• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Metaheuristic post-optimization of the NIST repository of covering arrays

    2017-05-16 10:26:43JoseTorresJimenezArturoRodriguezCristerna

    Jose Torres-Jimenez,Arturo Rodriguez-Cristerna

    CINVESTAV-Tamaulipas,Information Technology Laboratory,Km.5.5 Carretera Cd.,Victoria,Tamaulipas,Mexico

    Original article

    Metaheuristic post-optimization of the NIST repository of covering arrays

    Jose Torres-Jimenez*,Arturo Rodriguez-Cristerna

    CINVESTAV-Tamaulipas,Information Technology Laboratory,Km.5.5 Carretera Cd.,Victoria,Tamaulipas,Mexico

    A R T I C L E I N F O

    Article history:

    Received 19 September 2016

    Accepted 25 December 2016

    Available online 16 February 2017

    Covering arrays

    Construction of Covering Arrays(CA)with minimum possible number of rows is challenging.Often the available CA have redundant combinatorial interaction that could be removed to reduce the number of rows.This paper addresses the problem of removing redundancy of CA using a metaheuristic postoptimization(MPO)approach.Our approach consists of three main components:a redundancy detector(RD);a row reducer(RR);and a missing-combinations reducer(MCR).The MCR is a metaheuristic component implemented using a simulated annealing algorithm.MPO was instantiated with 21,964 CA taken from the National Institute of Standards and Technology(NIST)repository.It is a remarkable result that this instantiation of MPO has delivered 349 new upper bounds for these CA.

    ?2017 Chongqing University of Technology.Production and hosting by Elsevier B.V.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/).

    1.Introduction

    The use of software has permeated many areas of human activity,so the reliability of software has become important worldwide.It is estimated that software testing consumes about 50%of the cost of developing a new piece of software.A 2002 NIST report [23]indicates that the cost of an inadequate infrastructure for software testing was in the range of$22.2 to$59.5 billion(US dollars).Reducing this cost is notonly important but the design and implementation of adequate software testing procedures is critical for the reliability of many electronic and mechanical systems,even more so in complex and important systems,such as space shuttles Lions and et al.[16].

    According to Myers et al.[17]functional software testing methods may be divided into two main categories:white-box testing and black-box testing.The design of white-box testing suites requires source code of the software under examination. Some testing strategies based on the white-box approach are: statement coverage,decision coverage,condition coverage, decision-condition coverage and multiple-condition coverage.The building of test suites using white-box strategies is more challenging than for black-box strategies,since white-box strategies are based on knowledge of the internal structure of the system. Furthermore,if the system is modi fied,then tests must be redesigned to satisfy the new version of the system.On the other hand, the design of black box testing suites does not require source code of the software under examination.It compares actual behaviour against expected behaviour based on the functionality and the speci fication of the software system under examination.Some black-box testing strategies are:exhaustive input testing,equivalence partitioning,boundary-value analysis,cause-effect graphing, error guessing,andcombinatorial interaction testing.

    It is easy to construct test suites using a random black-box approach,but they rarely cover a large percentage of the functionality of the system under examination.A black-box approach that covers 100 percent of the functionality is the exhaustive approach,but it is impractical in most cases because too many tests are required.As an example:if we need to design a test suite for a system that has 20 parameters and each parameter has 10 possible values,it would require 1020tests;however,using a combinatorial interaction testing approach that covers the combinations of all pairs of parameter values,the test suite will require only 155 tests. The number of tests required with combinatorial interaction testing grows logarithmically according to the number of parameters[11]. Empirical studies in software testing have shown that combinatorial interaction testing is a useful approach Kuhn et al.[14],Bell[4]. The mathematical objects that support combinatorial interactiontesting are Covering Arrays(CA)and Mixed Covering Arrays(MCA).

    CA and MCA are combinatorial structures that have been used successfully in various areas.The most reported application of CA and MCA is in the design of test suites for software combinatorial interaction testing[7,8]which is based on the concept that software faults are caused by unexpected combinatorial interactions of certain size between components.Another application is found in the field of parameter fine-tuning of metaheuristic algorithms [12,19,21,22].

    A CA,denoted by CA(N;t,k,v),is an N×k array,where every entry of the array takes values from a set of symbols of sizev,such that every N×t sub-array contains at least once all possible vtttuples of symbols.An MCA is a generalization of a CA where the alphabets of the columns could have different cardinalities.The test cases are represented by the rows,the parameters are represented by the columns,the parameter values are taken from the set {0,1…,v-1}which is called the alphabet,and t is the strength or combinatorial interaction degree between parameters covered by the CA.Fig.1 shows an example of a CA(9;2,4,3),and an MCA(6; 2,4,3123)is shown in Fig.2.

    The Covering Array Number(CAN)is the minimum N such that for fixed k,v,and t a CA exists.The CAN is denoted by CAN(t,k,v). The construction of CA with N=CAN(t,k,v)is a challenging problem whether we use mathematical structures or metaheuristic algorithms.

    When we have non-optimal CA(i.e.a CAwith N>CAN(t,k,v)),it usually has many t-tuples that are covered more than once.This fact presents the opportunity to reduce number of rows of CA,given that it may then be possible to identify redundant rows[18]that can be removed.

