• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Modeling and verifying SoS performance requirements of C4ISR systems

    2015-02-10 12:25:41YudongQiZhixueWangQingchaoDongandHongyueHe

    Yudong Qi,Zhixue Wang,Qingchao Dong,and Hongyue He

    1.Departmentof Weapon Science and Technology,Naval Aeronauticaland Astronautical University,Yantai264001,China;

    2.Institute of Command Information System,PLAUniversity of Science and Technology,Nanjing 210007,China

    Modeling and verifying SoS performance requirements of C4ISR systems

    Yudong Qi1,Zhixue Wang2,*,Qingchao Dong1,and Hongyue He2

    1.Departmentof Weapon Science and Technology,Naval Aeronauticaland Astronautical University,Yantai264001,China;

    2.Institute of Command Information System,PLAUniversity of Science and Technology,Nanjing 210007,China

    System-of-systems(SoS)engineering involves a complex process of refining high-level SoS requirements into more detailed systems requirements and assessing the extent to which the performances ofto-be systems may possibly satisfy SoS capability objectives.The key issue is how to modelsuch requirements to automate the process of analysis and assessment.This paper suggests a meta-model that defines both functional and nonfunctionalfeatures of SoS requirements for command and control, communication,computer,intelligence,surveillance reconnaissance(C4ISR)systems.A domain-specific modeling language is defined by extending unified modeling language(UML)constructed of class and association with fuzzy theory in order to model the fuzzy concepts of performance requirements.An efficiency evaluation function is introduced,based on B′ezier curves, to predict the effectiveness ofsystems.An algorithm is presented to transform domain models in fuzzy UML into a requirements ontology in description logic(DL)so that requirements verification can be automated with a popular DL reasoner such as Pellet.

    performance requirements,efficiency evaluation function,description logic(DL),rationality.

    1.Introduction

    The system-of-systems(SoS)paradigm has emerged as an increasingly popular choice for being an economic and strategic approach for enhancing existing systems capabilities and generating additional capabilities,with widespread applications in the military,academia,industry and elsewhere[1].The development of SoS,such as the command and control,communication,computer,intelligence,surveillance and reconnaissance(C4ISR)system,should be aimed toward many satisfactory solutions based on capability requirements to accommodate more possibilities and unpredictable operating environments, as opposed to optimizing the performance of any individualsystem oran optimalsolution to a specific situation[2].

    Architecture-based capability engineering,the popular SoS engineering for defense acquisition and C4ISR system development,is intended to cope with complexity and uncertainty early in the SoS design process,and to conceptualize the capabilities expected to be achieved by the entire SoS with the continuous evolution of its systems architecture[3].To support the capability engineering,the US Department of Defense issued a new version of standard architecture framework(DoDAF 2.0)[4] thatsuggested a meta-modelfor architecturaldescriptions (DM2)in a consistentand interoperable fashion.ButDM2 is stillundergoing a major evolution,and its semantic ambiguity may probably limit the full benefit of architecture analysis[5,6].Furthermore,using the principles of modeldriven architecture(MDA),current executable architecture modeling has been concerned with the construction of executable models through the model transformation from architectural descriptions[6,7].Most of such work is still a manual process involving multiple model transformations with weak model consistency checking due to semiformal semantics in static modeling languages.This means that more significant efforts may be required to preserve traceability and consistency between static and executable models[8].In addition,architecturaldata in iterative architecture refinements are needed to better support the SoS evolution and accommodate its changing requirements and context.

    In software engineering,functionalrequirements can be modeled with unified modeling language(UML)[9],while there are few methods available for modeling performance requirements.To determine whetherthe system modelsatisfies the SoS performance requirements,engineers usually have to translate the conceptualmodelin UML or systems modeling language(SysML)into an executable model, such as Petrinet[10]or xUML[11],to facilitate verification and validation(V&V).In other words,it is necessary to incorporate static concepts of high-level SoS require-ments into dynamic concepts ofsystem execution.Itseems infeasible,forthe requirements analysis in the preliminary phase of a large-scale program may notlook forward into system design details.Besides,SoS performance requirements are usually stated with fuzzy concepts,for example,“we need a radar that detects a wider range of targets and provides pictures with higherprecision”,which makes them even harder to modeland verify.

    Microsoft argued the capability-oriented thinking as a robust enterprise architecture strategy for the successful service-oriented architecture(SOA)solution,for“it can abstract the stable from the volatile,encapsulate the volatile within services and manage change through the information system requirements evolution”[12].And,an enterprise service model(ESM)was proposed to map services in an IT solution to capabilities in a capability model [13].

    National Aeronautics and Space Administration (NASA)used model-based languages(such as SequenceL [14])and risk analysis methodologies to raise software development to the level of hardware development,hoping to achieve a fusion of systems and software engineering by replacing conventional software development techniques with capability engineering thatfocuses on a system’s full setof functionalities[15].

    Dai and Cooper proposed the formal design analysis framework(FDAF)for software architecture modeling to bridge the gap between enterprise and early software models(requirements and architecture)[16].They used a UML business modeling extension[17]to model the business goals and standard UML use cases to analyze the software requirements.

    Tsai and Liu argued that a formal requirements specification language plays an important role in software development.They report the experiences gained from the FRORL project and state the value of research in knowledge-based software engineering in verification, validation,requirementsanalysis,debugging,and transformation[18].

    Kang et al.found that the enterprise model cannot express the semantics enough and defined the fact-based ontologies through which the relationships can be defined and reasoned semantically[19].

    The above approaches inspire our research,and some achievements are absorbed into our research.But the nonfunctionalrequirements features,such as performance requirements,are not addressed.The suggested modeling language(like SequenceL)and frameworks(like FDAF) are allfocusing on functionalanalysis.However,the capability requirements analysis addresses both functions and performances of an SoS.The efficiency should be considered as an inseparable factor of SoS requirements in capability engineering.

    There are various V&V approaches and techniques. Reference[20]classified them into three categories:nonformal,semi-formal,or formal.The non-formal V&V techniques are essentially based on human expertise and do notrequire such a high levelofformalization ofthe model. Butthe V&V process is hardly automated with such techniques.The semi-formal techniques are usually based on modelexecution.They remain a popular approach and are even regarded as sufficient and relevantin a large number of projects[21].However,they do not exclude erroneous results because of the non-exhaustiveness of the scenarios taken into consideration[22].The formal techniques are strongly related to formal methods[23].They usually require a high level of formalization of the modeling language with an adequate mathematical semantic based on interpretation rules and deduction rules thatmake itpossible to reason about the specifications in order to discover potentialerrors,mistakes or inconsistencies.

    Ponsard et al.presented an integrated toolbox(named FAUST formal toolbox)implementing the formal techniques by a round trip mapping of KAOS[24]requirements level notations to the languages of formal V&V tools to ensure at an early stage that the right system is being builtand thatthe requirements modelis right[25].

