• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Combat utility prediction

    2016-12-27 01:08:07StanislasGABROVSEKIanCOLWILLEliasSTIPIDIS
    Defence Technology 2016年6期

    Stanislas GABROVSEK,Ian COLWILL,Elias STIPIDIS

    Vetronics Research Centre,University of Brighton,Lewes road,Brighton,UK

    Combat utility prediction

    Stanislas GABROVSEK*,Ian COLWILL,Elias STIPIDIS

    Vetronics Research Centre,University of Brighton,Lewes road,Brighton,UK

    The majority of allied casualties from recent conflicts were caused by blast wave and fragments perforation damage from Improvised Explosive Devices.Survivability to this type of threat is a critical factor to consider for land platform design.This paper proposes an original approach to platform survivability assessment using a combination ofAgent-Based(AB)simulation and FaultTreeAnalysis(FTA)to predict the consequences of IED fragment impacts on the platform operational status.As a demonstration,this approach is applied to the comparison of different platform architectures to gain insight into the optimisation of the platform component topology.

    Mission;Survivability;Simulation;Agent-based;Fault-tree analysis;Platform architecture

    1.Introduction

    Since 2001,Improvised Explosive Devices(IEDs)have been responsible for over 50%of the coalition soldiers’deaths,and IEDs dangerousness continues to intensify[1].IEDs are made of explosive material(typically discarded artillery ammunition) connected to a triggering system.The explosion of such a weapon generates blast wave(primary effect),fragments(secondary effect)and heat that interact with critical components or crew to incapacitate a platform.The interaction may be direct or indirect as in the case of Behind Armour Debris(BADs)generated by impacting fragments.

    Add-on solutions that offer increased protection from IED effects such as slat armour and anti-BAD liners exist,but further benefit can be achieved through optimisation of the platform architecture itself.Simulation tools are ideal for modelling and testing architecture topology improvements as part of the platform architecture design process.A wide range of vulnerability modelling and simulation tools are available,with approaches that each provides a specific level of insight. For example,war-gaming techniques provide exploitable insights regarding platform usage doctrine while Finite Element Analysis(FEA)provides detailed analysis of specific component resistance to perforation.

    This paper proposes an original approach to platform damage assessment analysis that can be applied from the fleet down to the component level,with benefits in terms of scalability,modularity and reusability of the developed models.Among other IED effects,this paper focuses mainly on the fragments’impacts on structures but the application of the approach to blast damage and shockwave transmission is also under study. Platform crew is not particularly considered either,while the method could be easily extended to human occupants,by considering appropriate fatality energy levels.As a demonstration of the benefits of this approach a comparison of different future platform architectures from their survivability to IED fragments point of view is presented.

    2.Background

    An existing standard for description of system vulnerability analysis is theVulnerability/Lethality(V/L)Taxonomy1[2]represented in Fig.1.Level 1 describes the initial state of thesystem before the attack.Level 2 describes the status of the components after the attack,with regard to the damage criteria. Level 3 describes the platform remaining capability at the functions level while level 4 describes the platform mission remaining effectiveness.Using a different terminology,the“platform incapacitation process”described in Ref.[3]refers to the same stages.

    Fig.1.The V/L taxonomy.

    2.1.Threat/target interactions prediction

    Three types of techniques are commonly used to predict the effects of a given threat on systems:

    1)Knowledge-based methods:this approach of survivability assessment is based on human estimation of damage resulting from empirical experiments or“after-action reviews”of enemy contact.This knowledge can then be implemented in“survivability tables”for simulation wargames[4]or in a database for survivability assessment expert-systems[5].

    2)Analytical methods:in this approach,the physical reality of the battlefield damage is described by mathematical formulas.Mathematical equations are essentially correlations with experimental data(e.g.THOR equations). Semi-empirical equations are simplified models of physical phenomena[6].Both empirical and semi-empirical approaches are used extensively in vulnerability and technical-operational studies[2].Analytical methods are usually coupled with target geometry ray-tracing analysis to determine which parts of the system have been hit by the threat[7].

    3)Numerical methods:this approach uses subdivision to model macro level problems using numerous small domains (nodes)with individualsolutions (Finite Element Analysis).Then,numerical techniques are used to find approximate solutions to each node.FEA provides improved accuracy at the component level,but requires detailed information about the structure to be modelled and is computationally intensive[8].

    2.2.Damage assessment criteria

    As depicted in chapter 1,platform components(including crew)can be damaged by different types of weapon effects. This paper considers the damage due to Kinetic Energy(KE) projectiles such as bullets and fragments.Possible metrics to estimate the kill probability Pk of a component after damage are reviewed in Ref.[9](Table 1).As detailed information regarding component kill probability is often classified,there is little publically available data.Piecemeal information on criti-cal levels of deposited energy was found in Refs.[10](Table 2) and[11](Table 3).Some data about critical levels of impact energy per area unit were found in Ref.[12](Table 4).

    Table 1 Possible metrics for kill criteria when a component is hit by KE projectiles of fragments[9].

    Table 3 Critical levels of deposited energy for platforms[11].

    2.3.Combat utility estimation

    The ability of a vehicle to successfully perform its mission is called the mission survivability[13],or combat utility[2].It is based on the different capabilities of the platform and its crewwhich are typically categorised as mobility,firepower,C4ISR2Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance.and protection.The combat utility of the platform is reduced if any of these capabilities are lost or degraded due to damage to the vehicle or crew(platform susceptibility3The probability of being hit.and recoverability4The probability of restoring mission capability through reconfiguration or repair.aspects are not considered here).So doing,most of the combat utility prediction techniques are based on:

    Table 4 Critical levels of energy per area unit[12].

    Fig.2.Examples of deactivation,RBD and FT diagrams of a DC power supply.

    1)A list of individual equipment or subsystems critical to the operation of the platform capabilities(Standard Damage Assessment List).

    2)The results of the criticality analysis,as a series of logic diagrams that present the contribution of critical components to the different platform capabilities.

    There are three major formalisms for these logic diagrams, which are illustrated in the simple example of Fig.2.

    1)Deactivation diagrams present the operational relationship between critical components and each capability.As long as an unbroken path can be traced through the diagram,no platform capability has been lost[2].

    2)Reliability Block Diagrams(RBD)represent the critical subsystems or components connected according to their function or reliability relationship.They are“mission success”oriented[14].

    3)Fault Trees(FT)show which combinations of the components failures will result in a system failure.It is composed of a Top Event(TE)that represents the most undesired event and lower level logical“AND”and“OR”gates or Basic Events(BE)that define the combinations of components failures leading to the occurrence of the TE[15].

    2.4.Existing work

    While existing implementations of the Agent Based(AB) approach for modelling battlefield complexity are numerous, existing applications that assess vulnerability at the component level are rare.In Ref.[16],anAB approach is used to model the effect of an anti-tank projectile on an AFV.Provided results generally concur with experimental data,but unfortunately no information is given about component damage assessment and no extension to the platform and fleet level vulnerability level is described.A similar approach is used in Ref.[17]to model the BAD generated by a missile explosion close to a military aircraft fuselage.The focus is the relative accuracy of the BAD modelling,but without considering the damage they create on components.

