• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Time sequential influence maximization algorithm based on neighbor node influence①

    2022-07-06 03:23:14CHENJingQIZiyiLIUMingxin
    High Technology Letters 2022年2期

    CHEN Jing (陳 晶), QI Ziyi?, LIU Mingxin

    (?School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, P.R.China)(??Hebei Key Laboratory of Virtual Technology and System Integration, Qinhuangdao 066004, P.R.China)

    (???Hebei Key Laboratory of Software Engineering, Qinhuangdao 066004, P.R.China)

    (????College of Electronic and Information Engineering,Guangdong Ocean University, Zhanjiang 524088, P.R.China)

    Abstract In view of the forwarding microblogging, secondhand smoke, happiness, and many other phenomena in real life, the spread characteristic of the secondary neighbor nodes in this kind of phenomenon and network scheduling is extracted, and sequence influence maximization problem based on the influence of neighbor nodes is proposed in this paper. That is, in the time sequential social network, the propagation characteristics of the second-level neighbor nodes are considered emphatically, and k nodes are found to maximize the information propagation. Firstly, the propagation probability between nodes is calculated by the improved degree estimation algorithm. Secondly, the weighted cascade model (WCM) based on static social network is not suitable for temporal social network. Therefore, an improved weighted cascade model (IWCM) is proposed, and a second-level neighbors time sequential maximizing influence algorithm (STIM) is put forward based on node degree. It combines the consideration of neighbor nodes and the problem of overlap of influence scope between nodes,and makes it chronological. Finally,the experiment verifies that STIM algorithm has stronger practicability, superiority in influence range and running time compared with similar algorithms, and is able to solve the problem of maximizing the timing influence based on the influence of neighbor nodes.

    Key words: neighbor node influence, time sequential social network, influence maximization(IM), information propagation model

    0 Introduction

    With the rapid development of Internet, more and more people like to spread their ideas and information through social media to influence other users on the platform. How to make the shared information spread quickly and influence the widest range has become a hot issue in the field of social network analysis.For this kind of problem,Ref.[1] proposed the influence maximization problem for the first time. At present, the widely used problem of influence maximization based on static social network is to findkusers in the social network as seed nodes, so that the information can influence other users in the network as much as possible throughkusers under a specific propagation model.

    At present, most studies usually abstract social network as static graph, which simplifies the study of influence maximization problem, while neglecting some important characteristics existing in the actual network,thus causing the problem of inaccurate scope of influence. To solve this problem, in view of the timing of network and the propagation characteristics of neighbor nodes, taking the timing social network and secondlevel neighbor nodes as the research objects, and a timing influence maximization algorithm based on the influence of neighbor nodes and the improved weighted cascade model (IWCM) is proposed in this paper.This algorithm has strong pertinence and practicability,and can efficiently solve the problem of maximizing the time sequential influence based on the influence of neighbor nodes.

    Because time sequential effect maximization research based on the influence of the neighbor node is very few, and most studies focused on only considering the temporal characteristics of the network or only considering the influence of the neighbor nodes, without considering a variety of characteristics of network, so the timing effect maximization problem based on the influence of the neighbor node challenges are as follows.(1) The traditional information dissemination model does not consider the timing characteristics of the network, it cannot be applied to the timing social network; (2) In the process of seed node selection, it is necessary to comprehensively consider the propagation characteristics of the second-level neighbor nodes and the timing of the network.

    In order to solve the above problems, taking the time sequential social network as the research object,timing the traditional information transmission model,the time sequential influence maximization algorithm is designed based on the influence of neighbor nodes.Firstly, the influence measurement method of secondlevel neighbor nodes and the selection method of seed nodes are given. Secondly, the second-level neighbor node influence measurement method is time-serialized so that it can be applied to time-series social networks.Second-level neighbors time sequential maximizing influence algorithm (STIM) takes full account of various characteristics of the network, and is able to efficiently solve the problem of maximizing the time sequential influence based on the influence of neighbor nodes, and provides a foundation for the modeling of related problems, the selection of seed nodes and how to reduce the time complexity.

    The major contributions of this paper are as follows.

    (1) On the basis of the traditional weighted cascade propagation model, a new method of transmission probability between computing nodes is introduced,and an improved weighted cascade model is proposed.It enables information to be transmitted in the social network graph based on time sequential relationship.

    (2) In view of the propagation characteristics of secondary neighbor nodes in the network, the influence measurement method of secondary neighbor nodes is designed, and the timing characteristics of the network are integrated into the selection process of seed nodes.

    (3) It is verified that STIM algorithm can efficiently solve the problem of time sequential influence maximization based on the influence of neighbor nodes,and guarantee a high influence range under the premise of short running time.

    The structure of this paper is as follows. In Section 1, the related work is introduced. In Section 2,the main definition and propagation model of the time sequential influence maximization problem based on the influence of neighbor nodes are discussed. In Section 3, the correlation algorithm of the time sequential influence maximization problem based on the influence of neighbor nodes is described. In Section 4, the experiment results on different data sets are analyzed and compared. In Section 5, the work of this paper is summarized and prospected.

    1 Related work

    In recent years, researchers at home and abroad have done a lot of research work on impact maximization. Kempe et al.[2]proposed the greedy algorithm for the problem of influence maximization (IM) and proved that its operation result could reach an approximate optimal of 63%. However, the greedy algorithm still has a high time complexity and is not suitable for large-scale social networks. Leskovec et al.[3]optimized the traditional greedy algorithm for the submodularity and monotonicity of the influence maximization problem, and proposed a cost-effective lazy-forward(CELF) algorithm, which is about hundreds of times faster than the greedy algorithm. Goyal et al.[4]proposed CELF ++ by optimizing CELF algorithm, and proved that it was 35% -55% faster than CELF.

    All the above algorithms are greedy algorithms or improved greedy algorithms. In recent years, many researchers have studied heuristic algorithms with lower time complexity. Chen et al.[5]proposed the DegreeDiscount algorithm to solve the overlap problem of influence range of traditional degree estimation algorithms. The node with the highest degree is selected as the seed node, and then the degree of the neighbors of the selected node is discounted untilknodes are selected. Zhou and Gao[6]used PageRank algorithm to estimate the influence of nodes, and selected nodes with greater influence as alternative nodes to calculate the combined collision probability of alternative nodes. Li et al.[7]proposed an influence maximization algorithm based on k-kernel filtering in combination with the heuristic algorithm. It has been verified that the algorithm has a wider scope of influence compared with the existing heuristic algorithm.

