期刊文献+
共找到350篇文章
< 1 2 18 >
每页显示 20 50 100
A feedback-retransmission based asynchronous frequency hopping MAC protocol for military aeronautical ad hoc networks 被引量:4
1
作者 Jinhui TANG Yequn WANG +2 位作者 Shufu DONG Qilu SUN Guoce HUANG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2018年第5期1130-1140,共11页
Attacking time-sensitive targets has rigid demands for the timeliness and reliability of information transmission, while typical Media Access Control(MAC) designed for this application works well only in very light-... Attacking time-sensitive targets has rigid demands for the timeliness and reliability of information transmission, while typical Media Access Control(MAC) designed for this application works well only in very light-load scenarios; as a consequence, the performances of system throughput and channel utilization are degraded. For this problem, a feedback-retransmission based asynchronous FRequency hopping Media Access(FRMA) control protocol is proposed. Burst communication, asynchronous Frequency Hopping(FH), channel coding, and feedback retransmission are utilized in FRMA. With the mechanism of asynchronous FH, immediate packet transmission and multi-packet reception can be realized, and thus the timeliness is improved.Furthermore, reliability can be achieved via channel coding and feedback retransmission. With theories of queuing theory, Markov model, packets collision model, and discrete Laplace transformation, the formulas of packet success probability, system throughput, average packet end-to-end delay, and delay distribution are obtained. The approximation accuracy of theoretical derivation is verified by experimental results. Within a light-load network, the proposed FRMA has the ability of millisecond delay and 99% reliability as well as outperforms the non-feedback-retransmission based asynchronous frequency hopping media access control protocol. 展开更多
关键词 Ad hoc networks Aeronautical communications Frequency hopping Media Access controlmac Time-sensitive
原文传递
A NOVEL PFMAC PROTOCOL FOR WIRELESS SENSOR NETWORK BASED ON PREDICTION AND FEEDBACK METHOD 被引量:2
2
作者 LiuYaqiu Bian Li Jing Weipeng Zhang Qianlong 《Journal of Electronics(China)》 2011年第4期488-495,共8页
In view of the problem that existing Media Access Control(MAC) protocols can not pro-vide real-time monitor on network conditions,this paper puts forward a new MAC protocol- Predict and Feedback MAC(PFMAC) which can p... In view of the problem that existing Media Access Control(MAC) protocols can not pro-vide real-time monitor on network conditions,this paper puts forward a new MAC protocol- Predict and Feedback MAC(PFMAC) which can predict the channel's congestion level reasonably.The dominant idea of the new scheme is to record the channel's busy or idle situation in the backoff stage by sending Sensor Nodes(SNs),and according to the congestion level every SN can change the contention window adaptively when send packets successfully to minimize collisions,saving energy and channel resources.The result of simulation shows that compared with other MAC protocols,the PFMAC protocol can improve network throughput and reduce energy consumption in high speed network en-vironment. 展开更多
关键词 Media Access control(mac) Backoff algorithm Predict and Feedback mac(PFmac) Contention window