    3.Combat utility prediction methodology

    In order to predict the impact of IED fragments on platform combat utility,we use a combination of two techniques(Fig.3):

    1)Agent-Based modelling is used to simulate the threatplatform interactions,as agents are well adapted to model battlefield complexity,meaning that with a large number of elements in interaction.The“deposited energy criteria”(chapter 0)is used to estimate the damage(probabilities of kill)on individual components.

    2)Probabilities of kill of individual components are used in the platform combat utility Fault-Tree to determine how the platform capabilities have been affected by the threat and the probability to perform the mission.

    3.1.Agent-Based modelling of the threat–target interactions

    This approach uses agents to model the physical representation of objects such as IEDs,fragments and platform components with a 3D space.In contrast to the existing attempts in thisdomain,this work aims to generalise the AB approach to every level of the battlefield(fleet down to component),with expected improvements in terms of:

    Fig.3.Graphic illustration of the modelling approach.

    1)Abstraction range,from the component survivability level up to the system of system survivability.

    2)Arbitraryandappropriate level of fidelity from acommon approach.

    3)Modularity,by favouring the development of ready-touse threats,components and platforms libraries.

    Agent properties describe critical(in terms of the simulation) dimensions of its existence.For example,at a given instant a fragment agent is described by its position,mass and velocity.

    Internally the agents implement appropriate empirical and semi-empirical methods to describe their behaviour and interaction with other agents.Four types of agents are used to represent the problem(Fig.4):

    1)An IED agent models the threat and the characteristics of the fragments that are generated by the explosion.

    2)Fragment agents model all the fragments.Some of them are going to impact the target.

    3)Component agents represent the platform components, with geometric and material characteristics attached.

    4)Collision agents are used to detect the position and the angle of incidences of fragment impacts on the platform components.

    3.1.1.IED agent model

    Upon detonation the IED generates a number of Fragment agents with initial parameters that depend on the IED characteristics.For fragmentation,Mott’s formula(1)generates the average fragment mass,considering the explosive and case parameters,leading to consider a certain number of fragments. Held’s formula(2)provides prediction of the distribution of fragments size and mass,while Gurney’s formula(3)predicts the initial velocity of fragments.

    Fig.4.The way the 4 types of agents interact in the model.

    n:Fragments number,beginning with the heaviest.

    B:Empirical constant(≈10-2),function of

    λ:Empirical constant(≈2/3)

    M:IED body mass(kg)

    3.1.2.Fragment agent model

    Fragment agents emanate radially from the IED agent and follow straight trajectories(gravity can be neglected for lowmass/high-speed fragments).Fragment agent velocity is calculated from an initial velocity and transmission medium (typically air)using the drag force equation(4).

    ρfragment shape,1.5 for cubic shape) :Air density(≈1.2 kg/m3)

    l:Fragment distance to explosion(m)

    Real experiments[18]have shown that initial velocity is slightly different according to the fragment initial position (Fig.5)and projection angle(Fig.6)because of the common cylindrical shape of the IED casing,which would not be the case for an ideal semi-spherical casing.But the consideration of individual fragment initial position makes the equations much more complex without significant benefits in terms of fidelity of the prediction.For simplification reasons,this phenomenon is not consideredinthe current research.So,the fragment velocity is considered as uniform inside the solid angle of influence of the IED(Fig.6).

    In the event of collision with a Collision agent,the Fragment agent transmits some of its energy to the Collision agent impactedandadaptsitsvelocityandmassaccordingtotheresult ofthecollision computation,considering fourpossible situations described in Table 5 and two fragment velocity thresholds:

    Fig.5.Variation of fragment initial velocity as a function of its initial position for a 105 mm shell IED[18]and simplification considered in the current research(blue plot).

    1)The ballistic limit velocity,under which the projectile does not perforate the target,

    2)The shattering limit velocity,over which the target shatters into multiple Behind Armour Debris.

    The ballistic limit velocity is approximated using the Brown equation(5)from Ref.[2]while the shattering limit velocity (Table 6)is based on experimental results related in Refs.[20] and[21].

    h:Target thickness(cm)

    m:Fragment mass(grams)

    θ:Angle of impact(rad)

    γ:Empirical constant(0.327 for RHA steel,-0.361 for Aluminium 2024)

    Eventhoughthesefoursimplecasesgloballyreflectthedifferent mechanismsobservedduringprojectilepenetration[2],theydonot consider more complex phenomena(e.g.projectile erosion).

    As mentioned in chapter 3,deposited energy is the criterion used to estimate the damage to individual components.This iscalculated by considering the different distributions of the projectile kinetic energy detailed in Table 8.

    Fig.6.Example of fragment velocity versus projection angle for 105 mm and 155 mm shell IEDs[19]and estimation considered in the current research(blue plot).

    Table 5 The 4 impact situations considered.

    Table 6 Shattering limit velocities according to different sources.

    Table 7 Empirical constants of the target material[2].

    In case of target material shattering(Fig.7),the number of generated BADs is estimated on the base of experimental data [22]approximated by the empirical formula(6),assuming that the BADs are all the same mass.

    Table 8 Distribution of the projectile kinetic energy versus different impact situations.

    Fig.7.Model of the BAD generation process.

    Finally,BADs spray is characterized by a maximal angle calculated in equation(7).Individual BAD velocity is calculated with equation(8)with angular deviation following a Weibull distribution,according to Ref.[20](Fig.8).

    C:Stress wave speed in target(m.s-1,4.61.103for steel)

    Fig.8.Direction of the BAD spray.

    θ:Angle of debris with the normal(rad)

    3.1.3.Component agent model

    As a compromise between complex computation and the targeted level of fidelity,components’geometries are bounded with Axis-Aligned Bounding Boxes(cuboids).For cylindrical and complex-shaped components like wheels or pipes,this approximation leads to slightly overestimate the probability of a hit,which is not the case for other platform components,most often cuboid.Components are also assumed to be hollow in order to support typical platform nested components configurations(Fig.9).Hardness and thickness parameters are attached to every component to calculate the fragment impact situation as developed in chapter 3.1.2).

    3.1.4.Collision agent model

    Collisions between fragments and components are usually detected using ray-tracing techniques[7,23].In order to maintain the agent modelling approach of encapsulating functionality and subsequent problem scalability,our approach uses Collision agents which are generated at the surface of component agents to detect impacts through efficient agent 3D proximity algorithms.This approach allows the collision detection resolution,and consequently the range of the combat utility prediction,to be controlled by the number and size of collision agents without changing the methodology(Fig.10).

    Fig.9.Example of nested components configuration.

    Fig.10.Different Collision agents(transparent boxes)according to the level of survivability analysis.

    3.2.Fault-Tree analysis

    We use the Fault-Tree diagram formalism presented in chapter 0 to model the system-under-study architecture(whatever level it is)and the way components contribute to every capability of the system.The Top Event(TE)of the Fault Tree diagram is the system mission failure,meaning the total loss of the platform combat utility.Basic Events(BA)are represented by the physical components of the system,using the same breakdown developed in the agent-based model of the system. So,there is direct correspondence between the Component agents in the AB model and the Basic Events used in the FTA, as illustrated in Fig.11.

    Probabilities individual component kills generated by the AB model are used as failure rates for the Basic Events.During the simulation and fragments impacts,failure rates are updated and propagated through the system capabilities up to the top of the Fault-Tree.Note that only static Fault-Tree mechanisms have been implemented at this stage and so-doing sequential relationships among component failures or components recovery modes are not possible.Implementation of Dynamic Fault Tree description has been identified as a possible future development of the method.