    At present, more and more researchers begin to study the extension deformation with maximum effect.Qiu et al.[8]proposed the influence maximization algorithm of overlapping communities, which could increase the running time by up to 90% and could be applied to large social networks. Ren et al.[9]proposed the problem of influence maximization under multi-topic consciousness. Across-social network model of influence maximization for topic perception is designed by improving the linear threshold model, and seed nodes are selected by means of heuristic algorithm. Li et al.[10]took price and other factors into consideration, and studied how to price a product under multiple conditions to maximize income. Zhao et al.[11]took into account the situation that there are multiple relationships among users in social networks and that multiple relationships affect information transmission together, MRRRSET algorithm was proposed to solve the problem of influence maximization of multi-relationship social networks.

    Kim et al.[12]transferred the research object of maximum impact to the dynamic graph and designed an algorithm to deal with the update operation on the dynamic graph. Wang et al.[13]defined novel influence maximization (IM) queries in social networks and used a window sliding model to solve the problem of realtime impact maximization on dynamic graphs.Zhang et al.[14]studied the problem of influence maximization when there are different relationships in the network that mutually promote communication and inhibit communication. Guo and Lu[15]improved the sketch-based design influence maximization algorithm and applied it to the influence maximization problem of dynamic graphs, then recalculated the seed node set by calculating the influence of the deletion or addition of nodes on the current sampling set. Cao et al.[16]set a time window and regarded the connection between nodes as an action. The window slides down with time, and then the new action enters the window while the old action exits. According to the entry and exit of nodes, it is judged whether it is necessary to recalculate the seed nodes in the window obtained in the previous period to solve the problem of maximizing the influence in the dynamic graph. Wu et al.[17]studied the problem of influence maximization with the object of time sequence diagram, improved the traditional independent cascade model, and proposed two algorithms AIMT and IMIT to solve the problem of influence maximization of time sequence diagram. Wei et al.[18]studied the influence maximization problem of dynamic social networks with time change as the main feature, and proposed the influence maximization algorithm of dynamic social networks based on the feature. Yang et al.[19]proposed a method to measure the influence of complex network nodes with three levels of neighbors according to the propagation characteristics of neighbor nodes. This method regarded the neighbors of node level 2 and 3 with propagation attenuation characteristics as a whole to measure the influence ability of nodes.

    2 Problem definition

    2.1 Basic definition

    Definition 1 (time sequential social network)Given networkGT(V,E,TE) based on the time sequential relationship between social network diagram,Vrepresents node set,Erepresents the edge of the collection, including |V| =n, |E| =m,TErepresents the set of moments with connection between nodes in the network, andT(u,v)represents the set of moments with connection between nodesuandv.

    Take Fig.1 as an example to illustrate the social network graph based on time sequential relationship.Compared with static social network graphG(edge weights for the node transmission probability), time sequential social network graphGTare given the concept of timeline, each node only at specific time points, the weight on the edge represents the moment when there is a connection between the two nodes. For example, in Fig.1(b), nodeaand nodebare only connected at two moments 3 and 6, there is no connection at other moments. Now calculate the influence range of nodeain Fig.1(a) and Fig.1(b) respectively. The calculation process is as follows.

    For convenience of calculation, it can be supposed that the propagation probability between nodes in Fig.1(a) and Fig.1(b) is the same, and is the weight values of each edge in Fig.1(a). Therefore, in Fig.1(a), nodeaactivates nodeband nodecwith probabilities of 0.1 and 0.03, respectively. If nodecis activated at this time, then nodecactivates nodeewithaprobability of 0.1. If nodeeis activated at this time, then nodeasuccessfully activates nodecande,with an influence range of 2. In Fig.1(b), nodeaactivates nodeband nodecat moments 3 and 2 with probabilities of 0.1 and 0.03, respectively. If nodecis activated, then nodecwill be activated after time 2.Since nodecand nodeeare only connected at time 1,and nodecis not activated at time 1, nodecwill no longer be able to activate nodee.Therefore, nodeawill only successfully activate nodecand its influence range is 1.

    Therefore, it can be seen that if only the static graph-based influence maximization algorithm is applied to the time sequential social network graph, the correct result cannot be obtained. Therefore, it is necessary to study the time sequential relations based social network influence maximization problem.

    2.2 Calculation of propagation probability

    Definition 2 (propagation probability) The probability that the active nodeusuccessfully activates its neighbor nodevthrough the edge (u,v) is the propagation probability, expressed asPu,v∈[0,1].

    Fig.1 Static graph and time sequential social network graph

    In the traditional research of influence maximization algorithm, the degree estimation method is usually used to calculate the probability of inter-node propagation, that is, the reciprocal of in-degree of the node is used to estimate the probability of the node being activated by the upper node, as shown in Eq.(1).

    Pu,v=1/InDegree(v) (1)

    In Eq.(1), InDegree(v) represents the in-degree of nodev.

    This method has been well proved and applied in the traditional research of influence maximization algorithm. However, the method does not take into account the problem of different contact times between nodes in the social network graph based on time sequential relationship. Now, an example is given to illustrate this problem, as shown in Fig.2. In the static graphG,the in-degree of nodecis 2, the probability that nodecis affected by both nodesaanddis 1/2. But in figureGT, when considering the number of connections, it can be found that the contact number of nodescandais less than the contact number of nodescandd, and the more times a node is contacted, the greater the probability that it will be affected. Therefore, in Fig.2(b), the probability of nodecbeing affected by nodeashould be less than the probability of nodecbeing affected by noded.The calculation result is inconsistent with that in Fig.2(a), that is, it is inaccurate to use traditional degree estimation methods to calculate the probability of node influence in a time sequential social network graph.Therefore,the traditional calculation method needs to be improved.

    In the Eq.(2),|T(u,v)| represents the number of connections between nodeuand nodev,andvkrepresents all in-degree nodes of nodev.

    Fig.2 Schematic diagram of propagation probability calculation

    2.3 Improvement of weighted cascading model

    2.3.1 Traditional weighted cascading model

    In the traditional weighted cascade model(WCM),each directed edge(u,v) is given a real valuePu,v=1/InDegree(v) andPu,v∈[0,1], wherePu,vrepresents the probability that nodeusuccessfully influences nodevthrough the directed edge (u,v).The propagation process of WCM model is as follows: at the initial timet,the active nodeuhas only one chance to activate each of its inactive neighbor nodesv,and the activation probability isPu,v.If nodevhas multiple active parents at timet,then the active parent node activates nodevin any order at timet.Ifvis successfully activated, it becomes active node at timet+ 1 and tries to activate its next level of inactive neighbor node in the same way. This cycle continues until no new nodes in the network are activated.

