什么人不能吃海带| 前瞻是什么意思| 生脉饮适合什么人群| 吃什么对心脏好改善供血不足| 八一年属什么生肖| 去痛片又叫什么名| 羟基是什么| 城头土命是什么意思| 没有精液是什么原因| 定期是什么意思| 木耳有什么功效与作用| 氯喹是什么药| 什么是情劫| 什么是善良| 绿豆汤不能和什么一起吃| 天蝎座跟什么星座最配| 屁股疼挂什么科室| 乳腺导管局限性扩张是什么意思| 湿气重吃什么药| 肛裂出血用什么药| 水鱼煲鸡汤放什么药材| 高血压头晕吃什么药| 老九门2什么时候上映| 男人射精是什么感觉| ebohr手表什么牌子多少钱| 火龙果对身体有什么好处| 骨髓穿刺是检查什么病| 脂肪肝吃什么水果好| 抗血小板是什么意思| 什么桂什么香| 狼烟是什么意思| 牙齿一碰就疼是什么原因| 勃起是什么| 唱过什么歌| 璐字五行属什么| 自言自语说话是什么病| 稷读什么| 鸟字旁的字和什么有关| 上不下要读什么| 玉兔是什么意思| 赫五行属性是什么| 磨牙是什么原因引起的如何治疗| yeezy是什么牌子| 姜红枣红糖一起煮有什么效果| 怀孕了梦见蛇是什么意思| 天生丽质什么意思| 两个人可以玩什么游戏| 判决书什么时候生效| 右边小腹疼是什么原因| 午时是什么时间| 筋是什么组织| 阿迪达斯和三叶草有什么区别| 什么是象限| 什么水果养胃又治胃病| 还记得年少时的梦吗是什么歌| 面包用什么面粉| gap什么意思| 好饭不怕晚什么意思| 枪灰色是什么颜色| 办理健康证需要什么| 不治身亡是什么意思| 米醋和陈醋有什么区别| 院子里有蛇是什么征兆| 尿味大是什么原因| 夫复何求什么意思| 舌头麻木是什么征兆| 嘴巴下面长痘痘是什么原因引起的| 什么是阻生牙| 2018 年是什么年| 成都人民公园有什么好玩的| 杏仁有什么功效和作用| 哀恸是什么意思| cg什么意思| cold什么意思| 白带豆腐渣用什么药| 神经肌电图检查什么| 区长是什么级别| 痔疮吃什么消炎药好得快| 异性恋是什么意思| 职业资格证书有什么用| 嘴角烂是什么原因| 口苦口臭吃什么药效果最佳| vad是什么意思| 恩施玉露是什么茶| 硬核是什么意思| ct和b超有什么区别| 黄体破裂是什么| 清款是什么意思| 赤道2什么时候上映| 灵魂契合是什么意思| 医院手环颜色代表什么| 宝宝为什么老是吐奶| 什么水果养胃| 肩膀疼挂什么科| 为什么不能空腹吃香蕉| 淋巴炎挂什么科| 1999年发生了什么| 11月13日什么星座| 地铁不能带什么东西| 嘴干是什么原因| 人彘是什么意思| 风化是什么意思| 产前筛查是检查什么| 坐怀不乱是什么生肖| 肺气肿是什么原因导致的| 旅长是什么军衔| 勰读什么| 集体户口什么意思| 属牛的守护神是什么菩萨| 心火旺吃什么药效果最好| 过度是什么意思| 罗文和甄妮什么关系| 吃过榴莲不能吃什么| b超是查什么的| 1314代表什么意思| 食道炎症吃什么药最好| 动脉斑块是什么意思| 红细胞偏高是什么原因| 中唐筛查是检查什么| 盐酸盐是什么| 虚岁30岁属什么生肖| 白头翁是什么| 老人过生日送什么礼物好| 小孩经常肚子疼是什么原因| 脂溢性脱发用什么药| 一国两制是什么时候提出的| 圆滑是什么意思| 小腿肿是什么原因| 孕妇吃什么坚果比较好| 百衲衣是什么意思| 嘴角起泡是什么原因| 盆腔少量积液是什么意思| 英姿的动物是什么生肖| 酒后头疼吃什么| 