    4.Validation

    While basic information regarding principles and technologies developed to improve system survivability can be found in open literature,defence system vulnerability information and particularly experimental results remain highly restricted, significantly complicating the validation of modelling and simulation approaches.The approach used here is to partly validate the models with piecemeal information available on components vulnerability,and to compare the results obtained at the component level with other available simulation results.

    For individual component vulnerability assessment,various simulation runs of this model with varying projectile-threat configurations have been conducted and analysed in Ref.[24]. Fig.12 shows an example of such a configuration and results obtained(angular dispersion of BADs).

    A set of platform configurations has been tested for vulnerability in Ref.[24],with positive results.Fig.13 is an example of results obtained when exposing a simple platform to IED fragments.Energy absorbed predictions match with the type of damage reported in after-action feedbacks[1]and other modelling methods[16].

    Fig.11.Example of system breakdown into Component agents(left)and FTA basic events(right).Only the observation sub-system capability branch is developed here.

    Fig.12.Example of individual components configuration tested in[24]and results obtained(angular dispersion of BADs)compared to the reality.

    Validation is confirmed as the predicted energy accumulated by individual components was comparable to those observed in real world experiments,proving appropriate implementation of the equations.Further validation requires that the high sensitivity of the results to slight changes in the target parameters, especially the shatter limit velocity of which estimation is further investigated.

    On the basis of these preliminary conclusions,further investigations on more complex platform configurations were conducted.

    5.Implementation and results

    The modelling approach is implemented in Anylogic software and is applied to the assessment of the influence of platform architecture modularity on mission survivability.

    Initially,three different architecture concepts were defined, on the basis of an original approach of platform modularity (chapter 5.1).The FaultTreeAnalysis of these architectures led to preliminary conclusions about their respective intrinsic vulnerability(chapters 5.2.5,5.3.5 and 5.4.5).

    Fig.13.Example of platform configuration tested in[24]and results obtained.Dashed lines represent the critical absorbed energy levels leading to light damages, from Tables 2 and 3.

    The architecture options were modelled using the approach presented and were exposed to a HE105 M1 shell IED threat. Predictions of combat utility resulting from numerous runs were compared and analysed(chapter 5.5).

    5.1.Platform modularity

    A platform architecture intended for reconnaissance mission (no offensive capabilities)is described in terms of three axes:

    1)The mechanical architecture,of which roles are:

    -To insure the contact of the platform with the ground, providing suspension,power transmission,braking and steering capabilities.

    -To provide the mechanical mountings for every platform component.

    -To protect the platform inner components and crew from external aggression.

    2)The energy(or power)architecture,of which roles are:

    -To generate the necessary electric energy for powering the platform components.

    -To distribute the electric energy in the platform.

    -To transform the electric energy into the mechanical energy required for motion.

    3)The C4I(or vetronic)architecture,of which roles are:

    -To support the data communications between the UGV and its remote command and control station(e.g. HF radio transmitter).

    -To acquire all the information required by the remote operation(e.g.driving camera)and by the mission(e.g.tactical awareness camera mounted on a turret).

    -To process the information on-board to facilitate its transmission or its interpretation by the distant UGV operator(e.g.video compression software running on an embedded computer).

    -To support the exchange of data between the platform components(e.g.CAN utility data bus).

    A module is defined as a component of a larger system that operates within this system independently from the operations of the other components.Modularity is a set of properties that support that independence of operations[25].

    We make the assumption that an architecture design is purely modular or purely monolithic,whereas in reality a more graduated degree of modularity is likely.

    This leads to the definition of 23=8 possible designs described in Table 9.Three architectures were selected for further survivability investigations,as the most representative of current design options for military land platforms:

    1)The “monolithic”platform isthemostcommon architecture in low-range land systems:functions are supported by unique and dedicated components that cannot reconfigure.Some components support multiple functions.

    2)The“digitalised”platform represents the current trend in land systems architectures.Digitalnetworking of components and intelligent power management allow implementing redundancy mechanisms to improve the system availability.

    Fig.14.Illustration of monolithic mechanical architecture with example of existing implementation(Amstaff UGV-Isra?l).

    3)The“extreme modular”platform is an illustration of a possible future modular platform,made of identical modules that can re-arrange autonomously.

    5.2.“Monolithic”platform concept

    Most of the legacy low-range civil and military vehicles are based on this design concept.It is also a usual type of design for disposable UGVs as it is reliable and relatively not expensive to produce(Fig.14).

    5.2.1.Mechanical architecture

    The chassis is a solid case mostly made of rigidly assembled parts.Optional parts such as the observation turret can be temporarily mounted.In the implementation(Fig.14),the contact with ground is insured by a 2×3 wheel and rubber tyre configuration.It is assumed that a damaged wheel is ripped off the platform and does not hamper the remaining wheels. Change of direction is affected by skid-steering.Steering is therefore reliant upon two operational wheel trains.

    5.2.2.Power architecture

    Propulsion energy is provided by a single battery that supplies the motors via a dual Motor Controller Unit(MCU).This unit receives commands from the ECU via an I2C data link. Two mechanical transmissions transmit motor torque to the left and right side drive wheels.Another battery is used to supply the C4I equipment(Fig.15).

    5.2.3.C4I architecture

    A radio receiver unit receives control signals and in turn sends command frames to the ECU.The ECU checks the integrity of the frames and generates commands to be sent to the appropriate equipment through dedicated point-to-point links. Analogue images are acquired by the 2 cameras and compressed by the ECU before being sent to the radio.Additional sensor data(compass,GPS,battery charge)are formatted bythe ECU and transmitted to the radio for communication to the remote control station(Fig.16).

    Fig.15.Illustration of the monolithic power architecture design.

    Table 9 The same platform with various modularity considered.Architectures investigated are shaded in grey.

    5.2.4.Damage assessment Agent-Based model

    As explained in chapter 3.1.3,platform components agents geometries are modelled as cuboids.These cuboids are positioned in the 3D model according to their position in the platform as shown in Fig.17.Agent parameters are set according to the different materials and thicknesses of components cases. Components colours refer to the mechanical(grey),power(red) and C4I architectures(blue)they belong to.

    5.2.5.Combat utility Fault-Tree model

    Fig.16.Illustration of a monolithic C4I architecture design.

    Fig.17.Geometry and position of Component agents in the damage assessment model of the monolithic platform.

    The least desirable event(Top Event)is the platform mission withdrawal,which can result from mobility(propulsion/ steering),observation or communication function failures as shown in Fig.18.These intermediate events have been refined down to the component level as explained in chapter 3.2.

    Once the fault tree diagram of the system has been defined, minimal cut sets can be used to understand the structural vulnerability of the system.Cut sets are defined as the unique combinations of component failures that can cause the topevent to occur.Specifically,a cut set is said to be a Minimal Cut Set(MCS)when any basic event is removed from the set,the remaining events are no longer a cut set.The minimal cut sets can be seen as“critical paths”leading to the mission failure. The order of the cut set is the length of the path that leads to the undesirable event.So,the order of the MCS reflects the vulnerability of the whole system.

    The results of the calculation of the MCS for the“Monolithic”architecture are summarised in Table 10.An important observation is that 8 single different components failures(cut sets of order 1)lead to mission failure,which makes the monolithic architecture intrinsically vulnerable to any damage to its components.

