• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Novel Workload-Aware and Optimized Write Cycles in NVRAM

    2022-08-24 03:27:32ShriTharanyaaSharmilaandSaravanaKumar
    Computers Materials&Continua 2022年5期

    J.P.Shri Tharanyaa,D.Sharmila and R.Saravana Kumar

    1Department of ECE,Bannari Amman Institute of Technology,Tamil Nadu,India

    2Department of CSE,Jai Shriram Engineering College,Tamil Nadu,India

    3Department of ECE,Bannari Amman Institute of Technology,Tamil Nadu,India

    Abstract: With the emergence of the Internet of things (IoT), embedded systems have now changed its dimensionality and it is applied in various domains such as healthcare, home automation and mainly Industry 4.0.These Embedded IoT devices are mostly battery-driven.It has been analyzed that usage of Dynamic Random-Access Memory (DRAM) centered core memory is considered the most significant source of high energy utility in Embedded IoT devices.For achieving the low power consumption in these devices, Non-volatile memory (NVM) devices such as Parameter Random Access Memory (PRAM) and Spin-Transfer Torque Magnetic Random-Access Memory (STT-RAM) are becoming popular among main memory alternatives in embedded IoT devices because of their features such as high thickness, byte addressability, high scalability and low power intake.Additionally,Non-volatile Random-Access Memory(NVRAM)is widely adopted to save the data in the embedded IoT devices.NVM,flash memories have a limited lifetime,so it is mandatory to adopt intelligent optimization in managing the NVRAM-based embedded devices using an intelligent controller while considering the endurance issue.To address this challenge, the paper proposes a powerful,lightweight machine learning-based workload-adaptive write schemes of the NVRAM, which can increase the lifetime and reduce the energy consumption of the processors.The proposed system consists of three phases like Workload Characterization, Intelligent Compression and Memory Allocators.These phases are used for distributing the write-cycles to NVRAM,following the energy-time consumption and number of data bytes.The extensive experimentations are carried out using the IoMT (Internet of Medical things)benchmark in which the different endurance factors such as application delay,energy and write-time factors were evaluated and compared with the different existing algorithms.

    Keywords: Internet of things;DRAM;PRAM;STT-RAM;machine learning;internet of medical things;endurance

    1 Introduction

    Internets of Things (IoT) technologies are growing exponentially, finding their application in various domains such as healthcare, automation and security.These devices are equipped with batteries, sensors, microcontrollers and transceivers.Since these devices are battery-driven, making the IoT node sensitive to battery lifetime is a tricky mechanism.Recent reports suggest that using DRAM-based memory systems is the main contributor to embedded devices’overall energy utility to solve this significant issue,Non-Volatile Random-Access Memory(NVRAM)finds its place in terms of DRAM memory systems.Non-volatile memory devices,including Phase Change Memory(PCM)as well as Resilient Random-Access Memory (ReRAM), are playing a vital role in building future memory systems due to their salient features like high scalability and low power consumption[1–5].However,NVRAMs suffer from shortcomings like less endurance and high energy read/write cycles[6]when compared with the existing DRAM systems.Hence these constraints impose serious issues in using the NVRAM as the complete replacement for DRAM.

    Several studies were investigated in improving the endurance of NVRAM in terms of reducing and effectively managing the memory write cycles[7,8].Flip-N-Write(FNW)[9]becomes the method that combines old and new data to lessen the number of bits that help reducing redundancy between similar caches.Moreover,frequency compression techniques[10,11]was used to compress the data bits for an efficient write mechanism.Specifically, these methods retain a template table in the program memory and include several typical word patterns, including a highly responsible template.If all the word patterns in the table are matched, each word in the in-memory cache is represented by a compact format,which decreases the number of text bits.The term patterns in the template chart are predetermined and cannot be updated,defined as static patterns.

    To achieve the above-mentioned challenge,methodologies such as Dynamic Frequency Compression techniques[12],F(xiàn)lash Translational Layer(FTL)mapping techniques[13–18]were proposed to reduce the high energy write levels,thus increasing the endurance levels of NVRAM.However,these methods find it difficult to handle many applications when ported in Embedded IoT devices.

    To improve the endurance of the memory systems for large applications, intelligent analysis of larger applications is required, which can impart flexible and adaptive write cycles.Addressing the observations from the literary works,we put forward the new adaptive NVRAM write schemes called WHEAL(Workload Hybrid Energy Adaptive Learning)mechanism.The proposed technique works on dynamic compression techniques based on the workload characterizations with an effective NAND flash memory management.Moreover,WHEAL also expanded the complex pattern granularity from 32 bits to 64 bytes.In specific,our interventions are summed up as follows.

    a.Intelligent Workload Characterization:In contrast to the previous schemes,which require more statistical and extraction methods for obtaining the data characteristics, we proposed a new powerful machine-learning algorithm to classify the data types based on the workload characterization.The proposed technique increases the versatility of data compression mechanisms in a cost-effective way.

    b.Workload-Energy-Aware NVRAM Compression Schemes:The proposed write schemes introduce the new methodology Dynamic Workload Compression(DWC),which writes data to fit into dynamic compressive schemes.The DWC expands the data pattern for compacting an allzero cache while leveraging the value localization.In addition,this methodology preserves the energy with the reduced mechanism.

    c.Endurance Aware Allocation Methods:The proposed schemes introduce the compression and assign the adaptive write cycles for the intelligent allocation of the compressed workload bits in the caches following its characteristics to increase the memory’s endurance.