喜欢一个人是什么感觉| 罗刹是什么意思| 猪八戒是什么生肖| 格格不入是什么意思| 春砂仁与什么煲汤最佳| 应景是什么意思| 安吉白茶属于什么茶类| 醪糟发酸是什么原因| 他喵的什么意思| 拔冗是什么意思| 扁平疣用什么药膏除根| 血压低有什么办法| 嘴巴苦苦的是什么原因| 孕吐吃什么药| 吃皮蛋有什么好处和坏处| 治疗湿疹吃什么药| 饺子包什么馅好吃| 9月21号是什么星座| 脑供血不足是什么原因引起的| 菊花脑是什么菜| 梦到抓了好多鱼是什么意思| 什么是天丝| 1962年属什么生肖| 梦见彩虹是什么征兆| 胃溃疡十二指肠溃疡吃什么药| 眼皮重是什么原因| 氯超标是因为什么原因| 汤圆和元宵有什么区别| 雷诺综合症是什么病| 大便干结吃什么药| 亮丽是什么意思| 万金油是什么意思| ppl是什么意思| 第一胎打掉会有什么影响| 房性早搏吃什么药| 农历十月十八是什么星座| 永垂不朽是什么意思| 蛋白粉吃多了有什么危害| 九月二十四号是什么星座| 什么的高楼| 泡酒用什么酒好| 吃什么补白细胞快| 择期手术是什么意思| 喝什么可以变白| 腰扭伤了挂什么科| 泌乳素偏高是什么原因| 利尿是什么意思| 胃造影和胃镜有什么区别| 睡觉天天做梦是什么原因| 闰月年有什么讲究| 轶事是什么意思| 吃龟苓膏有什么好处| 红细胞分布宽度偏低是什么原因| 什么木质手串最好| 3月份是什么星座| 狗和什么属相相冲| 出行是什么意思| 女儿是小棉袄儿子是什么| 张学良为什么被囚禁| 香精是什么| 什么话是世界通用的| 后位子宫什么意思| 血糖仪h1是什么意思| 检验葡萄糖用什么试剂| 八方来财是什么生肖| 肺不张是什么意思| ysl属于什么档次| 什么吃草吞吞吐吐歇后语| 母亲节可以做什么礼物| 胎儿偏小吃什么补得快| 发泄是什么意思| 神经性头疼吃什么药效果好| 英文为什么怎么写| 一直吐是什么原因| 鱼鳞云代表什么天气| 水逆退散什么意思| 胸膜牵拉是什么意思| 神秘感是什么意思| 不知道干什么| 定制和订制有什么区别| 乌鸡炖什么好吃又有营养| nsaid是什么药| 草莓的花是什么颜色| 气胸是什么症状| 后羿射日告诉我们什么道理| 6.21什么星座| 腰椎间盘突出和膨出有什么区别| 弓形虫抗体阳性是什么意思| 79年属什么| 为什么趴着睡觉会胀气然后打嗝| 嗓子疼喝什么药| 女贞子是什么| 维生素b2是什么颜色| 子宫肌瘤不能吃什么| 度蜜月什么意思| 新陈代谢慢是什么原因| a型血与o型血生的孩子是什么血型| 天性使然什么意思| 尼古丁是什么| prp是什么意思| 白猫来家里有什么预兆| 蓝什么什么| 肠胃炎吃什么药好得快| 人均gdp是什么意思| 只是女人容易一往情深是什么歌| 容易流鼻血是什么原因| 输钾为什么会痛| 血管瘪是什么原因| 心肌缺血吃什么药效果最好| 知柏地黄丸适合什么人吃| 羽毛球拍u是什么意思| 梦见手抓屎是什么意思| dj管是什么| 治疗股癣用什么药膏| 硬不起来吃什么药| 长疱疹是什么原因| 小火龙吃什么| 跨界是什么意思| 什么面条好吃| 巴字加一笔是什么字| 推是什么意思| 小便绿色是什么原因| 月经前腰疼是什么原因| 保重适合对什么人说| 烦请是什么意思| 邦顿手表是什么档次| 胆囊大是什么原因| 眼睛出血是什么原因| 11月出生是什么星座| 失眠多梦是什么原因| 百度Jump to content