    5.3.“Digitalised”platform concept

    The second design modelled is named“Digitalised Platform”.Many current AFVs in development are based on this architecture,and a lotofeffortis focussed on the standardisation of the mechanical,power and vetronics interfaces(NGVA,Victory[26])with expected benefits in terms of development,operation,maintenance and upgrade costs.

    5.3.1.Mechanical architecture

    The chassis is not fundamentally different from the monolithic mechanical architecture.The only difference is the con-sequence of the higher number of inner components that significantly increases the volume of the body,offering a larger apparent surface to fragments.

    Table 10 Minimal cut sets for the monolithic architecture platform.

    5.3.2.Power architecture

    Two energy sources deliver electric energy required by the platform components.The energy is produced and stored on-board by micro-generators combined with batteries or fuel cells.Power redundancy is provided through dual power circuits,providing a dual redundant supply for all equipment. Power management for improved silent watch and intelligent power balance can be realised by a dedicated computer(Energy Management Unit)and monitoring capability in all electrical consumers.Wheels are direct-driven by individual electric motors which are controlled by individual control devices (Fig.19).

    5.3.3.C4I architecture

    The electronic architecture of the digitalised platform is organised around 2 communications buses.The utility bus is dedicated to the platform command and control while the multimedia bus is dedicated to video data communications.Possible technologies for the utility bus are CAN and MilCAN standards,while multimedia communications can be supported by Gigabit Ethernet technology(Fig.20).

    Fig.18.Possible causes of the platform mission withdrawal(first level of the FT only).

    Fig.19.Illustration of the digitalised power architecture design.

    In a normal mode,control and command information is received from the HF radio and transmitted to ECU1 and ECU2 through the utility bus.ECU1 and ECU2 operate in a parallel redundancy mode.Command frames are decoded,integrity is checked and appropriate data frames are sent to the motor controllers to affect mobility according to command laws and sensors feedback.The 2 digital cameras transmit compressed video frames on the multimedia data bus to the ECUs and the VHF radio transmitter(wireless video link).

    If the HF radio transmitter gets damaged,control and command frames can still be sent through theVHF radio transmitter.If the VHF radio transmitter is damaged,low-data-rate pictures can be sent after compression by the ECUs to the remote station via the HF radio transmitter.

    5.3.4.Damage assessment Agent-Based model

    The assumption is made that the motor controllers are mounted next to the motors they control.The space between each pair of motors is used to install the computer units and the batteries.The individual equipment size is the same as for the monolithic architecture(Fig.21).

    5.3.5.Combat utility Fault-Tree model

    The minimal cut sets(MCS)analysis yields the events described in Table 11.The minimal cut sets order has been set to 2 to limit the size of the table.The results provide the following insights:

    1)There is only one MCS event of order 1(EMU damaged), making the EMU component very critical in the digitalised architecture.

    2)The criticality of the mechanical components(no MCS≤2) has been transferred to the vetronic architecture.

    3)Digital utility and multimedia networking support redundancies between vetronic components(MCS=2).

    Table 11 Minimal cut sets(limited to order 2)for the digitalised architecture platform.

    5.4.“Extreme modular”platform concept

    This“extreme modular”platform architecture is made of several modules that each provide a set common critical capabilities.This means that they are able to re-arrange themselves depending on the mission to realize and according to their current operational status.Specialised sensors and actuators can be mounted on the modules through a generic interface. This is a futuristic architecture as the required technologies are not all available yet.Some partial implementations exist (Fig.22).

    5.4.1.Mechanical architecture

    The platform chassis is made of identical modules that mount together with quick link interfaces.These modules can be arranged before the mission according to different configurations,or they can replace each other dynamically in case of module failure.Links between modules can be rigid or flexible, acting as articulations or dampers.

    5.4.2.Power architecture

    Each module is able to provide its own energy as well as energy to adjacent modules if required regardless of module organisation.Power transmission between the modules is insured by dedicated power plugs of different sides of the module.

    5.4.3.C4I architecture

    All modules communicate via redundant data networks. Connections with sensors and actuators mounted on modules are insured by multiple pins connectors.In case of connector damage,information and power are transmitted by remaining operational sockets(Fig.23).

    Fig.20.Illustration of a digitalised C4I architecture design.

    Fig.21.Geometry and position of Component agents in the damage assessment model of the digitalised platform.

    5.4.4.Damage assessment Agent-Based model

    To be able to compare the survivability of the three architectures,equipment size must remain the same,as well as the platform dimensions.Battery size is divided by the number of modules to still have the same UGV range.A drawback of the modularity is the multiplication of components and a particular effort has to be put on the integration of these components into the modules as shown in Fig.24.

    5.4.5.Combat utility Fault-Tree model

    Fig.22.Illustration of“extreme modular”architecture and example of existing implementation(Roburoc UGV from Robosoft,France).

    Fig.23.Illustration of the“extreme modular”C4I and power architecture design.

    Fig.24.Geometry and position of Component agents in the damage assessment model of the“extreme modular”platform.

    In the“extreme modular”architecture fault tree decomposition,we assume that the mechanical modules have been configured before the mission and they cannot reconfigure in response to damage.This ignores a substantial expected benefit from this“extreme”modular architecture and highlights a limitation of the static fault-tree analysis approach that does not support sequential relationships among component failures. Consequently,some additional assumptions had to be introduced to simulate the re-configurability of the architecture:

    1)Two batteries are enough to supply the rest of the architecture in energy in recovery mode,so that the mission can still be completed,

    2)A minimum of three wheels are necessary to preserve mobility.We make the assumption that the modules can reconfigure if the undamaged wheels are all on one side.

    3)Two operational modules are enough to move and steer the rest of the platform.

    4)The observation camera is mounted on the top of one of the modules while the driving video is always provided by the front module camera.

    5)One ECU and one radio can support the data processing and communications for the whole platform in a recovery mode.

    Analysis revealed no MCS of order less than four(Table 12). The modularity and reconfiguration capabilities of the platform dictate that a minimum of four components(wheels)need to be simultaneously damaged to foil the mission.

    5.5.Combat utility prediction

    The FTA of the three platform designs provides a means to compare the intrinsic vulnerability of the architectures.As expected,the“extreme modular”architecture is more resilient to individual internal components failures.

    Table 12 Total number of MCS per order for the“extreme modular”architecture.

    Fig.25.Top view of the target-threat(“extreme modular”)configuration att=to+2.6 ms.

    Considering external threats, the MCS calculated from FTA is not a sufficient reflection of the platform survivability,as FTA does not consider the platform design nor the way the platform components interact together to reinforce(BADs generation)or to mitigate(shield effect)the threat.

    In order to get a more valid estimation of their relative vulnerability to IEDs,we applied the combat utility assessment approach described in chapter 3 to the three platform concepts described in chapters 5.2,5.3 and 5.4.They were exposed to the same representative IED threat(HE 105 M1 IED)in the configuration of Fig.25.Fig.26 is a 3D view of the IED fragments impacting the platform.

    For each platform concept,a set of 50 simulation runs (Monte-Carlo analysis)with the same target and threat configuration and fragment Weibullangulardistribution resulted in the individual components kill probabilities presented in Figs.27–29.Error brackets correspond to the standard deviation for each probability of kill.

