondary control Self-triggered control hash algorithms False data injection attack
在线阅读 下载PDF
基于聚类和一致Hash的数据布局算法 被引量:17
12
作者 陈涛 肖侬 +1 位作者 刘芳 付长胜 《软件学报》 EI CSCD 北大核心 2010年第12期3175-3185,共11页
如何有效地对数据进行布局是大规模网络存储系统面临的重大挑战,需要一种能够自适应存储规模变化、公平有效的数据布局算法.提出的CCHDP(clustering-based and consistent hashing-aware data placement)算法将聚类算法与一致hash方法... 如何有效地对数据进行布局是大规模网络存储系统面临的重大挑战,需要一种能够自适应存储规模变化、公平有效的数据布局算法.提出的CCHDP(clustering-based and consistent hashing-aware data placement)算法将聚类算法与一致hash方法相结合,引入少量的虚拟设备,极大地减少了存储空间.理论和实验证明,CCHDP算法可以按照设备的权重公平地分布数据,自适应存储设备的增加和删除,在存储规模发生变化时迁移最少的数据量,并且可以快速地定位数据,对存储空间的消耗较少. 展开更多
关键词 数据布局 聚类算法 一致hash 公平 自适应
在线阅读 下载PDF
基于word-hashing的DGA僵尸网络深度检测模型 被引量:9
13
作者 赵科军 葛连升 +1 位作者 秦丰林 洪晓光 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2017年第A01期30-33,共4页
针对使用域名生成算法(DGA)僵尸网络隐蔽性强,传统检测算法特征提取复杂的问题,提出一种无需提取具体特征的深度学习模型DGA域名检测方法.首先基于word-hashing将所有域名转用二元语法字符串表示,利用词袋模型把域名映射到高维向量空间... 针对使用域名生成算法(DGA)僵尸网络隐蔽性强,传统检测算法特征提取复杂的问题,提出一种无需提取具体特征的深度学习模型DGA域名检测方法.首先基于word-hashing将所有域名转用二元语法字符串表示,利用词袋模型把域名映射到高维向量空间.然后利用5层深度神经网络对转换为高维向量的域名进行训练分类检测.通过深度模型,能够从训练数据中发现不同层次抽象的隐藏模式和特征,而这些模式和特征使用传统的统计方法大多是无法发现的.实验中使用了10万条DGA域名和10万条合法域名作为样本,与基于自然语言特征分类算法进行对比实验.实验结果表明该深度模型对DGA域名检测准确率达到97.23%,比基于自然语言特征分类算法得到的检测准确率高3.7%. 展开更多
关键词 DGA 僵尸网络 wordhashing 深度学习
在线阅读 下载PDF
可扩展Hash方法的一种改进算法 被引量:3
14
作者 徐凤刚 许俊奎 潘清 《计算机工程与应用》 CSCD 北大核心 2006年第4期95-97,共3页
文章介绍了可扩展Hash方法,并提出了改进的缓存算法,该算法可以避免因为伪键分布异常而出现频繁的桶分裂及Hash表更新操作,从而提高空间和时间效率,有效地利用服务器资源。
关键词 hash 可扩展hash方法 缓存算法
在线阅读 下载PDF
基于hash运算的RFID认证协议分析和改进 被引量:13
15
作者 张兵 马新新 秦志光 《计算机应用研究》 CSCD 北大核心 2011年第11期4311-4314,共4页
针对已有基于hash运算的RFID认证协议所面临的安全问题,提出了一种新的适合低成本RFID的双向认证协议,并与已有的协议进行安全性分析和性能比较。结果表明该协议仅使用hash函数和异或操作,就达到机密性、完整性和防追踪性的安全目标,并... 针对已有基于hash运算的RFID认证协议所面临的安全问题,提出了一种新的适合低成本RFID的双向认证协议,并与已有的协议进行安全性分析和性能比较。结果表明该协议仅使用hash函数和异或操作,就达到机密性、完整性和防追踪性的安全目标,并运用时间戳作为标签查询标志,提高认证过程的执行性能。因此该协议与先前工作相比,更适合低成本的RFID系统。 展开更多
关键词 射频识别 安全协议 认证 哈希运算 协议的安全性
在线阅读 下载PDF
基于Hash表改进的二进制编码的Apriori算法 被引量:6
16
作者 王洋 贺春林 +1 位作者 姜玥 崔梦天 《西南民族大学学报(自然科学版)》 CAS 2020年第6期623-630,共8页
针对关联规则中Apriori算法反复扫描数据库以及运算效率低的问题,提出了一种基于Hash表的二进制编码改进的Apriori算法HBE-Apriori(Hashed Binary Encode).该算法通过Hash表保存事务数据库,因此只需要扫描一次数据库,从而避免了传统Apri... 针对关联规则中Apriori算法反复扫描数据库以及运算效率低的问题,提出了一种基于Hash表的二进制编码改进的Apriori算法HBE-Apriori(Hashed Binary Encode).该算法通过Hash表保存事务数据库,因此只需要扫描一次数据库,从而避免了传统Apriori算法反复扫描数据库带来的时间消耗;通过引入与运算对项集二进制编码进行运算,以达到了节省了存储空间的效果,同时提升了算法的执行效率.论文最后,通过举例和实验分析对比,证明了所提出的算法具有可行性和更好地运算效率. 展开更多