中国电信原董事长常小兵受审 16年间受贿376万

From Wikipedia, the free encyclopedia
百度   巡视组分别列出了4个“回头看”省区对上轮巡视整改不力的问题清单,具体来看,内蒙古自治区党委的主要问题是对上轮巡视指出的文山会海、超职数配备干部等问题整改不到位;吉林是对上轮巡视指出的办公用房超标、违规兼职和违规配备干部问题整改不到位;陕西是对上轮巡视提出的超职数配备干部、违规兼职,领导干部多占住房、“文山会海”等整改不力;云南是对上轮巡视提出的重点领域腐败案件易发多发、用人视野不宽、违规配备干部等整改不力。

In computer science, a software agent is a computer program that acts for a user or another program in a relationship of agency.

The term agent is derived from the Latin agere (to do): an agreement to act on one's behalf. Such "action on behalf of" implies the authority to decide which, if any, action is appropriate.[1][2] Some agents are colloquially known as bots, from robot. They may be embodied, as when execution is paired with a robot body, or as software such as a chatbot executing on a computer, such as a mobile device, e.g. Siri. Software agents may be autonomous or work together with other agents or people. Software agents interacting with people (e.g. chatbots, human-robot interaction environments) may possess human-like qualities such as natural language understanding and speech, personality or embody humanoid form (see Asimo).

Related and derived concepts include intelligent agents (in particular exhibiting some aspects of artificial intelligence, such as reasoning), autonomous agents (capable of modifying the methods of achieving their objectives), distributed agents (being executed on physically distinct computers), multi-agent systems (distributed agents that work together to achieve an objective that could not be accomplished by a single agent acting alone), and mobile agents (agents that can relocate their execution onto different processors).

Concepts

[edit]

The basic attributes of an autonomous software agent are that agents:

  • are not strictly invoked for a task, but activate themselves,
  • may reside in wait status on a host, perceiving context,
  • may get to run status on a host upon starting conditions,
  • do not require interaction of user,
  • may invoke other tasks including communication.
Nwana's Category of Software Agent

The concept of an agent provides a convenient and powerful way to describe a complex software entity that is capable of acting with a certain degree of autonomy in order to accomplish tasks on behalf of its host. But unlike objects, which are defined in terms of methods and attributes, an agent is defined in terms of its behavior.[3]

Various authors have proposed different definitions of agents, these commonly include concepts such as:

  • persistence: code is not executed on demand but runs continuously and decides for itself when it should perform some activity;
  • autonomy: agents have capabilities of task selection, prioritization, goal-directed behavior, decision-making without human intervention;
  • social ability: agents are able to engage other components through some sort of communication and coordination, they may collaborate on a task;
  • reactivity: agents perceive the context in which they operate and react to it appropriately.

Distinguishing agents from programs

[edit]

All agents are programs, but not all programs are agents. Contrasting the term with related concepts may help clarify its meaning. Franklin & Graesser (1997)[4] discuss four key notions that distinguish agents from arbitrary programs: reaction to the environment, autonomy, goal-orientation and persistence.

Intuitive distinguishing agents from objects

[edit]
  • Agents are more autonomous than objects.
  • Agents have flexible behavior: reactive, proactive, social.
  • Agents have at least one thread of control but may have more.[5]

Distinguishing agents from expert systems

[edit]
  • Expert systems are not coupled to their environment.
  • Expert systems are not designed for reactive, proactive behavior.
  • Expert systems do not consider social ability.[5]

Distinguishing intelligent software agents from intelligent agents in AI

[edit]
  • Intelligent agents (also known as rational agents) are not just computer programs: they may also be machines, human beings, communities of human beings (such as firms) or anything that is capable of goal-directed behavior.
(Russell & Norvig 2003)

Impact of software agents

[edit]

Software agents may offer various benefits to their end users by automating complex or repetitive tasks.[6] However, there are organizational and cultural impacts of this technology that need to be considered prior to implementing software agents.

Organizational impact

[edit]

Work contentment and job satisfaction impact

[edit]

People like to perform easy tasks providing the sensation of success unless the repetition of the simple tasking is affecting the overall output. In general implementing software agents to perform administrative requirements provides a substantial increase in work contentment, as administering their own work does never please the worker. The effort freed up serves for a higher degree of engagement in the substantial tasks of individual work. Hence, software agents may provide the basics to implement self-controlled work, relieved from hierarchical controls and interference.[7] Such conditions may be secured by application of software agents for required formal support.

