• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Throughput scheduling in cognitive radio networksbased on immune optimization

    2015-03-01 09:21:56ChaiZhengyiZhengBaolinShenLianfengZhuSifeng

    Chai Zhengyi  Zheng Baolin  Shen Lianfeng  Zhu Sifeng

    (1National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China)(2School of Computer Science and Software Engineering, Tianjin Polytechnic University, Tianjin 300384, China)(3Department of Information Engineering, Henan Vocational and Technical College, Zhengzhou 450046, China)

    ?

    Throughput scheduling in cognitive radio networksbased on immune optimization

    Chai Zhengyi1,2Zheng Baolin3Shen Lianfeng1Zhu Sifeng1

    (1National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China)(2School of Computer Science and Software Engineering, Tianjin Polytechnic University, Tianjin 300384, China)(3Department of Information Engineering, Henan Vocational and Technical College, Zhengzhou 450046, China)

    Abstract:To study the throughput scheduling problem under interference temperature in cognitive radio networks, an immune algorithm-based suboptimal method was proposed based on its NP-hard feature. The problem is modeled as a constrained optimization problem to maximize the total throughput of the secondary users (SUs). The mapping between the throughput scheduling problems and the immune algorithm is given. Suitable immune operators are designed such as binary antibody encoding, antibody initialization based on pre-knowledge, a proportional clone to its affinity and an adaptive mutation operator associated with the evolutionary generation. The simulation results show that the proposed algorithm can obtain about 95% of the optimal throughput and operate with much lower liner computational complexity.

    Key words:cognitive radio networks; throughput scheduling; immune algorithm; interference temperature

    Received 2015-04-20.

    Biography:Chai Zhengyi (1976—), male, doctor, associate professor,super_chai@126.com.

    Foundation items:The National Natural Science Foundation of China (No.U1504613, 61202099, 61201175, U1204618), China Postdoctoral Science Foundation (No.2013M541586).

    Citation:Chai Zhengyi, Zheng Baolin, Shen Lianfeng, et al. Throughput scheduling in cognitive radio networks based on immune optimization[J].Journal of Southeast University (English Edition),2015,31(4):431-436.[doi:10.3969/j.issn.1003-7985.2015.04.001]

    The increasing growth in wireless communication demands has intensified the shortage crisis for the radio spectrum, while a significant amount of the licensed spectrum is not currently being utilized[1]. The spectrum is far more underutilized rather than naturally scarce. A cognitive radio network (CRN) is a kind of intelligent communication system, which enables the devices to opportunistically access the licensed spectrum, and thereby enhance the utilization of the existing spectrum resources[2-3]. The nodes in a cognitive radio network can be classified into primary users (PUs) and secondary users (SUs). A PU is a licensed user that has exclusive rights to the access spectrum. A SU is an unlicensed user that can utilize the spectrum opportunistically with primary users under interference restriction.

    Throughput optimal scheduling for cognitive radio networks under interference temperature constraints is an open research issue[4]. The throughput scheduling determines how many packets and with which frequency each SU will transmit in each time slot[5]. The aim of it is to maximize the total throughput of the SUs in the cell. The throughput scheduler issue in conventional networks has been widely studied[6]. Nonetheless, the cognitive radio paradigm brings new challenges into the issue because of the coexistence of the PUs and the SUs. The throughput scheduling problem considered in this paper can be distinguished from these works by its cognitive radio specific nature. That is, not only the availability of different frequencies but also the maximum allowable transmission rate of the frequency bands are time-varying[5].

    Researchers have done some work with different scenarios. In Ref.[6], a throughput scheduling algorithm was proposed which does not enable the true coexistence of the PUs and the SUs. The authors in Ref.[7] figureted a distributed heuristic to determine the channels and time slots for the cognitive nodes. However, they do not consider the interference for the PUs either in their optimization figuretion or in their suboptimal heuristic. The interference temperature model provides the true coexistence data of its licensed and unlicensed users. The throughput optimization is a binary integer programming problem, so the figureted scheduling algorithms have a high computational complexity[3-7]. In Ref.[3], its optimal solution was obtained by the branch-and-bound algorithm with very high computational complexity. In Ref.[4], the authors focused on throughput scheduling under interference temperature constraints and figureted the throughput maximization problems. Then, the authors proposed suboptimal schedulers, referred to as maximum frequency selection (MFS) and probabilistic frequency selection (PFS), with low complexity at the expense of poor throughput performance. Hence, the design of better performing suboptimal scheduling with reasonable complexity is very meaningful.

    It is known that bio-inspired methods are ideal for such nonlinear optimization problems[8]. Some bio-inspired methods have been employed in conventional (non-cognitive) schedulers, such as the genetic algorithm[9]and particle swarm optimization[10]. In this paper, an improved immune algorithm is introduced to solve the throughput scheduling problem. The inspiration comes from the fact that the immune algorithm is ideal for nonlinear optimization problems with a large feasible solution space where a quick sub-optimal solution will suffice. Also, to the best of our knowledge, the use of the immune algorithm for scheduling in cognitive radio networks has not previously been explored.