    The rest of the paper is organized as follows:Section 2 presents the related works of various literature.Section-2 also converses about the research gaps found in the existing systems.The preliminary overviews of NVRAM-Based Cache Memories and the motivation behind our research are detailed in Section-3.The complete working mechanism of the proposed framework is presented in Section-4.The implementation results with comparative analysis,performance metrics are exhibited in Section 5.Lastly the paper is concluded in Section-6.

    2 Related Works

    Power and performance optimization on embedded architectures is still a critical challenge.Many existing approaches are focused on designing an efficient software kernel for targeted architecture.On the other hand, hardware optimization in terms of design space area and memory optimization is still an open challenge problem to be focused on nowadays.In this literature survey, we initially discussed the workload characterization on embedded architectures followed by non-volatile memory optimization.

    Workload Characterization can be utilized to foresee future asset pre-requisites that enhance the scope organization,task planning and resource utilization effectively.The remaining burden portrayal is commonly performed by utilizing two unique methodologies i.e.,execution-based and model-based methods.In the model-based framework,the workloads are characterized using the performance tool[19]in terms of memory occupation,registers and other peripheral usages of execution of applications on the hardware platforms.Wang et al.[20] introduced multi level cell based phase change memory architecture.The significant value of this framework is relies upon energy variations in programming.To further enhance the performance,this framework incorporates data comparison write and results shows that this framework outperformed other existing methodologies in terms of energy consumption utilized for write cycles.

    Shishira SR et al.studied performance improvement achieved through workload characterization[21].The author initially defined the workload characterization with its various classes such as CPU, GPU, cloud workloads, physical environment, resource utilization and how the execution characteristics differ among each workload.The various tasks have distinct traits and the choice of the proper forum for a specific workflow processing is still an NP-hard task.The major limitation is a review paper, in which hypothetically detailed workload characterization and its classification are detailed.Maria Calzarossa et al.[22] developed and used a series of static tracks to establish task models based on the network usage and processing times.

    Alexander et al.developed a workload characterization model that focuses on multimedia application workloads.Multiprocessor system-on-chip is targeted for processing multimedia workloads in real-time.The workloads are categorized and differentiated based on the variability characterization curves and workload transformations [23].The limitation of this work, the proposed framework is more suitable for multimedia workloads on the MPSoC platform.Memory, I/O workloads are not considered in this work.Zhang et al.[24]utilize regulation methods to describe the vector task of roles with dependent implementation sequence.This classification framework is orthogonal to our design in the context that we are not just attempting to model timeline relationships inside tasks triggered by dependent implementation.Baruah et al.studied a real time task model in the perspective of feasibility examination.This framework incorporates 2 models called generalized multi framework model and sporadic task model.It is a powerful framework and easily handle both static and dynamic tasks in real time[25].

    Writam Banerjee [26] considered real-time challenges on non-volatile memory gadgets with different structures.The later advance faced the “memory wall”, i.e., the speed crevice within rationale and memory.Overcoming these issues, primary framework execution bottleneck and essential confinements related to contracting gadget measure and expanded processing complexity,developing NVM(eNVM)with energizing models have been introduced in this article.As per the recent survey,eNVM devices called FeFET, PCM, STTRAM and RRAM are the most assured memory devices that can be used for high-efficient performance with low cost and power.Likewise, Jishen Zhao et al.reviewed the low-cost architecture of non-volatile memory, byte-addressed non-volatile memory(NVM)architectures,including spin-transfer torque memory(STTMRAM), phase-change memory(PCM) and resistive memory (ReRAM), as just a substitute for conventional memory systems used throughout the memory models[27].

    Yuncheng Guo et al.developed an NVM writing scheme called Dynamic Frequent Pattern Compression(DFPC)to dramatically decrease the number of write units and increase their lifespan.The DFPC model comprises various stages such as sampling and dynamic patterns to improve the compression of data.Then, an enhanced DFCP algorithm is developed to optimize the latency and energy efficiency of NVM devices[12].

    3 Methodology

    3.1 NVRAM Background

    NVM,Characteristics and Drawbacks unlike conventional charge-based memory such as DRAM and SRAM, evolving NVMs store information using series resistance memories with increased concentration and scalability.Therefore,NVMs can be commonly used in the primary memory[27].

    Because all NVMs store data by modifying physical characteristics,the write operation acquires more time and resources than that of the read operation,contributing to the imbalance of reading and writing operations.Also,the write operation uses the NVM cell,particularly at high frequency,which results in reduced NVM durability.NVM-based structures also have to lessen the number of write-bits in the writing process.As one of the successful NVM innovations,PCM technology uses tolerance of chalcogenide glass for data storage.

    The element used for phase shift is germanium, antimony and tellurium alloys, including Ge2Sb2Te5.The substance has two possible states, the state of crystalline (SET) and the state of amorphous(RESET).The sensitivity of the substance to various states is fundamentally different.In particular, the tolerance rate of the amorphous form is much greater than those of the crystal-state material.PCM stores binary information in states by using material tolerance differences.

    In need of executing a RESET(SET)procedure to write“0”(“1”)to the PCM cell,the PCM cell is warmed just above the melting point that melts the chalcogenide substance,followed by immediate chilling to adjust the structure.The ReRAM system utilizes a permeable dielectric in the Metal-Insulator Metal structure.This can be adjusted among low-resistance state(SET)or high-resistance state(RESET)while using the necessary voltages.