    In this paper we introduce a Metaheuristic Post-Optimization (MPO)approach to reduce the size of a CA by exploiting redundant elements in CA.MPO is composed of three main components: a)a redundancy detector(RD);a row reducer(RR);and a missingcombination reducer(MCR)implemented using a simulated annealing algorithm(the metaheuristic component of our approach).MPO was extensively tested using 21,964 CA(taken from the CA NIST repository).We have improved almost all 21,964 CA,but the most remarkable result is that MPO has set 349 new upper bounds for these CA.

    The remaining of the paper is structured in three sections.In section 2 we present in detail MPO approach giving details of the redundancy detector,row reducer and missing-combination reducer components.In section 3 we present the results of instantiating the MPO with the whole National Institute of Standards and Technology repository of covering arrays.Finally in section 4 we present some conclusions.

    Fig.1.Transposed matrix of a CA(9;2,4,3).

    Fig.2.Transposed matrix of an MCA(6;2,4,3123).

    2.Metaheuristic post-optimization(MPO)

    In this section we present implementation details of the MPO approach.We firstly give an overview of the whole process of MPO, secondly,we present details of each of the components RD,RR, MCR.

    2.1.Design of MPO approach

    The design and implementation of MPO approach is brie fly described in algorithm 1,where it can be observed that it has three components and two main loops.The inner loop executes the components:Redundancy Detector(RD)andRow Reducer(RR).After the inner loop is executed,theMissing-Combinations Reducer(MCR) runs.When the MCR(implemented with a simulated annealing (SA)algorithm)is not able to make the number of missing combinations equal to zero,MPO ends.

    MPO(algorithm 1)receives as input A=CA(N;t,k,v)and gives as output B=CA(N’;t,k,v)with N’≤N and no missing t-wise combinations.The functionτcomputes the number of missing twise combinations of the parameter passed to it.τhas temporal complexity(a more detailed description of how to compute the missing interactions for CA was presented by Avila-George et al.[2].

    2.2.Redundancy detector(RD)

    The goal of the Redundancy Detector(RD)algorithm is to find alarge number of redundant entries in the CA given as input.RD does its job by doing three scans of the input,the first two scans visiting all t-wise combinations of the matrix(each scan with temporal complexitythe third scan visiting all elements of the matrix,searching for rows that are totally redundant(with temporal complexityO(Nk)).The total temporal complexity is

    The purpose of the first scan is to set as‘Fixed Symbol’(FS)cells that participate in t-wise combinations covered only once,and as‘Possible Redundant Cell’(PRC)all other cells.The second scan works with cells marked as PRC and decides which cells transform to the status of FS,while making sure coverage property(all t-wise combinations must be covered at least once)is satis fied,and number of cells with status of PRC is maximized.The third scan removes all rows in which all elements have status of PRC.

    2.3.Row reducer(RR)

    The Row Reducer algorithm receives as input a CA and works in a greedy manner searching for a rowisuch that its removal minimizes missing combinations.In the worst case RR tests all rows of CA,but when a row with no missing t-wise combinations is found RR ends.If this is not the case the row removed is the one that gives the fewest number of missing t-wise combinations.

    The logic of the operation of the RR algorithm is simple:replace the FS cells of thei-th row in all PRC cells of remaining rows,and then verify number of missing t-wise combinations(after removal of rowi).RR removes the first row that minimizes missing t-wise combinations.The worst case temporal complexity of the algorithm isfor the determination of row to be removed, andO(Nk)for the removal of the row.Then the total temporal complexity of the RR algorithm is

    2.4.Missing-combinations reducer(MCR)

    The MCR component of MPO is in charge of reducing to zero the number of missing t-tuples of the input parameter(a matrix with missing combinations).We decided to implement MCR using a simulated annealing(SA)algorithm given that SA has been applied successfully for solving related problems[3,6,20,24].The core elements of the SA are:the neighbourhood functions F F;and the cooling schedule.

    We used two neighbourhood functions N F1and N F2.N F1searches for a random missing t-tuple and sets one such tuple in every row,selecting the row that gives the fewest number of missing t-wise combinations.N F2selects t cells in a row(cells and rows are selected randomly)then tests every vtpossible t-tuple in those cells,and selects combination that gives the lower number of missing t-wise combinations.SA uses a mixture of the two neighbourhood functions in such a way that N F1is applied with a probabilityprand consequently N F2is applied with a probability 1-pr.

    The cooling schedule con figuration in SA involves[1,15]:(a)an initial temperature(temp0);(b)a decreasing function to reduce the temperature value;(c)an ending temperature(tempf);and(d)a finite number of iterations of the local search at the same temperature(L)(L size of a Markov chain[5].The parameters of the cooling schedule control the behaviour of the algorithm and therefore affect drastically the quality of the final solution.We selected static geometric cooling schedule controlled by a parameterα.The parameter L is static during execution of the algorithm [3,20].Also a parameter called frozen factor(ff)was added to control number of temperature reductions without improvement towards solution,which works as an alternative termination criterion that is triggered when search stagnates.

    SA algorithm(algorithm 2)is based on de finition given by Kirkpatrick et al.[13].Parameter values were selected after a parameter fine-tuning,and they are:temp0=1;α=0.99; L=Nkv2;pr=0.5;tempf=1×10-14;andff=11.

