期刊文献+
共找到35篇文章
< 1 2 >
每页显示 20 50 100
Research on Logistics Sorting System based on RFID
1
作者 Xingyu Xu YiBing Ma Yanfei Qin 《International Journal of Technology Management》 2013年第2期127-128,共2页
With the rapid development of express logistics business side, the traditional sorting has been unable to meet the needs of the logistics courier logistics development. In this case, the article combined with RFID rad... With the rapid development of express logistics business side, the traditional sorting has been unable to meet the needs of the logistics courier logistics development. In this case, the article combined with RFID radio frequency technology, put forward new ideas on the transformation of traditional logistics sorted. By adding RFID tags and binding RFID tags on waybill number, Comparison test validate and affirm that the RFID technology of sorting system is usability and ease of use. 展开更多
关键词 logistics management RFID the sorting system
在线阅读 下载PDF
Research on DoS Attack Detection Method of Modbus TCP in OpenPLC
2
作者 Tongxin Li Yong Wan +3 位作者 Cunming Zou Yingjie Tian Lin Zhou Yiwen Zhu 《Journal of Computer and Communications》 2021年第7期73-90,共18页
With the development of new information technologies such as cloud computing, Internet of Things, and mobile Internet of Things, Industry 4.0, Smart Manufacturing and Made in China 2025 have been proposed as the main ... With the development of new information technologies such as cloud computing, Internet of Things, and mobile Internet of Things, Industry 4.0, Smart Manufacturing and Made in China 2025 have been proposed as the main content of the development of the next industrial revolution. In order to realize these projects with the common characteristics of intelligence, service, and green, a new manufacturing model, digital twin, is proposed, which combines the digital twin with industrial systems, that is, the industrial control virtualization system. However, due to the frequent occurrence of industrial control system security incidents in recent years, the industrial control virtualization system is vulnerable to attacks. The industrial control system is huge and cumbersome. Once attacked, it will cause consequences that affect the whole body. In response to this problem, this article carried out a research on DoS attack detection methods for Modbus TCP in OpenPLC, using OpenPLC as a tool for industrial control system virtualization, building a digital twin system with Raspberry Pi, and launching DoS attacks on the system, combined with Snort Intrusion detection is carried out, and the experimental results show that the built digital twin system can detect DoS attacks in OpenPLC. 展开更多
关键词 Digital Virtualization Communication Protocol Vulnerability OpenPLC SNORT
在线阅读 下载PDF
Research on Risk Management and Supervision System of Equity Investment Projects
3
作者 ZHANG Chan 《外文科技期刊数据库(文摘版)经济管理》 2020年第2期035-038,共6页
This paper mainly studies the risk management of equity investment projects and the identification and evaluation of the main risks in each stage of investment. The main risk described is whether the project benefit c... This paper mainly studies the risk management of equity investment projects and the identification and evaluation of the main risks in each stage of investment. The main risk described is whether the project benefit can reach the expectation, and the deep-seated reasons lie in the risk of policy environment, industrial structure and market forecast. Therefore, we must attach great importance to the research on risk management and supervision system of equity investment projects, and constantly establish and improve the research on supervision system with risk assessment of major business decisions before investment, investigation of business management during investment and post-investment evaluation as the main line, so as to prevent problems before they happen. 展开更多
关键词 equity investment risk monitoring SOLUTIONS architectural study
原文传递
LEGF-DST:LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection
4
作者 Xin Tong Jingya Wang +3 位作者 Ying Yang Tian Peng Hanming Zhai Guangming Ling 《Computers, Materials & Continua》 2025年第2期1901-1924,共24页
With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal issue.While deep learning-based text classifiers offer promise,they often exhibit suboptimal ... With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal issue.While deep learning-based text classifiers offer promise,they often exhibit suboptimal performance in fine-grained detection tasks,primarily due to imbalanced datasets and insufficient model representation capabilities.To address this challenge,this paper proposes an LLMs-enhanced graph fusion dual-stream Transformer model for fine-grained Chinese malicious SMS detection.During the data processing stage,Large Language Models(LLMs)are employed for data augmentation,mitigating dataset imbalance.In the data input stage,both word-level and character-level features are utilized as model inputs,enhancing the richness of features and preventing information loss.A dual-stream Transformer serves as the backbone network in the learning representation stage,complemented by a graph-based feature fusion mechanism.At the output stage,both supervised classification cross-entropy loss and supervised contrastive learning loss are used as multi-task optimization objectives,further enhancing the model’s feature representation.Experimental results demonstrate that the proposed method significantly outperforms baselines on a publicly available Chinese malicious SMS dataset. 展开更多