    1System Model

    Consider a time-slotted IEEE 802.22 system in which the SUs are controlled and guided by the cognitive base station (CBS)[4-5]. The scheduler is at the CBS. Assume that the interference temperature perceived by the PUs is within the interference temperature limits; reliable communication between the CBS and the SUs is achieved; and collisions among the SUs are avoided[4]. Each SUncalculates every frequencyf, and the value is denoted asUnf, which is the maximum number of packets that it can transmit for frequencyfin a time slot. The calculation procedure forUnfvalues guarantees that the interference temperature perceived by the PUs is within the predetermined limits. The CBS then constitutes a matrix called U=[Unf].

    The throughput optimal schedule can be formatted as

    (1)

    (1a)

    Xnft+Xn′ft≤1?n,n′∈1,2,…,N;n≠n′; ?f,?t

    (1b)

    whereN,F,Tare the total number of SUs, frequencies, time slots, respectively;Xnftis a binary variable such thatXnft=1 if userntransmits with frequencyfin time slottand 0 otherwise. Constraint (1a) guarantees that at least one time slot is assigned to each SU, whereas constraint (1b) makes certain that at most one user can transmit at a particular time slot and frequency combination, and consequently preventing collisions among the cognitive nodes. Moreover, the schedule lengthTis the time period in which the spectral and networking environment changes slowly enough so that theXnftvalues are not affected. For example, the TV bands used by an IEEE 802.22 network constitute a slowly altering spectral environment, and hence enableTto be large enough[4].

    2Proposed Algorithm

    2.1 Overview of immune optimization algorithm

    The artificial immune system (AIS) is inspired by the human immune system. The AIS-based algorithms typically extract ideas from the human immune system’s characteristics of learning and adaptability to solve some complicated problems[10]. Most immune system inspired optimization algorithms are based on the clone selection principle. Clone selection is a dynamic simulation process of the immune system that is self-adaptive against antigens. The clone selection algorithm for optimization has been widely used in engineering-oriented fields, such as spectrum allocation[11], job scheduling[12], and image segmentation[13]and so on. These algorithms essentially evolve solutions to problems via the repetition of a clone, affinity maturation (via mutation) and a selection cycle for a candidate solutions population, and remaining good solutions in the population[10-12].

    Some related terms are described briefly as follows:

    1) Antigen. An antigen represents one sample in the solution space of the problem. In this paper, antigen refers to the throughput schedule problem to be solved and the total constraints.

    2) Antibody. An antibody represents a candidate solution to the problem in this paper.

    3) Antibody population. The complete antibodies consist of antibody population.

    4) Affinity. Affinity is the fitness measurement for an antibody, which indicates the extent that the antigen satisfies the problem requirements.

    5) Clone. In immunology, cloning means asexual propagation so that a group of identical cells can be descended from a single common ancestor. It is used to enlarge the search region.

    6) Mutation. In immunology, mutation means the immune system recognizes external patterns from antibody gene mutation in order to obtain a higher affinity. Mutations take the search procedure out of a locally optimal region, and enable it to possibly enter a better region of the search space.

    7) Selection. An immune algorithm takes a group of antigens from a population using an operation called selection. The selection operation serves the purpose of eliminating the relatively bad solution candidates and focusing the search operation on a relatively good portion of the solution space.

    2.2 Realization of throughput scheduling based on the immune algorithm

    Our motivations for utilizing the immune algorithm for the throughput optimal scheduling problems are manifold. First, the immune algorithm is suitable for problems with large search spaces. It is equipped with many tools to reduce the computational complexity and produce a diverse set of solutions. The fact that the immune algorithm operates on a population of solutions rather than a single solution implies that the algorithm makes parallel searches in the search space. Considering that the solution space in the throughput scheduling problems is enormous (even for 5 nodes, 3 frequencies, and 3 time slots, the size of the solution space is 245), the immune algorithm appears to be a suitable tool. Secondly, the immune algorithm can be conveniently implemented. The binary decision variablesXnftcan be easily encoded to a binary string.

    Some key techniques are as follows:

    1) Antigen representation (encoding). We use the binary encoded antigen which containsXnftvalues. Thus, the antigen [X111,X211,X311,X112,X212,…,X123,X223,X323], whereas the other antigen structure is [X111,X112,X113,X121,X122,…,X322,X323].Xnftis a gene bit of antibody.

    2) Affinity evaluation. In this paper, the optimization model is described in Eq.(1). The affinity is a mapping of the value of Eq.(1) for a given antibody. SinceQis to be maximized, it can be stated that if an antibody has higher affinity, it is the better one.

    The proposed algorithm for throughput optimal scheduling schemes is implemented as follows:

    Step 1Initialization. Set the maximum iterative generationtmax. Sett=0, wheretis termed as the current iterative generation. Create an initial antibody population A(t) with sizekin accordance with antibody encoding in section 3.2. That is

    A(t)={p1(t),p2(t),…,pk(t)}

    (2)

    where pi(1≤i≤k) is a candidate throughput scheduling scheme; A(t) is a set of candidate throughput scheduling schemes.

    Here, some pre-knowledge is used to initialize the antibody piin order to accelerate algorithm convergence, which is proved by the latter simulation experiments. From constraint (1a), it is known that at least one time slot is assigned to each SU. Constraint (1b) makes certain that at most, one user can transmit at a particular time slot and frequency combination. Each antibody pi(1≤i≤k) that satisfies the constraints (1a) and (1b) will be a candidate.

