• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Combat utility prediction

    2016-12-27 01:08:07StanislasGABROVSEKIanCOLWILLEliasSTIPIDIS
    Defence Technology 2016年6期

    Stanislas GABROVSEK,Ian COLWILL,Elias STIPIDIS

    Vetronics Research Centre,University of Brighton,Lewes road,Brighton,UK

    Combat utility prediction

    Stanislas GABROVSEK*,Ian COLWILL,Elias STIPIDIS

    Vetronics Research Centre,University of Brighton,Lewes road,Brighton,UK

    The majority of allied casualties from recent conflicts were caused by blast wave and fragments perforation damage from Improvised Explosive Devices.Survivability to this type of threat is a critical factor to consider for land platform design.This paper proposes an original approach to platform survivability assessment using a combination ofAgent-Based(AB)simulation and FaultTreeAnalysis(FTA)to predict the consequences of IED fragment impacts on the platform operational status.As a demonstration,this approach is applied to the comparison of different platform architectures to gain insight into the optimisation of the platform component topology.

    Mission;Survivability;Simulation;Agent-based;Fault-tree analysis;Platform architecture

    1.Introduction

    Since 2001,Improvised Explosive Devices(IEDs)have been responsible for over 50%of the coalition soldiers’deaths,and IEDs dangerousness continues to intensify[1].IEDs are made of explosive material(typically discarded artillery ammunition) connected to a triggering system.The explosion of such a weapon generates blast wave(primary effect),fragments(secondary effect)and heat that interact with critical components or crew to incapacitate a platform.The interaction may be direct or indirect as in the case of Behind Armour Debris(BADs)generated by impacting fragments.

    Add-on solutions that offer increased protection from IED effects such as slat armour and anti-BAD liners exist,but further benefit can be achieved through optimisation of the platform architecture itself.Simulation tools are ideal for modelling and testing architecture topology improvements as part of the platform architecture design process.A wide range of vulnerability modelling and simulation tools are available,with approaches that each provides a specific level of insight. For example,war-gaming techniques provide exploitable insights regarding platform usage doctrine while Finite Element Analysis(FEA)provides detailed analysis of specific component resistance to perforation.

    This paper proposes an original approach to platform damage assessment analysis that can be applied from the fleet down to the component level,with benefits in terms of scalability,modularity and reusability of the developed models.Among other IED effects,this paper focuses mainly on the fragments’impacts on structures but the application of the approach to blast damage and shockwave transmission is also under study. Platform crew is not particularly considered either,while the method could be easily extended to human occupants,by considering appropriate fatality energy levels.As a demonstration of the benefits of this approach a comparison of different future platform architectures from their survivability to IED fragments point of view is presented.

    2.Background

    An existing standard for description of system vulnerability analysis is theVulnerability/Lethality(V/L)Taxonomy1[2]represented in Fig.1.Level 1 describes the initial state of thesystem before the attack.Level 2 describes the status of the components after the attack,with regard to the damage criteria. Level 3 describes the platform remaining capability at the functions level while level 4 describes the platform mission remaining effectiveness.Using a different terminology,the“platform incapacitation process”described in Ref.[3]refers to the same stages.

    Fig.1.The V/L taxonomy.

    2.1.Threat/target interactions prediction

    Three types of techniques are commonly used to predict the effects of a given threat on systems:

    1)Knowledge-based methods:this approach of survivability assessment is based on human estimation of damage resulting from empirical experiments or“after-action reviews”of enemy contact.This knowledge can then be implemented in“survivability tables”for simulation wargames[4]or in a database for survivability assessment expert-systems[5].

    2)Analytical methods:in this approach,the physical reality of the battlefield damage is described by mathematical formulas.Mathematical equations are essentially correlations with experimental data(e.g.THOR equations). Semi-empirical equations are simplified models of physical phenomena[6].Both empirical and semi-empirical approaches are used extensively in vulnerability and technical-operational studies[2].Analytical methods are usually coupled with target geometry ray-tracing analysis to determine which parts of the system have been hit by the threat[7].

    3)Numerical methods:this approach uses subdivision to model macro level problems using numerous small domains (nodes)with individualsolutions (Finite Element Analysis).Then,numerical techniques are used to find approximate solutions to each node.FEA provides improved accuracy at the component level,but requires detailed information about the structure to be modelled and is computationally intensive[8].

    2.2.Damage assessment criteria

    As depicted in chapter 1,platform components(including crew)can be damaged by different types of weapon effects. This paper considers the damage due to Kinetic Energy(KE) projectiles such as bullets and fragments.Possible metrics to estimate the kill probability Pk of a component after damage are reviewed in Ref.[9](Table 1).As detailed information regarding component kill probability is often classified,there is little publically available data.Piecemeal information on criti-cal levels of deposited energy was found in Refs.[10](Table 2) and[11](Table 3).Some data about critical levels of impact energy per area unit were found in Ref.[12](Table 4).

    Table 1 Possible metrics for kill criteria when a component is hit by KE projectiles of fragments[9].

    Table 3 Critical levels of deposited energy for platforms[11].

    2.3.Combat utility estimation

    The ability of a vehicle to successfully perform its mission is called the mission survivability[13],or combat utility[2].It is based on the different capabilities of the platform and its crewwhich are typically categorised as mobility,firepower,C4ISR2Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance.and protection.The combat utility of the platform is reduced if any of these capabilities are lost or degraded due to damage to the vehicle or crew(platform susceptibility3The probability of being hit.and recoverability4The probability of restoring mission capability through reconfiguration or repair.aspects are not considered here).So doing,most of the combat utility prediction techniques are based on:

    Table 4 Critical levels of energy per area unit[12].

    Fig.2.Examples of deactivation,RBD and FT diagrams of a DC power supply.

    1)A list of individual equipment or subsystems critical to the operation of the platform capabilities(Standard Damage Assessment List).

    2)The results of the criticality analysis,as a series of logic diagrams that present the contribution of critical components to the different platform capabilities.

    There are three major formalisms for these logic diagrams, which are illustrated in the simple example of Fig.2.

    1)Deactivation diagrams present the operational relationship between critical components and each capability.As long as an unbroken path can be traced through the diagram,no platform capability has been lost[2].

    2)Reliability Block Diagrams(RBD)represent the critical subsystems or components connected according to their function or reliability relationship.They are“mission success”oriented[14].

    3)Fault Trees(FT)show which combinations of the components failures will result in a system failure.It is composed of a Top Event(TE)that represents the most undesired event and lower level logical“AND”and“OR”gates or Basic Events(BE)that define the combinations of components failures leading to the occurrence of the TE[15].

    2.4.Existing work

    While existing implementations of the Agent Based(AB) approach for modelling battlefield complexity are numerous, existing applications that assess vulnerability at the component level are rare.In Ref.[16],anAB approach is used to model the effect of an anti-tank projectile on an AFV.Provided results generally concur with experimental data,but unfortunately no information is given about component damage assessment and no extension to the platform and fleet level vulnerability level is described.A similar approach is used in Ref.[17]to model the BAD generated by a missile explosion close to a military aircraft fuselage.The focus is the relative accuracy of the BAD modelling,but without considering the damage they create on components.