    2.3.2 Improve the weighted cascade model

    Definition 3 (node active initial time) The time when nodevis successfully activated by its active parent nodeuis its active initial time, which is expressed asActvandActv=min{t|(t∈T(u,v) andt≥Actu)}.

    Take Fig.2(b) as an example, the set nodedis the seed node (the initial active time of the seed node is 0),and if it successfully activates nodec,Actc=min{4,5} =4.

    The traditional influence maximization algorithm does not consider the initial time when nodes are activated,while the initial time when nodes are successfully activated in the time sequential social network graph needs to be considered. Therefore, the traditional weighted cascade model is improved, and a new propagation model is obtained based on time sequential social network graph—improved weighted cascade model in this paper.

    Take Fig.1(b) as an example, let nodedbe the seed node and successfully activate its neighbor nodec,then the initial active time of nodec,Actc=2, that is, nodecis active after time 2. And because nodecand nodeeare only connected at time 1, at this timecis still in an inactive state, so nodecmust not activate nodee.

    The IWCM propagation model is proposed based on the WCM propagation model, so that information can be transmitted in the social network graph based on the time sequential relationship. The propagation process of information in the time sequential social network diagram through the IWCM model is described as follows.

    (1) In the initial network, the initial active time of all nodes is set toActv= - 1, indicating that all nodes are in an inactive state. Set the initial active time of seed nodeu,Actu=0, indicating that the seed node is in active state at the time of 0. At this point,seed nodeuactivates its neighbor nodevwith a certain probability, and nodeuhas only one chance to try to activate nodev.

    (3) No matter whether the node can activate nodevor not,uwill not try to activate nodevin the future propagation process.

    (4) If nodevis successfully activated, its initial active timeActvis recorded, whereActv∈T(u,v),Actu≦Actv≦max(T(u,v)).

    (5) In the whole network, information is transmitted from new active nodes to inactive neighbor nodes until no new nodes in the network are activated.

    2.4 Problem definition

    This section defines and explains the problem of time sequential influence maximizing based on the description of the above discussions. And the concept of node influence and marginal benefit in time sequential social network is introduced.

    Definition 4 (node influence) Node influence refers to the set of all nodes that can be successfully activated by nodevin the network, expressed asσ(v).

    Definition 5 (marginal benefit) The marginal benefit of nodevrefers to the increase in revenue that can be brought by adding a nodevto the seed setS.The calculation formula is shown in Eq.(3).

    Problem definition (time sequential influence maximization problem based on neighbor node influence) Given time sequential social network graphGT= (V,E,TE), and specific propagation model, in the time sequential social network to find a node setS,the number of nodes in the setS|S|=k, make the effect of the setSmost widely, setSis the seed node set ofGT.

    3 Time sequential influence maximization algorithm based on neighbor node influence

    3.1 Influence measurement method of second-level neighbor nodes

    The influence of nodes on second-order neighbor nodes can be explained by independent probability events in probability statistics. Independent probabilistic events are defined as:if eventAand eventBare independent,thenP(AB)=P(A)×P(B),that is,the probability of eventAand eventBoccurring at the same time is the probability of eventAmultiplied by the probability of eventBoccurring.

    Similarly, in the time sequential social network as shown in Fig.3, the probability that node 1 activates node 4 through node 2 is the probability that node 1 activates node 2 multiplied the probability that node 2 activates node 4 , that is,P(node1activatesnode4throughnode2)=0.2 ×0.3 =0.06.

    Fig.3 Social network diagram (second-level neighbor)

    Given the time sequential social networkGT(V,E,TE),VandErepresent network node set and edge set respectively, andTErepresents the set at the time when there is a connection between nodes.According to the improved weighted cascading model, the probability that nodeuactivates its neighbor nodevisPu,v,and the probability that nodevactivates its next-level nodev1isPv,v1,then the probability that nodeuactivates its neighbor node and second-level neighbor node along the path (u,v,v1) is shown in Eq.(4).

    P=Pu,v+Pu,v×Pv,v1(4)wherein,Prepresents the sum of the probability that nodeuactivates its neighbor nodes and second-level neighbor nodes on the path (u,v,v1).

    Therefore, nodeuis the sum of activation probabilities of all its neighbor nodes and second-level neighbor nodes in the whole network, as shown in Eq.(5).

    Since the influence range of nodes is directly affected by the activation probability between nodes,Eq.(5) can be used to estimate the influence range of nodes. However, when information is transmitted in the actual social network as shown in Fig.3, node 3 is set as the seed node, and the information transmission process is as follows.

    Time step 0 Activate node 3.

    Time step 1 Node 3 tries to activate node 2 and node 1 with probabilities of 0.15 and 0.2 respectively,assuming that both node 2 and node 1 are successfully activated.

    Time step 2 Since node 2 is already active at this time, node 1 will not try to activate node 2 again.However, when calculating the influenceP1of node 1,the influence probability of node 1 on node 2 has been included, which is inconsistent with the actual transmission process.

    Considering the influence range overlap between the nodes, when nodeiis selected as seed nodes, all parent nodesuand ancestor nodesv(the relationship between nodei, nodeu, and nodevare shown in Fig.4) are treated with influence discount. In its estimate, subtract the overlapping part of influence, as shown in Eqs(6) and (7).

    wherein, nodevis the ancestor node of nodei, and nodeuis the parent node of nodei.

    Fig.4 Schematic diagram of node relationship

    3.2 Timing of influence

    Due to the addition of time sequential relationship in time sequential social network, Eqs(6) and (7)need to be time-serialized.As shown in Fig.5, assuming that the initial active time of node 4 is 2, node 4 is already active when node 4 contacts node 2 and node 5. Therefore, node 2 and node 5 have a chance to be activated by node 4 respectively. However, if the initial active time of node 4 is assumed to be 5, node 4 is inactive in the two moments (2 and 3) when node 2 and node 4 are connected, so node 4 has no opportunity to activate node 2. But, node 4 is already active at the time 6 when node 4 is in contact with node 5.Therefore, node 5 has a chance to be activated by node 4 once. It can be seen that, since the initial active time of all nodes in the network is in an unknown state, the larger the maximum value of the contact time between two nodes, the greater the chance that the node has to be tried to activate.From the above examples, it can be seen that the maximum value of the contact time between two nodes max(T(u,v)) will have an impact on the influence range of nodes, and the larger the maximum value of the contact time between two nodes, the wider the influence range of nodes. Therefore, consideration of max(T(u,v)) is added into the estimation formula of the influence range of nodes, and the time-serialized formula is

    Fig.5 Time sequential social network (second-level neighbor)

    where,Pv′is the estimated value of influence of nodeuafter discount.