    Chapurlat et al.suggested that enterprise modeling be made in three processes:conceptualization,modeling and verification.In the conceptualization process,the domain expert captures the domain knowledge in the properties reference repository,defining a formalontology forthe selected domain.In the modeling process,the user models the enterprise using unified enterprise modelling language (UEML)[26]and specifies the properties corresponding to the needs that he or she wants to verify,using the domain ontology.In the verification process,the user would then prove some chosen properties on the modelby the use of formal mechanisms allowing him to increase his own knowledge and improve the model’s quality and relevance [27].

    Floch et al.presented a model-driven development approach that combines UML modeling and ontology techniques for specifying and validating software component properties and a middleware platform that supports componentdiscovery,compatibility checking and deployment [28].

    However,the above approaches and techniques do not address uncertain domain modeling and specification,and as a resultcannotbe used to reason on fuzzy knowledge.In ourapproach,we use a fuzzy extended UML(fuzzy UML) to cope with fuzzy concepts forthe complex objects so thatboth the function and non-function features of SoS requirements can be modeled.We provide an algorithm to convert the fuzzy UML models into the ontologies described in f-SHIN to enable modelverification through the logic inference mechanism.

    In the paper,we provide a three-layer analysis framework to capture the domain knowledge for V&V process,extend the UML constructs of class and association with fuzzy theory in order to specify both functional and non-functionalfeatures of SoS requirements,introduce the fuzzy description logic(f-DL)[29]to formalize the UML model,and offer an algorithm to convert domain models in the fuzzy UML into a requirements ontology in f-DL so that requirements verification can be automated with a popular DL reasonersuch as Pellet.

    The rest of the paper is organized as follows.Section 2 presents a method of SoS performance requirements modeling by introducing a three-layer modeling framework, extending UML for modeling fuzzy concepts and improving UML domain applicability.Section 3 discusses how to design an efficiency evaluation function(EEF)that facilitates the evaluation of SoS performances.Section 4 focuses on DL-based rationality analysis by introducing f-SHIN(a fuzzy extended DL),constructing the algorithm thattransforms the domain model into requirements ontology in f-DL and specifying rationality constraint rules in semantic web rule language(SWRL)for model verification.Section 5 provides a case study to demonstrate the proposed method,and Section 6 brings conclusions.

    2.Performance requirements modeling

    2.1 Three-layer requirements framework

    Reference[30]proposed a three-layer requirements analysis framework.It allows requirement engineers to capture domain knowledge from high-level abstract concepts down to domain-specific concepts,and thereby build requirementsmodels with richersemantics thatdescribe both the architecturalconstraints and the domain user needs.

    Based on the framework,we suggest an SoS performance requirements analysis framework for the C4ISR system.Itcan be used to capture SoS performance requirements by modeling the concepts of architecture,domain and application on three differentabstraction levels.

    The meta concepts on the top level,shown in Fig.1, correspond to the UML M2 layer.They are built from the DM2/DoDAF2.0 that includes those of“Capability”,“Activity”,“Performer”,etc.A number of new concepts, such as“Task goal”,“Efficiency”,“Simple capability”and“Complex capability”,are added to facilitate performance requirementsanalysis.Those meta-concepts provide architecturalterms and modeling constraints fordomain models and application models.

    The domain concepts on the medium level correspond to the UML M1 layer.They are instances of the metaconcepts,and are built by modeling individualsystem domains of an SoS.They make up of the domain knowledge for SoS requirements analysis and application development.

    Fig.1 Meta-modelof SoS performance requirements

    The application concepts are modeled on the bottom level that correspond to the UML M0 layer.They are instances of the domain concepts,and are built by modeling application orthe snapshots of run-time individualsystems.The SoS performance requirements analysis cannot be led until application models are built because the application concepts will be the evidence for validating SoS performance requirements.

    2.2 UML extension with fuzzy constructs

    The performance requirements are usually stated in terms of operation effectiveness of capabilities or systems.Thestatements may be full of uncertain and vague concepts that cannot be modeled with an ordinary UML tool[31]. For example,“Early detection”(in Fig.2)describes a requirement that an air target should be detected as early as the mission requires.The concept“Early detection”is by nature a qualitative description,and it is hard to set a certain value bound for quantitative description thatvaries from mission to mission.

    Fig.2 Domain model of SoS performance requirements of city air defense application

    Ma et al.[32,33]presented a fuzzy extension of UML (fuzzy UML)to cope with the fuzzy concepts of complex objects in a database.The core conceptof the extension is fuzzy class thatdefines a setoffuzzy objects with a similar structure and behaviors.There are three kinds offuzziness: (i)a class is fuzzy,because whether the objects belong to the class is uncertain,and the class is specified with an additionalattribute(μ)within the domain of0 and 1 to represent the objects membership degree;(ii)the domain of an attribute may be fuzzy and thus the class becomes fuzzy; (iii)a class is fuzzy,because itis specialized as a subclass of a fuzzy class or generalized as a superclass of a fuzzy class.

    We introduce the theory to model the performance requirements.A fuzzy concept is modeled as a fuzzy class, with a membership attributeμ:X→[0,1].A fuzzy class is figured as a dashed box in the UML class diagram.To determine the objects membership degreesμ,we introduce the EEF which is discussed in Section 3.

    2.3 UML improvementwith domain concepts

    As a general-purposed modeling tool,UML is of poor domain applicability and needs domain ontology to qualify the domain modeling semantics[34].The meta-modelof SoS performance requirements shown in Fig.1 provides a DoDAF-compliant ontology to improve domain applicability of UML.The extension constructs can be used to model both certain and uncertain features of capability requirements.All we need to do is to define new stereotypes,such as“Capability”and“Efficiency”thatextend the constructs of class and association of UML/MOF (meta-objectfacility)[35]to provide architecturalsemantics.The defined UML profile specifies a domain-specific modeling language with which engineers can build domain models of SoS performance requirements for a specific C4ISR program.

    Fig.2 provides a partialmodelon the domain of city air defense application.This model shows several core con-cepts centered on the“Air warning”and“Targetinterception”tasks.The requirements statements are given in Section 5.To commit the mission“City air defense”,the capability“Detection”is required and described by an efficiency requirement that the target should be detected as early as possible,where the concept“Early detect”an uncertain and vague concept,and is therefore modeled as a fuzzy class,and so as the other two concepts“Effectively intercept”and“Accurately identify”.Each of the fuzzy classes has the stereotype“Efficiency”thatcomes from the meta-model of SoS performance requirements,and each encapsulates a domain specific semantic of the C4ISRperformance requirements.

    The performance requirements analysis focuses on the evaluation of the fuzzy membership attributeμ.For example,whether the required efficiency“Early detect”is satisfied or not,is determined by the evaluation result of the attributeμthat describes how early the target is detected. Section 3 discusses on how to build the EEF forthe SoS to facilitate performance evaluation.

    3.EEF

    3.1 Efficiency calculation based on B′ezier curves

    Definition 1EEF is a function forcalculating the fuzzy membership attribute of a fuzzy conceptto predictthe degree of how wella capability willbe applied in an activity to achieve the mission goal with a desired effect.The domain ofan EEF is defined between 0 and 1.