    We can observe that:

    1)The most impacted parts are the left wheels and the motors driver modules(~50%of kill probability),as they are the most exposed to fragments.

    2)Predictions of the wheels kill probabilities do not vary in the three platform concepts,as the same components are used.

    The real-time injection of these individual probabilities of kill in every architecture fault-tree(see Fig.30)provides additional results regarding the robustness of the architectures to individual components failures.

    Fig.31 synthesizes the capabilities and combat utility predictions for the three concepts under study.

    It can be observed that:

    1)The“extreme modular”architecture is three times less vulnerable to the IED fragments than the“monolithic”architecture in terms of damage causing mission failure, highlighting the potential of modular architecture design for survivability.

    2)The mobility capability is the most sensitive to the IED fragments for all architecture concepts,indicating thatparticular effortshould be placed on the design of this function,in this particular IED-threat configuration

    Fig.26.Example of 3D view of the IED fragments impacts on the“monolithic”architecture at t=to+11.5 ms.Penetrating collisions are coloured in red,BAD impacts are coloured in orange.

    Fig.27.Probabilities of the“monolithic”architecture components for being killed by IED fragments.

    6.Conclusion and future work

    IEDs will remain one of the most lethal threats to future land engagements while existing defensive aids are not sufficient enough to fully protect the vehicle,crew and equipment.Meanwhile,the optimisation of the internal platform design remains a critical factor in limiting the impact of IEDs effects on the platform combat utility.

    The modelling and simulation approach described in this paper first aims to predict the damage caused by primary and secondary fragments impacts on internal platform components.

    ThisAgent-Based method has been validated on elementary plates by comparison with existing experimental results or other simulation techniques predictions.

    In a second step and as a demonstration,the approach was applied to the comparison of combat utility of three representative types of platform designs,by injecting component damage into the fault-tree diagrams of the architectures.

    Fig.28.Probabilities of the“digitalized”architecture components for being killed by IED fragments.

    Fig.29.Probabilities of the“extreme modular”architecture components for being killed by IED fragments.

    Fig.30.Animated Fault-Tree diagram for the“monolithic”architecture focused on probabilities of right and left propulsion failures.Other functions are masked for clarity.

    Fig.31.Prediction of capability and combat utility failure probabilities for the 3 architectures tested.

    In this case,results obtained show the benefit of modularity (threetimesmoresurvivablecomparedtothesamplemonolithic architecture)without considering dynamic reconfiguration capabilities that are expected to further increase survivability.

    This application also demonstrates the scalability,modularity and reusability of the developed approaches to vulnerability assessment.This approach enables the rapid generation of quantitative results describing platform combat utility.

    Future work will consider the thorough analysis of the vulnerability of modular platform,the modelling of IED blast effect and shockwave damage due to components mechanical interfaces as well as platform reconfiguration capabilities through Dynamic Fault-Tree implementation in the modelling environment.

    [1]Centre de Doctrine d’Emploi des Forces.La lutte contre les engins explosifs improvisés.Les cahiers du retex 2010.

    [2]Deitz PH,Reed HL,Klopcic JT,Walbert JN.Fundamentals of ground combat system ballistic vulnerability/lethality.Progress in astronautics and aeronautics.Arlington:American Institute of Aeronautics and Astronautics;2009.

    [3]Gavril F.A synthesis of methods for simulating vulnerability of armored vehicles.Naval Res Logistics 1995;42:247–65.

    [4]Kennedy E.A short report on the manual wargaming of three UGV concepts issued from previous FGMC studies,UK MOD/DSTL, Technical Report 2009.

    [5]Helfman RA,Saccenti JC,Kinsler RE,Suckling JR.An expert system for predicting component kill probabilities.Aberdeen(MD):1985.

    [6]Ackland K,Buckland M,Thorn V,Van der Schaaf P.A review of battle damageprediction and vulnerability reduction methods,DefenceScience and Technology Organisation,Victoria,Australia,Public report DSTO-GD-0620;2010.

    [7]Hou Y,Wang K,Jin T.A simulation system of ship vulnerability to fragment damage.J Inf Comput Sci 2014;11(12):4415–25.

    [8]MannJ,FisherD,KrausM,LowndesE,YorkA.Ananalysisofengagement algorithms for real-time weapons effects.JDMS 2006;3(3):189–201.

    [9]Hartmann M.Component kill criteria,Defence&Security,Systems and technology,FOI,Swedish Defence Research Agency,SE-164 90 Stockholm,FOI-R-2829-SE;2009.

    [10]Singh VP,Singh Y.Generalised model for aircraft vulnerability by different weapon systems.Def Sci J 2000;50:12–23.

    [11]Hall J.In:United States Naval Academy,editor.Principles of naval weapons systems.Dubuque(IA):Kendall/Hunt;2000.

    [12]Colwill I,Gabrovsek S,Webber T,Watts I,Duncan A,Diskett D,et al. Super-hardened unmanned ground vehicle,Vetronics Research Centre, Brighton,UK,Technical Report RT/COM/4/5008;2012.

    [13]Schofield J.Survivability assessment from concept to operational support, Qinetiq,Fife,Technical report Qinetiq/09/00063;2009.

    [14]Distefano S,Puliafito A.Dynamic reliability block diagramsVS Dynamic fault trees.In:Reliability and maintainability symposium,2007.RAMS‘07.Annual.Orlando:2007.

    [15]Lee WS,Grosh DL,Tillman FA,Lie CH.Fault tree analysis,methods, and applications–a review.IEEE Trans Reliab 1985;34(3):194–202.

    [16]Chen Y,Xiao S,Song H,Zhang Y.Agent based modelling of the equipment battle damage.J Comput 2013;8(2):334–40.

    [17]Bova MJ,Ciarallo FW,Hill RR.Development of an agent-based model for the secondary threat resulting from a ballistic impact event.J Simulat 2015;10(1):24–35.

    [18]Zecevic B,Terzic J,Catovic A,Kadic S.Characterization of distribution parameters of fragment mass and number for conventional projectiles. New Trends in Research of Energetic Materials;December 2011.

    [19]Hazell PJ.Armour materials,theory and design.New York(NY):CRC Press;2015.

    [20]Verolme JL.Behind-armour debris modelling for high-velocity fragment impact(part2),TNO,PML 1997;1997.

    [21]Rosenberg Z,Dekel E.In:Springer,editor.Terminal ballistics.Haifa, Israel:Springer;2012.

    [22]Baillargeon Y,Dinovitzer A.Modelling of behind-armour debris with the DeCaM software package,Weapons Effects Section–DRDC–Valcartier, Courcelette,Canada,Technical Report 5070C-2.FR;2004.

    [23]Roybal LG,Jeffers RF,McGillivary KE,Paul TD,Jacobson R.Modelling and simulating blast effects on electric substations.In:IEEE international conference on technologies for homeland security.Boston(MA):2009.p. 351–7.

    [24]Gabrovsek S,Colwill I,Stipidis E.Agents-Based Simulation of improvised explosive device fragment damage on individual components. JDMS 2016;13(4):399–413.

    [25]Nelson EM.Open architectures technical principles and guidelines V1.5.8,IBM Federal CTO Office,Technical Report 2008.

    [26]Hee YS,Phoon KK,Ang JY.Interoperable open architecture for land platforms.DSTA 2013.