下载PDF
A Fairness-Enhanced Intelligent MAC Scheme Using Q-Learning-Based Bidirectional Backoff for Distributed Vehicular Communication Networks 被引量:1
3
作者 Ping Wang Shuai Wang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第2期258-268,共11页
With the increasing attention to front-edge vehicular communication applications,distributed resource allocation is beneficial to the direct communications between vehicle nodes.However,in highly dynamic distributed v... With the increasing attention to front-edge vehicular communication applications,distributed resource allocation is beneficial to the direct communications between vehicle nodes.However,in highly dynamic distributed vehicular networks,quality of service(QoS)of the systems would degrade dramatically because of serious packet collisions in the absence of sufficient link knowledge.Focusing on the fairness optimization,a Q-learning-based collision avoidance(QCA)scheme,which is characterized by an ingenious bidirectional backoff reward model RQCA corresponding to arbitrary backoff stage transitions,has been proposed in an intelligent distributed media access control protocol.In QCA,an intelligent bidirectional backoff agent based on the Markov decision process model can actively motivate each vehicle agent to update itself toward an optimal backoff sub-intervel BSIopt through either positive or negative bidirectional transition individually,resulting in the distinct fair communication with a proper balance of the resource allocation.According to the reinforcement learning theory,the problem of goodness evaluation on the backoff stage self-selection policy is equal to the problem of maximizing Q function of the vehicle in the current environment.The final decision on BSI_(opt) related to an optimal contention window range was solved through maximizing the Q value or Q_(max).The ε-greedy algorithm was used to keep a reasonable convergence of the Q_(max) solution.For the fairness evaluation of QCA,four kinds of dynamic impacts on the vehicular networks were investigated:mobility,density,payload size,and data rate with a network simulator NS2.Consequently,QCA can achieve fair communication efficiently and robustly,with advantages of superior Jain’s fairness index,relatively high packet delivery ratio,and low time delay. 展开更多
关键词 media access control(mac) FAIRNESS Q-learning-based collision avoidance(QCA) bidirectional backoff agent vehicular communication networks
原文传递
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
4
作者 Abdallah Elhigazi Abdallah Mosab Hamdan +6 位作者 Shukor Abd Razak Fuad A.Ghalib Muzaffar Hamzah Suleman Khan Siddiq Ahmed Babikir Ali Mutaz H.H.Khairi Sayeed Salih 《Computers, Materials & Continua》 SCIE EI 2023年第3期5607-5623,共17页
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local ... IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection. 展开更多
关键词 802.11 media access control(mac) wireless local area network(WLAN) artificial neural network denial-of-service(DoS)
下载PDF
移动自适应的无线传感器网络MAC协议研究进展 被引量:1
5
作者 董义 周亮 +3 位作者 张爱清 陈建新 周暄承 鲁希若 《南京邮电大学学报(自然科学版)》 北大核心 2014年第2期10-18,26,共10页