    ?

    Table 1 Results of MPO algorithm after processing entire repository[10].Information is organized in triplets containing:average percentage reduction of rows(Υ);average time in minutes(Γ);and number of instances(I)(Continues in Table 2).

    Table 2 (Continued from Table 1)Results of MPO algorithm after processing entire repository[10].Information is organized in triplets containing:average percentage reduction of rows(Υ);average time in minutes(Γ);and number of instances(I).

    2.5.Implementation note

    The proposed algorithms were coded using C language and compiled with GCC 4.3.5 with-O3 optimization flag,and run in cores of the type AMD?8435(2.6 Ghz).

    3.Results

    To measure the effectiveness of MPO,the NIST repository of CA [10]was processed.NIST repository of CA consists of 21,964 CAwith v∈{2,…,6}andt∈{2,…,6}.For each instance we report:average percentage reduction of rows(Υ),average time in minutes(Γ),and number of instances(I).

    Tables 1 and 2 summarize the results of processing NIST repository[10].Information is organized in triplets containing:Υ,Γ, andI.It is shown that many instances were optimized,resulting in the construction of 349 state of the art upper bounds for CA by using MPO algorithm.The comparison between the MPO new upper bounds and the IPOG-F bounds is shown in Tables 3-5.Resultsare shown in Figs.3-7 where instances are grouped by combinatorial interaction coverage degree(t).

    Table 3 New best upper bounds constructed with MPO algorithm.Part 1 of 3.

    Table 3 (continued)

    Table 4 New best upper bounds constructed with MPO algorithm.Part 2 of 3.

    4.Conclusions

    In this paper we have presented a Metaheuristic Post-

    Optimization(MPO)approach to reduce the cardinality of Covering Arrays.MPO was implemented using three components:a redundancy detector,a row reducer,and a missing-combination reducer.The redundancy detector has the mission of detecting elements in CA that could be changed without affecting degree of coverage of CA.The row reducer takes advantage of redundant elements of CA to reduce number of rows.When the removal of a row produces missing combinations,then control is given to the missing-combination reducer.The missing-combination reducer is implemented with simulated annealing(the metaheuristic component of MPO)and tries to make the number of missing combinations equal to zero.Even though all three components are key to the success of MPO,we believe metaheuristic component is the most important part of MPO,given that through its use it is possible to reduce iteratively number of rows of CA.

    Table 5 New best upper bounds constructed with MPO algorithm.Part 3 of 3.

    Fig.3.Results of MPO after processing instances of repository[10]with t=2. (-Δ=N-N′).

    Fig.4.Results of MPO after processing instances of repository[10]with t=3. (-Δ=N-N′).

    Fig.5.Results of MPO after processing instances of repository[10]with t=4. (-Δ=N-N′).

    Fig.6.Results of MPO after processing instances of repository[10]with t=5. (-Δ=N-N′).

    Fig.7.Results of MPO after processing instances of repository[10]with t=6. (-Δ=N-N′).

    We have conducted big-scale experimentation through instantiation of MPO with the whole NIST repository of CA.NIST repository consists of 21,964 CA,and while improving almost all CA in repository,the most remarkable result is that we have set 349 new upper bounds for these CA.All CA are available at http://www. tamps.cinvestav.mx/~oc/.

    Disclaimer

    Any mention of commercial products in this paper is for information only;it does not imply recommendation or endorsement by NIST.

    Acknowledgements

    The authors acknowledge”Xiuhcoatl”-CGSTIC of CINVESTAV and ABACUS-CINVESTAV,CONACYT grant EDOMEX-2011-COI-165873,for providing access to high performance computing.This research was partially funded by the project:CONACyT 238469-M′etodos Exactos para Construir Covering Arrays.Part of this paper was written during first author's research stay at NIST in 2014-2015.

    [1]E.Aarts,J.Lenstra,Local Search in Combinatorial Optimization,Princeton Univ Pr,2003.ISBN:0691115222.

    [2]H.Avila-George,J.Torres-Jimenez,L.V.H.Gonzalez-Hernandez,Metaheuristic approach for constructing functional test-suites,IET Softw.7(2)(2013) 104-117.

    [3]H.Avila-George,J.Torres-Jimenez,V.Hern′andez,L.Gonzalez-Hernandez, Simulated annealing for constructing mixed covering arrays,in:Proceedings of the 9th International Symposium on Distributed Computing and Arti ficial Intelligence-DCAI.Vol.151 of Advances in Intelligent and Soft Computing. Springer Berlin/Heidelberg,Salamanca,Spain,from 28th to 30th March,2012, pp.657-664.

    [4]K.Bell,Optimizing Effectiveness and Ef ficiency of Software Testing:a Hybrid Approach.Ph.D.Thesis,North Carolina State University,2006.

    [5]D.Bertsimas,J.Tsitsiklis,Simulated annealing,Stat.Sci.8(1)(1993)10-15.

    [6]M.Cohen,C.Colbourn,A.Ling,Augmenting simulated annealing to build interaction test suites,in:Software Reliability Engineering,2003.ISSRE 2003. 14th International Symposium on,Nov.2003,pp.394-405.

    [7]M.Cohen,P.Gibbons,W.Mugridge,C.Colbourn,Constructing test suites for interaction testing,in:Proceedings of the 25th International Conference on Software Engineering.Portland,Oregon,USA,May 2003,pp.38-48.

