• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Alarm Correlation Rules Generation Algorithm Based on Confidence Covered Value

    2015-12-20 09:14:18LITongyan李彤巖
    關(guān)鍵詞:李彤

    LI Tong-yan(李彤巖)

    Meteorological Information and Signal Processing Key Laboratory of Sichuan Higher Education Institutes,Chengdu University of Information Technology,Chengdu 610225,China

    Introduction

    Recent global expansion in the demand for telecommunication services has resulted in a considerable growth of networks in terms of size,complexity and bandwidth.Networks often consist of hundreds or even thousands of interconnected nodes from different manufacturers using various transport mediums and systems.As a result,when a network problem or failure occurs,it is possible that a very large volume of alarms are generated.These alarms describe lots of detailed but very fragmented information about the problems.Typically,alarm flow is useful to find and isolate faults.However,it is also very difficult to determine the root cause of the faults.As we know,alarm correlation is used to help the faults diagnosis and localization[1-3].In the past,the knowledge of alarm correlation was mainly obtained by network experts.With the development of telecommunication networks,it is now much more difficult for the experts to keep up with the rapid change of networks and discover the real useful knowledge from the alarms.Therefore,researchers have adopted many advanced methods including association rules mining to analyze the alarm correlation in order to resolve this problem.Data mining is a science of extracting implicit,previously unknown,and potentially useful information from large data sets or databases,and is also known as knowledge discovery in databases(KDD).The problem of discovering association rules was introduced in Refs.[4-6].Nowadays,alarm correlation analysis based on association rules mining is playing an important part in current research and drawing more and more attentions.

    Alarm association rules mining usually includes two steps:frequent patterns mining and association rules generation.The first step is how to find weighted frequent patterns(WFPs)from the alarm data,and then the final realization is how to generate frequent patterns based on these WFPs.Rule itself reflects the correlation between alarm messages.Mining useful rules accurately are important for network ex-pert to find the root cause and locate the fault quickly.

    Association rules are generated according to the two criteria of support threshold and confidence threshold[7-9].A classical algorithm of rules generation is a recursive depth first search (DFS)method proposed in Refs.[10-11].However,efficiency of this method is very low,for it must test all frequent patterns as well as their parameters one by one to generate association rules.Meanwhile,the number of frequent patterns is too large to mine efficiently,resulting in that there are too many redundant rules to accurately reflect the relationship between the rules of alarms.For instance,some rules have redundant information with the same meaning in different rules;some rules which meet both support threshold and confidence threshold cannot fully represent implication relations,sometimes they only represent a complicated relationship.In this case,it is not enough to generate association rules with those two criteria in some specific applications.

    In this paper,a weighted frequent pattern based rules generation(WFP-RG)method is proposed for the condition of unequal telecommunication alarm transactions.And then a confidence covered value based rules generation method will be proposed,and finally the tests give the realization of association rule mining system and the results.

    The rest of this paper is organized as follows:section 1 shows the method of rules generation,section 2 gives the treatment of the rules including how to generate and reduce the rules,section 3shows a series of experiments and their simulation results,and finally a conclusion is made in section 4.

    1 Rules Generation Method

    Traditional rules generation algorithms are on the condition of equal itemsets.However,communication alarm itemsets are usually unequal;the rules generated objects are all the WFPs.For some WFPs,their sub-pattern may not be weighted frequently.Obviously,the non-weighted frequent itemsets can not appear in the rules,and we must delete all the non-weighted frequent itemsets from the subsets of WFPs.In this paper,a rules generation based on WFP method is proposed(shown in Algorithm 1).The depth-first algorithm is based on the improved recursive algorithm,making that the rules generation algorithm can not only maintain high efficiency,but also be adapt to the specific requirements of alarm data from communication networks.

    Algorithm 1 WFP-RG algorithm

    Input:all the weighted frequent itemsets WL,the maximum frequent itemsets MWL, confidence threshold minconf;

    Output:strong association rules.