关键词 TRANSFORMERS malicious SMS multi-task learning large language models
在线阅读 下载PDF
Multi-focus image fusion based on block matching in 3D transform domain 被引量:6
5
作者 YANG Dongsheng HU Shaohai +2 位作者 LIU Shuaiqi MA Xiaole SUN Yuchao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第2期415-428,共14页
Fusion methods based on multi-scale transforms have become the mainstream of the pixel-level image fusion. However,most of these methods cannot fully exploit spatial domain information of source images, which lead to ... Fusion methods based on multi-scale transforms have become the mainstream of the pixel-level image fusion. However,most of these methods cannot fully exploit spatial domain information of source images, which lead to the degradation of image.This paper presents a fusion framework based on block-matching and 3D(BM3D) multi-scale transform. The algorithm first divides the image into different blocks and groups these 2D image blocks into 3D arrays by their similarity. Then it uses a 3D transform which consists of a 2D multi-scale and a 1D transform to transfer the arrays into transform coefficients, and then the obtained low-and high-coefficients are fused by different fusion rules. The final fused image is obtained from a series of fused 3D image block groups after the inverse transform by using an aggregation process. In the experimental part, we comparatively analyze some existing algorithms and the using of different transforms, e.g. non-subsampled Contourlet transform(NSCT), non-subsampled Shearlet transform(NSST), in the 3D transform step. Experimental results show that the proposed fusion framework can not only improve subjective visual effect, but also obtain better objective evaluation criteria than state-of-the-art methods. 展开更多
关键词 image fusion block matching 3D transform block-matching and 3D(BM3D) non-subsampled Shearlet transform(NSST)
在线阅读 下载PDF
Analysis of Blast Wave Propagation Inside Tunnel 被引量:4
6
作者 刘晶波 闫秋实 武俊 《Transactions of Tianjin University》 EI CAS 2008年第5期358-362,共5页
The explosion inside tunnel would generate blast wave which transmits through the longitudinal tunnel. Because of the close-in effects of the tunnel and the reflection by the confining tunnel structure, blast wave pro... The explosion inside tunnel would generate blast wave which transmits through the longitudinal tunnel. Because of the close-in effects of the tunnel and the reflection by the confining tunnel structure, blast wave propagation inside tunnel is distinguished from that in air. When the explosion happens inside tunnel, the overpressure peak is higher than that of explosion happening in air. The continuance time of the blast wave also becomes longer. With the help of the numerical simulation finite element software LS-DYNA, a three-dimensional nonlinear dynamic simulation analysis for an explosion experiment inside tunnel was carried out. LS-DYNA is a fully integrated analysis program specifically designed for nonlinear dynamics and large strain problems. Compared with the experimental results, the simulation results have made the material parameters of numerical simulation model available. By using the model and the same material parameters, many results were adopted by calculating the model under different TNT explosion dynamites. Then the method of dimensional analysis was used for the simulation results. As overpressures of the explosion blast wave are the governing factor in the tunnel responses, a formula for the explosion blast wave over-pressure at a certain distance from the detonation center point inside the tunnel was derived by using the dimensional analysis theory. By comparing the results computed by the formula with experimental results which were obtained before, the formula was proved to be very applicable at some instance. The research may be helpful to estimate rapidly the effect of internal explosion of tunnel on the structure. 展开更多
关键词 explosion inside tunnel blast wave overpressure peak dimensional analysis
在线阅读 下载PDF
Motion Classification of EMG Signals Based on Wavelet Packet Transform and LS-SVMs Ensemble 被引量:3
7
作者 颜志国 尤晓明 +1 位作者 陈嘉敏 叶小华 《Transactions of Tianjin University》 EI CAS 2009年第4期300-307,共8页
This paper presents an effective method for motion classification using the surface electromyographic (sEMG) signal collected from the forearm. Given the nonlinear and time-varying nature of EMG signal, the wavelet pa... This paper presents an effective method for motion classification using the surface electromyographic (sEMG) signal collected from the forearm. Given the nonlinear and time-varying nature of EMG signal, the wavelet packet transform (WPT) is introduced to extract time-frequency joint information. Then the multi-class classifier based on the least squares support vector machine (LS-SVM) is constructed and verified in the various motion classification tasks. The results of contrastive experiments show that different motions can be identified with high accuracy by the presented method. Furthermore, compared with other classifiers with different features, the performance indicates the potential of the SVM techniques combined with WPT in motion classification. 展开更多