    [8]M.B.Cohen,Designing Test Suites for Software Interaction Testing.Ph.D. Thesis,University of Auckland,2004.

    [9]M.Forbes,J.Lawrence,Y.Lei,R.Kacker,D.Kuhn,Re fining the in-parameterorder strategy for constructing covering arrays,J.Res.Natl.Inst.Stand. Technol.113(5)(2008)287-297.

    [10]M.Forbes,J.Lawrence,Y.Lei,R.Kacker,D.Kuhn,Repository of CAs.Last Access September,2014.URL,http://math.nist.gov/coveringarrays/ipof/ipofresults.html.

    [11]A.Hedayat,N.Sloane,J.Stufken,Orthogonal Arrays:Theory and Applications, Springer Verlag,1999.ISBN:0-387-98766-5.

    [12]A.Jose-Garcia,H.Romero-Monsivais,C.Hernandez-Morales,A.Rodriguez-Cristerna,I.Rivera-Islas,J.Torres-Jimenez,A simulated annealing algorithm for the problem of minimal addition chains,in:Progress in Arti ficial Intelligence.Vol.7026 of Lecture Notes in Computer Science.Springer Berlin/Heidelberg,2011,pp.311-325.

    [13]S.Kirkpatrick,C.Gelatt Jr.,M.Vecchi,Optimization by simulated annealing, science 220(4598)(1983)671-680.

    [14]D.Kuhn,D.Wallace,A.Gallo Jr.,Software fault interactions and implications for software testing,IEEE Trans.Softw.Eng.30(6)(2004)418-421.

    [15]J.Lam,An Ef ficient Simulated Annealing Schedule.Ph.D.Thesis,Yale University New Haven CT,1988.

    [16]J.Lions,et al.,Ariane 5 Flight 501 Failure,Accesed 2014-09.Tech.Rep,09 2014.http://www.di.unito.it/damiani/ariane5rep.htm.

    [17]G.Myers,C.Sandler,T.Badgett,T.Thomas,The Art of Software Testing,second ed.,John Wiley&Sons Inc,2004.ISBN:0471469122.

    [18]P.Nayeri,C.Colbourn,G.Konjevod,Randomized postoptimization of covering arrays,in:Combinatorial Algorithms.Vol.5874 of Lecture Notes in Computer Science.Springer Berlin/Heidelberg,2009,pp.408-419.

    [19]N.Rangel-Valdez,J.Torres-Jim′enez,J.Bracho-R?os,P.Quiz-Ramos,Problem and algorithm fine-tuning-a case of study using bridge club and simulated annealing,in:A.Dourado,A.C.Rosa,K.Madani(Eds.),IJCCI.IJCCI 2009-Proceedings of the International Joint Conference on Computational Intelligence, Funchal,Madeira,Portugal,October 5-7,2009,INSTICC Press,2009,pp. 302-305.

    [20]A.Rodriguez-Cristerna,J.Torres-Jimenez,A simulated annealing with variable neighborhood search approach to construct mixed covering arrays,Electron. Notes Discrete Math.39(0)(2012)249-256(eURO Mini Conference).

    [21]A.Rodriguez-Cristerna,J.Torres-Jimenez,A genetic algorithm for the problem of minimal brauer chains for large exponents,in:Soft Computing Applications in Optimization,Control,and Recognition,Springer,2013,pp.27-51.

    [22]A.Rodriguez-Cristerna,J.Torres-Jimnez,I.Rivera-Islas,C.Hernandez-Morales, H.Romero-Monsivais,A.Jose-Garcia,A mutation-selection algorithm for the problem of minimum brauer chains,in:I.Batyrshin,G.Sidorov(Eds.),Advances in Soft Computing.Vol.7095 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg,2011,pp.107-118.

    [23]G.Tassey,The Economic Impacts of Inadequate Infrastructure for Software Testing.Tech.Rep,Research Triangle Institute,National Institute of Standards and Technology,U.S.Deparment of Commerce,05 2002.

    [24]J.Torres-Jimenez,E.Rodriguez-Tello,New bounds for binary covering arrays using simulated annealing,Inf.Sci.185(1)(Feb.2012)137-152.

    *Corresponding author.

    E-mail addresses:jtj@cinvestav.mx(J.Torres-Jimenez),arodriguez@tamps. cinvestav.mx(A.Rodriguez-Cristerna).

    Peer review under responsibility of Chongqing University of Technology.

    http://dx.doi.org/10.1016/j.trit.2016.12.006

    2468-2322/?2017 Chongqing University of Technology.Production and hosting by Elsevier B.V.This is an open access article under the CC BY-NC-ND license(http:// creativecommons.org/licenses/by-nc-nd/4.0/).