    WFP-RG algorithm generates association rules from the maximum weighted frequent itemsets,which is different from traditional methods.In addition,WFP-RG algorithm increases the judgment whether the subsets of the maximum weighted frequent itemsets are frequent or not.Idea of this method is this:if the left side of the rule which shows that some subsets of the maximum weighted frequent itemsets is infrequent,then this subset will be deleted directly,without generating association rules;if the right side of the rule which shows that some subsets of the maximum weighted frequent itemsets is infrequent,then this subset will be deleted directly,without generating association rules;only when both the left and right sides of the rule are frequent,confidence threshold may be considered to judge whether the rule is strong;if the right of rule is a subset of some strong association rules,then this rule will be deleted as redundant rules.After judging with above conditions,strong rules that meet the condition of weighted frequent itemsets will be generated,without producing a large number of redundant rules.This method can reduce the number of rules and recursion,which is more suitable for generating rules with larger number and longer pattern.It proves that this method has more advantages in time complexity and space complexity.

    2 Treatment of the Rules

    WFP-RG algorithm can effectively find the rules which meet the support threshold and confidence threshold in an alarm transaction database.Meanwhile a large number of redundant rules may be removed during the process of rule generation.However,there are also some redundant rules,for these different rules express the same meaning.Additionally,although some rules meet the requirements of weighted support and confidence,they can not really express the relationship between faults;sometimes they only show a complicated relationship between alarms.Such a rule is meaningless for finding the root cause of fault.Reference[12]described an example of concurrency alarm situation in a communication network(shown in Fig.1).In Fig.1,NMS means network management system,MSC means mobile switching center,and BSC means base system controller.And we can see that a series of alarm are concurrent alarms,for they are triggered by a root alarm.Rules generated by these concurrent alarms are redundant for the root fault.

    Fig.1 An example of communication network

    The purpose of rule treatment is to improve the efficiency and provide useful knowledge for finding the root cause of fault by reducing the meaningless and redundant rules.For communication network alarms,this paper proposes a rule producing method based on the confidence covered value.The confidence covered value is defined as follows.

    Definition 1Confidence covered value:suppose R1is A?C,then the confidence isα(0≤α≤1);rule R2is B?C,confidence isβ(0≤β≤1);if A ?Band(β-α)≤θmin,then θminis called the confidence covered value,which is a positive value of 0and 1.

    Confidence covered value is a basis of judging whether a rule is redundant or not.If the left of a rule adds an antecedent constraint,but it can not guarantee a certain degree of confidence increased by a certain covered value,then this rule is considered as a redundant rule to be removed.

    After the rule is generated,if using the confidence covered value to judge at first,a large number of redundant rules can be deleted,so as to preserve the more valuable rule information.Secondly,the rules will be classified in order to discover the root causes of failure.Regular basis of classification is based on the topology correlation clustering into the network element with a group.If the right of a rule is from the same network group,they will be linked by a chain.Obviously,the rules with the same right part will be linked by a chain.The way of linking rules is shown in Fig.2.In Fig.2,M and AB describe the right side of a rule;meanwhile,N,A &B &AB,and X &Y present the left side of the rule.

    Fig.2 The way of linking rules

    Based on the linked method,we proposed a new rule produced algorithm as follows.

    Algorithm 2The rule produced algorithm

    Input:the original rules sets R1,the confidence covered valueθmin;

    Output:the produced rule sets R2.

    According to the confidence covered value,the rules may be generated.Algorithm 2 gives the method that how to produce rule sets.

    3 Simulation Results and Analyses

    A series of experiments have been done to show the performance of our algorithms.We collect original alarm data from telecommunication network in a city.Parameters of alarms are shown in Fig.3.

    Fig.3 Original alarm data

    We test three groups of original alarm data using the mining system,and the result is shown in Table 1.As can be seen,the generating number of rules is influenced by the factors of the alarm number,the alarm type,the minimum support and the minimum confidence.For example,we test the third group of data,which includes 7 190alarm transactions and 126different types,and the number of WFPs is 165.The wminsupis set to 0.025%and minconf is set to 60%.Running with the algorithm WFP-RG,48rules are generated,in which only 2rules meet 100%confidence,for example,one rule is 0x01 0xff 0xff 0xff 0xff &0x0b0xff 0xff 0xff 0xff=>0x07 0xff 0xff 0xff 0xff &0x06 0xff 0xff 0xff 0xff &0x05 0xff 0xff 0xff0xff.According to the network topology,we can easily find where may have failures.Similarly,it is possible to find rules that meet a high degree of confidence,and experts may find some useful information from these rules.