关键词 关联规则 APRIORI算法 hash 二进制编码
在线阅读 下载PDF
基于Hash函数取样的线性时间聚类方法LCHS 被引量:2
17
作者 元昌安 唐常杰 +3 位作者 张天庆 陈安龙 左劼 谢方军 《小型微型计算机系统》 CSCD 北大核心 2005年第8期1364-1368,共5页
作为数据挖掘中的经典算法,k-中心点算法存在效率低、对大数据集适应性差等严重不足.该文针对这一不足,提出并实现Hash分层模型LCHS(LinearClusteringBasedHashSampling),主要贡献包括:(1)将m维超立方体按等概率空间进行分桶,使得每层(... 作为数据挖掘中的经典算法,k-中心点算法存在效率低、对大数据集适应性差等严重不足.该文针对这一不足,提出并实现Hash分层模型LCHS(LinearClusteringBasedHashSampling),主要贡献包括:(1)将m维超立方体按等概率空间进行分桶,使得每层(即Hash桶)的数据个数相近,以较小的计算代价获得分层抽样的效果;(2)新算法保证了样本具有对总体数据的充分的统计代表性;(3)从理论上证明了新算法复杂度为O(N);(4)对比实验表明新算法在数据集的个数接近10000时,效率比传统算法提高2个数量级,数据集的个数接近8000时,聚类质量比CLARA算法提高55%. 展开更多
关键词 K-中心点 聚类分析 线性时间 hash函数 取样
在线阅读 下载PDF
具有可变散列输出的安全Hash算法 被引量:2
18
作者 白恩健 王井刚 肖国镇 《计算机科学》 CSCD 北大核心 2004年第4期189-191,197,共4页
本文给出了一个具有可变散列输出的安全Hash算法,该算法可以把任意长的消息散列成128,160,192,224或256比特的消息摘要。算法的安全性与有效性都能满足实际的需求;设计简单,没有大的数据结构和复杂程序;运行速度快,适用于高速软硬件实现... 本文给出了一个具有可变散列输出的安全Hash算法,该算法可以把任意长的消息散列成128,160,192,224或256比特的消息摘要。算法的安全性与有效性都能满足实际的需求;设计简单,没有大的数据结构和复杂程序;运行速度快,适用于高速软硬件实现,特别适用于32-位的计算机处理;安全性方面比SHA算法更具优势,算法不仅能抗所有已知攻击,而且还提供了充分大的安全空间来抗将来的未知攻击。文章给出了算法的具体描述,设计诱因和安全性分析,并且将算法与其它同类算法进行比较。 展开更多
关键词 安全hash算法 消息散列 单向散列算法 公钥密码体制 密码学
在线阅读 下载PDF
低硬件成本的高性能Hash算法加速器VLSI设计 被引量:2
19
作者 顾叶华 曾晓洋 +1 位作者 韩军 张章 《小型微型计算机系统》 CSCD 北大核心 2007年第5期940-943,共4页
本文基于安全Hash算法(SHA-1),提出了一种结构优化的SHA-1硬件加速器.本设计通过改进数据通路,加快了运算单元的速度;同时,采用动态操作数生成的方法,节约了硬件资源.设计采用SMIC0.25μm CMOS工艺综合,其核心电路(core)等效门为16.8k;... 本文基于安全Hash算法(SHA-1),提出了一种结构优化的SHA-1硬件加速器.本设计通过改进数据通路,加快了运算单元的速度;同时,采用动态操作数生成的方法,节约了硬件资源.设计采用SMIC0.25μm CMOS工艺综合,其核心电路(core)等效门为16.8k;在86MHz的工作频率下,其数据吞吐率达1.07Gbps.分析结果显示,该硬件加速器具备低成本和高性能的特点,适用于PDA、智能手机等面积受限的移动设备,具有良好的应用前景. 展开更多
关键词 安全hash算法SHA-1 低成本 VLSI
在线阅读 下载PDF
基于Hash函数改进遗传算法的IPv6下模糊异常检测模型 被引量:2
20
作者 黎耀 李之棠 王莉 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2006年第5期600-603,共4页
为了实现基于IPv6的异常检测,设计了一种新的高效异常检测模型.针对传统遗传算法编码效率低下的不足进行了改进.该模型使用基于遗传算法的IPv6模糊异常检测规则生成技术,采用Hash函数进行初始种群优化、随机实数编码进行种群编码,提高... 为了实现基于IPv6的异常检测,设计了一种新的高效异常检测模型.针对传统遗传算法编码效率低下的不足进行了改进.该模型使用基于遗传算法的IPv6模糊异常检测规则生成技术,采用Hash函数进行初始种群优化、随机实数编码进行种群编码,提高了检测准确性.使用实时网络数据流对原型系统和Snort进行对比测试,结果表明所提出的模型在检测效率上有明显改善. 展开更多
关键词 遗传算法 hash函数 模糊检测
在线阅读 下载PDF
上一页 1 2 45 下一页 到第
使用帮助 返回顶部