    3.Combat utility prediction methodology

    In order to predict the impact of IED fragments on platform combat utility,we use a combination of two techniques(Fig.3):

    1)Agent-Based modelling is used to simulate the threatplatform interactions,as agents are well adapted to model battlefield complexity,meaning that with a large number of elements in interaction.The“deposited energy criteria”(chapter 0)is used to estimate the damage(probabilities of kill)on individual components.

    2)Probabilities of kill of individual components are used in the platform combat utility Fault-Tree to determine how the platform capabilities have been affected by the threat and the probability to perform the mission.

    3.1.Agent-Based modelling of the threat–target interactions

    This approach uses agents to model the physical representation of objects such as IEDs,fragments and platform components with a 3D space.In contrast to the existing attempts in thisdomain,this work aims to generalise the AB approach to every level of the battlefield(fleet down to component),with expected improvements in terms of:

    Fig.3.Graphic illustration of the modelling approach.

    1)Abstraction range,from the component survivability level up to the system of system survivability.

    2)Arbitraryandappropriate level of fidelity from acommon approach.

    3)Modularity,by favouring the development of ready-touse threats,components and platforms libraries.

    Agent properties describe critical(in terms of the simulation) dimensions of its existence.For example,at a given instant a fragment agent is described by its position,mass and velocity.

    Internally the agents implement appropriate empirical and semi-empirical methods to describe their behaviour and interaction with other agents.Four types of agents are used to represent the problem(Fig.4):

    1)An IED agent models the threat and the characteristics of the fragments that are generated by the explosion.

    2)Fragment agents model all the fragments.Some of them are going to impact the target.

    3)Component agents represent the platform components, with geometric and material characteristics attached.

    4)Collision agents are used to detect the position and the angle of incidences of fragment impacts on the platform components.

    3.1.1.IED agent model

    Upon detonation the IED generates a number of Fragment agents with initial parameters that depend on the IED characteristics.For fragmentation,Mott’s formula(1)generates the average fragment mass,considering the explosive and case parameters,leading to consider a certain number of fragments. Held’s formula(2)provides prediction of the distribution of fragments size and mass,while Gurney’s formula(3)predicts the initial velocity of fragments.

    Fig.4.The way the 4 types of agents interact in the model.

    n:Fragments number,beginning with the heaviest.

    B:Empirical constant(≈10-2),function of

    λ:Empirical constant(≈2/3)

    M:IED body mass(kg)

    3.1.2.Fragment agent model

    Fragment agents emanate radially from the IED agent and follow straight trajectories(gravity can be neglected for lowmass/high-speed fragments).Fragment agent velocity is calculated from an initial velocity and transmission medium (typically air)using the drag force equation(4).

    ρfragment shape,1.5 for cubic shape) :Air density(≈1.2 kg/m3)

    l:Fragment distance to explosion(m)

    Real experiments[18]have shown that initial velocity is slightly different according to the fragment initial position (Fig.5)and projection angle(Fig.6)because of the common cylindrical shape of the IED casing,which would not be the case for an ideal semi-spherical casing.But the consideration of individual fragment initial position makes the equations much more complex without significant benefits in terms of fidelity of the prediction.For simplification reasons,this phenomenon is not consideredinthe current research.So,the fragment velocity is considered as uniform inside the solid angle of influence of the IED(Fig.6).

    In the event of collision with a Collision agent,the Fragment agent transmits some of its energy to the Collision agent impactedandadaptsitsvelocityandmassaccordingtotheresult ofthecollision computation,considering fourpossible situations described in Table 5 and two fragment velocity thresholds:

    Fig.5.Variation of fragment initial velocity as a function of its initial position for a 105 mm shell IED[18]and simplification considered in the current research(blue plot).

    1)The ballistic limit velocity,under which the projectile does not perforate the target,

    2)The shattering limit velocity,over which the target shatters into multiple Behind Armour Debris.

    The ballistic limit velocity is approximated using the Brown equation(5)from Ref.[2]while the shattering limit velocity (Table 6)is based on experimental results related in Refs.[20] and[21].

    h:Target thickness(cm)

    m:Fragment mass(grams)

    θ:Angle of impact(rad)

    γ:Empirical constant(0.327 for RHA steel,-0.361 for Aluminium 2024)

    Eventhoughthesefoursimplecasesgloballyreflectthedifferent mechanismsobservedduringprojectilepenetration[2],theydonot consider more complex phenomena(e.g.projectile erosion).

    As mentioned in chapter 3,deposited energy is the criterion used to estimate the damage to individual components.This iscalculated by considering the different distributions of the projectile kinetic energy detailed in Table 8.

    Fig.6.Example of fragment velocity versus projection angle for 105 mm and 155 mm shell IEDs[19]and estimation considered in the current research(blue plot).

    Table 5 The 4 impact situations considered.

    Table 6 Shattering limit velocities according to different sources.

    Table 7 Empirical constants of the target material[2].

    In case of target material shattering(Fig.7),the number of generated BADs is estimated on the base of experimental data [22]approximated by the empirical formula(6),assuming that the BADs are all the same mass.

    Table 8 Distribution of the projectile kinetic energy versus different impact situations.

    Fig.7.Model of the BAD generation process.

    Finally,BADs spray is characterized by a maximal angle calculated in equation(7).Individual BAD velocity is calculated with equation(8)with angular deviation following a Weibull distribution,according to Ref.[20](Fig.8).

    C:Stress wave speed in target(m.s-1,4.61.103for steel)

    Fig.8.Direction of the BAD spray.

    θ:Angle of debris with the normal(rad)

    3.1.3.Component agent model

    As a compromise between complex computation and the targeted level of fidelity,components’geometries are bounded with Axis-Aligned Bounding Boxes(cuboids).For cylindrical and complex-shaped components like wheels or pipes,this approximation leads to slightly overestimate the probability of a hit,which is not the case for other platform components,most often cuboid.Components are also assumed to be hollow in order to support typical platform nested components configurations(Fig.9).Hardness and thickness parameters are attached to every component to calculate the fragment impact situation as developed in chapter 3.1.2).

    3.1.4.Collision agent model

    Collisions between fragments and components are usually detected using ray-tracing techniques[7,23].In order to maintain the agent modelling approach of encapsulating functionality and subsequent problem scalability,our approach uses Collision agents which are generated at the surface of component agents to detect impacts through efficient agent 3D proximity algorithms.This approach allows the collision detection resolution,and consequently the range of the combat utility prediction,to be controlled by the number and size of collision agents without changing the methodology(Fig.10).

    Fig.9.Example of nested components configuration.

    Fig.10.Different Collision agents(transparent boxes)according to the level of survivability analysis.

    3.2.Fault-Tree analysis

    We use the Fault-Tree diagram formalism presented in chapter 0 to model the system-under-study architecture(whatever level it is)and the way components contribute to every capability of the system.The Top Event(TE)of the Fault Tree diagram is the system mission failure,meaning the total loss of the platform combat utility.Basic Events(BA)are represented by the physical components of the system,using the same breakdown developed in the agent-based model of the system. So,there is direct correspondence between the Component agents in the AB model and the Basic Events used in the FTA, as illustrated in Fig.11.

    Probabilities individual component kills generated by the AB model are used as failure rates for the Basic Events.During the simulation and fragments impacts,failure rates are updated and propagated through the system capabilities up to the top of the Fault-Tree.Note that only static Fault-Tree mechanisms have been implemented at this stage and so-doing sequential relationships among component failures or components recovery modes are not possible.Implementation of Dynamic Fault Tree description has been identified as a possible future development of the method.