Cultural impact

[edit]

The cultural effects of the implementation of software agents include trust affliction, skills erosion, privacy attrition and social detachment. Some users may not feel entirely comfortable fully delegating important tasks to software applications. Those who start relying solely on intelligent agents may lose important skills, for example, relating to information literacy. In order to act on a user's behalf, a software agent needs to have a complete understanding of a user's profile, including his/her personal preferences. This, in turn, may lead to unpredictable privacy issues. When users start relying on their software agents more, especially for communication activities, they may lose contact with other human users and look at the world with the eyes of their agents. These consequences are what agent researchers and users must consider when dealing with intelligent agent technologies.[8]

History

[edit]

The concept of an agent can be traced back to Hewitt's Actor Model (Hewitt, 1977) - "A self-contained, interactive and concurrently-executing object, possessing internal state and communication capability."[citation needed]

To be more academic, software agent systems are a direct evolution of Multi-Agent Systems (MAS). MAS evolved from Distributed Artificial Intelligence (DAI), Distributed Problem Solving (DPS) and Parallel AI (PAI), thus inheriting all characteristics (good and bad) from DAI and AI.

John Sculley's 1987 "Knowledge Navigator" video portrayed an image of a relationship between end-users and agents. Being an ideal first, this field experienced a series of unsuccessful top-down implementations, instead of a piece-by-piece, bottom-up approach. The range of agent types is now (from 1990) broad: WWW, search engines, etc.

Examples of intelligent software agents

[edit]

Buyer agents (shopping bots)

[edit]

Buyer agents[9] travel around a network (e.g. the internet) retrieving information about goods and services. These agents, also known as 'shopping bots', work very efficiently for commodity products such as CDs, books, electronic components, and other one-size-fits-all products. Buyer agents are typically optimized to allow for digital payment services used in e-commerce and traditional businesses.[10]

User agents (personal agents)

[edit]

User agents, or personal agents, are intelligent agents that take action on your behalf. In this category belong those intelligent agents that already perform, or will shortly perform, the following tasks:

  • Check your e-mail, sort it according to the user's order of preference, and alert you when important emails arrive.
  • Play computer games as your opponent or patrol game areas for you.
  • Assemble customized news reports for you. There are several versions of these, including CNN.
  • Find information for you on the subject of your choice.
  • Fill out forms on the Web automatically for you, storing your information for future reference
  • Scan Web pages looking for and highlighting text that constitutes the "important" part of the information there
  • Discuss topics with you ranging from your deepest fears to sports
  • Facilitate with online job search duties by scanning known job boards and sending the resume to opportunities who meet the desired criteria
  • Profile synchronization across heterogeneous social networks

Monitoring-and-surveillance (predictive) agents

[edit]

Monitoring and surveillance agents are used to observe and report on equipment, usually computer systems. The agents may keep track of company inventory levels, observe competitors' prices and relay them back to the company, watch stock manipulation by insider trading and rumors, etc.

Service monitoring

For example, NASA's Jet Propulsion Laboratory has an agent that monitors inventory, planning, schedules equipment orders to keep costs down, and manages food storage facilities. These agents usually monitor complex computer networks that can keep track of the configuration of each computer connected to the network.

A special case of monitoring-and-surveillance agents are organizations of agents used to automate decision-making process during tactical operations. The agents monitor the status of assets (ammunition, weapons available, platforms for transport, etc.) and receive goals from higher level agents. The agents then pursue the goals with the assets at hand, minimizing expenditure of the assets while maximizing goal attainment.

Data-mining agents

[edit]

This agent uses information technology to find trends and patterns in an abundance of information from many different sources. The user can sort through this information in order to find whatever information they are seeking.

A data mining agent operates in a data warehouse discovering information. A 'data warehouse' brings together information from many different sources. "Data mining" is the process of looking through the data warehouse to find information that you can use to take action, such as ways to increase sales or keep customers who are considering defecting.

'Classification' is one of the most common types of data mining, which finds patterns in information and categorizes them into different classes. Data mining agents can also detect major shifts in trends or a key indicator and can detect the presence of new information and alert you to it. For example, the agent may detect a decline in the construction industry for an economy; based on this relayed information construction companies will be able to make intelligent decisions regarding the hiring/firing of employees or the purchase/lease of equipment in order to best suit their firm.

Networking and communicating agents

[edit]

Some other examples of current intelligent agents include some spam filters, game bots, and server monitoring tools. Search engine indexing bots also qualify as intelligent agents.