    At the same time, the influence of its ancestor nodevis updated, and the influence range of the updated node is shown in Eq.(10).

    3.3 Description of STIM algorithm

    The main research strategy of STIM algorithm proposed is heuristic strategy, that is, the influence of non-seed nodes is estimated in each seed node selection process, and the nodeuwith the largest estimated value is selected as the seed node.

    The idea of STIM algorithm is as follows: the problem of time sequential social network influence maximization is solved in two steps. Firstly, the node influence of the second-level neighbor is estimated according to the measurement method in subsection 3.1.Then, according to the influence estimation results,the nodeuwith the largest estimated value is selected as the next seed node, until allkseed nodes are found out. The specific description process of STIM algorithm is Algorithm 1.

    Algorithm 1 STIM Input: social network GT(V,E,TE), k;Output: seed set S;(1) Calculate propagation probability between nodes in time sequential social network according to the calculation method of propagation probability between nodes in subsection 3.2;(2) Use Eq.(5) to calculate the influence of all nodes in the network, and make it time sequenced;(3) Select the node v with the greatest influence as the first seed node, mark node v as active state and add it to S;(4) Update the influence estimate of parent node of S and its grandfather node according to Eqs(9) and (10);(5) Select the node u with the largest influence estimation after updating as the second seed node and add it to S;(6) Repeat Steps (3) to (5) until k nodes are selected.

    3.4 Pseudo code

    GT(V,E,TE) is used to represent a social network based on time sequential relationship, whereVrepresents the set of nodes,Erepresents the set of edges,TErepresents the set of contact moments between nodes,krepresents the number of seed nodes required, andSrepresents the set of seed nodes. The pseudo code of the STIM algorithm is Algorithm 2.

    Algorithm 2 Time sequential influence maximization algorithm based on neighbor node influence Input: social network GT(V,E,TE),k;Output: seed set S;(1) Initialize S =?;(2) For any node u in graph GT do;(3) Calculate Pu,v; //v indicates the next-level neighbor node of node u;(4) End for;(5) For any node u in graph GT do;(6) Pu′ = Pu - Pu,i × max(T(u,i) - ∑i1∈O(i)Pu,iPi,i1 ×min(max(T(u,i), max(T(i, i1)));(7) End for;(8) For i = 1 to k do;(9) v = argmaxu{Pu′| u ∈V/S};(10) S = S ∪{v};(11) End for.

    In Algorithm 2,Step (1) initializes the seed setSto an empty set; In Steps (2) -(4), the propagation probability between nodes in time sequential social network is obtained based on in subsection 2. 2; Steps(5) -(7) estimate the influence range of all nodes;Steps (8) -(11) find the firstknodes with a larger estimated influence range and incorporate them into the seed set.

    The time complexity analysis of STIM algorithm is as follows: let the number of nodes of networkGT(V,E,TE) ben, the number of edges bem, the size of seed set bek,and the number of contact moments between nodes in the network bet.In Algorithm 1, Steps(2) -(4), the time complexity generated when calculating the propagation probability between nodes isO(m);Steps (5) -(7) estimate the influence scope of each node in the time sequential social network, and the time complexity generated isO(n); Steps (8) -(11) selectknodes with the greatest influence and iteratekrounds, so the time complexity isO(k); To sum up, the time complexity of STIM algorithm isO(n+m+k).Since the value ofkis generally less than or equal to 50, that is, far less thannandm, soO(k)can be ignored, then the time complexity of the STIM algorithm isO(n+m).

    4 Experiment and result analysis

    Three real datasets of different scales are selected as input data to realize seed node selection and seed influence calculation in time sequential social network graph based on neighbor node influencein.

    4.1 Experimental data and parameter setting

    Dataset 1 used in the experiment is derived from the online social network of University of California,composed of private messages. Edges (u,v,t) indicate that userusends a private message to uservat timet[20].Dataset 2 is the E-mail data of a large European research institution, and the directed edges (u,v,t)indicate that userucommunicates with uservthrough E-mail at timet[21].Dataset 3 is a time sequential network that edits each other’s ‘conversation’ pages on behalf of Wikipedia users. Edges (u,v,t) indicate that useruhas edited the conversation page of uservat timet[22].The number of experimental datasets is shown in Table 1.

    Table 1 Adoption number of experimental datasets

    In this paper, the STIM algorithm is divided into two steps. The first step is to calculate the propagation probability between all nodes. The second step is to estimate the influence range of all nodes and selectknodes with the largest influence range as the seed node set. While realizing the algorithm, some classical algorithms and new algorithms in recent years with better running effect are reproduced. The advantages and disadvantages of each algorithm are compared and analyzed from two aspects of the influence range and running time of the algorithm.

    Coverage threshold maximum influence (CTMD)is a degree maximum heuristic algorithm based on coverage threshold. This algorithm uses the improved kshell algorithm to calculate the influence of nodes in the network and select the initial seed node set. Meanwhile, the activation probability of nodes within two degrees is considered.

    Influence estimation influence ranking (IEIR) is an algorithm based on influence estimation and influence ranking, and it has good comprehensive ability among traditional influence maximization algorithms at present.

    DegreeDiscount is the representative of the heuristic algorithm. The node with the highest degree is selected as the seed node, and then the degree of the neighbors of the selected node is discounted untilknodes are selected.

    Random, as a benchmark comparison method,simply randomly selectsknon-repeating nodes from the time sequential social network graph as seed nodes.

    In the stage of seed node selection, CTMD algorithm, IEIR algorithm, DegreeDiscount algorithm,Random algorithm and STIM algorithm select the size of seed node setkas 5,10,15,20,25,30,35,40,45, and 50 respectively.

    4.2 Influence of seed nodes in different algorithms

    The correlation algorithm is tested on three different datasets. Scope of influence refers to the number of nodes ultimately affected by calculating the seed set through the algorithm in the initial stage of the network to spread the seed set in the network. The wider the influence range of the seed set,the higher the accuracy of the algorithm.