    Step 2Affinity evaluation. The affinities of all antibodies in A(t) are calculated according to Eq.(1) and it is denoted as

    f(A(t))={f(p1(t),f(p2(t)),…,f(pk(t)}

    (3)

    If an antibody pi(t) (1

    Step 3Proportional cloneTc. In this paper, B(t) is obtained by applying clone proliferationTcto A(t), and it is defined as

    B(t)=Tc(A(t))={Tc(p1(t)),Tc(p2(t)),…,Tc(pk(t))}

    (4)

    Here, the clone scaleqifor each antibody pi(1≤i≤k) is proportional to its affinityf(pi(t)). That is

    (5)

    where Int() denotes the integer function, andncis a given value (nc>k). The antibody with a large affinity value (objective function value of Eq.(1)) has a largeqi.

    (6)

    Actually, clone proliferation on antibody pi(t) is to make multiple identical copies of it.

    Step 4MutationTm. In this paper, it is defined as C(t)=Tm(B(t)). An adaptive mutation which associates the mutation probabilitympwith the evolutionary generation is designed. That is

    (7)

    wheretis the current evolutionary generation;tmaxis the maximum evolutionary generation.

    The advantages of the mutation lie in its searching ability within a large scope in the early evolution process while it searches in a local scope in the latter evolution process, which can accelerate the convergence. After mutation, the population becomes

    C(t)={p″1(t),p″2(t),…,p″z(t)}

    (8)

    In this paper, the mutation is done by exchanging the element one and element zero with each other with probabilitymp. The proposed mutation is easily realized and it does not violate the constraints.

    Step 5Affinity evaluation. The affinities of all antibodies in C(t) are calculated according to Eq.(1) and it is defined as

    f(C(t))={f(p″1(t),f(p″2(t)),…,f(p″z(t)}

    (9)

    Step 6Clone selectionTsis defined as

    A(t+1)=Ts(C(t)∪A(t)=

    (p1(t+1),p2(t+1),…,pk(t+1))

    (10)

    That is,kantibodies with a high affinity are selected from C(t) and A(t) to form the next population A(t+1).

    Step 7Termination test. Iftmaxis reached, stop the algorithm. Output the antibody with the maximum affinity in A(t+1) as the result of the throughout scheme. Otherwise,t=t+1, and go to Step 3.

    2.3 Computational complexity

    Recall thatNdenotes the number of SU, andFdenotes the number of available frequencies. For the immune-based scheme, the total computational complexity is mainly composed of that for initialization, affinity evaluation, cloning, mutation, and selection. Given the population sizek, the clone scalenc(nc>k) and the maximum generationtmax, the procedure of population initialization, the affinity evaluation and proportional clone (Step 1 to Step 3) has the same computational complexity ofO(kFN) in each generation, while the procedure of mutation, affinity evaluation, selection (Step 4 to Step 6) has the computational complexity ofO(kncFN) in each generation. Hence, for each generation, the total computational complexity isO(3kFN+3kncFN). Sincenc>k, according to the properties of symbolicO[10,13-14], it can be denoted asO(ncFN). When the throughout scheduling is finished, it has the total computational complexity ofO(tmaxncFN).

    The computer simulations show thattmaximplicitly depends onFandN. The more complex the search space is, the larger the number of generations should be. Thus, for givenncandtmax, the gradual computational complexity of the proposed algorithm isO(NF) in accordance with the properties of symbolicO.

    A brief summary of the complexities of previous typical algorithms and our proposed algorithm is as follows. The complexity of algorithm in Ref.[3] isO(FN2), while the complexity of our proposed algorithm is the same as the algorithm in Ref.[4], which isO(FN).

    3Simulation Results and Discussion

    3.1 Experimental environments and parameter settings

    We simulated the suboptimal schedulers and acquired theUnfvalues in OPNET Modeler, and we solved the optimization problems in CPLEX[15]. Additive white Gaussian noise (AWGN) channels are considered. In all the simulations, each SU has three primary neighbors in its interference range. The simulation results are the average of 100 independent tests. The parameter settings are as the same as that in Refs.[4-5]. There are three frequencies with interference temperature thresholds of 1 000, 2 000, and 3 000 K.

    3.2 Sensitivity in relation to the immune algorithm parameters

    Four parameters are to be set at the initialization phase: the antibody population sizek, the clone population sizenc, the mutation probabilitymp, and the maximum number of generationstmax. The sequential experimental design method of employing a series of small experiments each with a specific objective is a common method in experimental design[16], because the experimenter can quickly learn crucial information from a small group of runs that can be used to plan the next experiment.kandncdirectly affect the computational complexity of the algorithm[10-13]. If the givenkandncare large enough, the diversity of the population can be enhanced and the prematurity can be avoided in some extent, but the computational complexity will also be very large.tmaxclearly depends onFandN. The more complex the search space is, the larger the number of generations should be.mpis very important for local search in the algorithm. A largemphas the ability to produce more new antibodies, but it also has the probability to destroy some good antibodies. Whenmpis too small, the convergence speed is not quick enough to find the best solution in appointed generations.

    Since the optimal choice is difficult to determine by theoretical analysis, it is important to analyze the performance affected by experiments in different cases. After trial and error, the parameters employed in the proposed immune algorithm are as follows: the number of generationstmaxis 100; the population sizekis 50; the clone scalencis 10; and the mutation probabilitympis 0.3.