    3.2 Motivation

    (i) Achieving high-endurance with low power is still an Np-hard issue.Workload characterization scheduling improves resource utilization and performance through static model-based optimization,which misleads specific architecture and specific applications.Existing approaches are not suitable for mixed-critical workloads and are not designed for common architectures.

    (ii) Memory(NVRAM)optimization is another emerging problem in recent research.However,few researchers have addressed the various non-volatile memory optimization structures which are not implemented on experimental boards.

    (iii) There are many inherent problems with eNVM technologies, like cell-level and system-level durability, variability, device performance, extremely smooth framework architecture, etc.Nevertheless,the eNVM paves the way to overwrite primary memories,play SCM’s function,explore new technologies,explore brain-inspired computational systems and model hardware safety systems.

    (iv) The low-power eNVM could also be beneficial for sensors,including Smart devices.However,there are also several obstacles in developing large eNVM systems, such as the production process,components and tailored operation for various products.

    4 Proposed Work

    4.1 Proposed WHEAL-NVRAM Architecture

    The proposed WHEAL-NVRAM-based architecture has been shown in Fig.1.The new workload awareness-compression and new wear-levelling approaches have been integrated to wear out the low energy cycles.In addition, the new lightweight learning algorithms are incorporated in memory to categorize the nature of the workloads.Based on the nature of workloads,novel compression and new adaptive-levelling and allocation technique were adopted to reduce the write cycle in the NVRAM for enhancing its endurance.

    4.2 Workload Characterization

    This section discusses the workload parameters and intelligent workload characterization based on the lightweight machine learning algorithms.

    4.3 Workload Parameters

    Tab.1 illustrates the workload parameters which are extracted from the different input application programming threads.These workloads are extracted by using the PSutils software,which runs on the kernel’s architecture.

    These workloads are considered the micro architecture-independent workload parameters used as input to the proposed learning model for efficient workload characterization.The major advantage of using the micro architecture-independent workloads is to capture the actual inherent program behaviours and prove its usefulness in characterizing suites for emerging workloads.

    4.4 Machine Learning Based Workload Extraction Mechanism

    Several algorithms such as Clustering,principal component analysis,histogram analysis,correlation methods were used for typical workload characterization.However, an accurate and intelligent workload characterization technique is still mandatorily needed for a better compression and levelling technique.This purpose can be served by using the machine learning algorithms and the proposed system incorporates a single-layer feedforward learning model for effective workload characterization.

    Figure 1:Proposed framework for the WHEAL-architectures

    Table 1:Workload parameters used for the characterization

    The single-layer feedforward networks are based on the Extreme Learning Machines (ELM).Fig.2 shows the architectural diagram for the proposed ELM.

    This infrastructure uses a single hidden layer, high speed, precision, speed planning and highly speculative and standard feature estimation skills.Hence,these algorithms are portable to embedded memory storage systems.In the same kind of model,the‘K’neurons in the hidden layer are expected to deal via an activation function that is very distinguishable while the output layer component is linear.In ELM,hidden layers are need not be tuned.Loads of the hidden layer are randomly allocated(counting loads of the bits).It is not the situation that hidden nodes are meaningless,but they do not need to be tuned and hidden neuron parameters can be haphazardly generated even in advance.Those are,until having to take care of a learning data collection.For a single layer ELM,the performance of the method is specified by Eq.(1)

    where a is the input

    βbe the output weight vector

    H(a)is the hidden layer output

    Figure 2:Structure of Extreme Learning Machines

    To formulate the output vector S that is considered as the target,the eqn can further be derived as follows

    The general implementation of the ELM is based on the minimum non-linear least square approaches expressed in Eq.(5)

    where H*is the inverse of H known as Moore-Penrose generalized inverse

    The output can be derived as

    4.5 Disadvantages of Existing ELM

    Although Extreme Learning Machines seem to be effective both in preparation and practice,the key downside was its non-optimal calibration of input weights.ELM often uses several hidden units to change the weight values relative to many other traditional learning strategies,which can influence the accuracy of the identification.

    To address the above downside, a novel Whale algorithm is used to optimize input connection weight variables to reach the optimal accuracy of the task classification system.There seems to be a significant trend in Whale optimization in recent decades.This evolutionary algorithm model is a computational approximation of the action and activity of humpback whales in their quest for food and supplies.Whale Optimization Algorithm(WOA)has been influenced by the Bubble-net assault technique, whereby whales begin catching fish by forming spiral-shaped bubbles surrounding their fish to 12 meters depth from the sea and then dive back and caught their intended prey.Centred on the shortest distance of the whales,the discovery phase in this method is a randomized quest for food that can be numerically converted by modifying old strategies rather than picking the right ones by randomly assigning other alternatives.In addition to this curious action,WOA separates it from other evolutionary algorithms because it only expands two values.These attributes determine a rapid integration among extraction and exploration processes.Fig.3 shows Encircling attack prey searching methodology for humpback whales.

    Figure 3:Encircling attack prey searching methodology for humpback whales

    We will explain the computational formula for prey conquering,prey seeking,spiral bubble-net hunting and gathering in the later subsection.Surrounding Prey:By raising the number of loops from the beginning to the optimum number,humpback whales encircle the prey and refine their location in the path of the best solution.This action can be expressed mathematically as:

    If(p<0.5 and mod(U)<1)

    Then the position of the candidate X(t+1)is updated and

    where p=0.1(constant)X(t+1)is the best position in the current situation.U and D are calculated by the following Eqs.(9)and(10)

    where a decrease linearly from 2 to 0 and r is the randomly selected vector

    Prey Searching:In prey searching mechanism,X is replaced with the random variables Xrandomand mathematical equation are given by

    The encircling of prey and spiral updation of prey have been done during the exploration phase of the whale optimization algorithm.The mathematical expression for updation of new position during the spiral process is given by Eq.(14)

    Here,D is the distance among the new position and updated position in the new generation,b is the constant,which varies from the 0 to 1.