    Fig.6 shows the seed nodes impact on the Wiki-Talk dataset.As can be seen from Fig.6, among many comparison algorithms, IEIR algorithm and STIM algorithm have a wide influence range, while the influence range of other algorithms is at a low level. When selecting different number of seed nodes, with the increase of the number of seed nodes,the influence range of IEIR algorithm is always in a stable state. As the number of selected seed nodes increases,the influence range of STIM algorithm expands. That is, when the number of seed nodes is less than 25, the influence range of IEIR algorithm is higher than that of STIM algorithm; but when the number of seed nodes is greater than 25, the influence range of STIM algorithm is higher than that of IEIR algorithm.

    Fig.6 Effect of seed nodes on Wiki-Talk dataset

    Fig.7 is an effect diagram of seed nodes on CollegeMsg dataset. It can be seen from Fig.7 that the influence range of STIM algorithm is much higher than that of other algorithms regardless of the size of the seed node set. Atk= 50,the influence range of STIM algorithm is 7.82 times,4.56 times,2.25 times, and 6.92 times that of IEIR algorithm, CTMD algorithm,DegreeeDiscount algorithm, and Random algorithm respectively. Among other algorithms, DegreeeDiscount algorithm has better effect, while IEIR algorithm, CTMD algorithm, and Random algorithm have worse effect.

    Fig.7 Effect of seed nodes on CollegeMsg dataset

    Fig.8 is an effect diagram of seed nodes on Email-Eu-Core dataset. As can be seen from Fig.8, STIM algorithm has the widest influence range, followed by IEIR algorithm and DegreeDiscount algorithm, and CTIM algorithm and Random algorithm have the smallest influence range. Whenk <15, the influence range of IEIR algorithm is higher than DegreeDiscount algorithm, while whenk >15,IEIR algorithm is overtaken by DegreeDiscount algorithm. Whenk= 15,the influence ranges of CTMD algorithm and Random algorithm reach the same level.

    Fig.8 Effect of seed nodes on Email-Eu-Core dataset

    4.3 Selection time of seed nodes in different algorithms

    In this subsection, under the IWCM propagation model, the running time of CTMD algorithm, IEIR algorithm, DedegreeDiscount algorithm, Random algorithm, and STIM algorithm are respectively counted.The calculated time is the running time of 50 seed nodes selected from three datasets of different scales,as shown in Table 2.

    Table 2 Running time of STIM algorithm

    As can be seen from Table 2, the running time of STIM algorithm, CTMD algorithm, DedegreeDiscount algorithm, IEIR algorithm, and Random algorithm grows gradually with the gradual increase of the scale of time sequential social network. IEIR algorithm has the longest running time, followed by STIM algorithm, and other algorithms have relatively short running time.

    The analysis of the experimental results shows that the Random algorithm has the shortest running time because of the randomness of seed node selection, but its influence range is much smaller than other algorithms.IEIR algorithm is a traditional influence maximization algorithm with better comprehensive ability. Although its influence range is relatively large, its running time is also the longest. CTMD algorithm is a relatively new influence maximization algorithm in the past two years.Although its running time is short, it does not consider the factors of time sequential and second-level neighbor nodes, which leads to the shrinkage of the influence range. DegreeDiscount algorithm is a heuristic algorithm that only considers first-level neighbor nodes.Compared with STIM algorithm, the running time of DegreeDiscount algorithm is smaller than that of STIM algorithm because the scope of neighbors it considers is smaller, but its influence scope is also much smaller than that of STIM algorithm.

    5 Conclusion

    In recent years, social phenomena such as secondhand smoke, happiness transmission and microblog forwarding have two main characteristics: (1) Time sequential change. As time goes on, the topology of such networks also changes constantly; (2) Secondary dissemination of information. Information is spread widely in the category of secondary neighbors in such networks. In view of the two characteristics of the network, the STIM algorithm is proposed in this paper.Firstly, the propagation probability between nodes is calculated by the improved degree estimation algorithm;Secondly,the traditional weighted cascade model is improved so that it can be applied to social networks based on time sequential relationships; Finally,STIM algorithm is proposed based on the improved weighted cascade model. Experimental results show that STIM algorithm is more targeted than CTMD, DedegreeDiscount, IEIR, Random and other influential maximization algorithms with universal characteristics.In the three networks selected in this section with time sequential characteristics and next-level transmission characteristics of information, STIM algorithm shows its advantages in terms of influence scope and running time, and can better solve the problem of maximizing the influence of next-level neighbor’s time sequential social network.

    The following in-depth studies will be carried out in the future work: (1) Research the actual factors of the time sequential influence maximization problem based on the influence of neighbor nodes, such as the different information types, cost, time; (2) Expand the algorithm so that it can be applied to time sequential social networks targeting multi-level neighbor nodes.