关键词 pattern recognition wavelet packet transform least squares support vector machine surface electromyographic signal neural network SEPARABILITY
在线阅读 下载PDF
Low Bit Rate Underwater Video Image Compression and Coding Method Based on Wavelet Decomposition 被引量:3
8
作者 Yonggang He Xiongzhu Bu +1 位作者 Ming Jiang Maojun Fan 《China Communications》 SCIE CSCD 2020年第9期210-219,共10页
In view of the limited bandwidth of underwater video image transmission,a low bit rate underwater video compression coding method is proposed.Based on the preprocessing process of wavelet transform and coefficient dow... In view of the limited bandwidth of underwater video image transmission,a low bit rate underwater video compression coding method is proposed.Based on the preprocessing process of wavelet transform and coefficient down-sampling,the visual redundancy of underwater image is removed and the computational coefficients and coding bits are reduced.At the same time,combined with multi-level wavelet decomposition,inter frame motion compensation,entropy coding and other methods,according to the characteristics of different types of frame image data,reduce the number of calculations and improve the coding efficiency.The experimental results show that the reconstructed image quality can meet the visual requirements,and the average compression ratio of underwater video can meet the requirements of underwater acoustic channel transmission rate. 展开更多
关键词 low bit rate DOWN-SAMPLING wavelet decomposition underwater video coding
在线阅读 下载PDF
Super-resolution enhancement of UAV images based on fractional calculus and POCS 被引量:2
9
作者 Junfeng Lei Shangyue Zhang +2 位作者 Li Luo Jinsheng Xiao He Wang 《Geo-Spatial Information Science》 SCIE CSCD 2018年第1期56-66,共11页
A super-resolution enhancement algorithm was proposed based on the combination of fractional calculus and Projection onto Convex Sets(POCS)for unmanned aerial vehicles(UAVs)images.The representative problems of UAV im... A super-resolution enhancement algorithm was proposed based on the combination of fractional calculus and Projection onto Convex Sets(POCS)for unmanned aerial vehicles(UAVs)images.The representative problems of UAV images including motion blur,fisheye effect distortion,overexposed,and so on can be improved by the proposed algorithm.The fractional calculus operator is used to enhance the high-resolution and low-resolution reference frames for POCS.The affine transformation parameters between low-resolution images and reference frame are calculated by Scale Invariant Feature Transform(SIFT)for matching.The point spread function of POCS is simulated by a fractional integral filter instead of Gaussian filter for more clarity of texture and detail.The objective indices and subjective effect are compared between the proposed and other methods.The experimental results indicate that the proposed method outperforms other algorithms in most cases,especially in the structure and detail clarity of the reconstructed images. 展开更多
关键词 Unmanned aerial vehicle(UAV)image SUPERRESOLUTION fractional calculus Projection onto Convex Sets(POCS) Scale Invariant Feature Transform(SIFT)
原文传递
A novel algorithm for ocean wave direction inversion from X-band radar images based on optical flow method 被引量:1
10
作者 WANG Li CHENG Yunfei +1 位作者 HONG Lijuan LIU Xinyu 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2018年第3期88-93,共6页
As one of the important sea state parameters for navigation safety and coastal resource management, the ocean wave direction represents the propagation direction of the wave. A novel algorithm based on an optical flow... As one of the important sea state parameters for navigation safety and coastal resource management, the ocean wave direction represents the propagation direction of the wave. A novel algorithm based on an optical flow method is developed for the ocean wave direction inversion of the ocean wave fields imaged by the X-band radar continuously. The proposed algorithm utilizes the echo images received by the X-band wave monitoring radar to estimate the optical flow motion, and then the actual wave propagation direction can be obtained by taking a weighted average of the motion vector for each pixel. Compared with the traditional ocean wave direction inversion method based on frequency-domain, the novel algorithm is fully using a time-domain signal processing method without determination of a current velocity and a modulation transfer function(MTF). In the meantime,the novel algorithm is simple, efficient and there is no need to do something more complicated here. Compared with traditional ocean wave direction inversion method, the ocean wave direction of derived by using this proposed method matches well with that measured by an in situ buoy nearby and the simulation data. These promising results demonstrate the efficiency and accuracy of the algorithm proposed in the paper. 展开更多
关键词 X-band radar optical flow weighted average ocean wave direction radar image
在线阅读 下载PDF
Analysis of Telephone Call Detail Records based on Fuzzy Decision Tree 被引量:1
11