    Table 1 Results of association rules mining

    Then we test the efficiency of our algorithm WFP-RG and traditional rules generation method depth first searchrules generation(DFS-RG).Figures 4and 5show the flex performances of the two algorithms in running time and memory occupied rate.The minimum support is fixed up to 0.25.From the figures,although running time and memory occupied rate of the two algorithms increase with the number of alarms linearly,WFP-RG increases more slowly than DFS-RG,and it has better flex performance than DFS-RG.

    Fig.4 Running time changes with the number of alarms

    Fig.5 Memory occupied changes with the number of alarms

    4 Conclusions

    The most important step of association rules mining is how to generate and produce rules efficiently.This paper presents a rules generation algorithm WFP-RG based on the characteristic of alarm data.For there are a lot of redundant rules and non-covered rules,we propose a novel rule processing method to resolve these problems.Finally,the mining system is used to test and verify the efficiency of WFPRG algorithm.

    [1]Koca F,S?zer H,Abreu R.Spectrum-Based Fault Localization for Diagnosing Concurrency Faults[J].Testing Software and Systems,2013,8254:239-254.

    [2]Estima J O,Marques Cardoso A J.A New Approach for Real-Time Multiple Open-Circuit Fault Diagnosis in Voltage-Source Inverters[J].IEEE Transactions on Industry Applications,2011,47(6):2487-2494.

    [3]Tang Y N,Al-Shaer E,Boutaba R.Efficient Fault Diagnosis Using Incremental Alarm Correlation and Active Investigation for Internet and Overlay Networks[J].IEEE Transactions on Network and Service Management,2008,5(1):36-49.

    [4]Agrawal R,Srikant R.Fast Algorithm for Mining Association Rules[C].Proceedings of the 20th VLDB Conference,Santiago,Chile,1994:487-499.

    [5]Brauckhoff D,Dimitropoulos X,Wagner A,et al.Anomaly Extraction in Backbone Networks Using Association Rules[J].IEEE/ACM Transactions on Networking (TON),2012,20(6):1788-1799.

    [6]Li T Y,Li X M.IULFP:an Efficient Incremental Updating Algorithm Based on LFP-tree for Mining Association Rules[C].Proceedings of the International Conference ICCASM 2010,Taiyuan,China,2010:426-430.

    [7]Bayaedo R J,Agrawal R.Mining the Most Interesting Rulesz[C].Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,San Diego,1999:145-154.

    [8]Huang Z,Lu X,Duan H.Mining Association Rules to Support Resource Allocation in Business Process Management[J].Expert Systems with Applications,2011,38(8):9483-9490.

    [9]Li T Y,Li X M.Novel Alarm Correlation Analysis System Based on Association Rules Mining in Telecommunication Networks[J].Information Sciences,2010,180:2960-2978.

    [10]Li A,Pu J Y.Optimization of Ship Field Repair Scheduling Based on Depth First Search Method[J].Applied Mechanics and Materials,2013,321/322/323/324:2152-2156.

    [11]Duhamel C,Lacomme P,Prodhon C.AHybrid Evolutionary Local Search with Depth First Search Split Procedure for the Heterogeneous Vehicle Routing Problems[J].Engineering Applications of Artificial Intelligence,2012,25(2):345-358.

    [12]Xu Q F.Alarm Correlation Analysis Based on Data Mining[M].Beijing:Beijing University of Post and Telecommunication,2007.(in Chinese)