包含运动节点的无线传感网应用得到了越来越多的关注。节点的运动对于无线传感器网络MAC(Medium Access Control)协议设计提出了很多挑战。文中研究当前节点运动处理的方法。首先介绍了节点运动的特征及其对于网络的影响。其次,指出了... 包含运动节点的无线传感网应用得到了越来越多的关注。节点的运动对于无线传感器网络MAC(Medium Access Control)协议设计提出了很多挑战。文中研究当前节点运动处理的方法。首先介绍了节点运动的特征及其对于网络的影响。其次,指出了移动自适应的无线传感器网络MAC协议的发展脉络,对于典型协议进行比较,并指出各自的优缺点。最后,展望了这类协议的发展趋势和方向。 展开更多
关键词 移动无线传感网 综述 节点运动 MEDIUM ACCESS control(mac)
下载PDF
Modeling and Simulation of P-Aloha,CSMA /CA and MACAW Protocols for Underwater Acoustic Channel 被引量:1
6
作者 DAO Van-phuong 左加阔 +3 位作者 赵力 NGUYEN Dang-nam 邹采荣 孙剑 《Journal of Donghua University(English Edition)》 EI CAS 2015年第1期35-40,共6页
Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks ... Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks have been designed with negligible propagation delay. If it is deployed directly in an underwater environment,the UANs will perform inefficiently. In this paper,the characteristics of underwater acoustic channel are modeled and simulated by using the OPNET simulation tool,which are the speed of sound, propagation loss, and four sources for ambient noise: the turbulence,shipping,wind driven waves and thermal noise. The performance of pure Aloha( P-Aloha),carrier sense multiple access with collision avoidance( CSMA / CA) and multiple access collision avoidance for wireless local area network( MACAW) protocols in underwater acoustic channel environment are evaluated. The different performance of protocols in underwater environment is compared in the simulation. 展开更多
关键词 underwater acoustic channel OPNET simulation medium access control(mac) protocol pure Aloha(P-Aloha) protocol carrier sense multiple access with collision avoidance(CSMA /CA) protocol multiple access collision avoidance for wireless local area network(macAW) protocol
下载PDF
OPTIMIZATION OF SPECTRUM UTILIZATION IN COGNITIVE RADIO SYSTEM
7
作者 Li Hongjiang Zhu Qi 《Journal of Electronics(China)》 2011年第4期450-459,共10页
In Cognitive Radio(CR) networks,CR user has to detect the spectrum channel periodically to make sure that the channel is idle during data transmission frame in order to avoid the collisions to the primary users.Hence ... In Cognitive Radio(CR) networks,CR user has to detect the spectrum channel periodically to make sure that the channel is idle during data transmission frame in order to avoid the collisions to the primary users.Hence recent research has been focused on the interference avoidance problem.Quality of Service(QoS) requirement of CR user will affect the time of data transmission in each frame.In this paper,in order to solve the interference avoidance and spectrum utilization problems without cooperation among CR users,a new scheme to obtain the optimal duration of data transmission frame is proposed to maximize the spectrum utilization and guarantee the protection to the primary users.The main advantages of our proposed scheme include the followings:(1) QoS requirement of CR user is concerned;(2) p-persistent Media Access Control(MAC) random access is used to avoid the collisions among CR users;(3) CR network system capacity is considered.We develop a Markov chain of the primary spectrum channel states and an exponential distribution of the CR user's traffic model to analyze the performance of our proposed scheme.Computer simulation shows that there is an optimal data transmission time to maximize the spectrum utilization.However,the regulatory constraint of the collision rate to the primary users has to be satisfied at the expense of spectrum utilization.And also the tradeoff between the spectrum utilization and the capacity of the CR system is taken into account. 展开更多