    Theoretically,itis hard to constructa generalEEF forall domains.When engineers construct an EEF,they should take into consideration the following factors:(i)the variations in missions or tasks because the performance may be varied from mission to mission where a capability is operated;(ii)the variations in operational environments because the performance is sensitive to differentoperational environments.For example,a car can run up to 120 km/h on a highway,butitruns no more than 40 km/h in a desert. Moreover,the EEF should be constructed satisfying the following constraints.

    (i)Accurate

    Wherever an EEF is constructed from a set of experimentaldata thatare given by domain experts according to their prior knowledge,the data mustbe relevantto the domain,and the results calculated by the EEF should notcontradictthe domain knowledge.

    (ii)Flexible

    More than one possible EEFs should be given for a capability so as to cope with mission change.

    (iii)Easy to use

    The EEF must be built to facilitate algorithm design in such a way that all valid values of quantitative attributes are applicable for calculation.

    Reference[36]used the B′ezier curves to construct a set of EEFs that were flexible to suit many different domains.We believe the method is applicable for mostcases of C4ISR capability efficiency evaluation.

    Definition 2A B′ezier curve with n+1 control points

    3.2 Estimation method

    In this section,we demonstrate,through an example,that the EEF constructed with the B′ezier curves is flexible and adaptive to the change of mission or task.

    According to the model shown in Fig.2,the concept“Effectively intercept”describes the efficiency ofthe interception capability.Missile unit plays the role of task performer.There are two kinds of air defense missile unit: shortrange and long range,respectively for operating different tasks.For the short range air defense missile,the domain experts construct the EEF of“Effectively intercept”(EEFEI)as follows,with the sample data shown in Table 1.

    Table 1 Sample data for short range air defense missile

    The efficiency curve is shown in Fig.3.It shows that the beststriking range of shortrange air defense missile is 15 km,where the interception capability reaches the maximum efficiency.

    Fig.3 The efficiency curve for short range air defense missile

    For another task,the long range air defense missile is used.Whatthe domain experts need to do is to modify the EEFEI with a new set of sample data to produce a new EEFEIas follows:

    The new sample data are shown in Table 2.Fig.4 gives a comparison of the two efficiency curves for the different capabilities(shortrange and long range).

    Table 2 Sample data for long range air defense missile

    From the drawing,we can see the two curves meet on the pointwhere the EEF value is 0.9 and the attribute value is 17 km,which may lead to an assumption thatthis point is the best chance for capability replacement where one efficiency begins to decline and another efficiency nearly reaches its peak.This assumption is quite reasonable because itis fully in accord with our domain knowledge that when a flying target is within 17 km,a shortrange air defense missile is usually applied,otherwise a long range air defense missile applied.

    Fig.4 Comparison of the two efficiency curves

    4.Rationality analysis based on DL

    4.1 f-SHIN

    DL is a logicalreconstruction of the so-called frame-based knowledge representation languages,with the aim of providing a simple well-established Tarski-style declarative semantics.Essentially,DL is the theoreticalcounterpartof the web ontology language(OWL)DL,and plays a particularrole in the representation and inference ofontologies. In order to deal with the knowledge vagueness,some researchers have extended the DL with fuzzy logic[29].We choose f-SHIN,the subsystem off-DL,to describe the performance requirements because it is powerful in expressability and decidability,and allows making use of some handy reasoners like Pelletand Racer.

    The background about f-SHIN is briefed here.Let NC, NR,and NIbe pair-wise disjointsets ofatomic fuzzy concepts,atomic fuzzy relations and individuals.The fuzzy concepts of f-SHIN are inductively defined as follows:

    Forall A∈NC,A is a fuzzy concept;

    Forall o∈NI,{o}is also a fuzzy concept;

    Let C,D be fuzzy concepts,R∈NR,S∈NRbe simple,then?C,C∪D,C∩D,?R.C,?R.C,≥pS,?p S, are fuzzy concepts,where p∈N.

    The fuzzy interpretation of f-SHIN is defined as I=〈ΔI,·I〉,whereΔIis a nonempty setas the domain and·Iis a fuzzy interpretation function mapping:

    Every abstract individual o into an element of the domain(o)I∈ΔI;

    Every atomic fuzzy concept into a membership degree function AI:ΔI→(0,1];

    Every atomic fuzzy relation R into a membership degree function RI:ΔI×ΔI→(0,1];

    ·Imaps fuzzy concepts and roles into subsets ofΔIand,which can be seen in[29].

    The f-SHIN knowledge base is a tripleIn fuzzy Tbox T,the fuzzy conceptaxiom is an expression in the form of C?D or C≡D.For any fuzzy interpretation I,I satisfies C?D(C≡D)iff?a∈ΔI, CI(a)?DI(a)(CI(a)=DI(a)).The detailed descriptions of H and A can be referenced in[29].

    4.2 Modeltransformation

    To verify performance requirements with a DL reasoning engine,itis necessary to transform requirements models in fuzzy UML into requirements ontology in f-DL.

    Assume that the domain model and the application modelhave been built.The requirements ontology can be established in two steps:(i)mapping all classes of the fuzzy-UML domain model into f-DL concept set and all associations into f-DL axiom set;(ii)mapping all objects and their relations of the fuzzy-UML application models into f-DL assertion set.The following algorithm provides the details of the transformation.

    Input:Domain model,application model

    Output:Requirements ontology

    Step 1Creating axioms in Tbox T

    Step 1.1Creating concepts

    For every class C in the domain model,create a same name DL concept C in Tbox T.

    Step 1.2Creating axioms For every generalization between subclass C and superclass D in the domain model,create a DL axiom C∩∪D in Tbox T.

    For every association R between class C and class D in the domain model,create a DL axiom C∩∪?R.D in Tbox T.

    Step 2Creating assertions in Abox A

    Step 2.1Creating from instances Forevery object c in the application model,with its class C and membership degree n,create a DL assertion<c: C>??n in Abox A.

    Step 2.2Creating from instance links Forevery link l in the application modelbetween objects a and b,create a DL assertion<a,b>??n in Abox A, where??∈{=,<,?,>,≥}and n∈[0,1].

    The requirements ontology built by the algorithm may contain numericalnumbers and hence cannotbe accepted by the available DL reasoners like Pelletand Racerthatdo not support mathematical calculation on numerical numbers.To solve the problem,we use the crisping technique suggested by[37]to transform fuzzy concepts further into crisp ones.

    The principle of the transformation is explained as follows around the example of the city air defense system. In the domain model shown in Fig.2,the capability concept“Interception”is described by the efficiency concept“Effectively intercept”.In the application model,the concept“Effectively intercept”is instantiated,with a membership value 0.9 assigned to it.To constructthe requirements ontology,the concepts“Interception”and“Effectively intercept”and their associations are created in Tbox,while their instances and links between instances are created in Abox.Then,the axiom“Interception??described by Effectively intercept”is created in Tbox,and the assertion“ei1:Effectively intercept=0.9”is created in Abox.To transform fuzzy concepts further into crisp ones,a crisp concept“Effectively intercept=0.9”is created in Tbox to extend the fuzzy concept“Effectively intercept”,and a crisp concept“Interception=1”is created to extend the definite concept“Interception”.Then,the above axiom is replaced by“Interception=1??described by Effectively intercept=0.9”,and the above assertion is replaced by“ei1: Effectively intercept=0.9”.Othertransformation results are summarized in Section 5.