    猜你喜歡
    李彤
    rSIG/A在急診創(chuàng)傷中的應(yīng)用
    謫仙記
    起死回生的植物朋友
    關(guān)注虛假陳述司法解釋
    關(guān)注北交所之交易規(guī)則知多少
    我家的“小王爺”
    賣根雕
    李彤作品
    藝術(shù)家(2019年7期)2019-12-16 16:10:18
    賣根雕
    李彤:只是做了點“小事”
    文史博覽(2016年2期)2016-03-23 09:12:09
    自拍偷自拍亚洲精品老妇| 乱系列少妇在线播放| 18禁在线播放成人免费| 各种免费的搞黄视频| 肉色欧美久久久久久久蜜桃 | av女优亚洲男人天堂| 校园人妻丝袜中文字幕| 亚洲欧洲日产国产| 大码成人一级视频| 国产黄色免费在线视频| 免费大片黄手机在线观看| 国产欧美亚洲国产| 日韩在线高清观看一区二区三区| 亚洲精品乱码久久久v下载方式| 特大巨黑吊av在线直播| 国产91av在线免费观看| 在线观看人妻少妇| 日韩视频在线欧美| 久久久a久久爽久久v久久| 伊人久久国产一区二区| 在线观看一区二区三区激情| 午夜免费观看性视频| 内射极品少妇av片p| 天堂中文最新版在线下载 | 午夜激情久久久久久久| 免费av毛片视频| www.色视频.com| 亚洲av福利一区| 日韩av免费高清视频| 国产 一区精品| av网站免费在线观看视频| 蜜臀久久99精品久久宅男| 亚洲av男天堂| 美女xxoo啪啪120秒动态图| 日本一二三区视频观看| av线在线观看网站| 精品少妇黑人巨大在线播放| 五月开心婷婷网| 国产有黄有色有爽视频| 亚洲av国产av综合av卡| 美女国产视频在线观看| 午夜福利视频精品| 男人狂女人下面高潮的视频| av线在线观看网站| 国产精品久久久久久精品古装| 亚洲va在线va天堂va国产| 男插女下体视频免费在线播放| 18禁在线无遮挡免费观看视频| 五月天丁香电影| 一级黄片播放器| 精品99又大又爽又粗少妇毛片| 99热这里只有是精品50| 亚洲无线观看免费| 一个人看的www免费观看视频| 国内少妇人妻偷人精品xxx网站| 97人妻精品一区二区三区麻豆| 日韩三级伦理在线观看| 久久久精品欧美日韩精品| 亚洲国产最新在线播放| 99热这里只有是精品在线观看| 精品久久久噜噜| 国产高清不卡午夜福利| 欧美日韩在线观看h| 一本色道久久久久久精品综合| 一级毛片我不卡| 97在线人人人人妻| 免费观看在线日韩| 爱豆传媒免费全集在线观看| 中文乱码字字幕精品一区二区三区| 国产亚洲av片在线观看秒播厂| 大陆偷拍与自拍| 久久久成人免费电影| 六月丁香七月| 黄色欧美视频在线观看| av天堂中文字幕网| 丰满人妻一区二区三区视频av| 午夜福利视频1000在线观看| 欧美97在线视频| 两个人的视频大全免费| 我要看日韩黄色一级片| 国产v大片淫在线免费观看| 岛国毛片在线播放| 日日撸夜夜添| 水蜜桃什么品种好| 少妇的逼水好多| 国产黄色免费在线视频| 嫩草影院新地址| 久久久久久久国产电影| 九九在线视频观看精品| 国产成人福利小说| 热re99久久精品国产66热6| 内射极品少妇av片p| 国产一区二区在线观看日韩| 国产亚洲av嫩草精品影院| 99热这里只有是精品50| 22中文网久久字幕| 久久综合国产亚洲精品| 亚洲久久久久久中文字幕| 久久女婷五月综合色啪小说 | 午夜福利视频1000在线观看| 成年女人在线观看亚洲视频 | 亚洲av不卡在线观看| 久久精品国产亚洲av涩爱| 亚洲欧美日韩无卡精品| 嫩草影院入口| av专区在线播放| 