    NIST repository of covering arrays

    Metaheuristic post-processing algorithms

    国产精品偷伦视频观看了| a级毛片黄视频| 韩国高清视频一区二区三区| 欧美午夜高清在线| 纵有疾风起免费观看全集完整版| 欧美黄色淫秽网站| 日日夜夜操网爽| 亚洲欧美色中文字幕在线| 岛国毛片在线播放| 日本av免费视频播放| 国产97色在线日韩免费| 亚洲色图综合在线观看| 欧美日韩黄片免| 欧美在线黄色| 国产一区二区三区在线臀色熟女 | 国产一区二区 视频在线| 99久久99久久久精品蜜桃| 妹子高潮喷水视频| 午夜福利一区二区在线看| 香蕉丝袜av| 麻豆国产av国片精品| 欧美另类亚洲清纯唯美| 一级毛片女人18水好多| 国产成+人综合+亚洲专区| 看免费av毛片| 亚洲精品国产区一区二| 国产淫语在线视频| 中文字幕人妻丝袜制服| 国产区一区二久久| 在线观看免费高清a一片| 久久人人爽人人片av| 国产成人系列免费观看| 日韩欧美免费精品| 日本wwww免费看| 人人澡人人妻人| 精品福利观看| 一区福利在线观看| 免费观看av网站的网址| 国产精品亚洲av一区麻豆| 亚洲色图综合在线观看| 999久久久国产精品视频| 18禁国产床啪视频网站| 麻豆av在线久日| 老司机午夜福利在线观看视频 | 精品一区二区三区av网在线观看 | 黄网站色视频无遮挡免费观看| 精品一区二区三卡| 国产免费福利视频在线观看| 国产精品亚洲av一区麻豆| 精品国产国语对白av| 自线自在国产av| 精品人妻熟女毛片av久久网站| 视频在线观看一区二区三区| 精品一区二区三区av网在线观看 | 日本五十路高清| 女性生殖器流出的白浆| 菩萨蛮人人尽说江南好唐韦庄| 国产av国产精品国产| 一级a爱视频在线免费观看| 在线观看一区二区三区激情| 国产成人精品无人区| 一本—道久久a久久精品蜜桃钙片| 国产成人精品久久二区二区免费| 乱人伦中国视频| 国产亚洲欧美在线一区二区| 99香蕉大伊视频| 91老司机精品| 国产欧美日韩一区二区三区在线| 国产在线视频一区二区| 超色免费av| 亚洲精品国产色婷婷电影| 欧美精品亚洲一区二区| 国产亚洲av片在线观看秒播厂| 亚洲国产日韩一区二区| 别揉我奶头~嗯~啊~动态视频 | 美女脱内裤让男人舔精品视频| 日韩有码中文字幕| 淫妇啪啪啪对白视频 | 狠狠狠狠99中文字幕| 99热网站在线观看| 欧美国产精品va在线观看不卡| 女人高潮潮喷娇喘18禁视频| 免费观看人在逋| 老司机午夜十八禁免费视频| 天天躁日日躁夜夜躁夜夜| 久久人人97超碰香蕉20202| 国产一区二区三区综合在线观看| 国产av精品麻豆| 国产伦人伦偷精品视频| 免费观看人在逋| 亚洲av美国av| 色播在线永久视频| 免费在线观看日本一区| 一级毛片女人18水好多| 久久国产精品人妻蜜桃| 黄色a级毛片大全视频| 久久久久久久精品精品| 脱女人内裤的视频| 国产高清videossex| 久久久久视频综合| 亚洲欧洲日产国产| 亚洲色图 男人天堂 中文字幕| 中文字幕另类日韩欧美亚洲嫩草| 叶爱在线成人免费视频播放| a级片在线免费高清观看视频| 极品少妇高潮喷水抽搐| 999精品在线视频| 婷婷成人精品国产| 国产亚洲av高清不卡| 97人妻天天添夜夜摸| 国产成+人综合+亚洲专区| 国产在视频线精品| 国产精品一二三区在线看| 欧美日韩亚洲高清精品| 十八禁高潮呻吟视频| 日韩精品免费视频一区二区三区| 免费在线观看完整版高清| 老司机影院毛片| 色婷婷久久久亚洲欧美| 欧美日韩黄片免| 亚洲国产看品久久| 女人久久www免费人成看片| 欧美在线一区亚洲| 精品久久久久久电影网| 久久久久久久精品精品| 天天躁日日躁夜夜躁夜夜| 久久久精品区二区三区| tube8黄色片| 免费女性裸体啪啪无遮挡网站| 91麻豆av在线| 婷婷成人精品国产| 在线看a的网站| 日本猛色少妇xxxxx猛交久久| 日韩免费高清中文字幕av| 成年人午夜在线观看视频| 亚洲午夜精品一区,二区,三区| 美女国产高潮福利片在线看| 亚洲 国产 在线| 深夜精品福利| 色精品久久人妻99蜜桃| 在线av久久热| 国产1区2区3区精品| 精品福利观看| 久久久久久久大尺度免费视频| 91成人精品电影| 一级a爱视频在线免费观看| 亚洲五月婷婷丁香| 欧美成人午夜精品| 欧美激情高清一区二区三区| 在线观看人妻少妇| 