    4.3 Rationality verification

    The rationality problem arises when requirements models specifying functionalrequirements cannot satisfy the efficiency requirements of a mission.

    Such rationality problem can be checked through the following steps:(i)transform the fuzzy-UML models into the f-DL ontology using the algorithm introduced in Section 4.2;(ii)add rationality constraint rules expressed in SWRL[38]into the ontology;(iii)check consistency and completeness of the ontology with a popular DL reasoner.

    The followings provide two examples for the rules definition in SWRL.

    Rule 1If a capability C1depends on another capability C2,the efficiency E1of C1mustbe nothigher than the efficiency E2of C2.

    The rule is specified in SWRL as follows:

    where swrlb:greaterThan is one ofthe predicates defined by SWRL to compare two numbers.

    Rule 2If a capability C is composed of a set of sub capability C1,...,Cn,the efficiency E of C must be not higher than the minimum efficiency Eiof Ci(1?i?n).

    The rule is specified in SWRL as follows:

    Capability=1(c)∧Capability=1(c1)∧Efficiency≥m(e)∧Efficiency≥n(e1)∧described by=1(c,e)∧

    described by=1(c1,e1)∧aggregation=1(c,c1)→swrlb:greaterThan(n,m).

    5.A case study

    Continuing on the example,the application model of performance requirements ofcity airdefense is built,as shown in Fig.5,to capture the following requirementsstatements.

    Fig.5 Application model of C4ISR capability requirements of the city air defense system

    “......Two tasks,air warning and target interception, are assigned for the mission‘City air defense’.To accomplish the tasks,two capabilities‘Warning’and‘Interception’are applied.‘Detection’,a component capability of‘Warning’,should be operated effectively to find air targets as early as possible.The other component‘Identification’should be operated effectively to identify the type of the air target and possible threatas accurately as possible.Any low efficiency in detection or identification may results in failure of interception.An effective interception shall destroy the target or make it lose power.Two types of missiles,short range and long range,are applied in the mission.They have different interception capabilities depending on the distance between the missile unit and the air target......”

    For performance requirements analysis,the requirements are modeled in the following way.Three concepts“Effectively intercept”,“Early detect”and“Accurately identify”are modeled to describe the desired efficiency of the capabilities“Interception”,“Detection”and“Identification”respectively,as shown in Fig.2.As the two types of missile are applied in the mission,there are two interception capabilities instantiated accordingly,and two instances of“Effectively intercept”created to describe the capability operation efficiency.The fuzzy attribute of“Effectively intercept”can be calculated by the EFFs introduced in Section 3.

    The built models suffer from a rationality problem.The efficiency of interception(evaluated to be 0.9)operated by the short range missile is higher than the efficiency of detection(evaluated to be 0.85),which breaks the rules R1 and R2.The domain explanation to the conflict is:the capability“Detection”,applied to detectair target7 min before it being a threat,does not support the performance requirementof“Effective interception”that requires 90% possible enemy targets to be destroyed ormade lose power.

    The above analysis result is made upon rationality verification,reasoning through the requirements ontology that is builtfrom the domain modeland the application model. Table 3 shows the contents of Tbox and Abox after crisping transformation.

    The reasoning is processed as follows:

    Step 1A new assertion a13“intercept1:Capability=1”can be deduced from assertion a1 and axiom A1.

    Step 2A new assertion a14“ei1:Efficiency=0.9”can be deduced from assertion a2 and axiom A2.

    Step 3A new assertion a15“we:Efficiency=w”can be deduced from assertion a10 and axiom A10.

    Step 4Anew assertion a16“w1:Capability=1”can be deduced from assertion a4 and axiom A1.

    Table 3 Axioms and assertions in the requirements ontology

    Step 5A new assertion a17“swrlb:greaterThan(w, 0.9)”can be deduced from assertion a13,a14,a15,a16, a3,a9,a12 and the rationality constraintrule R1.

    Step 6A new assertion a18“d1:Capability=1”can be deduced from assertion a5 and axiom A1.

    Step 7A new assertion a19“ed1:Efficiency=0.85”can be deduced from assertion a6 and axiom A13.

    Step 8A new assertion a20“swrlb:greaterThan(w, 0.85)”can be deduced from assertion a15,a16,a18,a19, a11,a12,a8 and the rationality constraintrule R2.

    Step 9A new assertion a21“swrlb:greaterThan(0.85, 0.9)”can be deduced from assertion a17 and a 20.Itis apparently a wrong assertion,and hence the reasoning process terminates.

    The above case is deliberately cutin order to give a simple example for understanding.But for a practical IT program,there may be thousands of concepts in the models, and it is hard to check all the rationality problems manually.

    6.Conclusions

    The main contribution of the paper is presenting a method of modeling and verification for both functional and performance requirements analysis,which would decrease the cost and risk of the SoS development.It suggests thatthe popular UML is extended by fuzzy constructs to model the uncertain and vague concepts that are important for analyzing performance requirements.In order to determine whether system capabilities are sufficient for a task to achieve the mission goal with a desired efficiency,the SoS performance requirements need to be modeled and then formally specified.A modeltransformation algorithm is provided to convert the fuzzy-UML model into a f-DL ontology so thatthe verification can be automated with the help of a poplar DL reasonersuch as Pellet.

    The current research focuses on requirements analysis,and it considers only the capability viewpoint of the C4ISR architecture.The further research will be extended to the architectural design by covering more viewpoints, such as operationalviewpointand system viewpointof the DoDAF.And,we willintend to develop a domain-specific rules description language based on SWRL.Such language may relieve the domain expertsfromlack offormaldomain knowledge and allow them to define rationality constraint rules with their familiar terms.

    Acknowledgments

    We acknowledge allauthors ofthe literature referenced for theirvaluable research results,especially the DM2 Groups forthe meta-modelthatprovides a basis for our research.

    [1]K.W.Hipel,M.M.Jamshidi,J.M.Tien,et al.The future of systems,man,and cybernetics:application domains and research methods.IEEE Trans.on Systems,Man and Cybernetics,PartC-Application and Review,2007,37(5):726–743.

    [2]M.Jamshidi.Systems of systems engineering:innovations for the 21stcentury.New Jersey:Wiley,2009.

    [3]A.P.Sage,W.B.Rouse.Handbook ofsystems engineering and management.2nd ed.New Jersey:Wiley,2009:479–506.

    [4]DoD Architecture Framework Working Group.DoD Architecture Framework,Version 2.0.Washington,DC:Departmentof Defense,2009.

    [5]E.A.Shuman.Understanding executable architectures through an examination of language model elements.Proc.of the Summer Simulation Multi-conference,2010:483–497.

    [6]C.Piaszczyk.Model based systems engineering with DepartmentofDefense architecturalframework.System Engineering, 2011,14(3):305–326.