    4.Validation

    While basic information regarding principles and technologies developed to improve system survivability can be found in open literature,defence system vulnerability information and particularly experimental results remain highly restricted, significantly complicating the validation of modelling and simulation approaches.The approach used here is to partly validate the models with piecemeal information available on components vulnerability,and to compare the results obtained at the component level with other available simulation results.

    For individual component vulnerability assessment,various simulation runs of this model with varying projectile-threat configurations have been conducted and analysed in Ref.[24]. Fig.12 shows an example of such a configuration and results obtained(angular dispersion of BADs).

    A set of platform configurations has been tested for vulnerability in Ref.[24],with positive results.Fig.13 is an example of results obtained when exposing a simple platform to IED fragments.Energy absorbed predictions match with the type of damage reported in after-action feedbacks[1]and other modelling methods[16].

    Fig.11.Example of system breakdown into Component agents(left)and FTA basic events(right).Only the observation sub-system capability branch is developed here.

    Fig.12.Example of individual components configuration tested in[24]and results obtained(angular dispersion of BADs)compared to the reality.

    Validation is confirmed as the predicted energy accumulated by individual components was comparable to those observed in real world experiments,proving appropriate implementation of the equations.Further validation requires that the high sensitivity of the results to slight changes in the target parameters, especially the shatter limit velocity of which estimation is further investigated.

    On the basis of these preliminary conclusions,further investigations on more complex platform configurations were conducted.

    5.Implementation and results

    The modelling approach is implemented in Anylogic software and is applied to the assessment of the influence of platform architecture modularity on mission survivability.

    Initially,three different architecture concepts were defined, on the basis of an original approach of platform modularity (chapter 5.1).The FaultTreeAnalysis of these architectures led to preliminary conclusions about their respective intrinsic vulnerability(chapters 5.2.5,5.3.5 and 5.4.5).

    Fig.13.Example of platform configuration tested in[24]and results obtained.Dashed lines represent the critical absorbed energy levels leading to light damages, from Tables 2 and 3.

    The architecture options were modelled using the approach presented and were exposed to a HE105 M1 shell IED threat. Predictions of combat utility resulting from numerous runs were compared and analysed(chapter 5.5).

    5.1.Platform modularity

    A platform architecture intended for reconnaissance mission (no offensive capabilities)is described in terms of three axes:

    1)The mechanical architecture,of which roles are:

    -To insure the contact of the platform with the ground, providing suspension,power transmission,braking and steering capabilities.

    -To provide the mechanical mountings for every platform component.

    -To protect the platform inner components and crew from external aggression.

    2)The energy(or power)architecture,of which roles are:

    -To generate the necessary electric energy for powering the platform components.

    -To distribute the electric energy in the platform.

    -To transform the electric energy into the mechanical energy required for motion.

    3)The C4I(or vetronic)architecture,of which roles are:

    -To support the data communications between the UGV and its remote command and control station(e.g. HF radio transmitter).

    -To acquire all the information required by the remote operation(e.g.driving camera)and by the mission(e.g.tactical awareness camera mounted on a turret).

    -To process the information on-board to facilitate its transmission or its interpretation by the distant UGV operator(e.g.video compression software running on an embedded computer).

    -To support the exchange of data between the platform components(e.g.CAN utility data bus).

    A module is defined as a component of a larger system that operates within this system independently from the operations of the other components.Modularity is a set of properties that support that independence of operations[25].

    We make the assumption that an architecture design is purely modular or purely monolithic,whereas in reality a more graduated degree of modularity is likely.

    This leads to the definition of 23=8 possible designs described in Table 9.Three architectures were selected for further survivability investigations,as the most representative of current design options for military land platforms:

    1)The “monolithic”platform isthemostcommon architecture in low-range land systems:functions are supported by unique and dedicated components that cannot reconfigure.Some components support multiple functions.

    2)The“digitalised”platform represents the current trend in land systems architectures.Digitalnetworking of components and intelligent power management allow implementing redundancy mechanisms to improve the system availability.

    Fig.14.Illustration of monolithic mechanical architecture with example of existing implementation(Amstaff UGV-Isra?l).

    3)The“extreme modular”platform is an illustration of a possible future modular platform,made of identical modules that can re-arrange autonomously.

    5.2.“Monolithic”platform concept

    Most of the legacy low-range civil and military vehicles are based on this design concept.It is also a usual type of design for disposable UGVs as it is reliable and relatively not expensive to produce(Fig.14).

    5.2.1.Mechanical architecture

    The chassis is a solid case mostly made of rigidly assembled parts.Optional parts such as the observation turret can be temporarily mounted.In the implementation(Fig.14),the contact with ground is insured by a 2×3 wheel and rubber tyre configuration.It is assumed that a damaged wheel is ripped off the platform and does not hamper the remaining wheels. Change of direction is affected by skid-steering.Steering is therefore reliant upon two operational wheel trains.

    5.2.2.Power architecture

    Propulsion energy is provided by a single battery that supplies the motors via a dual Motor Controller Unit(MCU).This unit receives commands from the ECU via an I2C data link. Two mechanical transmissions transmit motor torque to the left and right side drive wheels.Another battery is used to supply the C4I equipment(Fig.15).

    5.2.3.C4I architecture

    A radio receiver unit receives control signals and in turn sends command frames to the ECU.The ECU checks the integrity of the frames and generates commands to be sent to the appropriate equipment through dedicated point-to-point links. Analogue images are acquired by the 2 cameras and compressed by the ECU before being sent to the radio.Additional sensor data(compass,GPS,battery charge)are formatted bythe ECU and transmitted to the radio for communication to the remote control station(Fig.16).

    Fig.15.Illustration of the monolithic power architecture design.

    Table 9 The same platform with various modularity considered.Architectures investigated are shaded in grey.

    5.2.4.Damage assessment Agent-Based model

    As explained in chapter 3.1.3,platform components agents geometries are modelled as cuboids.These cuboids are positioned in the 3D model according to their position in the platform as shown in Fig.17.Agent parameters are set according to the different materials and thicknesses of components cases. Components colours refer to the mechanical(grey),power(red) and C4I architectures(blue)they belong to.

    5.2.5.Combat utility Fault-Tree model

    Fig.16.Illustration of a monolithic C4I architecture design.

    Fig.17.Geometry and position of Component agents in the damage assessment model of the monolithic platform.

    The least desirable event(Top Event)is the platform mission withdrawal,which can result from mobility(propulsion/ steering),observation or communication function failures as shown in Fig.18.These intermediate events have been refined down to the component level as explained in chapter 3.2.

    Once the fault tree diagram of the system has been defined, minimal cut sets can be used to understand the structural vulnerability of the system.Cut sets are defined as the unique combinations of component failures that can cause the topevent to occur.Specifically,a cut set is said to be a Minimal Cut Set(MCS)when any basic event is removed from the set,the remaining events are no longer a cut set.The minimal cut sets can be seen as“critical paths”leading to the mission failure. The order of the cut set is the length of the path that leads to the undesirable event.So,the order of the MCS reflects the vulnerability of the whole system.