    4.6 Optimized ELM for Workload Characterization

    The main limitation of the ELM is that the non-optimum collection of hidden units can trigger the formation of increasingly prevalent that impair the prediction accuracy.The proposed ELM network implements a whale algorithm to maximize input weight and bias variables to address this issue.The benefit of the whale algorithm in ELM is that it improves the global minimum search path,which can be more effective than the current optimization techniques.Throughout this case,accuracy is used as a feature of fitness.If the classification accuracy is equivalent to the accuracy of the standard,then the output variables will be deemed correct else,they will be ignored and their iterations will begin.This optimized learning model saves energy consumption and area overhead when implemented as the API in the Embedded Systems kernel.Hence the Eq.(7)can be modified as

    Eq.(15)depicts the final output from the proposed learning models,which is used to categorize the different types of the workloads such as Very Heavy(VH),Heavy(H),Medium(M)and Normal(N).Before categorizing the workloads by the proposed learning models, workload thresholds are calculated using the mathematical expression.Then,these values are used to label the workloads,which makes an effective categorization using the proposed learning models.

    4.7 Threshold Decision

    After calculating the workload parameters using the PSutils tools in the Embedded systems,energy and instruction per clock cycles are calculated using the decision rule for categorizing the workloads.The energy of each workload is calculated by using the mathematical expression, which is given as follows

    where E(W)is the Energy of the workloads,V is the voltage of the CPU,I is the current consumption and IPC is Clock cycles for writing in the memory.

    The Eq.(16)is used for labelling the workloads that better categorize workloads by the optimized machines.Based on the energy calculated,proposed learning models categorizes the different workloads as very heavy (VH), heavy (H), medium (M) and normal (N), which act as the inputs to the compressor and allocators.

    4.8 Intelligent Workload Compression and Allocation

    After the extractions of the workloads, these workloads are compressed by the dynamic compression technique and new threshold-based workload levelling is adopted to allocate the application threads in the cache memories.The architecture which is used for implementing the compression and allocator technique is shown in Fig.4.

    Figure 4:Memory controller architecture for compression and allocator

    The proposed memory controller architecture consists of two compression engines, a workload pattern table and an allocator.All these are controlled by the timing circuits, which control the workload patterns to write in the buffers.The working mechanism of the WHEAL memory controller is given as follows.

    4.8.1 Workload Storage Pattern

    These storage systems store the workload categorized by the proposed learning models and the categorization bits.These categorization bits are used to differentiate the workloads and following that,compression will take place concurrently for the different loads.

    4.8.2 Compression Engine

    The approach splits the entire 64-byte cache line as 16 32-bit words to perform data compression for different workloads.Further,the categorization bits are used to check the type of workloads,which avoids the repeated type of workloads.Also,these compression techniques work based on sampling time which is provided by the timing control circuits.

    5 Experimentation

    The proposed framework is simulated in a GEM-5 simulator emulated on the Raspberry Pi 3 Model B+ hardware.To analyze the workload characteristics, IoMT benchmarks were considered and implemented on hardware Raspberry Pi Model B+.Then the proposed NV-RAM architecture is simulated on GEM-5 software.The complete specification used for the experimentation is presented in Tab.2.

    Table 2:Specifications used for the experimentation

    For analysis,IoMT benchmarks are taken as input workload datasets in which 70%of workloads are used for training and 30% are used for testing.The different analysis of the proposed learning model in categorizing the workloads are given as follows.

    Figs.5–8 show the performance analysis of the different machine learning models in categorizing the different workloads.Fig.5 shows the performance metrics of different learning models in categorizing the very heavy workloads in which the proposed algorithm has exhibited 98.5%accuracy,98%sensitivity and 97.5%specificity,which has an edge of performances of 2%than SVM(Support Vector machines),3.5%than KNN(K-nearest neighbourhood),4%than DT(Decision Tree),5%than ANN-1(Artificial Neural Networks-Backpropagation layer)and ANN-2(Artificial Neural Networks-Feed forward layer)and finally 6%than Na?ve Bayes algorithms.A similar fashion of performance is found in Figs.6–8 in categorizing the different types of workloads.The integration of the optimized hidden layers in ELM has proved its stability in categorizing the workloads with high efficiency.Moreover,to prove the performance of the proposed framework,time of categorizing is calculated,which is shown in the figures,

    Figure 5:Performance analysis for different learning models for categorizing the very heavy workloads using IoMT benchmarks

    Figure 6:Performance analysis for different learning models for categorizing the heavy workloads using IoMT benchmarks

    Figure 7:Performance analysis for different learning models for categorizing the medium workloads using IoMT benchmarks

    From the above analysis, it is found that the proposed model consumes less time with high performance,which proves that these models can be integrated into the hardware,which can consume lesser energy and lesser overhead.