    [7]R.Wang,C.H.Dagli.Executable system architecting using systems modeling language in conjunction with colored Petrinets in a model-driven systems development process.System Engineering,2011,14(4):383–409.

    [8]B.Ge,K.W.Hipel,K.Yang,etal.A data-centric capabilityfocused approach forsystem-of-systems architecture modeling and analysis.System Engineering,2013,16(3):363–377.

    [9]OMG.OMG unified modeling language TM,superstructure. Version 2.2.http://www.omg.org/spec/UML/2.2/Superstructure.2009.

    [10]E.Andrade,P.Maciel,G.Callou.A methodology formapping SysML activity diagram to time Petrinetforrequirementvalidation of embedded real-time systems with energy constraints. Proc.ofthe InternationalConference on DigitalSociety,2009: 266–271.

    [11]S.Mellor.M.Balcer.Executable UML:a foundation for model-driven architecture.New York:Addison Wesley,2002.

    [12]H.Tuna.An enterprise architecture strategy for SOA.The Architecture Journal,2009,21:6–23.

    [13]C.Madrid,B.Shaw.Enabling business capabilities with SOA. The Architecture Journal,2009,21:24–28.

    [14]N.Brad,C.Daniel,R.Nelson.Transparency and multi-core parallelisms.Proc.of the 5th ACM SIGPLAN Workshop on Declarative Aspects ofMulticore Programming,2010:45–52.

    [15]E.Daniel.NASA’s exploration agenda and capability engineering.Computer,2006,39(1):63–73.

    [16]L.Dai,K.Cooper.Using FDAF to bridge the gap between enterprise and software architectures for security.Science of Computer Programming,2007,66(1):87–102.

    [17]H.Eriksson,M.Penkar.Business modeling with UML.New York:The OMG Press,2000.

    [18]J.Tsai,A.Liu.Experience on knowledge-based software engineering:a logic-based requirements language and its industrialapplications.The Journal of Systems and Software,2009, 82(10):1578–1587.

    [19]D.Kang,J.Lee,K.Kim.Alignmentof business enterprise architectures using fact-based ontologies.Expert Systems with Applications,2010,37(4):3274–3283.

    [20]V.Chapurlat.A formalverification framework and associated tools for enterprise modeling:application to UEML.Computers in Industry,2006,57(2):153–166.

    [21]R.Ahmed,S.Robinson.Simulation in business and industry: how simulation contextcan affect simulation practice.Proc.of the Spring Simulation Multi-conference,2007:152–159.

    [22]V.Chapurlat.Verification,validation,qualification and certification of enterprise models:statements and opportunities. Computers in Industry,2008,59(7):711–721.

    [23]V.Lamsweerde.Formal specification:a roadmap.Proc.of the Conference on the Future of Software Engineering,2002: 147–159.

    [24]V.Lamsweerde.Requirements engineering:from system goals to UML models to software specifications.New Jersey:Wiley, 2009.

    [25]C.Ponsard,P.Massonet.Early verification and validation of mission criticalsystems.Electronic Notes in Theoretical Computer Science,2005,133:237–254.

    [26]V.Anaya,G.Berio.The unified enterprise modelling language-overview and future work.Computers in Industry, 2010,61(2):99–111.

    [27]V.Chapurlat,B.Kamsu-foguem.A formalverification framework and associated tools forenterprise modeling:application to UEML.Computers in Industry,2006,57(2):153–166.

    [28]J.Floch,C.Carrez.A comprehensive engineering framework for guaranteeing componentcompatibility.Journal ofSystems and Software,2010,83(10):1759–1779.

    [29]G.Stoilos,G.Stamou.Reasoning with very expressive fuzzy description logics.Journal of ArtificialIntelligence Research, 2007,30(5):273–320.

    [30]Q.Dong,Z.Wang.Domain-specific modeling and verification for C4ISR capability requirements.Journal of Central South University,2012,19(5):1334–1341.

    [31]Q.Dong,Z.Wang.Capability requirements modeling and verification based on fuzzy ontology.Journal of Systems Engineering and Electronics,2012,23(1):178–188.

    [32]Z.Ma.Extending object-oriented databases forfuzzy information modeling.Journal of Information Systems,2004,29(5): 421–435.

    [33]Z.Ma.Representing and reasoning on fuzzy UML models:a description logic approach.Expert Systems with Applications, 2011,38(3):2536–2549.

    [34]G.Giancarlo,F.Luis.An ontology-based approach for evaluating the domain appropriateness and comprehensibility appropriateness ofmodeling languages.Journal ofLecture Notes in Computer Science,2005,3713(1):691–705.

    [35]OMG.Meta-object facility.Version 2.0.Document ad/03-04-07.http://www.omg.org/mof,2006.

    [36]L.Andres,S.Fang.An efficient and flexible mechanism for constructing membership functions.Journal of Operational Research,2002,2002:84–95.

    [37]F.Bobillo,M.Delgado.Fuzzy description logics under G¨odel semantics.Journal of Approximate Reasoning,2009,50(3): 494–514.

    [38]W3C.SWRL:a semantic web rule language combining OWL and Rule ML.http://www.w3.org/Submission/SWRL/,2004.

    Biographies

    Yudong Qiwas born in 1973.He is an associate professor of Aeronautical and Astronautical University.He received his Ph.D.degree from Aeronautical and Astronautical University.His research interests are software engineering,semantic web, theory and technology of command information system,currently focusing on conception modeling and information system design.

    E-mail:qiyudong@sina.comZhixue Wangwas born in 1961.He is a professor of Institute of Command Information System,PLA University of Science and Technology.He received his M.S.degree from National University of Defense and Technology,and was a visiting researcher in Faculty of Information Technology,University of Brighton,England.His research interests are software engineering,requirements engineering,theory and technology of command automation,currently focusing on domainspecific modeling and formalverification.

    E-mail:wzxcx@163.com

    Qingchao Dongwas born in 1982.He is a lecturer of Naval Aeronautical and Astronautical University. He received his Ph.D.degree from PLA University of Science and Technology.His research interests are requirements engineering,focusing on specification and formalverification.

    E-mail:dongqingchao001@163.com

    Hongyue Hewas born in 1985.He is a lecturer of Institute of Command Information System,PLA University of Science and Technology University, where he received his M.S.and Ph.D.degrees.His research interest is requirements engineering,currently focusing on specification and formalverification.

    E-mail:hehy2008@sina.com

    10.1109/JSEE.2015.00084

    Manuscript received June 27,2014.

    *Corresponding author.

    This work was supported by the National Natural Science Foundation of China(61273210).