神马国产精品三级电影在线观看| 免费观看无遮挡的男女| 亚洲av在线观看美女高潮| 国产熟女欧美一区二区| 国产亚洲最大av| 成年免费大片在线观看| 黄色日韩在线| 国产国拍精品亚洲av在线观看| 狂野欧美白嫩少妇大欣赏| 国产成人午夜福利电影在线观看| 免费播放大片免费观看视频在线观看| 18禁裸乳无遮挡免费网站照片| 久久久久久久亚洲中文字幕| 自拍偷自拍亚洲精品老妇| 91在线精品国自产拍蜜月| 免费黄网站久久成人精品| 一级毛片黄色毛片免费观看视频| 九色成人免费人妻av| 99热全是精品| 老司机影院毛片| 大码成人一级视频| 免费看av在线观看网站| 大陆偷拍与自拍| 国产成人精品婷婷| 人妻系列 视频| 黄色配什么色好看| 亚洲精品乱久久久久久| 青春草国产在线视频| 亚洲最大成人中文| 亚洲国产av新网站| 熟女人妻精品中文字幕| 看免费成人av毛片| 各种免费的搞黄视频| 国产黄色视频一区二区在线观看| 成年版毛片免费区| 国产欧美另类精品又又久久亚洲欧美| 美女高潮的动态| 成年版毛片免费区| 久久久久久国产a免费观看| 国产亚洲一区二区精品| 99视频精品全部免费 在线| 国产男女内射视频| 中文字幕免费在线视频6| 色网站视频免费| 黑人高潮一二区| 欧美xxxx性猛交bbbb| 日本熟妇午夜| 欧美精品国产亚洲| a级毛色黄片| 亚洲av二区三区四区| 日韩三级伦理在线观看| 亚洲精品成人av观看孕妇| 国产探花极品一区二区| 亚洲精品乱久久久久久| 亚洲精品中文字幕在线视频 | av在线app专区| 国产高潮美女av| 激情 狠狠 欧美| 欧美极品一区二区三区四区| 九九在线视频观看精品| 日韩强制内射视频| 97在线人人人人妻| 久久99蜜桃精品久久| 大片免费播放器 马上看| 在线观看一区二区三区激情| 国产精品成人在线| 一本一本综合久久| 色5月婷婷丁香| 菩萨蛮人人尽说江南好唐韦庄| 成年人午夜在线观看视频| 国产毛片在线视频| 爱豆传媒免费全集在线观看| 中文字幕亚洲精品专区| 国产永久视频网站| 亚洲精品影视一区二区三区av| 日韩电影二区| 精品一区二区免费观看| 黄色视频在线播放观看不卡| 成人亚洲欧美一区二区av| 国产欧美另类精品又又久久亚洲欧美| 午夜精品国产一区二区电影 | 一级毛片我不卡| 亚洲人成网站在线观看播放| 七月丁香在线播放| 美女视频免费永久观看网站| 国内少妇人妻偷人精品xxx网站| 免费观看性生交大片5| 久久精品国产亚洲av天美| 欧美精品一区二区大全| 欧美一区二区亚洲| 黄色欧美视频在线观看| 少妇人妻 视频| 熟女人妻精品中文字幕| 美女脱内裤让男人舔精品视频| 男女国产视频网站| 久久久a久久爽久久v久久| 汤姆久久久久久久影院中文字幕| 色婷婷久久久亚洲欧美| h日本视频在线播放| 久久久久久国产a免费观看| 午夜精品国产一区二区电影 | 国产在视频线精品| 伊人久久精品亚洲午夜| 亚洲av福利一区| 91精品国产九色| 1000部很黄的大片| 国产av国产精品国产| 99热这里只有是精品50| 亚洲欧美成人综合另类久久久| 黄色视频在线播放观看不卡| 夜夜看夜夜爽夜夜摸| 欧美性猛交╳xxx乱大交人| 在线观看人妻少妇| 最新中文字幕久久久久| 欧美xxxx性猛交bbbb| 色5月婷婷丁香| 日韩大片免费观看网站| 中文字幕免费在线视频6| 久久久久久九九精品二区国产| 日日摸夜夜添夜夜爱| 久久这里有精品视频免费| 少妇人妻 视频| 免费黄色在线免费观看| 欧美xxⅹ黑人| 亚洲国产最新在线播放| 黄色一级大片看看| 欧美另类一区| 国产免费又黄又爽又色| 一区二区av电影网| 国产精品久久久久久久久免| 亚洲精品久久久久久婷婷小说| 亚洲综合精品二区| 精品酒店卫生间| 亚洲国产欧美人成| 亚洲人成网站高清观看| 久久99热这里只有精品18| 久久久久性生活片| 国产女主播在线喷水免费视频网站| 69av精品久久久久久| 国产午夜精品一二区理论片| xxx大片免费视频| 久久久久久久大尺度免费视频| av.