    Figure 8:Performance analysis for different learning models for categorizing the normal workloads using IoMT benchmarks

    6 Conclusion

    The paper proposes the first-ever hybrid machine-learning-based approaches for increasing the endurance in NVRAM.The proposed WHEAL methodology incorporates different stages such as workload categorization,compression technique and a memory allocator.The first phase is workload categorization in which the new energy-saving optimized ELM technique is used for the workload categorization where the energy is taken as the major threshold.Also, the paper proposes the dual compression technique for compressing the bits and the memory allocator stores the loads by using adaptive write cycles in different caches.Extensive experimentations have been conducted and performance metrics such as accuracy of categorization,write frequency ratio and write latencies were analyzed and compared with other existing architectures such as Baseline architecture and A-CACHE controllers.As a result,the proposed model has increased the lifetime of NVRAMS by 50%greater than the A-CACHE controller and even>90%greater than baseline architectures.Eventhough this technique can increase NVRAM’s endurance,computational overheads need its improvisation for less complexity implementation.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美成人精品欧美一级黄| 久久午夜福利片| 亚洲成人一二三区av| 麻豆成人av视频| 一级黄片播放器| 青青草视频在线视频观看| 亚洲自偷自拍三级| 成年美女黄网站色视频大全免费 | 尤物成人国产欧美一区二区三区| 夜夜骑夜夜射夜夜干| 啦啦啦在线观看免费高清www| av在线蜜桃| 国产毛片在线视频| 亚洲精品一区蜜桃| 欧美xxxx黑人xx丫x性爽| 少妇人妻 视频| 边亲边吃奶的免费视频| 大又大粗又爽又黄少妇毛片口| 最近的中文字幕免费完整| 久久综合国产亚洲精品| 黄片无遮挡物在线观看| av福利片在线观看| 日韩视频在线欧美| 亚洲国产色片| 天堂8中文在线网| 又大又黄又爽视频免费| 欧美日韩一区二区视频在线观看视频在线| av专区在线播放| 色5月婷婷丁香| av视频免费观看在线观看| 亚洲国产精品成人久久小说| 噜噜噜噜噜久久久久久91| 国产欧美另类精品又又久久亚洲欧美| 午夜日本视频在线| 大话2 男鬼变身卡| 成人高潮视频无遮挡免费网站| 国产欧美日韩精品一区二区| 99久久人妻综合| 特大巨黑吊av在线直播| 热re99久久精品国产66热6| 国产精品熟女久久久久浪| 欧美zozozo另类| 免费av中文字幕在线| 五月玫瑰六月丁香| 成人国产av品久久久| 91久久精品国产一区二区三区| 国产精品一区二区性色av| 国产精品人妻久久久久久| av在线老鸭窝| 特大巨黑吊av在线直播| 久久久色成人| 亚洲,一卡二卡三卡| 国产亚洲欧美精品永久| 国产亚洲5aaaaa淫片| 我的老师免费观看完整版| 久久久欧美国产精品| 在线免费观看不下载黄p国产| 精品久久久久久电影网| 国产黄片美女视频| 精品视频人人做人人爽| 狠狠精品人妻久久久久久综合| 王馨瑶露胸无遮挡在线观看| 五月伊人婷婷丁香| 亚洲激情五月婷婷啪啪| 在线看a的网站| 成人亚洲欧美一区二区av| 性高湖久久久久久久久免费观看| 91精品一卡2卡3卡4卡| 亚洲国产精品国产精品| 午夜激情福利司机影院| 99久久综合免费| 在线观看国产h片| 