关键词 Cognitive Radio(CR) Collision rate Traffic model Media Access control(mac) random access TRADEOFF
下载PDF
Exploration of Energy Conservation MAC Protocol of WSNs for Ubiquitous Environment
8
作者 WEI Wei QI Yong HOU Di 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期509-512,共4页
According to analyze the facade phenomenon of wire-less sensor networks(WSNs),this paper proposes a feasible method to state clearly and improve the power control efficiency of wire-less sensor networks(WSNs). One... According to analyze the facade phenomenon of wire-less sensor networks(WSNs),this paper proposes a feasible method to state clearly and improve the power control efficiency of wire-less sensor networks(WSNs). One of the crucial problems for WSNs is the design of medium access control (MAC) protocol. Our method want to adjust the activities of the MAC protocols control to achieve the enery conservation when the wireless communication module of sensor nodes is running, which is the major consumer of energy consumed by sensors energy. The energy efficiency of MAC protocol makes a strong impact on the network performance. To some extent,our research work describes and analyze the sources of energy consumption in MAC layer and simultaneously present an optimal method for the design of MAC protocol. Then we discusses some factors impacting on the performance of MAC protocol and metrics of performance evaluation. Eventually, the coming research direction is summarized. 展开更多
关键词 wireless sensor networks (WSNs) medium accesscontrol energy conservation medium access controlmac protocols
下载PDF
Development of Recovery and Redundancy Model for Real Time Wireless Networks
9
作者 Boniface Kayode Alese Bamidele Moses Kuboye Omolara Iyabode Alabede 《Journal of Computer Science Research》 2022年第3期12-19,共8页
The growth in wireless technologies applications makes the necessity of providing a reliable communication over wireless networks become obvious.Guaranteeing real time communication in wireless medium poses a signific... The growth in wireless technologies applications makes the necessity of providing a reliable communication over wireless networks become obvious.Guaranteeing real time communication in wireless medium poses a significant challenge due to its poor delivery reliability.In this study,a recovery and redundancy model based on sequential time division multiple access(S-TDMA)for wireless communication is developed.The media access control(MAC)layer of the S-TDMA determines which station should transmit at a given time slot based on channel state of the station.Simulations of the system models were carried out using MATLAB SIMULINK software.SIMULINK blocks from the signal processing and communication block sets were used to model the communication system.The S-TDMA performance is evaluated with total link reliability,system throughput,average probability of correct delivery before deadline and system latency.The evaluation results displayed in graphs when compared with instant retry and drop of frame were found to be reliable in recovering loss packets. 展开更多