  • User agent - for browsing the World Wide Web
  • Mail transfer agent - For serving E-mail, such as Microsoft Outlook. Why? It communicates with the POP3 mail server, without users having to understand POP3 command protocols. It even has rule sets that filter mail for the user, thus sparing them the trouble of having to do it themselves.
  • SNMP agent
  • In Unix-style networking servers, httpd is an HTTP daemon that implements the Hypertext Transfer Protocol at the root of the World Wide Web
  • Management agents used to manage telecom devices
  • Crowd simulation for safety planning or 3D computer graphics,
  • Wireless beaconing agent is a simple process hosted single tasking entity for implementing wireless lock or electronic leash in conjunction with more complex software agents hosted e.g. on wireless receivers.
  • Use of autonomous agents (deliberately equipped with noise) to optimize coordination in groups online.[11]

Software development agents (aka software bots)

[edit]

Software bots are becoming important in software engineering.[12]

Security agents

[edit]

Agents are also used in software security application to intercept, examine and act on various types of content. Example include:

  • Data Loss Prevention (DLP) Agents[13] - examine user operations on a computer or network, compare with policies specifying allowed actions, and take appropriate action (e.g. allow, alert, block). The more comprehensive DLP agents can also be used to perform EDR functions.
  • Endpoint Detection and Response (EDR) Agents - monitor all activity on an endpoint computer in order to detect and respond to malicious activities
  • Cloud Access Security Broker (CASB) Agents - similar to DLP Agents, however examining traffic going to cloud applications

Design issues

[edit]

Issues to consider in the development of agent-based systems include

  • how tasks are scheduled and how synchronization of tasks is achieved
  • how tasks are prioritized by agents
  • how agents can collaborate, or recruit resources,
  • how agents can be re-instantiated in different environments, and how their internal state can be stored,
  • how the environment will be probed and how a change of environment leads to behavioral changes of the agents
  • how messaging and communication can be achieved,
  • what hierarchies of agents are useful (e.g. task execution agents, scheduling agents, resource providers ...).

For software agents to work together efficiently they must share semantics of their data elements. This can be done by having computer systems publish their metadata.

The definition of agent processing can be approached from two interrelated directions:

  • internal state processing and ontologies for representing knowledge
  • interaction protocols – standards for specifying communication of tasks

Agent systems are used to model real-world systems with concurrency or parallel processing.

  • Agent Machinery – Engines of various kinds, which support the varying degrees of intelligence
  • Agent Content – Data employed by the machinery in Reasoning and Learning
  • Agent Access – Methods to enable the machinery to perceive content and perform actions as outcomes of Reasoning
  • Agent Security – Concerns related to distributed computing, augmented by a few special concerns related to agents

The agent uses its access methods to go out into local and remote databases to forage for content. These access methods may include setting up news stream delivery to the agent, or retrieval from bulletin boards, or using a spider to walk the Web. The content that is retrieved in this way is probably already partially filtered – by the selection of the newsfeed or the databases that are searched. The agent next may use its detailed searching or language-processing machinery to extract keywords or signatures from the body of the content that has been received or retrieved. This abstracted content (or event) is then passed to the agent's Reasoning or inferencing machinery in order to decide what to do with the new content. This process combines the event content with the rule-based or knowledge content provided by the user. If this process finds a good hit or match in the new content, the agent may use another piece of its machinery to do a more detailed search on the content. Finally, the agent may decide to take an action based on the new content; for example, to notify the user that an important event has occurred. This action is verified by a security function and then given the authority of the user. The agent makes use of a user-access method to deliver that message to the user. If the user confirms that the event is important by acting quickly on the notification, the agent may also employ its learning machinery to increase its weighting for this kind of event.

Bots can act on behalf of their creators to do good as well as bad. There are a few ways which bots can be created to demonstrate that they are designed with the best intention and are not built to do harm. This is first done by having a bot identify itself in the user-agent HTTP header when communicating with a site. The source IP address must also be validated to establish itself as legitimate. Next, the bot must also always respect a site's robots.txt file since it has become the standard across most of the web. And like respecting the robots.txt file, bots should shy away from being too aggressive and respect any crawl delay instructions.[14]

Notions and frameworks for agents

[edit]

See also

[edit]