国产精品国产三级国产av玫瑰| 日本与韩国留学比较| 亚洲国产高清在线一区二区三| 内射极品少妇av片p| 乱码一卡2卡4卡精品| 国产亚洲一区二区精品| 18禁在线无遮挡免费观看视频| 在线观看国产h片| 97超视频在线观看视频| 少妇人妻一区二区三区视频| 国产免费福利视频在线观看| 亚洲欧美日韩东京热| 黄色欧美视频在线观看| 免费看日本二区| 人妻少妇偷人精品九色| 18禁在线无遮挡免费观看视频| 丰满乱子伦码专区| 亚洲av.av天堂| 少妇人妻一区二区三区视频| 这个男人来自地球电影免费观看 | 18+在线观看网站| 日韩,欧美,国产一区二区三区| 亚洲性久久影院| 看免费成人av毛片| 亚洲国产精品一区三区| 国产成人一区二区在线| 中文字幕久久专区| 男女无遮挡免费网站观看| 欧美一级a爱片免费观看看| 国产高清三级在线| 99热这里只有精品一区| 秋霞在线观看毛片| 国内精品宾馆在线| 久久精品国产亚洲网站| 国产亚洲一区二区精品| 麻豆成人午夜福利视频| 高清欧美精品videossex| 日韩亚洲欧美综合| 日本一二三区视频观看| 亚洲成人手机| 一二三四中文在线观看免费高清| 噜噜噜噜噜久久久久久91| 超碰av人人做人人爽久久| 99九九线精品视频在线观看视频| 午夜免费鲁丝| 国产亚洲91精品色在线| 永久网站在线| 久久国产精品大桥未久av | 在线亚洲精品国产二区图片欧美 | 大香蕉久久网| 少妇的逼水好多| 亚洲第一av免费看| 老师上课跳d突然被开到最大视频| 在线亚洲精品国产二区图片欧美 | 汤姆久久久久久久影院中文字幕| 22中文网久久字幕| 老司机影院毛片| 看免费成人av毛片| 欧美+日韩+精品| 免费看不卡的av| 男人添女人高潮全过程视频| 观看免费一级毛片| 秋霞在线观看毛片| 在线观看国产h片| 男女国产视频网站| 激情 狠狠 欧美| 午夜福利视频精品| 性色avwww在线观看| 精品人妻熟女av久视频| 国产亚洲一区二区精品| 久久99热6这里只有精品| 女的被弄到高潮叫床怎么办| 妹子高潮喷水视频| 国产爽快片一区二区三区| 国产在线一区二区三区精| 欧美日韩亚洲高清精品| 2021少妇久久久久久久久久久| 国产淫片久久久久久久久| 人妻少妇偷人精品九色| 在现免费观看毛片| 中文字幕精品免费在线观看视频 | 国产亚洲91精品色在线| 欧美日韩视频高清一区二区三区二| 日本爱情动作片www.在线观看| 亚洲aⅴ乱码一区二区在线播放| 精品久久久久久久末码| 亚洲欧美清纯卡通| 一区二区三区乱码不卡18| a 毛片基地| 91精品国产九色| 蜜桃亚洲精品一区二区三区| 国产乱人偷精品视频| 美女中出高潮动态图| 久久av网站| 国产伦在线观看视频一区| 国产成人精品一,二区| 免费人成在线观看视频色| 午夜免费观看性视频| 国产欧美亚洲国产| 人妻夜夜爽99麻豆av| 免费av不卡在线播放| av福利片在线观看| 精品国产露脸久久av麻豆| 黑丝袜美女国产一区| 婷婷色综合大香蕉| 国产成人91sexporn| 啦啦啦在线观看免费高清www| 校园人妻丝袜中文字幕| 成人漫画全彩无遮挡| 噜噜噜噜噜久久久久久91| 国产精品女同一区二区软件| 国产免费视频播放在线视频| 国产精品熟女久久久久浪| 国产精品熟女久久久久浪| 日韩一区二区三区影片| 美女视频免费永久观看网站| 婷婷色av中文字幕| 精品99又大又爽又粗少妇毛片| 亚洲人成网站在线播| 国产久久久一区二区三区| 精品亚洲乱码少妇综合久久| 乱码一卡2卡4卡精品| 99热这里只有是精品50| 中文字幕久久专区| 80岁老熟妇乱子伦牲交| 国产成人精品福利久久| 全区人妻精品视频| 国产成人精品久久久久久| 国产真实伦视频高清在线观看| 日韩制服骚丝袜av| 爱豆传媒免费全集在线观看| 综合色丁香网| 麻豆成人午夜福利视频| 水蜜桃什么品种好| 亚洲人成网站在线播| 免费黄频网站在线观看国产| 蜜桃在线观看..| 在线天堂最新版资源| 日韩人妻高清精品专区| 黄片无遮挡物在线观看| 看非洲黑人一级黄片| 高清日韩中文字幕在线| 午夜激情久久久久久久| 激情 狠狠 欧美| 大片免费播放器 马上看| 男男h啪啪无遮挡| 春色校园在线视频观看| 欧美xxxx性猛交bbbb| 亚洲精品一区蜜桃| 亚洲av成人精品一区久久| 日韩成人伦理影院| av.在线天堂| 五月伊人婷婷丁香| 一级毛片 在线播放| 国产精品一区二区在线不卡| 性色avwww在线观看| 久久精品久久久久久久性| 内地一区二区视频在线| 人妻 亚洲 视频| 三级经典国产精品| 汤姆久久久久久久影院中文字幕| 少妇人妻久久综合中文| 午夜激情久久久久久久| 一级毛片久久久久久久久女| 老司机影院成人| 亚洲av综合色区一区| 久久国产精品男人的天堂亚洲 | 十八禁网站网址无遮挡 | 熟女人妻精品中文字幕| 成年人午夜在线观看视频| 国产精品一二三区在线看| 亚洲美女搞黄在线观看| 精品一区二区三卡| 国产黄片美女视频| 91aial.com中文字幕在线观看| 丰满人妻一区二区三区视频av| 久久青草综合色| 热99国产精品久久久久久7| 亚洲精品第二区| 国产爽快片一区二区三区| 青春草视频在线免费观看| 国产毛片在线视频| 欧美区成人在线视频| 