关键词 Sequential time division multiple access(S-TDMA) Wireless REDUNDANCY PACKETS Media access control(mac)
下载PDF
Collision Classification MAC Protocol for Underwater Acoustic Communication Networks Using Directional Antennas
10
作者 Jianmin Yang Gang Qiao +3 位作者 Qing Hu Lingji Xu Peng Xiao Jiarong Zhang 《China Communications》 SCIE CSCD 2022年第5期241-252,共12页
Traditional underwater acoustic communication networks(UACNs)generally use omnidirectional transmission technology that causes a large number of data-packet collisions,thus resulting in low network throughput and high... Traditional underwater acoustic communication networks(UACNs)generally use omnidirectional transmission technology that causes a large number of data-packet collisions,thus resulting in low network throughput and high end-to-end delays.Compared with omnidirectional transmission technology,directional technology only sends and receives data packets in a specified direction.This can significantly reduce the probability of collisions and improve network performance.However,it also causes a deafness problem,which occurs when the sending node sends a data packet to the receiving node but the receiving node is unable to reply to the sender,because its antenna beam is closed.To resolve this issue,this study proposes a collision classification media access control(CC-MAC)protocol for UACNs.With this protocol,the underwater acoustic channel is divided into two subchannels,and the nodes transmit corresponding data types on them.The sending node can estimate the current status of the receiving node(i.e.,no collision,normal collision,deafness)according to the type of the data packet received and the sub-channel it arrived on,and it can choose correct options to improve network efficiency.Finally,we verify the performance of CC-MAC via simulations,showing that the protocol achieved higher network throughput and lower end-toend delays. 展开更多
关键词 collision classification directional antennas dual channel media access control(mac) underwater acoustic communication networks(UACNs)
下载PDF
An adaptive cooperative MAC protocol compatible with legacy 802.11 DCF
11
作者 Zhenfeng SONG 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2010年第2期197-202,共6页
A novel adaptive cooperative medium access control(MAC)protocol,which is completely backward compatible with the legacy IEEE 802.11 distributed coordination function(DCF),is proposed in this paper.To adapt to dynamic ... A novel adaptive cooperative medium access control(MAC)protocol,which is completely backward compatible with the legacy IEEE 802.11 distributed coordination function(DCF),is proposed in this paper.To adapt to dynamic channel variation and network topology,the sender adaptively selects transmission scheme based on the instantaneous channel measurements.Analytical and simulation results show that the proposed protocol outperforms the existing one in terms of throughput,delay,energy and mobility. 展开更多
关键词 cooperative communication medium access control(mac) distributed coordination function(DCF)
原文传递
局域网内ARP协议攻击及解决办法 被引量:40
12
作者 陈英 马洪涛 《中国安全科学学报》 CAS CSCD 2007年第7期126-131,共6页