    老汉色∧v一级毛片| 1024视频免费在线观看| 日韩在线高清观看一区二区三区| 老熟女久久久| 嫩草影院入口| 亚洲精品国产一区二区精华液| 两性夫妻黄色片| 免费看不卡的av| 97人妻天天添夜夜摸| 中国国产av一级| 免费不卡的大黄色大毛片视频在线观看| av有码第一页| 国产一区有黄有色的免费视频| 亚洲国产欧美网| 一级毛片 在线播放| 汤姆久久久久久久影院中文字幕| 人人妻人人爽人人添夜夜欢视频| 亚洲国产看品久久| 成年av动漫网址| 老司机影院成人| 久久99热这里只频精品6学生| 少妇的丰满在线观看| 精品国产一区二区久久| 久久免费观看电影| 丝袜美腿诱惑在线| 青春草视频在线免费观看| 亚洲精品成人av观看孕妇| 国产av国产精品国产| 亚洲av福利一区| 婷婷色麻豆天堂久久| 欧美亚洲 丝袜 人妻 在线| 亚洲欧美一区二区三区黑人 | 国产精品av久久久久免费| 午夜福利,免费看| 日韩视频在线欧美| 黄网站色视频无遮挡免费观看| 又黄又粗又硬又大视频| 免费观看性生交大片5| 欧美精品国产亚洲| 人人妻人人澡人人看| 最新的欧美精品一区二区| 精品国产露脸久久av麻豆| 人妻一区二区av| 青春草视频在线免费观看| 成年av动漫网址| 亚洲欧美日韩另类电影网站| videossex国产| 国产亚洲最大av| 亚洲av男天堂| 日产精品乱码卡一卡2卡三| 五月开心婷婷网| 日韩欧美一区视频在线观看| 18禁观看日本| 国产乱来视频区| 久久99热这里只频精品6学生| 免费不卡的大黄色大毛片视频在线观看| 汤姆久久久久久久影院中文字幕| 肉色欧美久久久久久久蜜桃| 国产又色又爽无遮挡免| 久久人人97超碰香蕉20202| 黄色视频在线播放观看不卡| 亚洲国产最新在线播放| 伦理电影免费视频| 精品午夜福利在线看| 人人妻人人澡人人看| 男女边摸边吃奶| 波野结衣二区三区在线| 人妻 亚洲 视频| 伊人久久国产一区二区| 精品少妇一区二区三区视频日本电影 | 国产亚洲最大av| 美女xxoo啪啪120秒动态图| 精品国产一区二区久久| 两性夫妻黄色片| 麻豆av在线久日| 精品国产乱码久久久久久男人| 久久久国产精品麻豆| 亚洲在久久综合| 日本欧美视频一区| 99久久人妻综合| 免费看av在线观看网站| 男人爽女人下面视频在线观看| 性高湖久久久久久久久免费观看| 日日啪夜夜爽| 亚洲精品久久成人aⅴ小说| 日本黄色日本黄色录像| 90打野战视频偷拍视频| 亚洲一码二码三码区别大吗| 一区二区三区精品91| 亚洲伊人久久精品综合| 国产精品三级大全| 成人漫画全彩无遮挡| 王馨瑶露胸无遮挡在线观看| 国产在视频线精品| 国产精品国产三级国产专区5o| 乱人伦中国视频| 午夜影院在线不卡| 日韩熟女老妇一区二区性免费视频| 日韩人妻精品一区2区三区| 国产国语露脸激情在线看| xxx大片免费视频| 丝袜美足系列| 女的被弄到高潮叫床怎么办| 久久狼人影院| 免费看不卡的av| 纵有疾风起免费观看全集完整版| 一区二区三区精品91| 七月丁香在线播放| av国产精品久久久久影院| 秋霞在线观看毛片| 久久精品国产亚洲av天美| 午夜福利乱码中文字幕| 欧美激情极品国产一区二区三区| 亚洲国产精品一区二区三区在线| 日韩伦理黄色片| 久久ye,这里只有精品| 人妻人人澡人人爽人人| 国产精品久久久久久久久免| 青春草视频在线免费观看| 亚洲成色77777| 一区二区av电影网| 最近的中文字幕免费完整| 考比视频在线观看| 日韩中字成人| 亚洲国产色片| 国产欧美亚洲国产| 欧美精品国产亚洲| 日韩中文字幕欧美一区二区 | 亚洲精品国产av蜜桃| 国产男女超爽视频在线观看| 多毛熟女@视频| 久久久久久免费高清国产稀缺| 亚洲国产日韩一区二区| 99久久中文字幕三级久久日本| 国产精品熟女久久久久浪| 考比视频在线观看| 国产一区二区在线观看av| 国产精品久久久久成人av| 两个人免费观看高清视频| 免费人妻精品一区二区三区视频| 亚洲国产最新在线播放| 成年动漫av网址| 成人手机av| 毛片一级片免费看久久久久| 80岁老熟妇乱子伦牲交| 中文欧美无线码| 国产免费视频播放在线视频| 精品一品国产午夜福利视频| 又大又黄又爽视频免费| 一二三四在线观看免费中文在| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 久久午夜福利片| 欧美av亚洲av综合av国产av | 国产精品亚洲av一区麻豆 | 少妇的逼水好多| av免费观看日本| 9191精品国产免费久久| 亚洲,欧美精品.| 日本午夜av视频| 美国免费a级毛片| 在线观看免费视频网站a站| 视频在线观看一区二区三区| 精品少妇久久久久久888优播| 成年av动漫网址| 午夜福利在线观看免费完整高清在| 亚洲欧洲精品一区二区精品久久久 | 成人漫画全彩无遮挡| 丝瓜视频免费看黄片| 亚洲欧美精品自产自拍| 国产免费视频播放在线视频| 免费看不卡的av| 久久久久精品久久久久真实原创| 免费黄色在线免费观看| 欧美日韩一区二区视频在线观看视频在线| 两个人看的免费小视频| 国产一区有黄有色的免费视频| 亚洲精品久久久久久婷婷小说| 免费观看无遮挡的男女| 两个人免费观看高清视频| 美女主播在线视频| 国产黄色视频一区二区在线观看| 黑丝袜美女国产一区| 日韩av免费高清视频| 亚洲精品中文字幕在线视频| 国产福利在线免费观看视频| 综合色丁香网| 国产日韩欧美在线精品| 亚洲天堂av无毛| 免费在线观看视频国产中文字幕亚洲 | 国产97色在线日韩免费| 国产精品久久久久久精品古装| 精品国产露脸久久av麻豆| 中文字幕最新亚洲高清| 老女人水多毛片| 1024视频免费在线观看| 中文字幕精品免费在线观看视频| 亚洲欧美成人精品一区二区| 国产精品亚洲av一区麻豆 | 99国产精品免费福利视频| 最黄视频免费看| 欧美 亚洲 国产 日韩一| 国产成人午夜福利电影在线观看| 爱豆传媒免费全集在线观看| 熟妇人妻不卡中文字幕| 