婷婷色麻豆天堂久久| 在线观看一区二区三区| 高清av免费在线| 黄色怎么调成土黄色| 18禁裸乳无遮挡免费网站照片| 97精品久久久久久久久久精品| 各种免费的搞黄视频| 在线观看国产h片| 王馨瑶露胸无遮挡在线观看| 亚洲欧美一区二区三区国产| 特大巨黑吊av在线直播| 精品久久久噜噜| 久久久久久久久久成人| 欧美精品人与动牲交sv欧美| 最黄视频免费看| 夫妻午夜视频| 精品少妇久久久久久888优播| 国产中年淑女户外野战色| 免费少妇av软件| 成人亚洲欧美一区二区av| 日本午夜av视频| 97在线视频观看| 高清不卡的av网站| 国产美女午夜福利| 在线观看人妻少妇| 亚洲欧美日韩东京热| 3wmmmm亚洲av在线观看| 人人妻人人添人人爽欧美一区卜 | av线在线观看网站| 精品少妇黑人巨大在线播放| 两个人的视频大全免费| 成人国产麻豆网| 九色成人免费人妻av| 一区二区三区免费毛片| 成人二区视频| 人人妻人人看人人澡| 日韩欧美 国产精品| 五月玫瑰六月丁香| 一区二区三区免费毛片| 男人狂女人下面高潮的视频| 成人综合一区亚洲| 欧美最新免费一区二区三区| 免费高清在线观看视频在线观看| 欧美国产精品一级二级三级 | 一级a做视频免费观看| 国产精品熟女久久久久浪| 中文字幕人妻熟人妻熟丝袜美| 女性生殖器流出的白浆| 国产黄色免费在线视频| 亚洲国产欧美人成| 王馨瑶露胸无遮挡在线观看| 一级av片app| 久久久欧美国产精品| 欧美精品人与动牲交sv欧美| 又粗又硬又长又爽又黄的视频| 能在线免费看毛片的网站| 超碰97精品在线观看| 黄色欧美视频在线观看| 夜夜看夜夜爽夜夜摸| 国产精品av视频在线免费观看| 91精品伊人久久大香线蕉| 国产v大片淫在线免费观看| 亚洲久久久国产精品| 亚洲精品aⅴ在线观看| 视频区图区小说| 在线观看国产h片| 久久久久网色| 国产日韩欧美亚洲二区| 一个人看视频在线观看www免费| 久久久久久九九精品二区国产| 国产成人免费观看mmmm| 欧美成人a在线观看| 纯流量卡能插随身wifi吗| 尾随美女入室| 中文欧美无线码| 精品久久久久久久久av| videossex国产| 香蕉精品网在线| 另类亚洲欧美激情| 交换朋友夫妻互换小说| 精品久久国产蜜桃| 91精品国产国语对白视频| 免费看日本二区| 岛国毛片在线播放| 国内揄拍国产精品人妻在线| 99久久综合免费| 新久久久久国产一级毛片| 精品国产一区二区三区久久久樱花 | 秋霞在线观看毛片| 亚洲av中文字字幕乱码综合| 日韩人妻高清精品专区| 伦理电影免费视频| 狂野欧美白嫩少妇大欣赏| 国产成人午夜福利电影在线观看| 一级毛片aaaaaa免费看小| 亚洲最大成人中文| 久久久午夜欧美精品| 精品一区在线观看国产| 麻豆精品久久久久久蜜桃| kizo精华| 深夜a级毛片| 卡戴珊不雅视频在线播放| 国产久久久一区二区三区| 久久鲁丝午夜福利片| 免费人妻精品一区二区三区视频| 国产精品爽爽va在线观看网站| 熟女人妻精品中文字幕| 99久久精品一区二区三区| 欧美亚洲 丝袜 人妻 在线| 精品一区在线观看国产| 亚洲欧美日韩另类电影网站 | 人人妻人人爽人人添夜夜欢视频 | 欧美一级a爱片免费观看看| 国产av码专区亚洲av| 高清日韩中文字幕在线| 亚洲精品国产av成人精品| 中文字幕人妻熟人妻熟丝袜美| 国产av码专区亚洲av| 啦啦啦在线观看免费高清www| 国产精品99久久99久久久不卡 | 欧美精品亚洲一区二区| 日韩伦理黄色片| 成人18禁高潮啪啪吃奶动态图 | 亚洲av成人精品一区久久| 日本免费在线观看一区| 国产成人免费观看mmmm| 成人无遮挡网站| 老熟女久久久| 熟女电影av网| 最近最新中文字幕免费大全7| 午夜老司机福利剧场| 亚洲图色成人| 国产白丝娇喘喷水9色精品| 少妇丰满av| 亚洲欧美日韩卡通动漫| 亚洲av不卡在线观看| 亚洲av中文字字幕乱码综合| 成人高潮视频无遮挡免费网站| 精品久久久久久久久亚洲| 国产黄片视频在线免费观看| 亚洲国产成人一精品久久久| 亚洲中文av在线| www.色视频.com| 美女cb高潮喷水在线观看| 特大巨黑吊av在线直播| 看十八女毛片水多多多| www.色视频.com| 毛片女人毛片| 成人一区二区视频在线观看| 男女啪啪激烈高潮av片| 亚洲精品国产成人久久av| 国产精品国产三级国产专区5o| 国产伦在线观看视频一区| 欧美bdsm另类| 国产精品一区www在线观看| 久久精品国产亚洲av涩爱| 精品久久久久久久久亚洲| 最后的刺客免费高清国语| 久久毛片免费看一区二区三区| 2022亚洲国产成人精品| 国产免费视频播放在线视频| 一级爰片在线观看| 亚洲欧美日韩无卡精品| 春色校园在线视频观看| 久久久精品免费免费高清| 成人黄色视频免费在线看| 亚洲av免费高清在线观看| 一个人看视频在线观看www免费| 国产成人免费观看mmmm| 乱系列少妇在线播放| 伦精品一区二区三区| 欧美日韩精品成人综合77777| 最后的刺客免费高清国语| 午夜免费观看性视频| 亚洲成人中文字幕在线播放| 99久久综合免费| 青春草视频在线免费观看| av播播在线观看一区| 国产成人免费无遮挡视频| 国产 一区 欧美 日韩| 