免费在线观看视频国产中文字幕亚洲 | 午夜日韩欧美国产| 淫妇啪啪啪对白视频 | 亚洲欧洲精品一区二区精品久久久| 欧美少妇被猛烈插入视频| xxxhd国产人妻xxx| 国产av国产精品国产| 一级毛片精品| 欧美精品啪啪一区二区三区 | 国产亚洲一区二区精品| 久久久久精品国产欧美久久久 | 少妇 在线观看| 国产日韩一区二区三区精品不卡| 多毛熟女@视频| 91老司机精品| 国产成人精品久久二区二区免费| 欧美激情久久久久久爽电影 | 国产老妇伦熟女老妇高清| 成年人午夜在线观看视频| 秋霞在线观看毛片| 午夜视频精品福利| 韩国精品一区二区三区| 男人舔女人的私密视频| 啦啦啦中文免费视频观看日本| 欧美日韩中文字幕国产精品一区二区三区 | 三上悠亚av全集在线观看| 亚洲欧美激情在线| 国产精品一二三区在线看| 亚洲五月色婷婷综合| 老司机亚洲免费影院| 天天躁日日躁夜夜躁夜夜| 亚洲专区字幕在线| 欧美精品亚洲一区二区| 精品国产超薄肉色丝袜足j| 亚洲精品中文字幕在线视频| 精品亚洲成国产av| 久久亚洲精品不卡| 十八禁网站免费在线| 久久久国产精品麻豆| 亚洲国产精品一区二区三区在线| 亚洲国产欧美一区二区综合| 中文欧美无线码| 欧美精品一区二区免费开放| 桃红色精品国产亚洲av| 亚洲精品乱久久久久久| 丝袜美足系列| 欧美 日韩 精品 国产| 午夜精品国产一区二区电影| 在线观看人妻少妇| 好男人电影高清在线观看| 欧美97在线视频| 在线观看一区二区三区激情| 亚洲视频免费观看视频| 国产一区二区三区综合在线观看| 999久久久精品免费观看国产| 亚洲精品国产区一区二| 国产成人欧美| 老熟女久久久| 丝袜人妻中文字幕| 亚洲五月婷婷丁香| 电影成人av| 国产成人影院久久av| 久久香蕉激情| 国产成人av教育| 一本—道久久a久久精品蜜桃钙片| 老司机福利观看| 国产日韩一区二区三区精品不卡| 女人爽到高潮嗷嗷叫在线视频| 国产亚洲av片在线观看秒播厂| 中文字幕另类日韩欧美亚洲嫩草| 久久久久久亚洲精品国产蜜桃av| 精品国产国语对白av| 十八禁高潮呻吟视频| 日韩欧美免费精品| 亚洲第一欧美日韩一区二区三区 | 亚洲情色 制服丝袜| 一个人免费看片子| 免费在线观看黄色视频的| 黄色视频在线播放观看不卡| 90打野战视频偷拍视频| 色视频在线一区二区三区| tube8黄色片| 久久香蕉激情| 天堂俺去俺来也www色官网| 99国产综合亚洲精品| 久久热在线av| 亚洲国产毛片av蜜桃av| 菩萨蛮人人尽说江南好唐韦庄| 99热全是精品| av网站免费在线观看视频| 丁香六月欧美| 国产伦理片在线播放av一区| 欧美国产精品一级二级三级| 一个人免费看片子| 国产欧美日韩综合在线一区二区| 亚洲欧美激情在线| 日韩人妻精品一区2区三区| 50天的宝宝边吃奶边哭怎么回事| 日韩精品免费视频一区二区三区| 麻豆国产av国片精品| 免费在线观看视频国产中文字幕亚洲 | 午夜福利在线免费观看网站| 正在播放国产对白刺激| 成年动漫av网址| 美女主播在线视频| 国产av国产精品国产| 777久久人妻少妇嫩草av网站| 美女主播在线视频| 国产成人免费观看mmmm| 女人爽到高潮嗷嗷叫在线视频| 国产一级毛片在线| 色94色欧美一区二区| 久久精品久久久久久噜噜老黄| 亚洲精品国产一区二区精华液| 9热在线视频观看99| 欧美精品高潮呻吟av久久| 欧美xxⅹ黑人| 精品久久久久久电影网| 欧美人与性动交α欧美软件| 亚洲 国产 在线| av视频免费观看在线观看| 亚洲精品久久久久久婷婷小说| 欧美另类一区| 久久久久国产精品人妻一区二区| 国产精品一区二区精品视频观看| 在线永久观看黄色视频| 久久久久国内视频| 国产高清国产精品国产三级| www.熟女人妻精品国产| 欧美另类亚洲清纯唯美| 午夜日韩欧美国产| 亚洲 国产 在线| 国产一区二区三区综合在线观看| 久久女婷五月综合色啪小说| 69av精品久久久久久 | 国产激情久久老熟女| 日韩免费高清中文字幕av| 老熟妇乱子伦视频在线观看 | 激情视频va一区二区三区| 久热这里只有精品99| 久久久久网色| 丰满人妻熟妇乱又伦精品不卡| 侵犯人妻中文字幕一二三四区| 国产av一区二区精品久久| 中国美女看黄片| 国产成人精品久久二区二区免费| 久久久久久免费高清国产稀缺| 国产精品麻豆人妻色哟哟久久| 俄罗斯特黄特色一大片| 午夜成年电影在线免费观看| 国产精品国产三级国产专区5o| 99国产精品免费福利视频| 