    3.3 The performances of the proposed algorithm

    In order to evaluate the performances of the proposed algorithm, the effect of number of iterations (evolutionary generation) on throughout scheduling is studied, and the number of SUs is set to be 5. As it is evident from Fig.1, the throughout initially increases with the number of evolutionary generations and then gradually converges to the high value, close to an optimal point. It is also can be seen that the proposed method provides significant gain in throughout and fast convergence rate. The simulation results prove the effectiveness of the proposed immune operators. It also can be seen from Fig.2 that the evolutionary generation increases with the numbers of SUs. It is effective.

    The results of different numbers of SUs are shown in Tab.1. It can be seen that the proposed algorithm gives consistent good results. First of all, the proposed solution yields better results than the MFS and PFS schedulers proposed in Ref.[4], at the same time being very close to the throughput optimal scheduler performance in Ref.[3].

    Fig.1 Throughout vs. evolutionary generation

    Fig.2 Evolutionary generation vs. different numbers of SUs

    Tab.1 The results of relative algorithms for different numbers of SUs

    Fig.3 presents the optimal throughput[3], MFS, and PFS[4]scheduling schemes compared with the proposed scheduling scheme. The algorithm in Ref.[3] can be regarded as the upper-bound of the proposed heuristic algorithm.

    Fig.3 Comparison of different algorithms

    Fig.4 shows the performances comparisons of relative algorithms with the increase in the numbers of SUs. It can be seen that the proposed algorithm performs excellently. It is very close to the optimal performances in Ref.[3] and is better than the algorithm in Ref.[4].

    All in all, the proposed scheduling scheme achieves performances close to the optimal scheduling operating with much lower complexity. However, the iterations in the simulation results reveal that the proposed algorithm is computationally more costly than the MFS and the PFS schedulers in Ref.[4]. Nevertheless, when they are compared with the throughput performance, we can see that the proposed algorithm is approximately twice as good as the MFS and the PFS schedulers. Moreover, the proposed algorithm is computationally more efficient than the classical branch and bound algorithms that are used to solve binary integer programming problems. Therefore, ther proposed algorithm presents a very reasonable tradeoff between computational complexity and performance.

    Fig.4 Throughout vs. numbers of SUs

    4Conclusion

    The immune algorithm-based suboptimal scheduling for the throughput problem in cognitive radio networks is proposed. The simulation results show that the proposed algorithm is very close to optimal performance with a relatively lower complexity. Hence, it can be concluded that the proposed scheduling is more suitable for slowly varying spectral environments. Considering that IEEE 802.22 networks that operate on the TV broadcast bands that are slowly changing, it can be confidently concluded that the proposed algorithm can operate in realistic network settings, and provide useful solutions for the open research problem.

    References

    [1]Akyildiz I, Lee W, Vuran M, et al. Next generation/dynamic spectrum access/cognitive radio wireless networks[J].ASurveyComputerNetworks, 2006, 50(13): 2127-2159.

    [2]Busson A, Jabbari B, Babaei A, et al. Large overlaid cognitive radio networks: from throughput scaling to asymptotic multiplexing gain[J].JournalofCommunicationsandNetworks, 2014, 16(1): 67-80.

    [3]Tian Z, Leus G, Lottici V. Joint dynamic resource allocation and waveform adaptation for cognitive networks[J].IEEEJournalonSelectedAreasinCommunications, 2011, 29(2): 443-454.

    [4]G?züpek D, Alag?z F. Throughput and delay optimal scheduling in cognitive radio networks under interference temperature constraints[J].JournalofCommunicationsandNetworks, 2009, 11(2): 147-155.

    [5]Arshad K, Mackenzie R, Celentano U, et al. Resource management for QoS support in cognitive radio networks[J].IEEECommunicationsMagazine, 2014, 52(3): 114-120.

    [6]Chaporkar P, Kar K, Luo X, et al. Throughput and fairness guarantees through maximal scheduling in wireless networks[J].IEEETransactionsonInformationTheory, 2008, 54(2): 572-594.

    [7]Chai Zhengyi, Liu Fang. A novel immune optimization algorithm for fairness resource allocation in cognitive wireless network[J].WirelessPersonalCommunications, 2013, 69(4): 1671-1687.

    [8]He A, Kyung K B,Newman T R, et al. A survey of artificial intelligence for cognitive radios[J].IEEETransactionsonVehicularTechnology, 2010, 59(4): 1578-1592.

    [9]Zhao Jun, Liu Quanli, Wang Wei, et al. A parallel immune algorithm for traveling salesman problem and its application on cold rolling scheduling[J].InformationSciences, 2011, 181(7): 1212-1223.

    [10]Chai Zhengyi, Liu Fang. On the use of immune clonal optimization for joint subcarrier and power allocation in OFDMA with proportional fairness rate[J].InternationalJournalofCommunicationSystems, 2013, 26(10): 1273-1287.

    [11]Luh G-C, Chueh C-H. A multi-modal immune algorithm for the job-shop scheduling problem[J].InformationSciences, 2009, 179(10): 1516-1532.

    [12]Yang Dongdong, Jiao Licheng, Gong Maoguo, et al. Artificial immune multi-objective SAR image segmentation with fused complementary features[J].InformationSciences, 2011, 181(13): 2797-2812.

    [13]Tarcisio F, Maciel M, Anja K. On the performance, complexity, and fairness of suboptimal resource allocation for multi-user MIMO-OFDMA Systems[J].IEEETransactionsonVehicularTechnology, 2010, 59(1): 406-421.

    [14] Banaei A, Georghiades C N, Cui S G. Maximum-minimum throughput for MIMO systems in cognitive radio networks[J].IEEETransactionsonWirelessCommunications, 2014, 13(6): 3042-3055.