    Received 26 June 2016;revised 23 September 2016;accepted 10 October 2016 Available online 24 October 2016

    Peer review under responsibility of China Ordnance Society.

    *Corresponding author.Tel.:+33687146672.

    E-mail address:s.gabrovsek@vetronics.org(S.GABROVSEK).

    1There is a close mapping between the V/L taxonomy levels and the more complex Missions and Means Framework(MMF)extensively used in military operations research analysis.

    http://dx.doi.org/10.1016/j.dt.2016.10.002

    2214-9147/?2016 The Authors.Production and hosting by Elsevier B.V.on behalf of China Ordnance Society.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/).

    ?2016 The Authors.Production and hosting by Elsevier B.V.on behalf of China Ordnance Society.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/).

    国产亚洲欧美精品永久| 内地一区二区视频在线| 国产精品人妻久久久久久| 国产成人精品久久久久久| 国内揄拍国产精品人妻在线| 国产综合精华液| 久久久久网色| 成人一区二区视频在线观看| 大话2 男鬼变身卡| 又粗又硬又长又爽又黄的视频| 97热精品久久久久久| 国产精品伦人一区二区| 十八禁网站网址无遮挡 | 99精国产麻豆久久婷婷| 亚洲欧洲国产日韩| 一二三四中文在线观看免费高清| 啦啦啦啦在线视频资源| 国产毛片在线视频| 少妇人妻一区二区三区视频| 天美传媒精品一区二区| 在线亚洲精品国产二区图片欧美 | 亚洲丝袜综合中文字幕| 成人毛片60女人毛片免费| 最近最新中文字幕免费大全7| 观看美女的网站| 久久精品久久精品一区二区三区| 综合色丁香网| 久热这里只有精品99| 精品亚洲乱码少妇综合久久| 国产伦精品一区二区三区四那| www.av在线官网国产| 日本-黄色视频高清免费观看| 精品国产乱码久久久久久小说| 国产精品爽爽va在线观看网站| 久久久精品94久久精品| 一边亲一边摸免费视频| 成人特级av手机在线观看| 亚洲欧洲国产日韩| 国产成人精品婷婷| 偷拍熟女少妇极品色| 一二三四中文在线观看免费高清| 久久国内精品自在自线图片| 国产69精品久久久久777片| 久热久热在线精品观看| 国产精品熟女久久久久浪| 夜夜骑夜夜射夜夜干| 免费看日本二区| 久久久久久人妻| 国产黄片视频在线免费观看| av免费观看日本| 我的女老师完整版在线观看| 在线观看国产h片| 午夜老司机福利剧场| 欧美日韩亚洲高清精品| 久久久久久久久久久丰满| 亚洲第一av免费看| 国产久久久一区二区三区| 国产在线视频一区二区| 插逼视频在线观看| 亚洲精品自拍成人| 婷婷色综合大香蕉| xxx大片免费视频| 男女国产视频网站| 一本—道久久a久久精品蜜桃钙片| 国产精品爽爽va在线观看网站| av卡一久久| 亚洲四区av| 久久精品国产亚洲网站| 国产高清三级在线| 小蜜桃在线观看免费完整版高清| 人体艺术视频欧美日本| 久久久久国产网址| 在线精品无人区一区二区三 | 又大又黄又爽视频免费| av国产免费在线观看| 中国三级夫妇交换| 青春草亚洲视频在线观看| 亚洲成人手机| 久久久色成人| 欧美成人午夜免费资源| 亚洲第一av免费看| 久久av网站| 欧美激情国产日韩精品一区| 在线看a的网站| 国产真实伦视频高清在线观看| 精品国产乱码久久久久久小说| 中文精品一卡2卡3卡4更新| 成人特级av手机在线观看| 最近中文字幕高清免费大全6| 激情五月婷婷亚洲| 五月天丁香电影| 免费黄色在线免费观看| 欧美成人精品欧美一级黄| 久久久久久久大尺度免费视频| 在线观看一区二区三区激情| 欧美激情极品国产一区二区三区 | 午夜福利高清视频| 亚洲伊人久久精品综合| 成人18禁高潮啪啪吃奶动态图 | 国产av一区二区精品久久 | 成年美女黄网站色视频大全免费 | 亚洲精品国产av成人精品| 精品亚洲乱码少妇综合久久| 亚洲欧美日韩东京热| 亚洲精品自拍成人| 激情 狠狠 欧美| 嫩草影院新地址| 国产精品.久久久| 国产精品久久久久久精品古装| 蜜桃在线观看..| 欧美精品人与动牲交sv欧美| 亚洲自偷自拍三级| 欧美xxxx黑人xx丫x性爽| 婷婷色av中文字幕| 插阴视频在线观看视频| 啦啦啦啦在线视频资源| 日本黄色日本黄色录像| 久久精品久久久久久噜噜老黄| 免费观看性生交大片5| 国产精品一区www在线观看| 国产色婷婷99| av网站免费在线观看视频| 菩萨蛮人人尽说江南好唐韦庄| 精品少妇久久久久久888优播| 国产综合精华液| 欧美精品亚洲一区二区| 久久精品熟女亚洲av麻豆精品| a级一级毛片免费在线观看| 欧美日韩综合久久久久久| 日韩欧美 国产精品| 18禁裸乳无遮挡动漫免费视频| 美女cb高潮喷水在线观看| 亚洲国产成人一精品久久久| 色5月婷婷丁香| 亚洲激情五月婷婷啪啪| xxx大片免费视频| 大香蕉97超碰在线| 直男gayav资源| 国产成人freesex在线| 汤姆久久久久久久影院中文字幕| 精品久久国产蜜桃| 久久久色成人| 欧美一级a爱片免费观看看| 一级毛片黄色毛片免费观看视频| 久久久久久伊人网av| 午夜老司机福利剧场| 热99国产精品久久久久久7| 久久久久久久大尺度免费视频| 欧美激情国产日韩精品一区| 日本黄大片高清| 欧美+日韩+精品| 美女视频免费永久观看网站| 亚洲va在线va天堂va国产| 国产高清有码在线观看视频| 嫩草影院入口| 亚洲欧美一区二区三区国产| 女的被弄到高潮叫床怎么办| 久久久久久久大尺度免费视频| 中文字幕久久专区| 午夜激情福利司机影院| 