在线天堂| 久久99热这里只频精品6学生| 夜夜爽夜夜爽视频| 国产精品一及| 99久久人妻综合| 亚洲真实伦在线观看| 日本一二三区视频观看| 少妇高潮的动态图| 一级a做视频免费观看| 日韩免费高清中文字幕av| 精品酒店卫生间| 久久精品国产亚洲av涩爱| 精品人妻视频免费看| 日本爱情动作片www.在线观看| 一级爰片在线观看| 久久国产乱子免费精品| av国产久精品久网站免费入址| 国产成人精品一,二区| 日韩人妻高清精品专区| 男女国产视频网站| 欧美 日韩 精品 国产| av.在线天堂| 嫩草影院精品99| 韩国高清视频一区二区三区| 日韩在线高清观看一区二区三区| 欧美日韩精品成人综合77777| 大片免费播放器 马上看| 国产一区有黄有色的免费视频| 男女边摸边吃奶| 欧美日韩视频高清一区二区三区二| 内地一区二区视频在线| 精品国产露脸久久av麻豆| 国产欧美另类精品又又久久亚洲欧美| 国产成人aa在线观看| 欧美激情国产日韩精品一区| 日韩不卡一区二区三区视频在线| 性色avwww在线观看| 可以在线观看毛片的网站| 久久99蜜桃精品久久| 97热精品久久久久久| 日韩电影二区| 国产精品无大码| 精品久久久精品久久久| av专区在线播放| 国产 一区精品| 春色校园在线视频观看| 亚洲精华国产精华液的使用体验| 日日撸夜夜添| av在线app专区| 少妇被粗大猛烈的视频| 蜜桃亚洲精品一区二区三区| 亚洲自拍偷在线| 国产精品99久久99久久久不卡 | av卡一久久| 国产精品99久久久久久久久| 美女xxoo啪啪120秒动态图| 国产探花在线观看一区二区| 又粗又硬又长又爽又黄的视频| 日日啪夜夜爽| 3wmmmm亚洲av在线观看| 超碰97精品在线观看| 日韩一本色道免费dvd| 国产精品熟女久久久久浪| 国产精品一区二区在线观看99| 午夜亚洲福利在线播放| 欧美+日韩+精品| a级毛片免费高清观看在线播放| 国产一区有黄有色的免费视频| 亚洲怡红院男人天堂| 99热全是精品| 亚洲精品,欧美精品| 51国产日韩欧美| 亚洲电影在线观看av| 王馨瑶露胸无遮挡在线观看| 人人妻人人澡人人爽人人夜夜| 黄色怎么调成土黄色| 欧美日本视频| 亚洲av电影在线观看一区二区三区 | 欧美高清性xxxxhd video| 人妻夜夜爽99麻豆av| 男插女下体视频免费在线播放| 久久久久久久久久久免费av| 啦啦啦中文免费视频观看日本| 91精品一卡2卡3卡4卡| 国产一区二区亚洲精品在线观看| 国产伦精品一区二区三区四那| 在线观看三级黄色| 国产色婷婷99| 日韩av免费高清视频| 欧美一级a爱片免费观看看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 亚洲精品日韩在线中文字幕| 在线免费观看不下载黄p国产| 免费观看在线日韩| 亚洲综合精品二区| 国产午夜福利久久久久久| 国产在视频线精品| 欧美xxⅹ黑人| 亚洲国产精品成人久久小说| 亚洲av欧美aⅴ国产| 精品一区二区三区视频在线| 91久久精品电影网| 免费黄色在线免费观看| 久久99精品国语久久久| 久久精品久久久久久久性| 2022亚洲国产成人精品| 干丝袜人妻中文字幕| 免费看a级黄色片| a级毛色黄片| 2022亚洲国产成人精品| 国产亚洲一区二区精品| 深夜a级毛片| 