    [15]Sadr S, Anpalagan A, Raahemifar K. Radio resource allocation algorithms for the downlink of multiuser OFDM communication systems[J].IEEECommunicationsSurveys&Tutorials, 2009, 11(3): 92-106.

    doi:10.3969/j.issn.1003-7985.2015.04.001

    精品卡一卡二卡四卡免费| 岛国视频午夜一区免费看| 午夜福利一区二区在线看| 国产av一区二区精品久久| 日本黄色日本黄色录像| 中文字幕人妻熟女乱码| 精品国产乱子伦一区二区三区| 国产精品99久久99久久久不卡| 亚洲国产精品999在线| 美女高潮喷水抽搐中文字幕| 波多野结衣一区麻豆| 亚洲精品国产色婷婷电影| 激情在线观看视频在线高清| 巨乳人妻的诱惑在线观看| 亚洲成人国产一区在线观看| 午夜福利免费观看在线| 最近最新中文字幕大全免费视频| 夜夜爽天天搞| 国产av又大| 99久久国产精品久久久| 性欧美人与动物交配| av网站在线播放免费| 久久影院123| 欧美最黄视频在线播放免费 | 91字幕亚洲| 亚洲自拍偷在线| 少妇被粗大的猛进出69影院| a级片在线免费高清观看视频| 国产一区二区在线av高清观看| 露出奶头的视频| 日本a在线网址| 日韩大码丰满熟妇| 无人区码免费观看不卡| 黄色毛片三级朝国网站| 韩国精品一区二区三区| 国产一区二区在线av高清观看| 在线观看免费日韩欧美大片| 淫妇啪啪啪对白视频| 一级a爱视频在线免费观看| 欧美在线黄色| 一个人观看的视频www高清免费观看 | 欧美日韩亚洲综合一区二区三区_| 精品熟女少妇八av免费久了| 久久 成人 亚洲| 亚洲精品中文字幕在线视频| 亚洲精品粉嫩美女一区| 国产成人一区二区三区免费视频网站| 中文字幕av电影在线播放| 欧美日韩黄片免| 国产一卡二卡三卡精品| www.www免费av| 在线播放国产精品三级| 女同久久另类99精品国产91| 亚洲激情在线av| 国产精品久久视频播放| www.熟女人妻精品国产| 999久久久精品免费观看国产| 在线免费观看的www视频| 桃红色精品国产亚洲av| 窝窝影院91人妻| 身体一侧抽搐| 成人免费观看视频高清| 国产精品秋霞免费鲁丝片| 亚洲国产欧美网| 日韩精品青青久久久久久| 成人免费观看视频高清| 性欧美人与动物交配| 好看av亚洲va欧美ⅴa在| 韩国精品一区二区三区| 日日干狠狠操夜夜爽| 成人亚洲精品av一区二区 | 在线观看免费日韩欧美大片| 黄片播放在线免费| 自线自在国产av| 成人免费观看视频高清| 女人被狂操c到高潮| 美国免费a级毛片| 日本五十路高清| 国内毛片毛片毛片毛片毛片| 免费久久久久久久精品成人欧美视频| 国产精品亚洲一级av第二区| 欧美老熟妇乱子伦牲交| 日韩有码中文字幕| 一级毛片高清免费大全| 在线观看一区二区三区激情| 1024视频免费在线观看| 亚洲情色 制服丝袜| 国产视频一区二区在线看| 黄片小视频在线播放| 国产精品偷伦视频观看了| 国产成人av激情在线播放| 国产一区二区三区视频了| 长腿黑丝高跟| av片东京热男人的天堂| 一二三四在线观看免费中文在| 亚洲片人在线观看| 香蕉国产在线看| 99精品在免费线老司机午夜| 91成人精品电影| 日本免费a在线| 欧美一级毛片孕妇| 老司机在亚洲福利影院| 亚洲成人国产一区在线观看| 三级毛片av免费| 韩国av一区二区三区四区| 午夜免费成人在线视频| 电影成人av| 伦理电影免费视频| 欧美+亚洲+日韩+国产| 国产黄a三级三级三级人| bbb黄色大片| 在线观看舔阴道视频| 久久久国产欧美日韩av| 一级片免费观看大全| 国产人伦9x9x在线观看| 欧美+亚洲+日韩+国产| 欧美日韩亚洲综合一区二区三区_| 中出人妻视频一区二区| 亚洲中文字幕日韩| 99精国产麻豆久久婷婷| 高清在线国产一区| 欧美一区二区精品小视频在线| 一个人免费在线观看的高清视频| 老司机福利观看| 777久久人妻少妇嫩草av网站| 国产精品国产av在线观看| 国产精品成人在线| 国产成+人综合+亚洲专区| 一a级毛片在线观看| 午夜福利在线观看吧| 久久人妻av系列| 欧美一区二区精品小视频在线| 亚洲av日韩精品久久久久久密| 十分钟在线观看高清视频www| 亚洲国产精品合色在线| 欧美日本中文国产一区发布| 狂野欧美激情性xxxx| 