    The results of the calculation of the MCS for the“Monolithic”architecture are summarised in Table 10.An important observation is that 8 single different components failures(cut sets of order 1)lead to mission failure,which makes the monolithic architecture intrinsically vulnerable to any damage to its components.

    5.3.“Digitalised”platform concept

    The second design modelled is named“Digitalised Platform”.Many current AFVs in development are based on this architecture,and a lotofeffortis focussed on the standardisation of the mechanical,power and vetronics interfaces(NGVA,Victory[26])with expected benefits in terms of development,operation,maintenance and upgrade costs.

    5.3.1.Mechanical architecture

    The chassis is not fundamentally different from the monolithic mechanical architecture.The only difference is the con-sequence of the higher number of inner components that significantly increases the volume of the body,offering a larger apparent surface to fragments.

    Table 10 Minimal cut sets for the monolithic architecture platform.

    5.3.2.Power architecture

    Two energy sources deliver electric energy required by the platform components.The energy is produced and stored on-board by micro-generators combined with batteries or fuel cells.Power redundancy is provided through dual power circuits,providing a dual redundant supply for all equipment. Power management for improved silent watch and intelligent power balance can be realised by a dedicated computer(Energy Management Unit)and monitoring capability in all electrical consumers.Wheels are direct-driven by individual electric motors which are controlled by individual control devices (Fig.19).

    5.3.3.C4I architecture

    The electronic architecture of the digitalised platform is organised around 2 communications buses.The utility bus is dedicated to the platform command and control while the multimedia bus is dedicated to video data communications.Possible technologies for the utility bus are CAN and MilCAN standards,while multimedia communications can be supported by Gigabit Ethernet technology(Fig.20).

    Fig.18.Possible causes of the platform mission withdrawal(first level of the FT only).

    Fig.19.Illustration of the digitalised power architecture design.

    In a normal mode,control and command information is received from the HF radio and transmitted to ECU1 and ECU2 through the utility bus.ECU1 and ECU2 operate in a parallel redundancy mode.Command frames are decoded,integrity is checked and appropriate data frames are sent to the motor controllers to affect mobility according to command laws and sensors feedback.The 2 digital cameras transmit compressed video frames on the multimedia data bus to the ECUs and the VHF radio transmitter(wireless video link).

    If the HF radio transmitter gets damaged,control and command frames can still be sent through theVHF radio transmitter.If the VHF radio transmitter is damaged,low-data-rate pictures can be sent after compression by the ECUs to the remote station via the HF radio transmitter.

    5.3.4.Damage assessment Agent-Based model

    The assumption is made that the motor controllers are mounted next to the motors they control.The space between each pair of motors is used to install the computer units and the batteries.The individual equipment size is the same as for the monolithic architecture(Fig.21).

    5.3.5.Combat utility Fault-Tree model

    The minimal cut sets(MCS)analysis yields the events described in Table 11.The minimal cut sets order has been set to 2 to limit the size of the table.The results provide the following insights:

    1)There is only one MCS event of order 1(EMU damaged), making the EMU component very critical in the digitalised architecture.

    2)The criticality of the mechanical components(no MCS≤2) has been transferred to the vetronic architecture.

    3)Digital utility and multimedia networking support redundancies between vetronic components(MCS=2).

    Table 11 Minimal cut sets(limited to order 2)for the digitalised architecture platform.

    5.4.“Extreme modular”platform concept

    This“extreme modular”platform architecture is made of several modules that each provide a set common critical capabilities.This means that they are able to re-arrange themselves depending on the mission to realize and according to their current operational status.Specialised sensors and actuators can be mounted on the modules through a generic interface. This is a futuristic architecture as the required technologies are not all available yet.Some partial implementations exist (Fig.22).

    5.4.1.Mechanical architecture

    The platform chassis is made of identical modules that mount together with quick link interfaces.These modules can be arranged before the mission according to different configurations,or they can replace each other dynamically in case of module failure.Links between modules can be rigid or flexible, acting as articulations or dampers.

    5.4.2.Power architecture

    Each module is able to provide its own energy as well as energy to adjacent modules if required regardless of module organisation.Power transmission between the modules is insured by dedicated power plugs of different sides of the module.

    5.4.3.C4I architecture

    All modules communicate via redundant data networks. Connections with sensors and actuators mounted on modules are insured by multiple pins connectors.In case of connector damage,information and power are transmitted by remaining operational sockets(Fig.23).

    Fig.20.Illustration of a digitalised C4I architecture design.

    Fig.21.Geometry and position of Component agents in the damage assessment model of the digitalised platform.

    5.4.4.Damage assessment Agent-Based model

    To be able to compare the survivability of the three architectures,equipment size must remain the same,as well as the platform dimensions.Battery size is divided by the number of modules to still have the same UGV range.A drawback of the modularity is the multiplication of components and a particular effort has to be put on the integration of these components into the modules as shown in Fig.24.

    5.4.5.Combat utility Fault-Tree model

    Fig.22.Illustration of“extreme modular”architecture and example of existing implementation(Roburoc UGV from Robosoft,France).

    Fig.23.Illustration of the“extreme modular”C4I and power architecture design.

    Fig.24.Geometry and position of Component agents in the damage assessment model of the“extreme modular”platform.

    In the“extreme modular”architecture fault tree decomposition,we assume that the mechanical modules have been configured before the mission and they cannot reconfigure in response to damage.This ignores a substantial expected benefit from this“extreme”modular architecture and highlights a limitation of the static fault-tree analysis approach that does not support sequential relationships among component failures. Consequently,some additional assumptions had to be introduced to simulate the re-configurability of the architecture:

    1)Two batteries are enough to supply the rest of the architecture in energy in recovery mode,so that the mission can still be completed,

    2)A minimum of three wheels are necessary to preserve mobility.We make the assumption that the modules can reconfigure if the undamaged wheels are all on one side.

    3)Two operational modules are enough to move and steer the rest of the platform.

    4)The observation camera is mounted on the top of one of the modules while the driving video is always provided by the front module camera.

    5)One ECU and one radio can support the data processing and communications for the whole platform in a recovery mode.

    Analysis revealed no MCS of order less than four(Table 12). The modularity and reconfiguration capabilities of the platform dictate that a minimum of four components(wheels)need to be simultaneously damaged to foil the mission.

    5.5.Combat utility prediction

    The FTA of the three platform designs provides a means to compare the intrinsic vulnerability of the architectures.As expected,the“extreme modular”architecture is more resilient to individual internal components failures.

    Table 12 Total number of MCS per order for the“extreme modular”architecture.

    Fig.25.Top view of the target-threat(“extreme modular”)configuration att=to+2.6 ms.

    Considering external threats, the MCS calculated from FTA is not a sufficient reflection of the platform survivability,as FTA does not consider the platform design nor the way the platform components interact together to reinforce(BADs generation)or to mitigate(shield effect)the threat.

    In order to get a more valid estimation of their relative vulnerability to IEDs,we applied the combat utility assessment approach described in chapter 3 to the three platform concepts described in chapters 5.2,5.3 and 5.4.They were exposed to the same representative IED threat(HE 105 M1 IED)in the configuration of Fig.25.Fig.26 is a 3D view of the IED fragments impacting the platform.