    精品熟女少妇八av免费久了| 操出白浆在线播放| 日韩中文字幕视频在线看片| 久久久精品94久久精品| 亚洲国产精品成人久久小说| 丝袜喷水一区| 久久中文字幕一级| 操出白浆在线播放| 亚洲成人手机| 人人妻,人人澡人人爽秒播| 十八禁网站免费在线| 满18在线观看网站| 亚洲第一欧美日韩一区二区三区 | 色婷婷av一区二区三区视频| 99国产精品99久久久久| 丰满饥渴人妻一区二区三| 亚洲国产毛片av蜜桃av| 中文字幕另类日韩欧美亚洲嫩草| 91国产中文字幕| 亚洲精品日韩在线中文字幕| 老汉色∧v一级毛片| 水蜜桃什么品种好| 手机成人av网站| 一区二区三区乱码不卡18| 国产免费一区二区三区四区乱码| av不卡在线播放| 国产精品99久久99久久久不卡| 亚洲欧美激情在线| 国产精品影院久久| 人人妻人人澡人人爽人人夜夜| 操出白浆在线播放| 欧美乱码精品一区二区三区| 搡老岳熟女国产| 精品国产乱码久久久久久男人| 亚洲伊人久久精品综合| 国产在视频线精品| 亚洲欧美色中文字幕在线| 99国产综合亚洲精品| 国产国语露脸激情在线看| 高潮久久久久久久久久久不卡| 亚洲熟女毛片儿| 他把我摸到了高潮在线观看 | 免费观看a级毛片全部| 久久热在线av| 成人av一区二区三区在线看 | 国产成人a∨麻豆精品| 每晚都被弄得嗷嗷叫到高潮| 亚洲,欧美精品.| 麻豆av在线久日| 精品久久久久久久毛片微露脸 | 一级a爱视频在线免费观看| 欧美精品高潮呻吟av久久| 国内毛片毛片毛片毛片毛片| 精品久久蜜臀av无| 九色亚洲精品在线播放| 精品人妻在线不人妻| 男女免费视频国产| www.熟女人妻精品国产| 999精品在线视频| 亚洲成av片中文字幕在线观看| 免费人妻精品一区二区三区视频| 一区二区三区四区激情视频| 12—13女人毛片做爰片一| 人妻一区二区av| 超色免费av| 黄色a级毛片大全视频| 久久久久久免费高清国产稀缺| 亚洲av美国av| 国产国语露脸激情在线看| 午夜日韩欧美国产| 欧美97在线视频| 男女下面插进去视频免费观看| 91麻豆av在线| av免费在线观看网站| 日韩欧美一区视频在线观看| 亚洲av欧美aⅴ国产| 熟女少妇亚洲综合色aaa.| 一边摸一边抽搐一进一出视频| 日韩 欧美 亚洲 中文字幕| 亚洲黑人精品在线| svipshipincom国产片| 97精品久久久久久久久久精品| 久久毛片免费看一区二区三区| 亚洲av国产av综合av卡| 一级毛片精品| 新久久久久国产一级毛片| 国产精品自产拍在线观看55亚洲 | 99香蕉大伊视频| 在线观看免费高清a一片| 亚洲 国产 在线| 午夜福利免费观看在线| 99热网站在线观看| 国产精品久久久久成人av| 搡老岳熟女国产| 母亲3免费完整高清在线观看| www.精华液| 9191精品国产免费久久| 国产成人精品久久二区二区免费| 免费观看人在逋| 十八禁网站网址无遮挡| 免费在线观看完整版高清| 俄罗斯特黄特色一大片| 丝袜人妻中文字幕| 亚洲av男天堂| 国产片内射在线| 欧美日韩国产mv在线观看视频| 久久人人爽人人片av| 丁香六月天网| 欧美激情 高清一区二区三区| 俄罗斯特黄特色一大片| 最黄视频免费看| 国产高清国产精品国产三级| 91精品伊人久久大香线蕉| 热re99久久精品国产66热6| 国产在线视频一区二区| 中文字幕色久视频| 妹子高潮喷水视频| 日韩欧美免费精品| 青春草亚洲视频在线观看| 性色av一级| 国产一区二区三区综合在线观看| 亚洲国产av影院在线观看| 亚洲精品国产av成人精品| 巨乳人妻的诱惑在线观看| av网站免费在线观看视频| www.熟女人妻精品国产| 99久久人妻综合| 亚洲欧美精品自产自拍| 亚洲精品久久午夜乱码| 亚洲欧美色中文字幕在线| 色精品久久人妻99蜜桃| 91老司机精品| tube8黄色片| 啪啪无遮挡十八禁网站| 久久国产亚洲av麻豆专区| 97在线人人人人妻| 1024视频免费在线观看| 丝袜美足系列| 国产欧美日韩一区二区三 | 精品少妇内射三级| 人妻 亚洲 视频| 一区二区三区精品91| 一级毛片女人18水好多| 美女中出高潮动态图| 欧美亚洲 丝袜 人妻 在线| 日日夜夜操网爽| 一个人免费看片子| 中文欧美无线码| 国产1区2区3区精品| 精品久久久久久,| 久久亚洲真实| 真人做人爱边吃奶动态| 一a级毛片在线观看| 国产亚洲av嫩草精品影院| 人人妻人人看人人澡| 在线观看一区二区三区| 一级作爱视频免费观看| 超碰成人久久| 亚洲成人国产一区在线观看| 桃色一区二区三区在线观看| 精品少妇一区二区三区视频日本电影| 日韩三级视频一区二区三区| www.精华液| 亚洲一区二区三区色噜噜| a级毛片a级免费在线| 一卡2卡三卡四卡精品乱码亚洲| 久久香蕉精品热| 国产一区二区激情短视频| 亚洲一区高清亚洲精品| 欧美三级亚洲精品| 亚洲精品中文字幕一二三四区| 亚洲天堂国产精品一区在线| 亚洲乱码一区二区免费版| 色播亚洲综合网| 精品一区二区三区av网在线观看| 午夜福利欧美成人| 亚洲色图 男人天堂 中文字幕| 亚洲成av人片在线播放无| 中文字幕人成人乱码亚洲影| 国产成人av教育| 色老头精品视频在线观看| 国产男靠女视频免费网站| 国内毛片毛片毛片毛片毛片| xxx96com| 国产一区在线观看成人免费| 亚洲欧美日韩高清专用| 成人国产综合亚洲| 国产欧美日韩精品亚洲av| 国产97色在线日韩免费| 三级国产精品欧美在线观看 | 人妻久久中文字幕网| 精品国产亚洲在线| 亚洲一码二码三码区别大吗| 99精品在免费线老司机午夜| 国内揄拍国产精品人妻在线| 免费在线观看成人毛片| 亚洲成人免费电影在线观看| 嫩草影院精品99| svipshipincom国产片| 亚洲全国av大片| 免费人成视频x8x8入口观看| 精品高清国产在线一区| 91麻豆精品激情在线观看国产| 午夜激情福利司机影院| av福利片在线观看| 精品国产乱码久久久久久男人| 最新美女视频免费是黄的| 国产男靠女视频免费网站| 日韩高清综合在线| 亚洲最大成人中文| 亚洲精品美女久久久久99蜜臀| 欧美3d第一页| ponron亚洲| 欧美zozozo另类| 日韩大尺度精品在线看网址| 日韩欧美一区二区三区在线观看| 精品欧美一区二区三区在线| 日韩精品青青久久久久久| 久久亚洲真实| 亚洲va日本ⅴa欧美va伊人久久| 18禁国产床啪视频网站| 精品午夜福利视频在线观看一区| www.