国产精品偷伦视频观看了| 多毛熟女@视频| 亚洲专区中文字幕在线| 亚洲九九香蕉| 啪啪无遮挡十八禁网站| 国产麻豆69| 热99国产精品久久久久久7| 国产精品香港三级国产av潘金莲| av福利片在线| 久久青草综合色| 午夜免费成人在线视频| 美女高潮到喷水免费观看| 国产亚洲欧美精品永久| 久久精品亚洲熟妇少妇任你| 狂野欧美激情性bbbbbb| 国产欧美亚洲国产| 欧美亚洲 丝袜 人妻 在线| 中文字幕av电影在线播放| 黄色 视频免费看| 免费在线观看完整版高清| 99热国产这里只有精品6| 欧美精品av麻豆av| 亚洲五月色婷婷综合| 国产精品一区二区在线观看99| 国产精品秋霞免费鲁丝片| 免费在线观看日本一区| 搡老岳熟女国产| 日本a在线网址| 午夜免费鲁丝| 国产精品一区二区精品视频观看| 亚洲精品粉嫩美女一区| 日本精品一区二区三区蜜桃| 满18在线观看网站| 精品一区二区三区av网在线观看 | 中文字幕人妻丝袜一区二区| 国产黄频视频在线观看| 丝袜美足系列| 丁香六月天网| 1024视频免费在线观看| 中国国产av一级| 丁香六月天网| 亚洲人成电影观看| 午夜91福利影院| 成年av动漫网址| 亚洲激情五月婷婷啪啪| 精品高清国产在线一区| 精品国产一区二区三区四区第35| 人成视频在线观看免费观看| 国产免费视频播放在线视频| av视频免费观看在线观看| 少妇人妻久久综合中文| 色老头精品视频在线观看| 欧美日本中文国产一区发布| 最近最新免费中文字幕在线| 午夜91福利影院| 亚洲av美国av| 久久久国产成人免费| 亚洲欧美一区二区三区久久| 在线亚洲精品国产二区图片欧美| 国产在线免费精品| 久久性视频一级片| 中文精品一卡2卡3卡4更新| 欧美人与性动交α欧美软件| 国产不卡av网站在线观看| 最新的欧美精品一区二区| 热re99久久国产66热| 国产亚洲精品第一综合不卡| 一级,二级,三级黄色视频| 欧美久久黑人一区二区| 亚洲少妇的诱惑av| 亚洲欧美一区二区三区黑人| 青春草亚洲视频在线观看| 丰满饥渴人妻一区二区三| 一区二区日韩欧美中文字幕| 亚洲欧美成人综合另类久久久| 亚洲av成人一区二区三| 午夜福利一区二区在线看| 中文欧美无线码| 99国产精品一区二区三区| 国产欧美日韩一区二区三 | 午夜激情av网站| 国产精品久久久久久人妻精品电影 | 欧美另类亚洲清纯唯美| 亚洲第一av免费看| 日本猛色少妇xxxxx猛交久久| 99久久人妻综合| av片东京热男人的天堂| 无遮挡黄片免费观看| 国产av又大| 国产成人欧美| 桃红色精品国产亚洲av| 久久久久久久大尺度免费视频| 99热国产这里只有精品6| 秋霞在线观看毛片| 成人手机av| 亚洲va日本ⅴa欧美va伊人久久 | 看免费av毛片| 久久中文看片网| 黄色怎么调成土黄色| 国产在线观看jvid| 欧美中文综合在线视频| 亚洲第一青青草原| 丰满人妻熟妇乱又伦精品不卡| 日韩欧美一区视频在线观看| 最黄视频免费看| 两个人看的免费小视频| 欧美黄色淫秽网站| 老司机在亚洲福利影院| 男女无遮挡免费网站观看| 中文字幕人妻熟女乱码| 久久 成人 亚洲| h视频一区二区三区| 91国产中文字幕| 岛国在线观看网站| 亚洲成人国产一区在线观看| 可以免费在线观看a视频的电影网站| 黑人巨大精品欧美一区二区mp4| 天天添夜夜摸| 夫妻午夜视频| 精品亚洲乱码少妇综合久久| 最近最新免费中文字幕在线| 一区二区三区乱码不卡18| 三上悠亚av全集在线观看| 女性生殖器流出的白浆| 日韩大片免费观看网站| 欧美精品av麻豆av| av天堂在线播放| 香蕉丝袜av| 免费在线观看日本一区| 国产高清视频在线播放一区 | 国产精品一区二区免费欧美 | 亚洲 欧美一区二区三区| 80岁老熟妇乱子伦牲交| 中文精品一卡2卡3卡4更新| 精品人妻1区二区| 精品欧美一区二区三区在线| 少妇被粗大的猛进出69影院| 丰满人妻熟妇乱又伦精品不卡| 深夜精品福利| 欧美精品av麻豆av| 亚洲成av片中文字幕在线观看| 午夜福利视频精品| 欧美黄色片欧美黄色片| 亚洲av成人一区二区三| 亚洲av欧美aⅴ国产| 老司机深夜福利视频在线观看 | 国产精品一区二区精品视频观看| 亚洲欧美精品自产自拍| 一级黄色大片毛片| 纵有疾风起免费观看全集完整版| 国产亚洲av高清不卡| 99香蕉大伊视频| 亚洲三区欧美一区| 欧美日韩福利视频一区二区| 国产精品国产三级国产专区5o| 成人黄色视频免费在线看| 