亚洲精品,欧美精品| av国产久精品久网站免费入址| 久久这里有精品视频免费| 欧美日韩精品成人综合77777| 色婷婷久久久亚洲欧美| 成人免费观看视频高清| 久久久久人妻精品一区果冻| 午夜影院在线不卡| 最近2019中文字幕mv第一页| 国产成人精品在线电影| 精品一区在线观看国产| 欧美在线黄色| 亚洲综合色惰| 欧美日韩亚洲高清精品| 亚洲精品aⅴ在线观看| 国产人伦9x9x在线观看 | 国产精品免费大片| 免费黄频网站在线观看国产| 日韩伦理黄色片| 亚洲欧美中文字幕日韩二区| 欧美日韩综合久久久久久| 伦理电影免费视频| 美女中出高潮动态图| 少妇被粗大猛烈的视频| 国产精品一二三区在线看| 国产精品一区二区在线观看99| 国产成人91sexporn| 日韩一区二区三区影片| 最近最新中文字幕大全免费视频 | 国产成人91sexporn| 秋霞在线观看毛片| 99国产综合亚洲精品| 成人18禁高潮啪啪吃奶动态图| 女人高潮潮喷娇喘18禁视频| 欧美日韩一级在线毛片| 精品国产超薄肉色丝袜足j| 狠狠婷婷综合久久久久久88av| 丰满迷人的少妇在线观看| 免费黄频网站在线观看国产| 亚洲国产av影院在线观看| 一级黄片播放器| 黑丝袜美女国产一区| 久久久久久久久免费视频了| 国产av一区二区精品久久| 亚洲av.av天堂| 国产精品一二三区在线看| 永久网站在线| 午夜老司机福利剧场| 亚洲久久久国产精品| 国产亚洲欧美精品永久| 国产野战对白在线观看| av福利片在线| 国产亚洲一区二区精品| 天天躁夜夜躁狠狠久久av| av国产久精品久网站免费入址| 人人妻人人爽人人添夜夜欢视频| 欧美国产精品一级二级三级| 欧美精品高潮呻吟av久久| 26uuu在线亚洲综合色| 亚洲五月色婷婷综合| 波野结衣二区三区在线| 国精品久久久久久国模美| 少妇被粗大的猛进出69影院| 国产成人免费观看mmmm| 成年av动漫网址| 久久99精品国语久久久| 一级a爱视频在线免费观看| 国产精品av久久久久免费| 免费观看性生交大片5| 少妇被粗大的猛进出69影院| 午夜久久久在线观看| 国产日韩欧美亚洲二区| 亚洲欧洲国产日韩| 纯流量卡能插随身wifi吗| 亚洲一区二区三区欧美精品| a 毛片基地| 一级毛片黄色毛片免费观看视频| 国产免费一区二区三区四区乱码| 九草在线视频观看| 美女xxoo啪啪120秒动态图| 成年女人在线观看亚洲视频| 国产成人精品婷婷| 老女人水多毛片| 久久精品久久久久久噜噜老黄| 国产乱来视频区| 边亲边吃奶的免费视频| 免费日韩欧美在线观看| 香蕉丝袜av| 高清不卡的av网站| 精品人妻熟女毛片av久久网站| 国产亚洲午夜精品一区二区久久| 亚洲国产看品久久| 啦啦啦在线观看免费高清www| 亚洲精品一区蜜桃| 国产一区二区在线观看av| 亚洲国产欧美日韩在线播放| 亚洲精品日韩在线中文字幕| 777久久人妻少妇嫩草av网站| 亚洲成人av在线免费| 我的亚洲天堂| 欧美激情 高清一区二区三区| xxx大片免费视频| 男女午夜视频在线观看| 久久这里只有精品19| 老汉色∧v一级毛片| 2022亚洲国产成人精品| 国产日韩欧美视频二区| 亚洲精品自拍成人| 亚洲五月色婷婷综合| 边亲边吃奶的免费视频| 久久久久精品性色| 美女大奶头黄色视频| 我要看黄色一级片免费的| 女性生殖器流出的白浆| 啦啦啦视频在线资源免费观看| 日韩在线高清观看一区二区三区| 国产精品一区二区在线不卡| 热99久久久久精品小说推荐| 亚洲欧洲精品一区二区精品久久久 | 美女视频免费永久观看网站| 亚洲色图 男人天堂 中文字幕| 久久精品夜色国产| 久久免费观看电影| 亚洲欧美日韩另类电影网站| 18在线观看网站| 欧美日韩精品网址| 日韩人妻精品一区2区三区| 亚洲精品日本国产第一区| 一级毛片黄色毛片免费观看视频| 又黄又粗又硬又大视频| 午夜福利在线观看免费完整高清在| 咕卡用的链子| 狠狠婷婷综合久久久久久88av| 欧美日韩国产mv在线观看视频| 岛国毛片在线播放| 亚洲,一卡二卡三卡| 久久亚洲国产成人精品v| 国产亚洲午夜精品一区二区久久| 少妇的逼水好多| 国产精品欧美亚洲77777| 国产免费又黄又爽又色| 国产精品人妻久久久影院| 久久久久久久国产电影| 在线天堂最新版资源| 中文字幕最新亚洲高清| 天天躁狠狠躁夜夜躁狠狠躁| 日韩三级伦理在线观看| 美女午夜性视频免费| 国产精品人妻久久久影院| 波多野结衣av一区二区av| 国产97色在线日韩免费| 亚洲第一av免费看| 十分钟在线观看高清视频www| 精品人妻一区二区三区麻豆| 各种免费的搞黄视频| 在线观看人妻少妇| 爱豆传媒免费全集在线观看| 美女中出高潮动态图| 午夜激情久久久久久久| tube8黄色片| 中国三级夫妇交换| 美女午夜性视频免费| 欧美精品国产亚洲| 成人午夜精彩视频在线观看| 国产精品一区二区在线不卡| 91精品三级在线观看| 校园人妻丝袜中文字幕| 黄色一级大片看看| 午夜福利视频精品| 亚洲中文av在线| 午夜福利视频精品| 美女脱内裤让男人舔精品视频| 午夜老司机福利剧场| 叶爱在线成人免费视频播放| 热99国产精品久久久久久7| 寂寞人妻少妇视频99o| 在现免费观看毛片| 成人毛片a级毛片在线播放| 国产精品嫩草影院av在线观看| 狠狠婷婷综合久久久久久88av| 免费在线观看视频国产中文字幕亚洲 | av国产精品久久久久影院| 日韩,欧美,国产一区二区三区| 黄色怎么调成土黄色| 自拍欧美九色日韩亚洲蝌蚪91| 黑人巨大精品欧美一区二区蜜桃| 成人国产av品久久久| 亚洲国产精品999| 青春草亚洲视频在线观看| 国产伦理片在线播放av一区| 亚洲 欧美一区二区三区| 黄色配什么色好看| 亚洲国产最新在线播放| 在线看a的网站| 9热在线视频观看99| 日韩av不卡免费在线播放| 午夜激情av网站| 国产精品 国内视频| 侵犯人妻中文字幕一二三四区| 亚洲人成电影观看| 久热久热在线精品观看| 精品国产一区二区久久| 亚洲欧美色中文字幕在线| 欧美精品国产亚洲| 1024香蕉在线观看| 