男的添女的下面高潮视频| 综合色丁香网| 精品人妻一区二区三区麻豆| av网站免费在线观看视频| 91在线精品国自产拍蜜月| 国产成人精品一,二区| 国产精品偷伦视频观看了| 成人无遮挡网站| 在线观看免费视频网站a站| 成人黄色视频免费在线看| 最近手机中文字幕大全| 成人午夜精彩视频在线观看| 亚洲一级一片aⅴ在线观看| 在线免费观看不下载黄p国产| 亚洲成人av在线免费| 亚洲四区av| 国内揄拍国产精品人妻在线| 日韩成人av中文字幕在线观看| av在线app专区| 两个人的视频大全免费| 亚洲色图综合在线观看| 赤兔流量卡办理| 欧美bdsm另类| 99久国产av精品国产电影| 18+在线观看网站| 在线观看一区二区三区| 五月天丁香电影| 一个人看视频在线观看www免费| 亚洲国产精品专区欧美| 日韩亚洲欧美综合| 亚洲在久久综合| 各种免费的搞黄视频| 青春草国产在线视频| 波野结衣二区三区在线| 国产亚洲最大av| 乱码一卡2卡4卡精品| 欧美日韩视频精品一区| 五月天丁香电影| 女人久久www免费人成看片| 又粗又硬又长又爽又黄的视频| 蜜桃亚洲精品一区二区三区| 99视频精品全部免费 在线| 久久久精品94久久精品| 99热这里只有精品一区| 午夜福利在线观看免费完整高清在| 91久久精品国产一区二区三区| 精品99又大又爽又粗少妇毛片| 国产免费一级a男人的天堂| 国产精品爽爽va在线观看网站| 99热这里只有精品一区| 国产女主播在线喷水免费视频网站| 免费大片18禁| 又黄又爽又刺激的免费视频.| 蜜臀久久99精品久久宅男| 精品久久久久久久末码| av视频免费观看在线观看| 少妇被粗大猛烈的视频| 男人爽女人下面视频在线观看| 久久精品国产亚洲av涩爱| 亚洲自偷自拍三级| 嘟嘟电影网在线观看| 人妻夜夜爽99麻豆av| 国产av国产精品国产| 国产淫语在线视频| 亚州av有码| 国产 一区 欧美 日韩| 亚洲美女视频黄频| 久久精品国产亚洲网站| 美女脱内裤让男人舔精品视频| 伦理电影免费视频| 国产日韩欧美亚洲二区| 自拍偷自拍亚洲精品老妇| 我要看黄色一级片免费的| 在线精品无人区一区二区三 | 亚洲精品国产av成人精品| 国产精品99久久久久久久久| 亚洲自偷自拍三级| 欧美日韩亚洲高清精品| 亚洲av欧美aⅴ国产| 亚洲高清免费不卡视频| 国产精品不卡视频一区二区| 高清日韩中文字幕在线| 婷婷色av中文字幕| 两个人的视频大全免费| 毛片一级片免费看久久久久| 亚洲精华国产精华液的使用体验| 搡女人真爽免费视频火全软件| 亚洲精品成人av观看孕妇| 黑丝袜美女国产一区| 欧美日韩视频高清一区二区三区二| 亚洲人成网站高清观看| 久久精品国产自在天天线| 久久99热6这里只有精品| 久久精品人妻少妇| 亚洲欧美中文字幕日韩二区| 美女脱内裤让男人舔精品视频| 国产黄片视频在线免费观看| 亚洲,欧美,日韩| av一本久久久久| 大又大粗又爽又黄少妇毛片口| av免费在线看不卡| 国产欧美日韩一区二区三区在线 | 日本欧美国产在线视频| 精品国产露脸久久av麻豆| 少妇猛男粗大的猛烈进出视频| 人妻一区二区av| 亚洲精品国产成人久久av| 在线观看免费视频网站a站| 色吧在线观看| 亚洲精品乱码久久久v下载方式| freevideosex欧美| 简卡轻食公司| 永久网站在线| 能在线免费看毛片的网站| 五月开心婷婷网| 美女xxoo啪啪120秒动态图| 精品人妻一区二区三区麻豆| 少妇丰满av| 妹子高潮喷水视频| 一区二区三区精品91| 亚洲欧美一区二区三区国产| av在线蜜桃| 国内精品宾馆在线| 一级毛片黄色毛片免费观看视频| 毛片一级片免费看久久久久| 日韩,欧美,国产一区二区三区| 麻豆国产97在线/欧美| 精品一区二区三卡| 爱豆传媒免费全集在线观看| 乱码一卡2卡4卡精品| 菩萨蛮人人尽说江南好唐韦庄| 狠狠精品人妻久久久久久综合| 国产精品无大码| 超碰97精品在线观看| 欧美精品一区二区免费开放| 韩国高清视频一区二区三区| 中文字幕av成人在线电影| 下体分泌物呈黄色| 永久网站在线| 我要看黄色一级片免费的| 精品国产露脸久久av麻豆| 99久久综合免费| 三级经典国产精品| 亚洲成人手机| 一个人看的www免费观看视频| 久久韩国三级中文字幕| 五月开心婷婷网| av在线播放精品| 国产精品一区二区三区四区免费观看| 欧美一区二区亚洲| 91狼人影院| 欧美日韩视频高清一区二区三区二| h视频一区二区三区| 有码 亚洲区| 精品一品国产午夜福利视频| 自拍欧美九色日韩亚洲蝌蚪91 | 97精品久久久久久久久久精品| 边亲边吃奶的免费视频| 国产美女午夜福利| 欧美亚洲 丝袜 人妻 在线| 一级黄片播放器| 蜜臀久久99精品久久宅男| 大又大粗又爽又黄少妇毛片口| 精品久久久久久电影网| 内地一区二区视频在线| 最新中文字幕久久久久| 国产91av在线免费观看| 亚洲天堂av无毛| 嘟嘟电影网在线观看| 看非洲黑人一级黄片| 狠狠精品人妻久久久久久综合| 视频区图区小说| 日日啪夜夜爽| 亚洲精品乱久久久久久| 久久国产精品男人的天堂亚洲 | 99久久精品热视频| 中文字幕人妻熟人妻熟丝袜美| 色吧在线观看| 国产免费又黄又爽又色| 免费久久久久久久精品成人欧美视频 |