    For each platform concept,a set of 50 simulation runs (Monte-Carlo analysis)with the same target and threat configuration and fragment Weibullangulardistribution resulted in the individual components kill probabilities presented in Figs.27–29.Error brackets correspond to the standard deviation for each probability of kill.

    We can observe that:

    1)The most impacted parts are the left wheels and the motors driver modules(~50%of kill probability),as they are the most exposed to fragments.

    2)Predictions of the wheels kill probabilities do not vary in the three platform concepts,as the same components are used.

    The real-time injection of these individual probabilities of kill in every architecture fault-tree(see Fig.30)provides additional results regarding the robustness of the architectures to individual components failures.

    Fig.31 synthesizes the capabilities and combat utility predictions for the three concepts under study.

    It can be observed that:

    1)The“extreme modular”architecture is three times less vulnerable to the IED fragments than the“monolithic”architecture in terms of damage causing mission failure, highlighting the potential of modular architecture design for survivability.

    2)The mobility capability is the most sensitive to the IED fragments for all architecture concepts,indicating thatparticular effortshould be placed on the design of this function,in this particular IED-threat configuration

    Fig.26.Example of 3D view of the IED fragments impacts on the“monolithic”architecture at t=to+11.5 ms.Penetrating collisions are coloured in red,BAD impacts are coloured in orange.

    Fig.27.Probabilities of the“monolithic”architecture components for being killed by IED fragments.

    6.Conclusion and future work

    IEDs will remain one of the most lethal threats to future land engagements while existing defensive aids are not sufficient enough to fully protect the vehicle,crew and equipment.Meanwhile,the optimisation of the internal platform design remains a critical factor in limiting the impact of IEDs effects on the platform combat utility.

    The modelling and simulation approach described in this paper first aims to predict the damage caused by primary and secondary fragments impacts on internal platform components.

    ThisAgent-Based method has been validated on elementary plates by comparison with existing experimental results or other simulation techniques predictions.

    In a second step and as a demonstration,the approach was applied to the comparison of combat utility of three representative types of platform designs,by injecting component damage into the fault-tree diagrams of the architectures.

    Fig.28.Probabilities of the“digitalized”architecture components for being killed by IED fragments.

    Fig.29.Probabilities of the“extreme modular”architecture components for being killed by IED fragments.

    Fig.30.Animated Fault-Tree diagram for the“monolithic”architecture focused on probabilities of right and left propulsion failures.Other functions are masked for clarity.

    Fig.31.Prediction of capability and combat utility failure probabilities for the 3 architectures tested.

    In this case,results obtained show the benefit of modularity (threetimesmoresurvivablecomparedtothesamplemonolithic architecture)without considering dynamic reconfiguration capabilities that are expected to further increase survivability.

    This application also demonstrates the scalability,modularity and reusability of the developed approaches to vulnerability assessment.This approach enables the rapid generation of quantitative results describing platform combat utility.

    Future work will consider the thorough analysis of the vulnerability of modular platform,the modelling of IED blast effect and shockwave damage due to components mechanical interfaces as well as platform reconfiguration capabilities through Dynamic Fault-Tree implementation in the modelling environment.

    [1]Centre de Doctrine d’Emploi des Forces.La lutte contre les engins explosifs improvisés.Les cahiers du retex 2010.

    [2]Deitz PH,Reed HL,Klopcic JT,Walbert JN.Fundamentals of ground combat system ballistic vulnerability/lethality.Progress in astronautics and aeronautics.Arlington:American Institute of Aeronautics and Astronautics;2009.

    [3]Gavril F.A synthesis of methods for simulating vulnerability of armored vehicles.Naval Res Logistics 1995;42:247–65.

    [4]Kennedy E.A short report on the manual wargaming of three UGV concepts issued from previous FGMC studies,UK MOD/DSTL, Technical Report 2009.

    [5]Helfman RA,Saccenti JC,Kinsler RE,Suckling JR.An expert system for predicting component kill probabilities.Aberdeen(MD):1985.

    [6]Ackland K,Buckland M,Thorn V,Van der Schaaf P.A review of battle damageprediction and vulnerability reduction methods,DefenceScience and Technology Organisation,Victoria,Australia,Public report DSTO-GD-0620;2010.

    [7]Hou Y,Wang K,Jin T.A simulation system of ship vulnerability to fragment damage.J Inf Comput Sci 2014;11(12):4415–25.

    [8]MannJ,FisherD,KrausM,LowndesE,YorkA.Ananalysisofengagement algorithms for real-time weapons effects.JDMS 2006;3(3):189–201.

    [9]Hartmann M.Component kill criteria,Defence&Security,Systems and technology,FOI,Swedish Defence Research Agency,SE-164 90 Stockholm,FOI-R-2829-SE;2009.

    [10]Singh VP,Singh Y.Generalised model for aircraft vulnerability by different weapon systems.Def Sci J 2000;50:12–23.

    [11]Hall J.In:United States Naval Academy,editor.Principles of naval weapons systems.Dubuque(IA):Kendall/Hunt;2000.

    [12]Colwill I,Gabrovsek S,Webber T,Watts I,Duncan A,Diskett D,et al. Super-hardened unmanned ground vehicle,Vetronics Research Centre, Brighton,UK,Technical Report RT/COM/4/5008;2012.

    [13]Schofield J.Survivability assessment from concept to operational support, Qinetiq,Fife,Technical report Qinetiq/09/00063;2009.

    [14]Distefano S,Puliafito A.Dynamic reliability block diagramsVS Dynamic fault trees.In:Reliability and maintainability symposium,2007.RAMS‘07.Annual.Orlando:2007.

    [15]Lee WS,Grosh DL,Tillman FA,Lie CH.Fault tree analysis,methods, and applications–a review.IEEE Trans Reliab 1985;34(3):194–202.

    [16]Chen Y,Xiao S,Song H,Zhang Y.Agent based modelling of the equipment battle damage.J Comput 2013;8(2):334–40.

    [17]Bova MJ,Ciarallo FW,Hill RR.Development of an agent-based model for the secondary threat resulting from a ballistic impact event.J Simulat 2015;10(1):24–35.

    [18]Zecevic B,Terzic J,Catovic A,Kadic S.Characterization of distribution parameters of fragment mass and number for conventional projectiles. New Trends in Research of Energetic Materials;December 2011.

    [19]Hazell PJ.Armour materials,theory and design.New York(NY):CRC Press;2015.

    [20]Verolme JL.Behind-armour debris modelling for high-velocity fragment impact(part2),TNO,PML 1997;1997.

    [21]Rosenberg Z,Dekel E.In:Springer,editor.Terminal ballistics.Haifa, Israel:Springer;2012.

    [22]Baillargeon Y,Dinovitzer A.Modelling of behind-armour debris with the DeCaM software package,Weapons Effects Section–DRDC–Valcartier, Courcelette,Canada,Technical Report 5070C-2.FR;2004.

    [23]Roybal LG,Jeffers RF,McGillivary KE,Paul TD,Jacobson R.Modelling and simulating blast effects on electric substations.In:IEEE international conference on technologies for homeland security.Boston(MA):2009.p. 351–7.

    [24]Gabrovsek S,Colwill I,Stipidis E.Agents-Based Simulation of improvised explosive device fragment damage on individual components. JDMS 2016;13(4):399–413.