亚洲 国产 在线| 国产熟女午夜一区二区三区| 精品人妻1区二区| 亚洲成av片中文字幕在线观看| 色综合欧美亚洲国产小说| 巨乳人妻的诱惑在线观看| 中文字幕最新亚洲高清| 国产亚洲欧美在线一区二区| xxxhd国产人妻xxx| 免费女性裸体啪啪无遮挡网站| 一级a爱视频在线免费观看| 亚洲黑人精品在线| 久久ye,这里只有精品| 欧美在线黄色| www.av在线官网国产| 日韩免费高清中文字幕av| 香蕉丝袜av| 777久久人妻少妇嫩草av网站| 亚洲美女黄色视频免费看| 亚洲五月色婷婷综合| 精品熟女少妇八av免费久了| 欧美av亚洲av综合av国产av| 大码成人一级视频| 高清视频免费观看一区二区| 99久久综合免费| 视频区欧美日本亚洲| 女性被躁到高潮视频| 成人手机av| 激情视频va一区二区三区| 日韩制服骚丝袜av| 国产精品香港三级国产av潘金莲| 国产精品免费大片| 岛国毛片在线播放| 久久精品亚洲熟妇少妇任你| 在线看a的网站| 久久久久久免费高清国产稀缺| 国产成人一区二区三区免费视频网站| 午夜免费成人在线视频| 欧美少妇被猛烈插入视频| 久久久久久免费高清国产稀缺| 大香蕉久久成人网| 美女福利国产在线| 在线精品无人区一区二区三| 国产麻豆69| 久久精品国产a三级三级三级| 两性夫妻黄色片| 美国免费a级毛片| 亚洲性夜色夜夜综合| 丰满人妻熟妇乱又伦精品不卡| 成年动漫av网址| 日韩制服骚丝袜av| 亚洲国产成人一精品久久久| 欧美精品人与动牲交sv欧美| 咕卡用的链子| 日韩欧美一区二区三区在线观看 | 男人舔女人的私密视频| 女警被强在线播放| 欧美 日韩 精品 国产| 亚洲精品中文字幕一二三四区 | 国产1区2区3区精品| 性高湖久久久久久久久免费观看| 久久综合国产亚洲精品| tube8黄色片| 国产麻豆69| 狂野欧美激情性bbbbbb| 国产成人精品在线电影| av一本久久久久| videos熟女内射| 最新的欧美精品一区二区| 免费日韩欧美在线观看| 免费在线观看完整版高清| 国产男人的电影天堂91| 男人舔女人的私密视频| 女警被强在线播放| 亚洲精品第二区| 成人手机av| 无遮挡黄片免费观看| 欧美一级毛片孕妇| 99re6热这里在线精品视频| 亚洲精品国产av成人精品| 满18在线观看网站| 亚洲精品国产av蜜桃| 各种免费的搞黄视频| 亚洲国产毛片av蜜桃av| 看免费av毛片| av网站免费在线观看视频| 欧美日韩精品网址| 国产精品秋霞免费鲁丝片| 国产精品久久久人人做人人爽| 欧美国产精品一级二级三级| 久久女婷五月综合色啪小说| 黑人巨大精品欧美一区二区mp4| 国产一区二区激情短视频 | 国产亚洲一区二区精品| 日本av免费视频播放| 搡老熟女国产l中国老女人| 国产免费视频播放在线视频| 十八禁高潮呻吟视频| 久久久久视频综合| 一级a爱视频在线免费观看| 欧美日韩成人在线一区二区| 热re99久久精品国产66热6| 午夜福利在线观看吧| 亚洲精品成人av观看孕妇| tocl精华| 国产精品一区二区免费欧美 | 欧美xxⅹ黑人| 老司机在亚洲福利影院| 亚洲av日韩精品久久久久久密| 婷婷丁香在线五月| 777久久人妻少妇嫩草av网站| 日韩人妻精品一区2区三区| 丁香六月欧美| 在线观看人妻少妇| 国产一区二区三区av在线| 动漫黄色视频在线观看| 精品国产乱码久久久久久男人| 亚洲欧美一区二区三区久久| 在线精品无人区一区二区三| 国产一区二区 视频在线| 在线观看免费视频网站a站| 欧美精品av麻豆av| 国产主播在线观看一区二区| 欧美大码av| 啦啦啦免费观看视频1| 夫妻午夜视频| 人妻一区二区av| www.熟女人妻精品国产| 人妻一区二区av| 91麻豆av在线| kizo精华| 欧美久久黑人一区二区| 亚洲国产欧美网| 99re6热这里在线精品视频| 精品第一国产精品| 国产精品国产av在线观看| www.精华液| 久久国产精品男人的天堂亚洲| 91麻豆av在线| 在线观看一区二区三区激情| bbb黄色大片| 精品亚洲乱码少妇综合久久| 一区在线观看完整版| 免费在线观看影片大全网站| 日本vs欧美在线观看视频| 国产日韩欧美在线精品| av片东京热男人的天堂| 欧美黑人精品巨大| 人人澡人人妻人| 宅男免费午夜| 在线观看免费高清a一片| 亚洲黑人精品在线| 欧美日韩亚洲高清精品| 2018国产大陆天天弄谢| 美女高潮喷水抽搐中文字幕| 中国国产av一级| 丝袜美腿诱惑在线|