作者 Ding Liping Gu jian +1 位作者 Wang Yongji Wu Jingzheng 《China Communications》 SCIE CSCD 2010年第6期120-127,共8页
Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of di... Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising. 展开更多
关键词 FORENSICS digital evidence telephonecall records fuzzy decision tree
在线阅读 下载PDF
Face and Lip Tracking For Person Identification 被引量:1
12
作者 Zhang Ying 《China Communications》 SCIE CSCD 2010年第6期141-144,共4页
This paper addresses the issue of face and lip tracking via chromatic detector, CCL algorithm and canny edge detector. It aims to track face and lip region from static color images including frames read from videos, w... This paper addresses the issue of face and lip tracking via chromatic detector, CCL algorithm and canny edge detector. It aims to track face and lip region from static color images including frames read from videos, which is exPected to be an important part of the robust and reliable person identification in the field of computer forensics. We use the M2VTS face database and pictures took from my colleagues as the test resource. This project is based on the concept of image processing and computer version. 展开更多
关键词 face recognition lip tracking computer forensics
在线阅读 下载PDF
Test analysis of stress characteristics on reinforcing rock slope with group anchorage cable 被引量:1
13
作者 ZHANG Liang-liang XIA Yuan-you +2 位作者 GU Jin-cai LI Qi-min CHEN Chen 《Journal of Coal Science & Engineering(China)》 2010年第1期23-28,共6页
To research the reinforcement effect of a rock slope with group anchorage cables and the stress characteristics of pre-stressed anchorage cables in the fractured surface, the rock slope calculated model of a wedge blo... To research the reinforcement effect of a rock slope with group anchorage cables and the stress characteristics of pre-stressed anchorage cables in the fractured surface, the rock slope calculated model of a wedge block within the double-slide face was established by using the finite difference software according to the actual slope project combined with indoor model test. The pre-stress loss rule of the anchorage cable and the distribution of axial force and the force-transferring mechanism of the anchorage cable were analyzed during simulation. Also, based on the displacement contour and the safety factor of the calculated results, the quantitative analysis for the reinforcement ef- fect of the rock slope with group pre-stressed anchorage cable was discovered. The results computed by the software conform with the data in the experiment, which can prove the effectiveness and correctness of parameter selection and model building. Keywords group anchorage reinforcement, rock slope, joint fissure, pre-stressed anchorage cable, stress characteristics 展开更多
关键词 group anchorage reinforcement rock slope joint fissure pre-stressed anchorage cable stress characteristics
在线阅读 下载PDF
PICOTEES:a privacy-preserving online service of phenotype exploration for genetic-diagnostic variants from Chinese children cohorts 被引量:1
14
作者 Xinran Dong Yulan Lu +10 位作者 Lanting Guo Chuan Li Qi Ni Bingbing Wu Huijun Wang Lin Yang Songyang Wu Qi Sun Hao Zheng Wenhao Zhou Shuang Wang 《Journal of Genetics and Genomics》 SCIE CAS CSCD 2024年第2期243-251,共9页
The growth in biomedical data resources has raised potential privacy concerns and risks of genetic information leakage. For instance, exome sequencing aids clinical decisions by comparing data through web services, bu... The growth in biomedical data resources has raised potential privacy concerns and risks of genetic information leakage. For instance, exome sequencing aids clinical decisions by comparing data through web services, but it requires significant trust between users and providers. To alleviate privacy concerns, the most commonly used strategy is to anonymize sensitive data. Unfortunately, studies have shown that anonymization is insufficient to protect against reidentification attacks. Recently, privacy-preserving technologies have been applied to preserve application utility while protecting the privacy of biomedical data. We present the PICOTEES framework, a privacy-preserving online service of phenotype exploration for genetic-diagnostic variants (https://birthdefectlab.cn:3000/). PICOTEES enables privacy-preserving queries of the phenotype spectrum for a single variant by utilizing trusted execution environment technology, which can protect the privacy of the user's query information, backend models, and data, as well as the final results. We demonstrate the utility and performance of PICOTEES by exploring a bioinformatics dataset. The dataset is from a cohort containing 20,909 genetic testing patients with 3,152,508 variants from the Children's Hospital of Fudan University in China, dominated by the Chinese Han population (>99.9%). Our query results yield a large number of unreported diagnostic variants and previously reported pathogenicity. 展开更多
关键词 Privacy protecti on Rare diseases in children Genetic testing Web system Trusted executi on envir onment
原文传递
A novel model of drug cue-induced behaviours in rhesus macaque subjected to chronic ketamine exposure 被引量:2
15
作者 Meng Qin Jiaoqiong Guan +7 位作者 Yichun Huang He Lin Ding Cui Tao Yao Chaoyang Tian Mali Wong Zhe Shi Tifei Yuan 《General Psychiatry》 CAS CSCD 2023年第1期76-78,共3页