    [25]Nelson EM.Open architectures technical principles and guidelines V1.5.8,IBM Federal CTO Office,Technical Report 2008.

    [26]Hee YS,Phoon KK,Ang JY.Interoperable open architecture for land platforms.DSTA 2013.

    Received 26 June 2016;revised 23 September 2016;accepted 10 October 2016 Available online 24 October 2016

    Peer review under responsibility of China Ordnance Society.

    *Corresponding author.Tel.:+33687146672.

    E-mail address:s.gabrovsek@vetronics.org(S.GABROVSEK).

    1There is a close mapping between the V/L taxonomy levels and the more complex Missions and Means Framework(MMF)extensively used in military operations research analysis.

    http://dx.doi.org/10.1016/j.dt.2016.10.002

    2214-9147/?2016 The Authors.Production and hosting by Elsevier B.V.on behalf of China Ordnance Society.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/).

    ?2016 The Authors.Production and hosting by Elsevier B.V.on behalf of China Ordnance Society.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/).

    我的女老师完整版在线观看| 精品国内亚洲2022精品成人| 欧美日韩综合久久久久久| 日日啪夜夜撸| 97在线视频观看| 18禁裸乳无遮挡免费网站照片| 如何舔出高潮| 日日摸夜夜添夜夜添av毛片| 国产精品福利在线免费观看| 午夜亚洲福利在线播放| 蜜桃亚洲精品一区二区三区| 亚洲性久久影院| 22中文网久久字幕| 麻豆国产97在线/欧美| 午夜老司机福利剧场| 别揉我奶头 嗯啊视频| 九草在线视频观看| 美女主播在线视频| 观看美女的网站| 麻豆精品久久久久久蜜桃| 久久久精品免费免费高清| 寂寞人妻少妇视频99o| 国产精品国产三级国产av玫瑰| 欧美成人a在线观看| 国产v大片淫在线免费观看| 91狼人影院| 婷婷色麻豆天堂久久| 国国产精品蜜臀av免费| 天堂俺去俺来也www色官网 | 1000部很黄的大片| 久久精品综合一区二区三区| 非洲黑人性xxxx精品又粗又长| 久久精品熟女亚洲av麻豆精品 | 69av精品久久久久久| 99热这里只有是精品在线观看| 亚洲人成网站在线观看播放| 亚洲精品日韩在线中文字幕| 综合色丁香网| 干丝袜人妻中文字幕| 亚洲国产日韩欧美精品在线观看| 日本色播在线视频| 性插视频无遮挡在线免费观看| 中文字幕亚洲精品专区| 一边亲一边摸免费视频| 高清欧美精品videossex| 日韩欧美国产在线观看| 国产老妇女一区| 日韩制服骚丝袜av| 毛片女人毛片| 久久精品熟女亚洲av麻豆精品 | 97热精品久久久久久| 别揉我奶头 嗯啊视频| 国产成人freesex在线| 亚洲国产精品sss在线观看| 久久综合国产亚洲精品| 亚洲av不卡在线观看| 不卡视频在线观看欧美| 久久久成人免费电影| 国产精品久久久久久av不卡| 欧美一级a爱片免费观看看| 身体一侧抽搐| 欧美另类一区| 欧美丝袜亚洲另类| 99re6热这里在线精品视频| 街头女战士在线观看网站| 中国国产av一级| 97精品久久久久久久久久精品| 成人午夜精彩视频在线观看| 国产乱人视频| 综合色av麻豆| 免费看av在线观看网站| 欧美最新免费一区二区三区| 久久久国产一区二区| 在线免费十八禁| 国产伦精品一区二区三区四那| 国内少妇人妻偷人精品xxx网站| 床上黄色一级片| 国产人妻一区二区三区在| 美女被艹到高潮喷水动态| 国内少妇人妻偷人精品xxx网站| 久久久久久国产a免费观看| 精品一区二区三区视频在线| 人人妻人人看人人澡| 午夜福利在线在线| 免费观看无遮挡的男女| 国产色爽女视频免费观看| 永久网站在线| 国产亚洲最大av| 99热这里只有是精品在线观看| 国产成人一区二区在线| 亚洲av成人精品一二三区| 午夜老司机福利剧场| 一级爰片在线观看| 中文天堂在线官网| 国产黄片视频在线免费观看| av黄色大香蕉| 国产高潮美女av| 夫妻午夜视频| a级毛色黄片| 熟妇人妻久久中文字幕3abv| 久久久久久伊人网av| 99久久精品国产国产毛片| 免费少妇av软件| 国产爱豆传媒在线观看| 校园人妻丝袜中文字幕| 免费黄频网站在线观看国产| 男人舔奶头视频| 亚洲av电影在线观看一区二区三区 | 国产精品女同一区二区软件| 高清毛片免费看| 国产精品一区二区在线观看99 | 国产69精品久久久久777片| 尾随美女入室| 日本wwww免费看| 2021少妇久久久久久久久久久| 联通29元200g的流量卡| 美女大奶头视频| 嫩草影院入口| 国产免费又黄又爽又色| 久久99精品国语久久久| 亚洲国产最新在线播放| 18+在线观看网站| 少妇人妻一区二区三区视频| 最近手机中文字幕大全| 在线播放无遮挡| 欧美bdsm另类| 午夜免费激情av| 成人欧美大片| 日本色播在线视频| 好男人在线观看高清免费视频| 小蜜桃在线观看免费完整版高清| 搡女人真爽免费视频火全软件| 亚洲国产最新在线播放| 国产欧美日韩精品一区二区| 91av网一区二区| 六月丁香七月| a级一级毛片免费在线观看| 久久99精品国语久久久| 春色校园在线视频观看| 高清视频免费观看一区二区 | 国产探花在线观看一区二区| 97人妻精品一区二区三区麻豆| 欧美zozozo另类| 国产大屁股一区二区在线视频| av在线蜜桃| 国产高清国产精品国产三级 | 久久精品国产亚洲网站| av天堂中文字幕网| 国产亚洲最大av| 成人亚洲精品av一区二区| av福利片在线观看| 久久久精品欧美日韩精品| 女的被弄到高潮叫床怎么办| 