References

[edit]
  1. ^ Nwana, H. S. (1996). "Software Agents: An Overview". Knowledge Engineering Review. 21 (3): 205–244. CiteSeerX 10.1.1.50.660. doi:10.1017/s026988890000789x. S2CID 7839197.
  2. ^ Schermer, B. W. (2007). Software agents, surveillance, and the right to privacy: A legislative framework for agent-enabled surveillance (paperback). Vol. 21. Leiden University Press. pp. 140, 205–244. hdl:1887/11951. ISBN 978-0-596-00712-6. Retrieved October 30, 2012.
  3. ^ Wooldridge, M.; Jennings, N. R. (1995). "Intelligent agents: theory and practice". Knowledge Engineering Review. 10 (2): 115–152.
  4. ^ Franklin, S.; Graesser, A. (1996). "Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents". Intelligent Agents III Agent Theories, Architectures, and Languages. Lecture Notes in Computer Science. Vol. 1193. University of Memphis, Institute for Intelligent Systems. pp. 21–35. doi:10.1007/BFb0013570. ISBN 978-3-540-62507-0.
  5. ^ a b Wooldridge, Michael J. (2002). An Introduction to Multiagent Systems. New York: John Wiley & Sons. p. 27. ISBN 978-0-471-49691-5.
  6. ^ Serenko, A.; Detlor, B. (2004). "Intelligent agents as innovations" (PDF). Artificial Intelligence & Society. 18 (4): 364–381.
  7. ^ Adonisi, M. (2003). "The relationship between Corporate Entrepreneurship, Market Orientation, Organisational Flexibility and Job satisfaction" (PDF) (Diss.). Fac.of Econ.and Mgmt.Sci., Univ.of Pretoria.
  8. ^ Serenko, A.; Ruhi, U.; Cocosila, M. (2007). "Unplanned effects of intelligent agents on Internet use: Social Informatics approach" (PDF). Artificial Intelligence & Society. 21 (1–2): 141–166.
  9. ^ Haag, Stephen; Cummings, Maeve; Dawkins, James (2006). Management Information Systems for the Information Age. pp. 224–228.
  10. ^ "Maximize Your Business Impact | How to Use Facebook Chatbots". Keystone Click. August 26, 2016. Retrieved September 7, 2017.
  11. ^ Shirado, Hirokazu; Christakis, Nicholas A (2017). "Locally noisy autonomous agents improve global human coordination in network experiments". Nature. 545 (7654): 370–374. Bibcode:2017Natur.545..370S. doi:10.1038/nature22332. PMC 5912653. PMID 28516927.
  12. ^ Lebeuf, Carlene; Storey, Margaret-Anne; Zagalsky, Alexey (2018). "Software Bots". IEEE Software. 35: 18–23. doi:10.1109/MS.2017.4541027. S2CID 31931036.
  13. ^ "Enterprise IP and DLP Software | Digital Guardian" (PDF). info.digitalguardian.com. Retrieved December 25, 2024.
  14. ^ "How to Live by the Code of Good Bots". DARKReading from Information World. September 27, 2017. Retrieved November 14, 2017.
[edit]
高血压挂什么科室 梦见煮鱼有什么预兆 癔症是什么病 南乳是什么 秀才相当于什么学历
气球是什么意思 指压板有什么功效 女人左眼皮跳是什么预兆 2022年五行属什么 总出虚汗什么原因怎么解决
舌头干是什么原因 我想长胖点有什么办法 头晕拉肚子是什么情况 省委组织部长是什么级别 一节黑一节白是什么蛇
瓦特发明了什么 什么相照 欲拒还迎什么意思 孕妇为什么不能吃桃子 为什么吃了避孕药还是怀孕了
夏天适合种植什么蔬菜hcv9jop6ns7r.cn 土笋冻是什么虫子jinxinzhichuang.com 心率低40多吃什么药hcv9jop2ns2r.cn 血糖高吃什么菜hcv7jop7ns0r.cn 啤酒加什么好喝hcv9jop1ns4r.cn
女士喝什么茶叶对身体好hcv8jop3ns4r.cn 女性胃炎有什么症状hcv9jop3ns0r.cn 伊玛目是什么意思hcv8jop0ns2r.cn 燕麦色是什么颜色adwl56.com 虾吃什么食物hcv8jop7ns4r.cn
嵌顿是什么意思hcv9jop3ns0r.cn 吃什么对痔疮好得快hcv7jop9ns6r.cn 小叶紫檀有什么功效hcv8jop7ns3r.cn 为什么脚会抽筋hcv9jop0ns2r.cn 农历8月20日是什么星座hcv8jop2ns6r.cn
腱子肉是什么意思hcv8jop3ns1r.cn 霉菌性阴炎用什么药止痒效果好hcv8jop8ns4r.cn 慢阻肺是什么原因引起的hcv9jop1ns3r.cn 右脚浮肿预示着什么hcv9jop5ns8r.cn 西芹炒什么好吃hcv8jop9ns8r.cn
百度