欧美精品亚洲一区二区| 美女高潮到喷水免费观看| 十分钟在线观看高清视频www| 国产免费男女视频| 亚洲av美国av| 少妇的丰满在线观看| 国产精品免费视频内射| 淫秽高清视频在线观看| 在线播放国产精品三级| av天堂在线播放| 亚洲黑人精品在线| xxxhd国产人妻xxx| 国产又色又爽无遮挡免费看| 午夜精品久久久久久毛片777| 午夜日韩欧美国产| 久久精品国产清高在天天线| 极品人妻少妇av视频| 在线十欧美十亚洲十日本专区| 午夜福利一区二区在线看| 麻豆国产av国片精品| 精品卡一卡二卡四卡免费| 国产不卡一卡二| 国产成人影院久久av| 亚洲精品久久午夜乱码| 国产又爽黄色视频| 男人的好看免费观看在线视频 | 午夜亚洲福利在线播放| 欧美久久黑人一区二区| 日韩免费av在线播放| 中文字幕人妻丝袜制服| 亚洲情色 制服丝袜| 久久久久亚洲av毛片大全| 交换朋友夫妻互换小说| 国产成人精品久久二区二区免费| 男女下面进入的视频免费午夜 | 男女床上黄色一级片免费看| 欧美中文日本在线观看视频| 国产精品亚洲一级av第二区| 性色av乱码一区二区三区2| av天堂久久9| 嫩草影视91久久| 交换朋友夫妻互换小说| 9191精品国产免费久久| 亚洲视频免费观看视频| 最新在线观看一区二区三区| 国产视频一区二区在线看| 啦啦啦 在线观看视频| 在线av久久热| 91九色精品人成在线观看| 国产1区2区3区精品| 免费久久久久久久精品成人欧美视频| 91精品国产国语对白视频| 九色亚洲精品在线播放| 午夜a级毛片| 成年人免费黄色播放视频| 国产精品 国内视频| 久久久久国产一级毛片高清牌| 一本综合久久免费| 亚洲少妇的诱惑av| 女性生殖器流出的白浆| 青草久久国产| 久久久久久久久免费视频了| 在线观看66精品国产| 欧美av亚洲av综合av国产av| 99精国产麻豆久久婷婷| 99久久国产精品久久久| 欧美最黄视频在线播放免费 | 国产在线观看jvid| 中文字幕人妻丝袜制服| 黄色片一级片一级黄色片| 最新美女视频免费是黄的| 亚洲精品一卡2卡三卡4卡5卡| 在线观看一区二区三区| 日韩一卡2卡3卡4卡2021年| 国产精品98久久久久久宅男小说| 成人亚洲精品一区在线观看| 夜夜躁狠狠躁天天躁| 巨乳人妻的诱惑在线观看| 欧美精品一区二区免费开放| 日韩精品中文字幕看吧| 午夜福利免费观看在线| 精品久久久久久久久久免费视频 | 日韩高清综合在线| 亚洲自偷自拍图片 自拍| 国产91精品成人一区二区三区| aaaaa片日本免费| 国产精品99久久99久久久不卡| 欧美日本中文国产一区发布| 欧美中文综合在线视频| 精品人妻1区二区| 99riav亚洲国产免费| 日韩免费高清中文字幕av| 欧美黄色片欧美黄色片| 大码成人一级视频| 亚洲伊人色综图| 又大又爽又粗| 女性被躁到高潮视频| 在线天堂中文资源库| 亚洲精品国产一区二区精华液| 18禁观看日本| 一边摸一边抽搐一进一小说| 两性午夜刺激爽爽歪歪视频在线观看 | 欧美日韩视频精品一区| 国产精品1区2区在线观看.| 露出奶头的视频| 精品第一国产精品| 国产又爽黄色视频| 精品国产一区二区久久| 天堂俺去俺来也www色官网| 亚洲七黄色美女视频| 日日爽夜夜爽网站| 欧美午夜高清在线| 久久久国产一区二区| 好男人电影高清在线观看| 国产有黄有色有爽视频| 亚洲在线自拍视频| 午夜免费观看网址| 精品久久久久久成人av| 国产深夜福利视频在线观看| 欧美日韩福利视频一区二区| 亚洲三区欧美一区| 最近最新免费中文字幕在线| a级毛片黄视频| 亚洲人成77777在线视频| 成人18禁高潮啪啪吃奶动态图| 亚洲自拍偷在线| 精品熟女少妇八av免费久了| 老汉色∧v一级毛片| 亚洲精华国产精华精| 精品国产国语对白av| 国产成年人精品一区二区 | 国产成年人精品一区二区 | 啦啦啦 在线观看视频| 国产精品久久电影中文字幕| 国产一区在线观看成人免费| bbb黄色大片| 久久精品91蜜桃| 亚洲黑人精品在线| 又黄又爽又免费观看的视频| 香蕉丝袜av| 日日夜夜操网爽| 亚洲精品一二三| 高清av免费在线| av中文乱码字幕在线| 国产熟女午夜一区二区三区| 一区二区三区激情视频| 老鸭窝网址在线观看| 咕卡用的链子| 久久久国产精品麻豆| 淫妇啪啪啪对白视频| 80岁老熟妇乱子伦牲交| 亚洲男人的天堂狠狠| 亚洲自拍偷在线| 人人妻人人澡人人看| 超碰97精品在线观看| 1024视频免费在线观看| 一二三四在线观看免费中文在| 