成年免费大片在线观看| 欧美日韩视频精品一区| 极品教师在线视频| 又大又黄又爽视频免费| 高清在线视频一区二区三区| 国产成人免费观看mmmm| 久久久久久久亚洲中文字幕| 一边亲一边摸免费视频| 久热这里只有精品99| 亚洲国产欧美在线一区| 成年女人在线观看亚洲视频 | 成人高潮视频无遮挡免费网站| 国产一级毛片在线| 精品国产乱码久久久久久小说| 在线亚洲精品国产二区图片欧美 | 夜夜爽夜夜爽视频| 国产一区二区亚洲精品在线观看| 97超碰精品成人国产| 国产精品爽爽va在线观看网站| 18+在线观看网站| 男女国产视频网站| 亚洲,欧美,日韩| 观看美女的网站| 亚洲在久久综合| 91在线精品国自产拍蜜月| 国产欧美亚洲国产| 一个人观看的视频www高清免费观看| 色综合色国产| 能在线免费看毛片的网站| 国产老妇女一区| 亚洲综合精品二区| 91久久精品电影网| 久久久久国产精品人妻一区二区| 国产午夜精品久久久久久一区二区三区| 黄色视频在线播放观看不卡| 一区二区三区精品91| 成年免费大片在线观看| 少妇丰满av| 直男gayav资源| 日日撸夜夜添| 成人一区二区视频在线观看| 亚洲精品国产成人久久av| 国产精品不卡视频一区二区| 一级二级三级毛片免费看| 国产精品99久久久久久久久| 在线观看免费高清a一片| av福利片在线观看| 老司机影院成人| 国产乱人视频| 一级av片app| 美女主播在线视频| 精品人妻一区二区三区麻豆| 久久久国产一区二区| 国产伦精品一区二区三区四那| 91久久精品国产一区二区三区| 亚洲无线观看免费| 一二三四中文在线观看免费高清| 九九在线视频观看精品| 午夜爱爱视频在线播放| 一区二区三区精品91| 香蕉精品网在线| 国内揄拍国产精品人妻在线| 国产 一区 欧美 日韩| 国产成人91sexporn| 国产高清三级在线| 成人特级av手机在线观看| 91狼人影院| 女人十人毛片免费观看3o分钟| 夫妻性生交免费视频一级片| 亚洲最大成人手机在线| 国产黄色免费在线视频| 中文字幕亚洲精品专区| 97超视频在线观看视频| 亚洲av中文字字幕乱码综合| 嫩草影院新地址| .国产精品久久| 午夜福利视频1000在线观看| 亚洲精品乱码久久久久久按摩| 啦啦啦啦在线视频资源| 一区二区av电影网| 亚洲三级黄色毛片| 偷拍熟女少妇极品色| 十八禁网站网址无遮挡 | 亚洲av电影在线观看一区二区三区 | 国产国拍精品亚洲av在线观看| 另类亚洲欧美激情| 日韩成人av中文字幕在线观看| 成人亚洲精品一区在线观看 | 国产视频内射| 免费播放大片免费观看视频在线观看| 亚洲人成网站高清观看| 舔av片在线| 欧美激情久久久久久爽电影| 大香蕉97超碰在线| 人妻一区二区av| av国产精品久久久久影院| h日本视频在线播放| 国产亚洲av嫩草精品影院| 日韩人妻高清精品专区| 美女视频免费永久观看网站| av免费在线看不卡| 日韩欧美一区视频在线观看 | 欧美另类一区| 久久久久国产网址| 99久国产av精品国产电影| 久久精品人妻少妇| 久久久久久久国产电影| 自拍欧美九色日韩亚洲蝌蚪91 | 国产色婷婷99| 久久人人爽av亚洲精品天堂 | 免费电影在线观看免费观看| 精品久久久久久久人妻蜜臀av| 久久久久久久精品精品| 国产av码专区亚洲av| 简卡轻食公司| 亚洲成人中文字幕在线播放| 老女人水多毛片| 国产成人精品婷婷| 在线精品无人区一区二区三 | 真实男女啪啪啪动态图| 国产视频首页在线观看| 国产探花极品一区二区| 免费观看的影片在线观看| 91午夜精品亚洲一区二区三区| 免费看日本二区| 最近最新中文字幕免费大全7| a级一级毛片免费在线观看| 