To the Editor,Non-human primate(NHP)models are advantageous for mimicking human addiction with high behavioural validity.1 However,current NHP drug addiction models(eg,self-administration)often require a comprehensive... To the Editor,Non-human primate(NHP)models are advantageous for mimicking human addiction with high behavioural validity.1 However,current NHP drug addiction models(eg,self-administration)often require a comprehensive behavioural training paradigm,relatively expensive apparatus and invasive surgical procedures. 展开更多
关键词 DRUG behaviour KETAMINE
暂未订购
Active Approach for Tamper Detection with Robustness to Lossy Compression
16
作者 李剑 李生红 郑旭平 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第4期385-393,共9页
Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression,... Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tam- pered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. ExperimentM results demonstrate the effectiveness of the proposed scheme. 展开更多
关键词 active tamper detection energy concentration transform error correction code semi-fragile water- marking
原文传递
Key Management for Outsourced Data Security
17
作者 PEI Bei CHEN Changsong WAN Changsheng 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期449-454,共6页
This paper analyzes the efficiency and security of bi- linear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing, which is much more efficient. In this scheme, a trust model ... This paper analyzes the efficiency and security of bi- linear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing, which is much more efficient. In this scheme, a trust model including four entities is designed to provide both integrity and confidentiality protection. The proposed scheme can be proved to achieve the security goals that no cheating cloud server can pass the auditing without storing users' data intact. The efficiency of the proposal is evaluated by analyzing the fulfillment of the design goals, including the computation cost, communication cost and storage cost of our scheme. This light weight publicly auditable Proof-of-storage scheme achieves security goals perfectly, and has an excellent efficiency performance superior to the current bilinear-map-based publicly auditable Proof-of-storage scheme. 展开更多
关键词 cloud computing malicious cloud server key management
原文传递
Investigating the Implications of Virtualization for Digital Forensics
18
作者 Song Zheng Jin Bo +1 位作者 Zhu Yinghong Sun Yongqing 《China Communications》 SCIE CSCD 2010年第6期100-106,共7页
Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential role... Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared. 展开更多
关键词 digital forensics VIRTUALIZATION forensic image booting virtual machine introspection
在线阅读 下载PDF
Agent Modeling of User Preferences Based on Fuzzy Classified ANNs in Automated Negotiation
19
作者 顾铁军 汤兵勇 +1 位作者 马溪骏 李毅 《Journal of Donghua University(English Edition)》 EI CAS 2011年第1期45-48,共4页
In agent-based automated negotiation research area,a key problem is how to make software agent more adaptable to represent user preferences or suggestions,so that agent can take further proposals that reflect user req... In agent-based automated negotiation research area,a key problem is how to make software agent more adaptable to represent user preferences or suggestions,so that agent can take further proposals that reflect user requirements to implement ecommerce activities like automated transactions.The difficulty lies in the uncertainty of user preferences that include uncertain description and contents,non-linear and dynamic variability.In this paper,fuzzy language was used to describe the uncertainty and combine with multiple classified artificial neural networks(ANNs) for self-adaptive learning of user preferences.The refinement learning results of various negotiation contracts' satisfaction degrees in the extent of fuzzy classification can be achieved.Compared to unclassified computation,the experimental results illustrate that the learning ability and effectiveness of agents have been improved. 展开更多
关键词 AGENT automated negotiation user modeling artificial neural network(ANN) fuzzy classification
在线阅读 下载PDF
Study of Thick Gaseous Electron Multipliers Gain Stability and Some Influencing Factors 被引量:1
20
作者 ZHOU Xiao-Kang LIU Qian +13 位作者 CHEN Shi HUANG Wen-Qian WANG Bin-Long ZHANG Yong-Dong GE Dong-Sheng LIU Hong-Bang ZHENG Yang-Heng XIE Yi-Gang DONG Yang ZHANG Qiang CHANG Jie WANG Jing LI Min ZHOU Yan 《Chinese Physics Letters》 SCIE CAS CSCD 2014年第3期47-50,共4页
The working stability of thinner-thick gaseous electron multipliers (THGEMs), which have been developed by the University of the Chinese Academy of Sciences and the Second Academy of China's Aerospace Science and I... The working stability of thinner-thick gaseous electron multipliers (THGEMs), which have been developed by the University of the Chinese Academy of Sciences and the Second Academy of China's Aerospace Science and Industry Corporation, is studied with an 8 keV x-ray on a Cu target. Gains of about 103–104 are achieved with a single board in Ar:iC4H10 (97:3). Environmental factors, such as pressure, temperature and humidity are considered. The thinner-THGEMs are shown to perform stably over two months of studies. 展开更多
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部