自偷自拍.com| 制服诱惑二区| 欧美精品亚洲一区二区| 在线观看美女被高潮喷水网站 | 亚洲激情在线av| 亚洲欧美激情综合另类| 国产一区二区三区视频了| 男女之事视频高清在线观看| 中文字幕久久专区| 91麻豆精品激情在线观看国产| 亚洲成a人片在线一区二区| 欧美三级亚洲精品| 1024视频免费在线观看| 久久久久国产精品人妻aⅴ院| 亚洲熟妇熟女久久| 级片在线观看| 无遮挡黄片免费观看| 中国美女看黄片| 国产又黄又爽又无遮挡在线| 精品一区二区三区av网在线观看| 黄色成人免费大全| 国产亚洲精品第一综合不卡| 国产精品av久久久久免费| 国产成人aa在线观看| 看免费av毛片| 天天躁夜夜躁狠狠躁躁| videosex国产| 欧美丝袜亚洲另类 | 欧美成狂野欧美在线观看| 黄色a级毛片大全视频| 一区二区三区高清视频在线| 国产黄a三级三级三级人| 日韩高清综合在线| 亚洲在线自拍视频| 日韩免费av在线播放| 日韩欧美免费精品| 欧美高清成人免费视频www| 欧美黄色片欧美黄色片| svipshipincom国产片| 国产野战对白在线观看| 精品一区二区三区四区五区乱码| 麻豆久久精品国产亚洲av| 亚洲av熟女| 精品久久久久久久人妻蜜臀av| 午夜免费观看网址| 日韩欧美在线二视频| 国产三级在线视频| 美女 人体艺术 gogo| 亚洲人成网站在线播放欧美日韩| 狠狠狠狠99中文字幕| 一级毛片精品| 九色成人免费人妻av| 丰满人妻熟妇乱又伦精品不卡| 亚洲成人精品中文字幕电影| 99热6这里只有精品| 全区人妻精品视频| 中国美女看黄片| 亚洲va日本ⅴa欧美va伊人久久| 国产精品日韩av在线免费观看| 日本在线视频免费播放| 午夜a级毛片| 日本撒尿小便嘘嘘汇集6| 亚洲精品中文字幕在线视频| 国产亚洲av嫩草精品影院| 欧美日韩精品网址| 久久久久久久精品吃奶| 99国产精品一区二区三区| 90打野战视频偷拍视频| 可以在线观看毛片的网站| 国产精品一及| 一本精品99久久精品77| 99久久精品热视频| 欧美成人免费av一区二区三区| 99国产极品粉嫩在线观看| 好男人在线观看高清免费视频| 一二三四在线观看免费中文在| 久久人妻福利社区极品人妻图片| 亚洲av成人一区二区三| 91成年电影在线观看| 中文字幕久久专区| 国产av不卡久久| 观看免费一级毛片| 午夜a级毛片| www国产在线视频色| 久久欧美精品欧美久久欧美| 精品熟女少妇八av免费久了| 国内少妇人妻偷人精品xxx网站 | 真人做人爱边吃奶动态| 久久久久久久午夜电影| 看片在线看免费视频| 久久中文看片网| 欧洲精品卡2卡3卡4卡5卡区| 亚洲美女视频黄频| 成人18禁在线播放| 他把我摸到了高潮在线观看| 天堂影院成人在线观看| 国产免费av片在线观看野外av| 欧美中文日本在线观看视频| 天天躁狠狠躁夜夜躁狠狠躁| 国产97色在线日韩免费| 少妇人妻一区二区三区视频| 夜夜夜夜夜久久久久| 久久精品人妻少妇| 久9热在线精品视频| 日韩中文字幕欧美一区二区| 俺也久久电影网| 亚洲欧美精品综合一区二区三区| 麻豆av在线久日| 欧美日韩精品网址| 午夜福利在线观看吧| 欧美日韩精品网址| 1024视频免费在线观看| 熟女电影av网| 青草久久国产| 妹子高潮喷水视频| 久久香蕉激情| 伊人久久大香线蕉亚洲五| 久99久视频精品免费| 每晚都被弄得嗷嗷叫到高潮| 可以在线观看的亚洲视频| 日本三级黄在线观看| 亚洲国产看品久久| 可以免费在线观看a视频的电影网站| 最好的美女福利视频网| av片东京热男人的天堂| 亚洲乱码一区二区免费版| xxxwww97欧美| 成人三级黄色视频| 欧美极品一区二区三区四区| 欧美黑人精品巨大| 色尼玛亚洲综合影院| 国产精品香港三级国产av潘金莲| 美女扒开内裤让男人捅视频| 国产免费av片在线观看野外av| 亚洲国产精品久久男人天堂| 他把我摸到了高潮在线观看| 中文在线观看免费www的网站 | 久久久久久久久中文| 色综合站精品国产| 91九色精品人成在线观看| 国产一区二区三区在线臀色熟女| 国产伦一二天堂av在线观看| 亚洲精品中文字幕一二三四区| 超碰成人久久| 母亲3免费完整高清在线观看| 亚洲色图av天堂| 老鸭窝网址在线观看| 亚洲一区中文字幕在线| a级毛片在线看网站| 欧美日韩精品网址| 18禁裸乳无遮挡免费网站照片| 久久国产精品影院| 毛片女人毛片| 两个人的视频大全免费| 免费在线观看黄色视频的| ponron亚洲| 18禁黄网站禁片午夜丰满| 午夜视频精品福利| 午夜精品久久久久久毛片777| 999精品在线视频| 欧美人与性动交α欧美精品济南到| 我的老师免费观看完整版| 一级作爱视频免费观看| 午夜免费成人在线视频| e午夜精品久久久久久久| 男女午夜视频在线观看| 亚洲一区高清亚洲精品| 色噜噜av男人的天堂激情| 一卡2卡三卡四卡精品乱码亚洲| 国产精品香港三级国产av潘金莲| 国产高清videossex| 在线永久观看黄色视频| 久久热在线av| 久久久久久国产a免费观看| 看黄色毛片网站| 极品教师在线免费播放| 99国产精品一区二区三区| 99国产精品一区二区蜜桃av| av福利片在线观看| 香蕉国产在线看| 国产精品综合久久久久久久免费| 国产日本99.