人人妻人人添人人爽欧美一区卜| 美女高潮到喷水免费观看| 男男h啪啪无遮挡| 亚洲成人av在线免费| 又黄又粗又硬又大视频| 日韩一本色道免费dvd| 三级国产精品片| 日本av免费视频播放| 中文字幕亚洲精品专区| 性少妇av在线| 天天影视国产精品| 国产视频首页在线观看| 在线天堂中文资源库| 午夜日韩欧美国产| 国产福利在线免费观看视频| 韩国av在线不卡| 亚洲色图 男人天堂 中文字幕| 在线亚洲精品国产二区图片欧美| 亚洲综合色惰| 亚洲精品久久成人aⅴ小说| av天堂久久9| 亚洲精华国产精华液的使用体验| 亚洲 欧美一区二区三区| 亚洲人成77777在线视频| 久久国内精品自在自线图片| 男女边摸边吃奶| 亚洲精品在线美女| 久久这里只有精品19| 亚洲欧美色中文字幕在线| 街头女战士在线观看网站| 亚洲三区欧美一区| 日韩不卡一区二区三区视频在线| 一级爰片在线观看| 搡老乐熟女国产| 人人妻人人爽人人添夜夜欢视频| 国产精品久久久久久av不卡| 免费女性裸体啪啪无遮挡网站| 国产片特级美女逼逼视频| 最新的欧美精品一区二区| 999精品在线视频| 国产一区二区在线观看av| 午夜影院在线不卡| 久久午夜综合久久蜜桃| 国产免费现黄频在线看| 老司机亚洲免费影院| 久久免费观看电影| 女的被弄到高潮叫床怎么办| 亚洲成国产人片在线观看| 午夜免费观看性视频| 青青草视频在线视频观看| 久久久国产精品麻豆| 日本欧美国产在线视频| 这个男人来自地球电影免费观看 | 久久精品国产亚洲av涩爱| 亚洲婷婷狠狠爱综合网| 伊人亚洲综合成人网| 国产亚洲一区二区精品| 极品人妻少妇av视频| 亚洲三级黄色毛片| 欧美日韩视频高清一区二区三区二| 成人免费观看视频高清| 中文乱码字字幕精品一区二区三区| 亚洲人成电影观看| 亚洲av在线观看美女高潮| 午夜激情久久久久久久| 99国产精品免费福利视频| 综合色丁香网| 欧美激情 高清一区二区三区| 国产视频首页在线观看| 少妇的逼水好多| 亚洲情色 制服丝袜| 亚洲成色77777| 美女国产高潮福利片在线看| 两性夫妻黄色片| 久久精品国产鲁丝片午夜精品| 国产亚洲欧美精品永久| 久久精品国产亚洲av涩爱| 精品久久久精品久久久| 这个男人来自地球电影免费观看 | 国产白丝娇喘喷水9色精品| 99久国产av精品国产电影| 亚洲精品久久久久久婷婷小说| 男人舔女人的私密视频| 亚洲精品国产一区二区精华液| 在线精品无人区一区二区三| 久久精品国产综合久久久| 国产精品 国内视频| 18禁动态无遮挡网站| 中文字幕色久视频| 人妻一区二区av| 日韩欧美精品免费久久| freevideosex欧美| 久久精品国产a三级三级三级| 有码 亚洲区| 亚洲国产日韩一区二区| 色婷婷久久久亚洲欧美| 亚洲天堂av无毛| 欧美精品高潮呻吟av久久| 成人漫画全彩无遮挡| 黑丝袜美女国产一区| 一级a爱视频在线免费观看| 一区在线观看完整版| 国产一区有黄有色的免费视频| 成人18禁高潮啪啪吃奶动态图| 免费高清在线观看日韩| 亚洲欧美日韩另类电影网站| 日韩制服骚丝袜av| 80岁老熟妇乱子伦牲交| 嫩草影院入口| 亚洲一区二区三区欧美精品| 亚洲伊人色综图| 激情五月婷婷亚洲| 亚洲人成77777在线视频| 一级a爱视频在线免费观看| 亚洲欧洲国产日韩| 国产av一区二区精品久久| 卡戴珊不雅视频在线播放| 寂寞人妻少妇视频99o| 国产精品久久久久久精品古装| 亚洲成国产人片在线观看| 亚洲男人天堂网一区| 国语对白做爰xxxⅹ性视频网站| 亚洲精品久久久久久婷婷小说| 亚洲精品一区蜜桃| 国产精品一区二区在线不卡| 国产av码专区亚洲av| 日韩中文字幕欧美一区二区 | 国产欧美日韩综合在线一区二区| 在线观看免费视频网站a站| 啦啦啦视频在线资源免费观看| 人成视频在线观看免费观看| 国产爽快片一区二区三区| 免费久久久久久久精品成人欧美视频| 国产成人精品福利久久| 国产黄色视频一区二区在线观看| 国产麻豆69| 亚洲视频免费观看视频| 国语对白做爰xxxⅹ性视频网站| 一区二区三区精品91| 久久久a久久爽久久v久久| 色94色欧美一区二区| 午夜91福利影院| 18在线观看网站| 精品亚洲成a人片在线观看| 久久久久人妻精品一区果冻| 精品国产乱码久久久久久男人| 啦啦啦啦在线视频资源| 各种免费的搞黄视频| 精品人妻熟女毛片av久久网站| 久久久久网色| 搡女人真爽免费视频火全软件| 国产精品国产av在线观看| 色播在线永久视频| av在线观看视频网站免费| 在线观看人妻少妇| 日本av手机在线免费观看| 亚洲欧美精品自产自拍| 18禁动态无遮挡网站| 夫妻午夜视频| 99精国产麻豆久久婷婷| 久久久久久免费高清国产稀缺| 亚洲国产欧美在线一区| 女人久久www免费人成看片| 黄色视频在线播放观看不卡| 少妇人妻久久综合中文| 熟女av电影| 热99国产精品久久久久久7| 久久精品国产自在天天线| 国产午夜精品一二区理论片| 久久午夜福利片| 两性夫妻黄色片| 美女中出高潮动态图| 精品少妇内射三级| 婷婷色麻豆天堂久久| 国产精品免费视频内射| 日韩制服骚丝袜av| 伦精品一区二区三区| www日本在线高清视频| 欧美日韩精品成人综合77777| 国产av一区二区精品久久| 美国免费a级毛片| 哪个播放器可以免费观看大片| 精品人妻在线不人妻| 性色avwww在线观看| 欧美人与性动交α欧美精品济南到 | 肉色欧美久久久久久久蜜桃| 如何舔出高潮| 精品一区在线观看国产| 免费观看在线日韩| 18禁动态无遮挡网站| 亚洲欧洲精品一区二区精品久久久 | 亚洲精品美女久久av网站| 国产成人aa在线观看| 成人国产麻豆网| 欧美黄色片欧美黄色片| av女优亚洲男人天堂| 亚洲综合色惰| 日韩,欧美,国产一区二区三区| 久久久久国产精品人妻一区二区| 99热网站在线观看| 亚洲精品美女久久av网站| 少妇人妻精品综合一区二区| 日韩三级伦理在线观看| 国产免费现黄频在线看| 热re99久久精品国产66热6| 国产精品三级大全|