舔av片在线| 成人亚洲精品一区在线观看 | 欧美 日韩 精品 国产| av免费在线看不卡| 亚洲欧美成人精品一区二区| 王馨瑶露胸无遮挡在线观看| 日韩av不卡免费在线播放| 欧美成人精品欧美一级黄| 最近最新中文字幕免费大全7| 另类亚洲欧美激情| 嫩草影院入口| 91午夜精品亚洲一区二区三区| 在线亚洲精品国产二区图片欧美 | 久久精品国产亚洲av涩爱| 精品久久久精品久久久| 日日啪夜夜撸| 亚洲人成网站在线播| 午夜激情久久久久久久| 免费看光身美女| 男插女下体视频免费在线播放| 2022亚洲国产成人精品| 精品亚洲乱码少妇综合久久| 激情五月婷婷亚洲| .国产精品久久| 亚洲欧美一区二区三区国产| 精品国产三级普通话版| 国产伦精品一区二区三区四那| 亚洲,一卡二卡三卡| 国产午夜福利久久久久久| 久久精品久久久久久久性| 亚洲av.av天堂| 少妇的逼水好多| 天天躁日日操中文字幕| 22中文网久久字幕| 内地一区二区视频在线| 一级毛片电影观看| 夫妻性生交免费视频一级片| 99热6这里只有精品| 日韩制服骚丝袜av| 亚洲人成网站在线观看播放| 六月丁香七月| 日日啪夜夜撸| 国产 一区 欧美 日韩| 深爱激情五月婷婷| 熟女电影av网| 免费看av在线观看网站| xxx大片免费视频| 不卡视频在线观看欧美| 在线 av 中文字幕| 欧美日韩精品成人综合77777| 欧美97在线视频| 亚洲色图综合在线观看| av网站免费在线观看视频| 亚洲人成网站在线播| 亚洲欧洲日产国产| 人人妻人人澡人人爽人人夜夜| 少妇 在线观看| 99久久精品热视频| 国产精品人妻久久久久久| 97热精品久久久久久| 国产亚洲5aaaaa淫片| 观看免费一级毛片| 校园人妻丝袜中文字幕| 纵有疾风起免费观看全集完整版| 国产欧美日韩一区二区三区在线 | 黄色一级大片看看| 国产成人aa在线观看| 九九久久精品国产亚洲av麻豆| 国产成人午夜福利电影在线观看| 丰满少妇做爰视频| 欧美高清性xxxxhd video| 精品一区在线观看国产| 夫妻性生交免费视频一级片| 99热这里只有是精品在线观看| 亚洲精品乱久久久久久| 日韩,欧美,国产一区二区三区| 亚洲欧美中文字幕日韩二区| 日韩不卡一区二区三区视频在线| 另类亚洲欧美激情| 亚洲精品国产av成人精品| 亚洲自拍偷在线| 精品一区二区三卡| 毛片一级片免费看久久久久| 欧美亚洲 丝袜 人妻 在线| videos熟女内射| 观看美女的网站| 亚洲精品aⅴ在线观看| 免费黄网站久久成人精品| 国产高清国产精品国产三级 | 国产成人精品婷婷| 网址你懂的国产日韩在线| 免费在线观看成人毛片| 最近最新中文字幕免费大全7| 国产探花极品一区二区| 黄色视频在线播放观看不卡| www.色视频.com| 欧美人与善性xxx| 亚洲国产色片| 99久久精品热视频| 伦精品一区二区三区| 亚洲国产色片| 国产成人91sexporn| 欧美激情国产日韩精品一区| 丝袜脚勾引网站| 久久久久久久久大av| 亚洲在久久综合| 水蜜桃什么品种好| 99久久中文字幕三级久久日本| 伊人久久精品亚洲午夜| 亚洲人与动物交配视频| 97超视频在线观看视频| 99久久九九国产精品国产免费| 免费在线观看成人毛片| 自拍欧美九色日韩亚洲蝌蚪91 | 不卡视频在线观看欧美| 日韩 亚洲 欧美在线| 搡女人真爽免费视频火全软件| 国产精品不卡视频一区二区| 日韩亚洲欧美综合| 菩萨蛮人人尽说江南好唐韦庄| 欧美激情国产日韩精品一区| 熟女人妻精品中文字幕| 中国三级夫妇交换| 久久鲁丝午夜福利片| 国产成人aa在线观看| 爱豆传媒免费全集在线观看| 成年版毛片免费区| 国产亚洲一区二区精品|