地址解析协议(ARP,Address Resolution Protocol)是用于关联某个3层(网络层)地址(如IP地址)和某个两层(数据链路层)地址(MAC地址)。由于ARP协议的自身的缺陷,使得ARP协议在使用的过程中存在着盗用IP地址和ARP欺骗等严重的安全问题。笔... 地址解析协议(ARP,Address Resolution Protocol)是用于关联某个3层(网络层)地址(如IP地址)和某个两层(数据链路层)地址(MAC地址)。由于ARP协议的自身的缺陷,使得ARP协议在使用的过程中存在着盗用IP地址和ARP欺骗等严重的安全问题。笔者在对ARP协议简要介绍的基础上,主要分析了利用ARP协议漏洞进行网络攻击的原理和攻击的常见方式,并提出相关的ARP攻击的解决办法。 展开更多
关键词 地址解析协议(ARP) IP地址 媒体存取控制(mac) IP转发 ARP欺骗
下载PDF
强制访问控制MAC的设计及实现 被引量:16
13
作者 郭玮 茅兵 谢立 《计算机应用与软件》 CSCD 北大核心 2004年第3期1-2,13,共3页
访问控制是计算机信息保护中极其重要的一个环节 ,本文针对自主访问控制的缺陷 ,介绍了更强力的强制访问控制(MAC) ,强制访问控制是根据客体中信息的敏感标记和访问敏感信息的主体的访问级对客体访问实行限制的一种方法。本文在简单介... 访问控制是计算机信息保护中极其重要的一个环节 ,本文针对自主访问控制的缺陷 ,介绍了更强力的强制访问控制(MAC) ,强制访问控制是根据客体中信息的敏感标记和访问敏感信息的主体的访问级对客体访问实行限制的一种方法。本文在简单介绍了强制访问控制的优点后给出了它的形式化定义及其基本规则 。 展开更多
关键词 计算机安全 信息保护 强制访问控制 自主访问控制
下载PDF
以太网技术基础讲座(四):以太网帧结构 被引量:12
14
作者 王廷尧 马克城 《光通信技术》 CSCD 北大核心 2002年第6期55-59,共5页
以太网帧是以太网中传输信息存在的基本形式,是以太网络通信信号的基本单元.一般将以太网帧分为两类即数据帧与管理帧.
关键词 以太网 讲座 帧结构
下载PDF
基于强制访问控制的文件安全监控系统的设计与实现 被引量:15
15
作者 王雷 庄毅 潘龙平 《计算机应用》 CSCD 北大核心 2006年第12期2941-2944,共4页
重点分析了基于信息保密的BLP(Bell-LaPadula)模型和基于信息完整性的Biba模型,基于这两个模型设计了兼顾系统保密性和完整性需求的强制访问控制模型,并结合Windows文件过滤驱动程序开发了一个基于该强制访问控制模型的文件安全监控系统... 重点分析了基于信息保密的BLP(Bell-LaPadula)模型和基于信息完整性的Biba模型,基于这两个模型设计了兼顾系统保密性和完整性需求的强制访问控制模型,并结合Windows文件过滤驱动程序开发了一个基于该强制访问控制模型的文件安全监控系统,对其主要模块和关键技术进行了详细介绍。该文件安全监控系统可有效地维护文件系统的保密性和完整性,检测并阻断本地与网络的入侵。 展开更多
关键词 强制访问控制 模型 文件过滤驱动 文件监控系统
下载PDF
LoRa无线网络MAC层TDMA时隙分配协议研究 被引量:21
16
作者 李民政 资文彬 王浩 《计算机工程》 CAS CSCD 北大核心 2019年第9期95-99,118,共6页
轮询协议是一种经典的介质访问控制(MAC)层时分多址(TDMA)时隙分配协议,具有无冲突数据通信且功耗低的特点,但无法保证通信可靠性及实现有区别服务。为此,研究一种具有动态重传和差异服务机制的TDMA时隙分配协议。重新设计帧结构,根据... 轮询协议是一种经典的介质访问控制(MAC)层时分多址(TDMA)时隙分配协议,具有无冲突数据通信且功耗低的特点,但无法保证通信可靠性及实现有区别服务。为此,研究一种具有动态重传和差异服务机制的TDMA时隙分配协议。重新设计帧结构,根据终端节点数据包信息完成静态时隙分配,在数据传输失败时,利用重传时隙提高通信可靠性,通过影子时隙实现有区别服务。在无线抄表系统上的实验结果表明,与经典轮询协议相比,该协议的丢包率降低了3 %。 展开更多
关键词 LoRa无线网络 介质访问控制层 时分多址 时隙分配 无线抄表
下载PDF
一种新型移动通信网络——Ad Hoc网络 被引量:7
17
作者 李可 《军民两用技术与产品》 2004年第5期44-48,共5页
无线移动Ad H oc 网络由于其无固定基础设施、自我组织、分布管理、动态拓扑、多跳通信等特点成为近年研究的热点。各结点的媒体接入控制( M AC) 层协议规定了结点接入信道进行通信的机制,网络层路由协议规定... 无线移动Ad H oc 网络由于其无固定基础设施、自我组织、分布管理、动态拓扑、多跳通信等特点成为近年研究的热点。各结点的媒体接入控制( M AC) 层协议规定了结点接入信道进行通信的机制,网络层路由协议规定了如何搜寻站点和维护高速动态拓扑的网络。介绍了 Ad H oc 网络的基本特性,并分析了现有主要的几种 M AC 协议和路由协议。 展开更多
关键词 AD HOC网络 移动通信网络 分组无线网 报文转发能力
下载PDF
基于LSM的安全访问控制实现 被引量:5
18
作者 阮越 王成耀 《计算机工程》 CAS CSCD 北大核心 2004年第1期4-5,13,共3页
LSM是Linus Torvalds提出来的支持多种安全策略的底层架构。而细粒度的自主 访问控制和强制访问控制是安全操作系统中必不可少的一部分。文章介绍了LSM项目的结构 与设计,并以此为基础讨论了细粒度的自主访问控制和强制访问控制在其上... LSM是Linus Torvalds提出来的支持多种安全策略的底层架构。而细粒度的自主 访问控制和强制访问控制是安全操作系统中必不可少的一部分。文章介绍了LSM项目的结构 与设计,并以此为基础讨论了细粒度的自主访问控制和强制访问控制在其上的实现。 展开更多
关键词 LSM 钩子函数 自主访问控制 强制访问控制
下载PDF
多跳吞吐量分析及邻节点实时估计算法设计 被引量:15
19
作者 朱清超 《计算机应用》 CSCD 北大核心 2017年第9期2484-2490,共7页
针对媒体接入控制(MAC)协议吞吐量理论分析中单跳性、静态性不足,提出一种面向移动自组网(MANET)的多跳分析模型,并设计了邻节点实时估计算法。首先,基于二维离散时间马尔可夫链(DTMC)吞吐量模型,定义距离参数欧实比(ERR),建立泊松网络(... 针对媒体接入控制(MAC)协议吞吐量理论分析中单跳性、静态性不足,提出一种面向移动自组网(MANET)的多跳分析模型,并设计了邻节点实时估计算法。首先,基于二维离散时间马尔可夫链(DTMC)吞吐量模型,定义距离参数欧实比(ERR),建立泊松网络(PN)分布时多跳吞吐量分析模型;其次,定性分析理论与仿真误差的原因之一在于邻节点的动态性,即模型缺乏移动性考虑;然后,基于卡尔曼滤波算法,定义系统状态更新规则和测量规则,设计一种与泊松节点分布、随机行走模型相适应的邻节点实时估计算法;最后,对比分析多跳吞吐量分析模型的性能。实验结果表明,虽引入0.13 s计算时延,但在吞吐量方面,其精度提高了8%,实现了理论分析模型的多跳扩展和移动性考量。 展开更多
关键词 移动自组网 吞吐量 媒体接入控制 泊松分布 卡尔曼滤波算法
下载PDF
集中式无线局域网的仿真 被引量:5
20
作者 白菊蓉 李明远 《西安邮电学院学报》 2004年第1期18-20,共3页
基于OPNET平台,构建出一个集中式无线局域网的仿真模型。对比分析了在轮询———应答MAC多址接入协议下,采用不同的物理层特征参数(跳频、直接序列)时,网络性能(吞吐量、媒体接入时延、丢包率)的差异,用以选取最佳解决方案。
关键词 集中式无线局域网 OPNET mac 媒体接入控制 网络模型 节点模型 进程模型
下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部