三级国产精品欧美在线观看| 两个人视频免费观看高清| 天堂影院成人在线观看| 日韩人妻高清精品专区| 丰满少妇做爰视频| 亚洲性久久影院| 精品一区二区免费观看| 久久人人爽人人片av| 免费大片黄手机在线观看| 国产 亚洲一区二区三区 | 精品欧美国产一区二区三| 国产伦精品一区二区三区四那| 国产三级在线视频| 午夜精品在线福利| 久久久久国产网址| 丰满乱子伦码专区| 日日啪夜夜爽| 国产精品国产三级专区第一集| 久久97久久精品| 国产高清三级在线| 国产av在哪里看| 日日干狠狠操夜夜爽| 极品少妇高潮喷水抽搐| 日日啪夜夜撸| 18禁在线无遮挡免费观看视频| 免费观看精品视频网站| 亚洲成人精品中文字幕电影| 国产精品熟女久久久久浪| 日韩电影二区| 91aial.com中文字幕在线观看| 精品久久久久久久末码| 97超碰精品成人国产| 伊人久久精品亚洲午夜| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国产中年淑女户外野战色| 亚洲无线观看免费| 亚洲国产精品专区欧美| 久久国内精品自在自线图片| 国产精品人妻久久久久久| 久久精品夜夜夜夜夜久久蜜豆| 国产精品熟女久久久久浪| 尾随美女入室| 国产成人精品婷婷| 亚洲av在线观看美女高潮| 1000部很黄的大片| 欧美xxxx黑人xx丫x性爽| 午夜精品一区二区三区免费看| 久久久亚洲精品成人影院| 午夜亚洲福利在线播放| 联通29元200g的流量卡| 亚洲精品日韩av片在线观看| 男人爽女人下面视频在线观看| 午夜免费观看性视频| 日本午夜av视频| 亚洲精品国产av成人精品| 免费人成在线观看视频色| 国产精品福利在线免费观看| 麻豆成人午夜福利视频| 色综合色国产| 国产精品三级大全| 晚上一个人看的免费电影| 九九在线视频观看精品| 一级毛片久久久久久久久女| 亚洲人成网站高清观看| 亚洲欧美精品专区久久| 在现免费观看毛片| 亚洲最大成人中文| 亚洲内射少妇av| 国产91av在线免费观看| 蜜臀久久99精品久久宅男| 最后的刺客免费高清国语| 少妇的逼水好多| 日本午夜av视频| 老司机影院成人| 欧美人与善性xxx| 久久久久久伊人网av| 男人爽女人下面视频在线观看| 18+在线观看网站| 日本色播在线视频| 国产精品嫩草影院av在线观看| kizo精华| 亚洲自偷自拍三级| 亚洲美女搞黄在线观看| 少妇人妻一区二区三区视频| 亚洲精品第二区| h日本视频在线播放| 国产亚洲午夜精品一区二区久久 | 亚洲成人av在线免费| 激情 狠狠 欧美| 天堂影院成人在线观看| 日韩精品有码人妻一区| 免费看av在线观看网站| 亚洲av国产av综合av卡| 亚洲精品日本国产第一区| 国产白丝娇喘喷水9色精品| 国国产精品蜜臀av免费| 精品一区二区三卡| 最近最新中文字幕免费大全7| 免费看av在线观看网站| 我的老师免费观看完整版| 亚洲aⅴ乱码一区二区在线播放| 国产在线男女| av又黄又爽大尺度在线免费看| 国产v大片淫在线免费观看| 国内少妇人妻偷人精品xxx网站| 国产成人a∨麻豆精品| 少妇的逼水好多| 免费不卡的大黄色大毛片视频在线观看 | 大香蕉久久网| 少妇裸体淫交视频免费看高清| 成人综合一区亚洲| 国产 亚洲一区二区三区 | 美女高潮的动态| 麻豆久久精品国产亚洲av| 丝袜美腿在线中文| 日韩国内少妇激情av| 久久久久久久午夜电影| 青春草视频在线免费观看| 九九久久精品国产亚洲av麻豆| 建设人人有责人人尽责人人享有的 | 能在线免费观看的黄片| 1000部很黄的大片| 午夜精品在线福利| 欧美三级亚洲精品| 亚洲高清免费不卡视频| 欧美不卡视频在线免费观看| 国产黄片视频在线免费观看| 内射极品少妇av片p| 国产一区二区亚洲精品在线观看| 日韩电影二区| 久久人人爽人人爽人人片va| 国产高清三级在线| 亚洲精品乱久久久久久| 尤物成人国产欧美一区二区三区| 久久这里只有精品中国| 午夜福利成人在线免费观看| 哪个播放器可以免费观看大片| 国产美女午夜福利| 国产精品综合久久久久久久免费| 成年人午夜在线观看视频 | 国产黄片视频在线免费观看| 99re6热这里在线精品视频| a级毛片免费高清观看在线播放| 最近最新中文字幕大全电影3| 最新中文字幕久久久久| 中文字幕亚洲精品专区| eeuss影院久久| 久久99热6这里只有精品| 欧美精品一区二区大全| 亚洲国产精品成人久久小说| 欧美三级亚洲精品| 毛片女人毛片| 亚洲欧美一区二区三区黑人 | 午夜日本视频在线| 97精品久久久久久久久久精品| 日本黄大片高清| 两个人视频免费观看高清| 日韩成人伦理影院| 听说在线观看完整版免费高清| 联通29元200g的流量卡| 2018国产大陆天天弄谢| 夜夜爽夜夜爽视频| 国产亚洲91精品色在线| 精品久久久噜噜| 我的女老师完整版在线观看| 老女人水多毛片| 国内揄拍国产精品人妻在线| 97精品久久久久久久久久精品| h日本视频在线播放| 久久精品久久久久久噜噜老黄| 三级男女做爰猛烈吃奶摸视频| 国产男人的电影天堂91| 国产精品熟女久久久久浪| 少妇的逼水好多| 国产亚洲5aaaaa淫片| 美女内射精品一级片tv| 亚洲人成网站高清观看| 男女边摸边吃奶| 99九九线精品视频在线观看视频| 亚洲一区高清亚洲精品| 女人久久www免费人成看片| 亚洲18禁久久av| 美女高潮的动态| 天堂中文最新版在线下载 | 精品久久久久久久末码| 成人亚洲欧美一区二区av| 毛片一级片免费看久久久久| 99久久九九国产精品国产免费| 日本爱情动作片www.在线观看| 久久综合国产亚洲精品| 日韩国内少妇激情av| 综合色丁香网| www.av在线官网国产| 日本av手机在线免费观看| 成人综合一区亚洲| 日韩av免费高清视频| 最近最新中文字幕大全电影3| 日韩不卡一区二区三区视频在线| 直男gayav资源| 亚洲国产av新网站| 中文字幕人妻熟人妻熟丝袜美| 99久久精品热视频| 乱码一卡2卡4卡精品| 99久久精品热视频| 观看免费一级毛片| 日日撸夜夜添| 一级爰片在线观看| 色哟哟·www| 欧美潮喷喷水| 日韩强制内射视频| 麻豆成人av视频| 亚洲av一区综合| 伦精品一区二区三区| 青青草视频在线视频观看| 国产伦理片在线播放av一区| 亚洲av一区综合| 一个人看视频在线观看www免费| 天美传媒精品一区二区| 国产毛片a区久久久久| 一二三四中文在线观看免费高清| 看免费成人av毛片| 亚洲高清免费不卡视频| 精品熟女少妇av免费看| 国产精品一区www在线观看| 国产免费一级a男人的天堂| 亚洲精品日本国产第一区| 国产高潮美女av| 亚洲成人久久爱视频| 在线观看av片永久免费下载| 建设人人有责人人尽责人人享有的 | 国产v大片淫在线免费观看| 精华霜和精华液先用哪个| 