免费观看| 女人高潮潮喷娇喘18禁视频| 欧美中文日本在线观看视频| 久久这里只有精品中国| 亚洲在线自拍视频| 九九热线精品视视频播放| 搡老熟女国产l中国老女人| 国产亚洲精品久久久久5区| 亚洲欧美日韩东京热| 国产成人精品无人区| 欧美精品亚洲一区二区| 欧美乱妇无乱码| 两个人的视频大全免费| xxxwww97欧美| av欧美777| 一本精品99久久精品77| 亚洲熟妇熟女久久| 国产亚洲精品一区二区www| 黄频高清免费视频| 又紧又爽又黄一区二区| 国产真实乱freesex| 悠悠久久av| 男人的好看免费观看在线视频 | 国产一区二区三区在线臀色熟女| 国产精品久久电影中文字幕| 老司机靠b影院| 国产精品久久久久久人妻精品电影| 免费在线观看日本一区| 国产av一区二区精品久久| 免费在线观看成人毛片| 亚洲成人久久性| 午夜免费激情av| www日本在线高清视频| 国产精品九九99| 亚洲av成人精品一区久久| 国产主播在线观看一区二区| av片东京热男人的天堂| 悠悠久久av| 毛片女人毛片| 久久国产精品影院| 欧美日韩亚洲综合一区二区三区_| 成人18禁在线播放| 国产精品香港三级国产av潘金莲| 亚洲天堂国产精品一区在线| av有码第一页| 少妇熟女aⅴ在线视频| 一级片免费观看大全| 欧美成人午夜精品| av福利片在线| 亚洲成人中文字幕在线播放| 成人18禁高潮啪啪吃奶动态图| 国产欧美日韩精品亚洲av| 99久久99久久久精品蜜桃| av视频在线观看入口| 欧美不卡视频在线免费观看 | 国产精品久久久久久亚洲av鲁大| 午夜福利成人在线免费观看| 日本精品一区二区三区蜜桃| 久久久久免费精品人妻一区二区| 99久久无色码亚洲精品果冻| 亚洲成人久久性| 亚洲成a人片在线一区二区| 十八禁网站免费在线| 国产99久久九九免费精品| 成在线人永久免费视频| 欧美精品亚洲一区二区| 在线观看日韩欧美| 亚洲成人中文字幕在线播放| 久久热在线av| 露出奶头的视频| 两性午夜刺激爽爽歪歪视频在线观看 | 97超级碰碰碰精品色视频在线观看| 国产又色又爽无遮挡免费看| 午夜精品一区二区三区免费看| 欧美性猛交黑人性爽| 成人高潮视频无遮挡免费网站| 1024视频免费在线观看| 伊人久久大香线蕉亚洲五| 欧美一级毛片孕妇| 亚洲精品色激情综合| 亚洲午夜理论影院| 久久天躁狠狠躁夜夜2o2o| 一区二区三区高清视频在线| 99久久综合精品五月天人人| 99精品欧美一区二区三区四区| 成人精品一区二区免费| а√天堂www在线а√下载| 亚洲熟女毛片儿| x7x7x7水蜜桃| 国产精品久久久人人做人人爽| 日日爽夜夜爽网站| 大型av网站在线播放| 国产一区二区三区视频了| av片东京热男人的天堂| 91麻豆精品激情在线观看国产| 一区二区三区国产精品乱码| 老鸭窝网址在线观看| 一区二区三区高清视频在线| 人妻久久中文字幕网| 日本精品一区二区三区蜜桃| 特级一级黄色大片| 毛片女人毛片| 日韩欧美精品v在线| 国产片内射在线| 视频区欧美日本亚洲| 精品福利观看| 99久久国产精品久久久| 两个人免费观看高清视频| 免费在线观看日本一区| 狠狠狠狠99中文字幕| 日本黄大片高清| 亚洲一区高清亚洲精品| 亚洲精品色激情综合| 一本综合久久免费| 99riav亚洲国产免费| 婷婷精品国产亚洲av在线| 国产久久久一区二区三区| 99在线人妻在线中文字幕| 国产免费男女视频| 国产精华一区二区三区| 日韩成人在线观看一区二区三区| 久久久久久久久免费视频了| 性色av乱码一区二区三区2| 亚洲精品在线美女| 成年女人毛片免费观看观看9| 亚洲男人天堂网一区| 国产成+人综合+亚洲专区| 日韩大码丰满熟妇| 久久人人精品亚洲av| 精品久久久久久久久久久久久| 一个人免费在线观看的高清视频| 小说图片视频综合网站| 午夜激情福利司机影院| 国产蜜桃级精品一区二区三区| 中文字幕高清在线视频| 在线观看午夜福利视频| 2021天堂中文幕一二区在线观| 91大片在线观看| 国内毛片毛片毛片毛片毛片| 精品一区二区三区视频在线观看免费| 欧美中文日本在线观看视频| www.999成人在线观看| 欧美性长视频在线观看| 在线观看日韩欧美| 国产精品av视频在线免费观看| 成年人黄色毛片网站| 无遮挡黄片免费观看| 精品一区二区三区av网在线观看| 久久精品国产亚洲av高清一级| 99久久久亚洲精品蜜臀av| 一卡2卡三卡四卡精品乱码亚洲| 国产一区二区激情短视频| 国产精品98久久久久久宅男小说| x7x7x7水蜜桃| 99热只有精品国产| 欧美精品啪啪一区二区三区| 操出白浆在线播放| 少妇被粗大的猛进出69影院| 欧美乱码精品一区二区三区| 成人手机av| 在线视频色国产色| 久久久精品大字幕| 欧美成人性av电影在线观看| 999久久久国产精品视频| 国产精品永久免费网站| 国产精品av久久久久免费| 999久久久精品免费观看国产| 欧美成人免费av一区二区三区| 国产精品九九99| 三级男女做爰猛烈吃奶摸视频| 免费在线观看成人毛片| 亚洲男人天堂网一区| www日本在线高清视频| 一进一出抽搐动态| 久久精品国产清高在天天线| 国产精品亚洲美女久久久| 国产欧美日韩一区二区精品| 国内揄拍国产精品人妻在线| 欧美日本视频| 国产精华一区二区三区| 国产一区二区在线观看日韩 | 在线看三级毛片| 亚洲男人天堂网一区| 亚洲一区中文字幕在线| 精品一区二区三区四区五区乱码| 欧美黄色片欧美黄色片| 婷婷亚洲欧美| 在线看三级毛片| 波多野结衣高清作品| 精品福利观看| 成年免费大片在线观看| 国产av不卡久久| av福利片在线观看| 亚洲一区高清亚洲精品| 国产一区二区在线av高清观看| 精品不卡国产一区二区三区| 国产69精品久久久久777片 | 国产成人av教育| 在线免费观看的www视频| 亚洲一区中文字幕在线| 国产日本99.免费观看| 亚洲熟妇中文字幕五十中出| 国产精品99久久99久久久不卡| 国产97色在线日韩免费| 麻豆国产97在线/欧美 | 成人午夜高清在线视频| 男人舔女人的私密视频| 91大片在线观看| 69av精品久久久久久| 国产三级中文精品| 精品一区二区三区av网在线观看| 老鸭窝网址在线观看|