性色av乱码一区二区三区2| 看黄色毛片网站| 欧美黑人欧美精品刺激| xxx96com| 黄片小视频在线播放| 欧美中文综合在线视频| 亚洲精品久久成人aⅴ小说| 女人被狂操c到高潮| 日韩精品青青久久久久久| 后天国语完整版免费观看| 久久国产精品影院| 色精品久久人妻99蜜桃| 在线观看66精品国产| 亚洲av熟女| 午夜日韩欧美国产| 国产一区二区三区在线臀色熟女 | 午夜亚洲福利在线播放| 国产成+人综合+亚洲专区| 露出奶头的视频| 窝窝影院91人妻| 欧美黑人欧美精品刺激| 黄片播放在线免费| 中文字幕人妻丝袜一区二区| 黄片播放在线免费| 天堂动漫精品| 黄色怎么调成土黄色| 亚洲成人国产一区在线观看| 成人18禁高潮啪啪吃奶动态图| 精品人妻在线不人妻| 精品久久蜜臀av无| 久久国产乱子伦精品免费另类| 久久久精品国产亚洲av高清涩受| 国产深夜福利视频在线观看| 很黄的视频免费| ponron亚洲| 一区在线观看完整版| 精品一区二区三区视频在线观看免费 | 高清毛片免费观看视频网站 | 久久久水蜜桃国产精品网| 免费在线观看亚洲国产| 热re99久久精品国产66热6| 又大又爽又粗| 亚洲 欧美 日韩 在线 免费| 99riav亚洲国产免费| 黄色成人免费大全| 一边摸一边抽搐一进一小说| 亚洲熟女毛片儿| 18美女黄网站色大片免费观看| 一边摸一边抽搐一进一出视频| 欧美激情高清一区二区三区| 超碰成人久久| 午夜亚洲福利在线播放| 女性被躁到高潮视频| 中文字幕人妻丝袜制服| www日本在线高清视频| 一夜夜www| 亚洲自偷自拍图片 自拍| 香蕉丝袜av| 一本综合久久免费| а√天堂www在线а√下载| 亚洲专区字幕在线| 在线看a的网站| 99国产精品一区二区三区| 欧美日韩乱码在线| 99国产精品一区二区三区| 午夜亚洲福利在线播放| 日韩精品中文字幕看吧| 色精品久久人妻99蜜桃| 日韩中文字幕欧美一区二区| 欧美日韩视频精品一区| 天天躁夜夜躁狠狠躁躁| 精品久久久久久电影网| 在线视频色国产色| 亚洲avbb在线观看| 国产主播在线观看一区二区| av天堂久久9| 亚洲片人在线观看| 天堂影院成人在线观看| 在线永久观看黄色视频| 黄色丝袜av网址大全| 国产欧美日韩一区二区三| 成人影院久久| 十八禁网站免费在线| 一级毛片女人18水好多| 90打野战视频偷拍视频| av电影中文网址| 午夜亚洲福利在线播放| 亚洲av五月六月丁香网| 日韩大码丰满熟妇| 999久久久精品免费观看国产| 制服诱惑二区| 嫩草影视91久久| 精品久久久久久电影网| 亚洲第一av免费看| 黑人猛操日本美女一级片| 亚洲国产看品久久| 亚洲欧洲精品一区二区精品久久久| 亚洲精品一二三| 久久久久久久久免费视频了| av有码第一页| 国产伦一二天堂av在线观看| 交换朋友夫妻互换小说| 中文亚洲av片在线观看爽| 欧美乱妇无乱码| 免费在线观看影片大全网站| 亚洲人成伊人成综合网2020| 成人三级黄色视频| 午夜成年电影在线免费观看| 亚洲,欧美精品.| 高潮久久久久久久久久久不卡| 亚洲精品美女久久av网站| 国产精品电影一区二区三区| 五月开心婷婷网| 在线国产一区二区在线| 性色av乱码一区二区三区2| 亚洲国产精品合色在线| 18禁裸乳无遮挡免费网站照片 | 亚洲 欧美一区二区三区| 国产三级黄色录像| 亚洲一区二区三区不卡视频| 69av精品久久久久久| 九色亚洲精品在线播放| 制服诱惑二区| 天天躁夜夜躁狠狠躁躁| 久久精品国产99精品国产亚洲性色 | 色哟哟哟哟哟哟| 精品熟女少妇八av免费久了| 久久人人精品亚洲av| 欧美成人免费av一区二区三区| 一区二区日韩欧美中文字幕| 我的亚洲天堂| 一二三四社区在线视频社区8| 啦啦啦在线免费观看视频4| 国产免费现黄频在线看| 两性午夜刺激爽爽歪歪视频在线观看 | 美女福利国产在线| 精品国产乱码久久久久久男人| 岛国在线观看网站| 男人的好看免费观看在线视频 | 级片在线观看| 天堂√8在线中文| 中文字幕高清在线视频| 久久人妻熟女aⅴ| 97人妻天天添夜夜摸| 又大又爽又粗| 999久久久国产精品视频| 一进一出抽搐动态| 天天影视国产精品| 黄色丝袜av网址大全| 91精品三级在线观看| 热re99久久国产66热| 国产伦人伦偷精品视频| 一级黄色大片毛片| 男人操女人黄网站| 亚洲精品一区av在线观看| 婷婷丁香在线五月| a级片在线免费高清观看视频| xxxhd国产人妻xxx| 国产精品av久久久久免费| 欧美精品啪啪一区二区三区| 大香蕉久久成人网| 