毛片女人毛片| 51国产日韩欧美| 亚洲精品成人av观看孕妇| 少妇人妻精品综合一区二区| 性色avwww在线观看| 99热6这里只有精品| 熟女人妻精品中文字幕| 免费观看无遮挡的男女| 搡老乐熟女国产| 国产精品精品国产色婷婷| 日韩成人av中文字幕在线观看| 亚洲自偷自拍三级| 亚洲美女黄色视频免费看| 日韩制服骚丝袜av| 欧美日韩国产mv在线观看视频 | 久久久久国产网址| 欧美日韩一区二区视频在线观看视频在线| 黄片无遮挡物在线观看| 国产亚洲欧美精品永久| 亚洲欧美日韩卡通动漫| 日韩一区二区三区影片| 成人一区二区视频在线观看| 在线看a的网站| 自拍欧美九色日韩亚洲蝌蚪91 | 超碰97精品在线观看| 亚洲成人av在线免费| 欧美少妇被猛烈插入视频| 国产爽快片一区二区三区| 亚洲av日韩在线播放| 美女xxoo啪啪120秒动态图| 极品少妇高潮喷水抽搐| 婷婷色麻豆天堂久久| 国产精品久久久久久av不卡| 伦精品一区二区三区| 久久久久久伊人网av| 午夜激情福利司机影院| 欧美三级亚洲精品| 国产av国产精品国产| 亚洲人成网站高清观看| 日韩精品有码人妻一区| 日韩一区二区三区影片| 国产成人精品久久久久久| 天美传媒精品一区二区| 国产日韩欧美在线精品| 久久国产乱子免费精品| 最近2019中文字幕mv第一页| 欧美三级亚洲精品| 午夜福利视频精品| 亚洲性久久影院| 九九久久精品国产亚洲av麻豆| 最近的中文字幕免费完整| 五月开心婷婷网| 多毛熟女@视频| 国产久久久一区二区三区| 男女啪啪激烈高潮av片| 插阴视频在线观看视频| 久久精品国产亚洲av涩爱| 99久久中文字幕三级久久日本| 秋霞在线观看毛片| av在线蜜桃| 国产精品精品国产色婷婷| 免费黄频网站在线观看国产| 久久精品久久久久久噜噜老黄| 国产人妻一区二区三区在| 国产欧美亚洲国产| 国产高清国产精品国产三级 | 国产亚洲午夜精品一区二区久久| 亚洲精品一区蜜桃| 少妇被粗大猛烈的视频| 啦啦啦啦在线视频资源| 身体一侧抽搐| 亚洲va在线va天堂va国产| 高清视频免费观看一区二区| 欧美另类一区| 欧美一级a爱片免费观看看| 久久精品国产自在天天线| 国产成人aa在线观看| 久久国产精品大桥未久av | a级毛色黄片| 夜夜看夜夜爽夜夜摸| 免费大片18禁| av专区在线播放| 亚洲一区二区三区欧美精品| 最近中文字幕高清免费大全6| 久久精品熟女亚洲av麻豆精品| 成人毛片a级毛片在线播放| 免费av中文字幕在线| 久久精品国产鲁丝片午夜精品| 2022亚洲国产成人精品| 国产老妇伦熟女老妇高清| 少妇高潮的动态图| 国产综合精华液| 日韩电影二区| 黑人高潮一二区| 亚洲精品国产av蜜桃| 亚洲精品视频女| 一级毛片我不卡| 在线精品无人区一区二区三 | 日韩,欧美,国产一区二区三区| 高清av免费在线| 亚洲精品一区蜜桃| 只有这里有精品99| 天堂8中文在线网| 大话2 男鬼变身卡| 观看av在线不卡| av在线播放精品| 黄色欧美视频在线观看| 亚洲激情五月婷婷啪啪| 最近中文字幕高清免费大全6| 亚洲精品国产av蜜桃| 九九在线视频观看精品| 免费av中文字幕在线| 久久久久久久久久久丰满| 国产黄色免费在线视频| 女人十人毛片免费观看3o分钟| 精品亚洲成a人片在线观看 | 国产国拍精品亚洲av在线观看| 久久精品夜色国产| 国产在线免费精品| 色吧在线观看| 色婷婷久久久亚洲欧美| 内射极品少妇av片p| 亚洲天堂av无毛| 亚洲综合精品二区| 国产伦精品一区二区三区四那| 91aial.com中文字幕在线观看| 91精品国产国语对白视频| 新久久久久国产一级毛片| 亚洲第一区二区三区不卡| 有码 亚洲区| 女的被弄到高潮叫床怎么办| 性高湖久久久久久久久免费观看| 九九久久精品国产亚洲av麻豆| 18禁裸乳无遮挡免费网站照片| h视频一区二区三区| 国产精品国产三级专区第一集| 久久国产亚洲av麻豆专区| av在线老鸭窝| 久久热精品热| 色视频在线一区二区三区| 久久精品国产鲁丝片午夜精品| 国产高潮美女av| 超碰av人人做人人爽久久| 亚洲不卡免费看| 永久免费av网站大全| 青青草视频在线视频观看| 亚洲人成网站在线播| 国产精品久久久久久久电影| 97在线视频观看| 纯流量卡能插随身wifi吗| 欧美日韩一区二区视频在线观看视频在线| 精品一区在线观看国产| 欧美成人午夜免费资源| 1000部很黄的大片| 欧美另类一区| 欧美成人精品欧美一级黄| 肉色欧美久久久久久久蜜桃| 青春草亚洲视频在线观看| 国产精品伦人一区二区| 熟女电影av网| 丰满人妻一区二区三区视频av| 国产精品嫩草影院av在线观看| 91精品一卡2卡3卡4卡| 亚洲精品,欧美精品| 日韩欧美精品免费久久| 久久婷婷青草| 日本与韩国留学比较| 一二三四中文在线观看免费高清| 尤物成人国产欧美一区二区三区| 久久人妻熟女aⅴ| 激情 狠狠 欧美| 亚洲av在线观看美女高潮| 国产高潮美女av| 成人无遮挡网站| 免费看光身美女| 一级二级三级毛片免费看| 人妻 亚洲 视频| 又粗又硬又长又爽又黄的视频| 中文字幕人妻熟人妻熟丝袜美| 免费观看a级毛片全部| 国产乱来视频区| 在线观看av片永久免费下载| 水蜜桃什么品种好| 国内少妇人妻偷人精品xxx网站| 精品久久久精品久久久| 色网站视频免费| 美女福利国产在线 | 日本色播在线视频| 超碰97精品在线观看| 婷婷色麻豆天堂久久| 久久久久精品性色| 1000部很黄的大片| 亚洲欧美中文字幕日韩二区| 成人毛片a级毛片在线播放| 国产亚洲精品久久久com| 色网站视频免费| 国产精品久久久久久av不卡| 人人妻人人澡人人爽人人夜夜| 久久国产亚洲av麻豆专区| 免费看光身美女| 欧美一区二区亚洲| 亚洲国产精品999| 日韩强制内射视频| 人人妻人人看人人澡| 国产精品欧美亚洲77777| 国产淫语在线视频| 大片电影免费在线观看免费| 久热这里只有精品99| 国产欧美另类精品又又久久亚洲欧美| 国产高清三级在线| 国产精品人妻久久久影院| 国产一区有黄有色的免费视频| 一级毛片 在线播放| 欧美高清性xxxxhd video| 99热国产这里只有精品6| 欧美日韩亚洲高清精品| 最新中文字幕久久久久| 亚洲图色成人| 丰满人妻一区二区三区视频av| 国产大屁股一区二区在线视频| 免费播放大片免费观看视频在线观看| 高清毛片免费看| 国内揄拍国产精品人妻在线| av线在线观看网站| 日韩大片免费观看网站| 久久国产精品男人的天堂亚洲 | 久久久久久人妻| 欧美bdsm另类| 