特大巨黑吊av在线直播| 国内揄拍国产精品人妻在线| 老师上课跳d突然被开到最大视频| 高清日韩中文字幕在线| 午夜精品一区二区三区免费看| 一级片'在线观看视频| 美女被艹到高潮喷水动态| 久久久精品94久久精品| 久久久久久久久久成人| 丝袜美腿在线中文| 高清午夜精品一区二区三区| av女优亚洲男人天堂| 日韩av不卡免费在线播放| 在线免费观看不下载黄p国产| 亚洲精品视频女| 麻豆精品久久久久久蜜桃| 91aial.com中文字幕在线观看| 国产精品久久久久久久久免| 亚洲怡红院男人天堂| 亚洲天堂国产精品一区在线| 亚洲国产欧美在线一区| 久久久欧美国产精品| 欧美性猛交╳xxx乱大交人| 99re6热这里在线精品视频| 啦啦啦中文免费视频观看日本| www.av在线官网国产| 亚洲婷婷狠狠爱综合网| 亚洲av日韩在线播放| 国产精品一区www在线观看| 午夜日本视频在线| 如何舔出高潮| 高清日韩中文字幕在线| 国产欧美日韩精品一区二区| 欧美一区二区亚洲| 精品酒店卫生间| 美女内射精品一级片tv| 身体一侧抽搐| 免费在线观看成人毛片| 久久99蜜桃精品久久| 中文字幕亚洲精品专区| 美女黄网站色视频| 80岁老熟妇乱子伦牲交| 国产黄片视频在线免费观看| 大陆偷拍与自拍| 在线 av 中文字幕| 久久99精品国语久久久| 九九爱精品视频在线观看| 最近最新中文字幕免费大全7| 日韩视频在线欧美| 欧美性感艳星| 网址你懂的国产日韩在线| 一级毛片我不卡| 永久免费av网站大全| 非洲黑人性xxxx精品又粗又长| 国产一区二区三区av在线| 熟妇人妻不卡中文字幕| 国产一区亚洲一区在线观看| 人人妻人人看人人澡| 一夜夜www| 久久久久久久久久久免费av| 男人和女人高潮做爰伦理| 亚洲精品自拍成人| 午夜精品国产一区二区电影 | 久久久精品欧美日韩精品| 日本熟妇午夜| 亚洲综合精品二区| 男人舔奶头视频| 99久国产av精品| 亚洲国产精品专区欧美| 99久久精品一区二区三区| 超碰av人人做人人爽久久| 久久久久久久久久久免费av| 亚洲精品日本国产第一区| 亚洲真实伦在线观看| 亚洲人成网站在线播| 亚洲精品乱久久久久久| 亚洲欧美成人精品一区二区| 日日干狠狠操夜夜爽| 免费大片黄手机在线观看| 性色avwww在线观看| 成人毛片a级毛片在线播放| 三级国产精品片| 在线观看一区二区三区| 国产高清三级在线| 国产高清国产精品国产三级 | 亚洲性久久影院| 天天躁日日操中文字幕| 亚洲欧美一区二区三区黑人 | 日韩大片免费观看网站| 日韩欧美一区视频在线观看 | 免费观看在线日韩| 三级毛片av免费| 五月伊人婷婷丁香| 日本一本二区三区精品| 亚洲av电影在线观看一区二区三区 | 欧美日韩一区二区视频在线观看视频在线 | 精品久久久久久久末码| 欧美精品一区二区大全| 91精品国产九色| 免费电影在线观看免费观看| 久久久欧美国产精品| or卡值多少钱| 国产亚洲精品av在线| 国产男人的电影天堂91| 91久久精品国产一区二区成人| 一个人看视频在线观看www免费| 一夜夜www| 久久久久国产网址| 一个人观看的视频www高清免费观看| 国产探花极品一区二区| 午夜亚洲福利在线播放| 高清视频免费观看一区二区 | 天堂影院成人在线观看| 美女国产视频在线观看| 精品99又大又爽又粗少妇毛片| 免费观看a级毛片全部| 午夜精品国产一区二区电影 | 国产精品女同一区二区软件| 美女脱内裤让男人舔精品视频| 少妇人妻精品综合一区二区| 久久精品久久久久久噜噜老黄| 黄色欧美视频在线观看| 午夜亚洲福利在线播放| 日本-黄色视频高清免费观看| 99热这里只有是精品在线观看| www.色视频.com| a级一级毛片免费在线观看| 欧美zozozo另类| 纵有疾风起免费观看全集完整版 | 亚洲乱码一区二区免费版| 蜜桃久久精品国产亚洲av| 国产成人福利小说| 久久久久免费精品人妻一区二区| 一级二级三级毛片免费看| 国产伦一二天堂av在线观看| 插阴视频在线观看视频| 日韩人妻高清精品专区| 国产黄色视频一区二区在线观看| 国产永久视频网站| 特大巨黑吊av在线直播| 床上黄色一级片| 国产成人精品福利久久| 久99久视频精品免费| 五月伊人婷婷丁香| 一级毛片aaaaaa免费看小| 91在线精品国自产拍蜜月| 亚洲av日韩在线播放| 国产v大片淫在线免费观看| 国产男人的电影天堂91| 免费大片黄手机在线观看| 国产淫片久久久久久久久| 精品久久久久久久久亚洲| 夜夜爽夜夜爽视频| 欧美zozozo另类| 国内少妇人妻偷人精品xxx网站| 精品久久久久久成人av| a级毛片免费高清观看在线播放| 一个人看的www免费观看视频| 久久精品夜色国产| 久久久久久久久大av| 中文资源天堂在线| 最近手机中文字幕大全| 精品人妻视频免费看| 又黄又爽又刺激的免费视频.| 久久综合国产亚洲精品| 国内精品美女久久久久久| 女的被弄到高潮叫床怎么办| 一级a做视频免费观看| 女人久久www免费人成看片| 亚洲人与动物交配视频| 美女国产视频在线观看| 伦精品一区二区三区| 五月天丁香电影| 久久久久精品久久久久真实原创| 午夜视频国产福利| 能在线免费看毛片的网站| av播播在线观看一区| 国产免费又黄又爽又色| 卡戴珊不雅视频在线播放| 午夜日本视频在线| 丝袜喷水一区| 久久99热这里只频精品6学生| 三级国产精品欧美在线观看| 亚洲久久久久久中文字幕| a级毛片免费高清观看在线播放| 大陆偷拍与自拍| 亚洲一区高清亚洲精品| 国产国拍精品亚洲av在线观看| 网址你懂的国产日韩在线| 麻豆乱淫一区二区| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 大香蕉久久网| 秋霞在线观看毛片| 国产一区亚洲一区在线观看| 欧美不卡视频在线免费观看| 少妇熟女欧美另类| 亚洲av免费在线观看| 人妻制服诱惑在线中文字幕| 久久精品夜色国产| 免费不卡的大黄色大毛片视频在线观看 | 久久人人爽人人爽人人片va| 免费无遮挡裸体视频| 三级国产精品片| 国产男人的电影天堂91| 亚洲成色77777| 啦啦啦啦在线视频资源| 精品久久久久久久久av| 老司机影院毛片| 亚洲成人一二三区av| 一级片'在线观看视频| 欧美最新免费一区二区三区| 干丝袜人妻中文字幕| 精品久久国产蜜桃| 九九在线视频观看精品| 中文字幕制服av| 国产精品爽爽va在线观看网站| 成年女人看的毛片在线观看| 99热这里只有精品一区| 18禁在线播放成人免费| 精品一区二区三区人妻视频| 别揉我奶头 嗯啊视频| 日本免费a在线| 久久热精品热| 十八禁国产超污无遮挡网站| 国产av国产精品国产| 免费高清在线观看视频在线观看| 欧美一级a爱片免费观看看| 亚洲婷婷狠狠爱综合网| 91av网一区二区| kizo精华|