韩国精品一区二区三区| 成人亚洲精品av一区二区 | 午夜91福利影院| 国产成人精品久久二区二区91| 麻豆成人av在线观看| 国产熟女午夜一区二区三区| 波多野结衣av一区二区av| 亚洲欧美精品综合久久99| 午夜a级毛片| 色综合欧美亚洲国产小说| av视频免费观看在线观看| 人人妻人人添人人爽欧美一区卜| av在线天堂中文字幕 | 叶爱在线成人免费视频播放| 一二三四在线观看免费中文在| 波多野结衣一区麻豆| 午夜免费成人在线视频| 久久伊人香网站| 天堂√8在线中文| 香蕉久久夜色| 日韩大码丰满熟妇| 国产深夜福利视频在线观看| 亚洲男人的天堂狠狠| 99国产精品免费福利视频| 午夜日韩欧美国产| 亚洲国产欧美一区二区综合| 国产高清视频在线播放一区| 亚洲欧美精品综合久久99| 18禁国产床啪视频网站| 久久久久久久久中文| 男女下面插进去视频免费观看| 亚洲三区欧美一区| 免费不卡黄色视频| 一进一出好大好爽视频| 丝袜美足系列| av网站免费在线观看视频| 亚洲一区二区三区色噜噜 | 精品电影一区二区在线| 精品久久蜜臀av无| 男女床上黄色一级片免费看| 亚洲一区二区三区不卡视频| a在线观看视频网站| 伊人久久大香线蕉亚洲五| 中出人妻视频一区二区| 男女床上黄色一级片免费看| 国产伦一二天堂av在线观看| 超色免费av| 婷婷精品国产亚洲av在线| √禁漫天堂资源中文www| 在线天堂中文资源库| 不卡av一区二区三区| 国产精品成人在线| 亚洲成人精品中文字幕电影 | 一区福利在线观看| 亚洲精品av麻豆狂野| 在线看a的网站| 国产一区二区三区视频了| 在线av久久热| 宅男免费午夜| 91在线观看av| 超色免费av| 亚洲精品一区av在线观看| 国产片内射在线| 91成年电影在线观看| 97人妻天天添夜夜摸| 日韩有码中文字幕| 一区福利在线观看| 可以在线观看毛片的网站| 51午夜福利影视在线观看| 夜夜看夜夜爽夜夜摸 | 少妇粗大呻吟视频| 亚洲第一欧美日韩一区二区三区| 1024香蕉在线观看| 亚洲国产欧美网| 中国美女看黄片| 波多野结衣高清无吗| 国内久久婷婷六月综合欲色啪| 欧美日韩中文字幕国产精品一区二区三区 | 免费观看精品视频网站| 久久人妻福利社区极品人妻图片| 激情视频va一区二区三区| 国产亚洲欧美98| 精品乱码久久久久久99久播| 无限看片的www在线观看| 成人手机av| 村上凉子中文字幕在线| 91大片在线观看| 国产有黄有色有爽视频| 国产无遮挡羞羞视频在线观看| 中文字幕色久视频| 91精品三级在线观看| 在线十欧美十亚洲十日本专区| 一区在线观看完整版| 日韩 欧美 亚洲 中文字幕| 国产激情欧美一区二区| 老鸭窝网址在线观看| 日韩精品青青久久久久久| 亚洲欧洲精品一区二区精品久久久| 日韩视频一区二区在线观看| 亚洲欧美激情在线| 极品人妻少妇av视频| 亚洲成人国产一区在线观看| 又黄又粗又硬又大视频| 久9热在线精品视频| 啦啦啦免费观看视频1| 亚洲色图综合在线观看| av超薄肉色丝袜交足视频| 黑人巨大精品欧美一区二区蜜桃| 在线播放国产精品三级| 久久中文字幕人妻熟女| 欧美日韩黄片免| 自拍欧美九色日韩亚洲蝌蚪91| 欧美激情极品国产一区二区三区| 亚洲av五月六月丁香网| 免费在线观看亚洲国产| 88av欧美| 曰老女人黄片| 美女 人体艺术 gogo| 免费av毛片视频| 国产成+人综合+亚洲专区| 男人操女人黄网站| 一区福利在线观看| 99久久99久久久精品蜜桃| 十八禁人妻一区二区| 国产成人系列免费观看| 免费一级毛片在线播放高清视频 | 91大片在线观看| 久久人妻熟女aⅴ| 午夜精品国产一区二区电影| 色尼玛亚洲综合影院| 嫩草影院精品99| 精品国产亚洲在线| 欧美日韩亚洲国产一区二区在线观看| 久久久久久大精品| 亚洲 欧美 日韩 在线 免费| 一级片'在线观看视频| 成人免费观看视频高清| 亚洲欧美激情在线| 欧美一级毛片孕妇| 国产精品九九99| 久热爱精品视频在线9| 亚洲免费av在线视频| 在线天堂中文资源库| 又紧又爽又黄一区二区| 欧美丝袜亚洲另类 | 久9热在线精品视频| 婷婷六月久久综合丁香| 日韩免费高清中文字幕av| 99在线视频只有这里精品首页| 国产av一区二区精品久久| av电影中文网址| 欧美日韩福利视频一区二区| 80岁老熟妇乱子伦牲交| 又黄又粗又硬又大视频| 一进一出抽搐动态| 日韩欧美三级三区| 岛国在线观看网站| 性少妇av在线| 欧美日本中文国产一区发布| 在线观看免费视频日本深夜|