晚上一个人看的免费电影| 日韩中字成人| 欧美成人午夜免费资源| 美女国产视频在线观看| 久久久久久久亚洲中文字幕| 日本猛色少妇xxxxx猛交久久| 国产淫语在线视频| 欧美另类一区| 久久久欧美国产精品| 伦理电影免费视频| 亚洲久久久国产精品| 亚洲精品久久午夜乱码| 女人久久www免费人成看片| av卡一久久| 久久久久久久久久人人人人人人| 国产成人免费无遮挡视频| 亚洲经典国产精华液单| 美女内射精品一级片tv| 天堂中文最新版在线下载| 久久久色成人| 日韩人妻高清精品专区| 青春草国产在线视频| 国产黄频视频在线观看| 纯流量卡能插随身wifi吗| 国产精品av视频在线免费观看| 又爽又黄a免费视频| 国产精品成人在线| 国产精品一区www在线观看| 成人毛片a级毛片在线播放| 国产黄色视频一区二区在线观看| 亚洲电影在线观看av| 亚洲精品国产av成人精品| 日本黄大片高清| 亚洲欧美中文字幕日韩二区| 一区二区三区精品91| 蜜桃亚洲精品一区二区三区| 亚洲欧美成人综合另类久久久| 久久精品国产a三级三级三级| 亚洲怡红院男人天堂| 国产亚洲av片在线观看秒播厂| www.色视频.com| 最近最新中文字幕大全电影3| 五月玫瑰六月丁香| av专区在线播放| 在线观看国产h片| 十八禁网站网址无遮挡 | 亚洲av在线观看美女高潮| 国产精品国产三级国产av玫瑰| 欧美97在线视频| 激情五月婷婷亚洲| 久久久久国产网址| 99久久精品国产国产毛片| av网站免费在线观看视频| 国产亚洲一区二区精品| 在线观看一区二区三区| 免费黄频网站在线观看国产| 激情五月婷婷亚洲| 岛国毛片在线播放| 亚洲四区av| 亚洲精品亚洲一区二区| 在线亚洲精品国产二区图片欧美 | 26uuu在线亚洲综合色| 中文字幕人妻熟人妻熟丝袜美| 亚洲人成网站在线播| 亚洲天堂av无毛| 亚洲精品一区蜜桃| 精品久久国产蜜桃| 99国产精品免费福利视频| 欧美zozozo另类| 色网站视频免费| 亚洲欧美中文字幕日韩二区| 少妇人妻一区二区三区视频| 精品亚洲成a人片在线观看 | 国产成人精品福利久久| 日韩免费高清中文字幕av| 两个人的视频大全免费| 亚洲av免费高清在线观看| 婷婷色麻豆天堂久久| 亚洲国产成人一精品久久久| 日韩中文字幕视频在线看片 | 欧美成人a在线观看| 老司机影院毛片| 简卡轻食公司| 哪个播放器可以免费观看大片| 又爽又黄a免费视频| 精品久久国产蜜桃| 国产欧美亚洲国产| 亚洲av免费高清在线观看| 久久久午夜欧美精品| 精品99又大又爽又粗少妇毛片| 一本—道久久a久久精品蜜桃钙片| 80岁老熟妇乱子伦牲交| 久久6这里有精品| 精品熟女少妇av免费看| 韩国高清视频一区二区三区| 日本色播在线视频| 久久久久久久亚洲中文字幕| 偷拍熟女少妇极品色| av天堂中文字幕网| 久久久久国产精品人妻一区二区| 美女主播在线视频| 精品一区二区三卡| 黄色怎么调成土黄色| 国产熟女欧美一区二区| 三级国产精品片| 草草在线视频免费看| 国产高清三级在线| 青青草视频在线视频观看| 欧美区成人在线视频| 国产黄色视频一区二区在线观看| 久久精品久久久久久噜噜老黄| 夜夜爽夜夜爽视频| 久久青草综合色| 国产成人精品久久久久久| 日本黄色片子视频| 日日撸夜夜添| 国产伦精品一区二区三区四那| 91在线精品国自产拍蜜月| 天堂中文最新版在线下载| 性色av一级| 亚洲国产精品专区欧美| 国产在线男女| 久久午夜福利片| 成人毛片60女人毛片免费| 嘟嘟电影网在线观看| av免费在线看不卡| 亚洲欧美成人精品一区二区| 日韩欧美精品免费久久| av在线观看视频网站免费| 尤物成人国产欧美一区二区三区| 久久ye,这里只有精品| 免费av不卡在线播放| 下体分泌物呈黄色| 看非洲黑人一级黄片| 青春草视频在线免费观看| 久久青草综合色| 在线看a的网站| 国产精品久久久久久久久免| 午夜激情久久久久久久| 亚洲国产日韩一区二区| 国产精品久久久久久精品电影小说 | 亚洲自偷自拍三级| 十八禁网站网址无遮挡 | 一级毛片aaaaaa免费看小| 久久6这里有精品| 亚洲av欧美aⅴ国产| 精品99又大又爽又粗少妇毛片| 免费久久久久久久精品成人欧美视频 | 欧美日韩在线观看h| 最近最新中文字幕大全电影3| 成人漫画全彩无遮挡| 你懂的网址亚洲精品在线观看| 日韩一区二区三区影片| 97超视频在线观看视频| 国产探花极品一区二区| 亚洲va在线va天堂va国产| 久久99蜜桃精品久久| 亚洲人成网站高清观看| 91在线精品国自产拍蜜月| 1000部很黄的大片| 免费黄网站久久成人精品| 成人特级av手机在线观看| 老司机影院毛片| 人妻系列 视频| 一本—道久久a久久精品蜜桃钙片| 欧美人与善性xxx| 国产精品久久久久成人av| 亚洲精品久久久久久婷婷小说| 乱码一卡2卡4卡精品| 舔av片在线| 肉色欧美久久久久久久蜜桃| 久热久热在线精品观看| 一级a做视频免费观看| 波野结衣二区三区在线| 青春草国产在线视频| 亚洲精品色激情综合| 成人高潮视频无遮挡免费网站| 色婷婷久久久亚洲欧美| 国内揄拍国产精品人妻在线| 国产成人午夜福利电影在线观看| 午夜老司机福利剧场| 日本av免费视频播放| 男人添女人高潮全过程视频| 国产成人a∨麻豆精品| 汤姆久久久久久久影院中文字幕| 一个人免费看片子| 国产高清有码在线观看视频| 中文字幕av成人在线电影| 亚洲国产精品国产精品| 超碰av人人做人人爽久久| 成人毛片60女人毛片免费| 丝瓜视频免费看黄片| 国产视频首页在线观看| 国产av精品麻豆| 嘟嘟电影网在线观看| 精品久久国产蜜桃| 美女脱内裤让男人舔精品视频| 国产精品久久久久久精品古装| 国产男女内射视频| 大陆偷拍与自拍| 熟女人妻精品中文字幕| 七月丁香在线播放| 日韩,欧美,国产一区二区三区| 亚洲欧美一区二区三区国产| 99久久中文字幕三级久久日本| 国产成人freesex在线| 国产成人aa在线观看| 十分钟在线观看高清视频www | 寂寞人妻少妇视频99o| 熟妇人妻不卡中文字幕| 一级二级三级毛片免费看| 1000部很黄的大片| 久久精品国产鲁丝片午夜精品| 观看美女的网站| 男的添女的下面高潮视频| 日日啪夜夜爽| 青青草视频在线视频观看| 成人毛片a级毛片在线播放| 精品亚洲成a人片在线观看 | 大话2 男鬼变身卡| 99久久人妻综合| 天美传媒精品一区二区| 91午夜精品亚洲一区二区三区| 又黄又爽又刺激的免费视频.| 少妇猛男粗大的猛烈进出视频| 日本与韩国留学比较| 日韩一区二区视频免费看|