• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Privacy-Preserving Algorithm for Clinical Decision-Support Systems Using Random Forest

    2019-03-18 08:15:18AliaAlabdulkarimMznahAlRodhaanYuanTianandAbdullahAlDhelaan
    Computers Materials&Continua 2019年3期

    Alia Alabdulkarim,Mznah Al-Rodhaan,Yuan Tian* and Abdullah Al-Dhelaan

    Abstract:Clinical decision-support systems are technology-based tools that help healthcare providers enhance the quality of their services to satisfy their patients and earn their trust.These systems are used to improve physicians’diagnostic processes in terms of speed and accuracy.Using data-mining techniques,a clinical decision support system builds a classification model from hospital’s dataset for diagnosing new patients using their symptoms.In this work,we propose a privacy-preserving clinical decision-support system that uses a privacy-preserving random forest algorithm to diagnose new symptoms without disclosing patients’information and exposing them to cyber and network attacks.Solving the same problem with a different methodology,the simulation results show that the proposed algorithm outperforms previous work by removing unnecessary attributes and avoiding cryptography algorithms.Moreover,our model is validated against the privacy requirements of the hospitals’datasets and votes,and patients’diagnosed symptoms.

    Keywords:Privacy-preserving,clinical decision-support system,random forests.

    1 Introduction

    Patient health records(PHRs)are considered a vital asset in all health institutions,such as hospitals and clinics.Physicians refer to PHRs during diagnosis and record their findings,such as lab results and X-ray images.Furthermore,when diagnosing a patient,a physician performs a procedure that is called “differential diagnosis”,in which he or she lists all possible diseases and eliminates them one-by-one until only one disease is left[Ledley and Lusted(1959)].To simplify this process,clinical decision-support systems(CDSSs)are used to enhance physicians’diagnostic process[Musen,Middleton and Greenes(2014)].Since PHRs are now computerized,health institutions can use them to build a classification model for classifying a patient’s new symptoms.A CDSS utilizes data-mining techniques or a knowledgebase to aid physicians during diagnosis[Berner and La Lande(2007)].For further enhancement,hospitals may collaborate to generate a more accurate classification modelbycombiningtheirdatasets.However,suchcollaborationwillraiseprivacyconcerns thatarerelatedtopatients’records[Alabdulkarim,Al-RodhaanandTian(2017);Liang,Lu,Chen et al.(2011);Liu,Lu,Ma et al.(2016);Lu,Lin and Shen(2013)].

    The privacy of shared data is a serious issue[Ma,Zhang,Cao et al.(2015);Rong,Ma,Tang et al.(2018);Xiong and Shi(2018)];thus,privacy preserving algorithms for securing data-mining techniques enable the extraction of hidden patterns from a dataset without actually accessing it[Zhang,Tong,Tang et al.(2005)].A privacy-Preserving na?ve Bayes classifier(PPNBC)model was proposed in Liu et al.[Liu,Lu,Ma et al.(2016)].The authors utilized a cloud to collect and aggregate encrypted PHRs and train the NBC.The privacy of the resulting model was maintained by a third party.

    Various data-mining techniques have been used for diagnosing many types of diseases,including heart diseases[Abdar,Kalhori,Sutikno et al.(2015);Chaurasia and Pal(2013)],diabetes[Rahman and Afroz(2013)],and lung cancer[Krishnaiah,Narsimha and Chandra(2013)].Comparing the accuracy rates,the study in Abdar et al.[Abdar,Kalhori,Sutikno et al.(2015)]has found that among SVM,KNN,and neural networks,C4.5 was the most accurate.Furthermore,comparing J48 and Bayesian networks,the study in Rahman et al.[Rahman and Afroz(2013)]found that the former has higher performance accuracy.Hence,decision trees are the most accurate classification models for medical applications.

    In an ensemble of decision trees,instead of returning one decision class,each tree in the ensemble returns a decision class.Then,the class that receives the majority of votes is returned as the final decision class. The random forest ensemble is constructed by randomly generating multiple subsets of the dataset and from each dataset subset,a single decision tree is built[Wu,Feng,Naehrig et al.(2016)].Furthermore,the studies in Alickovic et al.[Alickovic and Subasi(2016);Azar and El-Metwally(2013);?z?ift(2011)]have shown the positive impact of tree ensembles on the classification performance and results.

    Generating decision trees from multiple distributed datasets that are owned by different parties without disclosing their content is called privacy-preserving data-mining,in which privacy is achieved through encryption and secret-sharing schemes.

    Motivated by the need for a privacy-preserving CDSS,that would mainly aim to build an accurate classification model to aid physicians while maintaining patients’health records private,in this paper,we propose a privacy-preserving clinical decision-support system(PPCDSS)that uses random forests to enable multiple parties(hospitals),through a cloud,to collaborate in creating a classification model(random forest)for the CDSS without revealing patients’records.We have proposed in Alabdulkarim et al. [Alabdulkarim, Al-Rodhaan and Tian(2017)]a privacy-preserving model for a healthcare systems.Part of the proposed model addresses the privacy and security challenges faced by clinical decision-support systems.In this paper,PPCDSS model is based on the proposed privacy-preserving random forest(PPRF)algorithm.The study in Liu et al.[Liu,Lu,Ma et al.(2016)]has proposed a different solution to the same problem using PPNBC.The simulation results show that the PPRF algorithm outperforms the PPNBC algorithm in terms of average runtime in preserving hospital and patient privacy by removing unneeded attributes and avoiding the use of cryptography.Furthermore,our model is validated against all datasets and patient privacy requirements.The main contributions of our work are threefold:

    1.We propose a PPCDSS that helps hospitals create a classification model privately for the clinical decision-support system and diagnose new patients’ symptoms without disclosing their datasets.

    2.In order to protect patients’ privacy,we propose a privacy-preserving random forest(PPRF) algorithm that builds a random forest model from distributed datasets without disclosing the datasets.

    3.Our proposed model has a shorter average runtime than that of the work in Liu et al.[Liu,Lu,Ma et al.(2016)],which used NBC as a classification model.

    The remainder of the paper is organized as follows:The system architecture is in Section 2.Then,a set of notations and preliminaries are presented in Section 3.The proposed PPRF algorithm is described in Section 4,followed by privacy analysis and performance evaluation in Sections 5 and 6,respectively.The current literature and related work are reviewed in Section 7.Finally,the conclusions and future work are presented in Section 8.

    2 System architecture

    2.1 System model

    In our model,we build a random forest(RF)from all participating hospitals’datasets while preserving the patients’privacy.Fig.1 depicts the layout of all system participants and their relations.The main participants in our PPRF model are the trusted authority(TA),the hospitals,and the cloud.

    1.Trusted authority (TA):The TA is responsible for RSA key generation and management during initialization and setup.

    2.Hospitals:Each hospital generates a local random forest ensemble and sends it to the cloud.In addition,they vote out trees from the global ensemble.

    3.Cloud:The cloud receives the local ensembles from the participating hospitals and securely aggregates them into a single global ensemble.

    2.2 Threat model

    We define an adversary,A,whose goal is to eavesdrop on the transmission between the hospitals,H,and the cloud,C.Amay acquire the ensemble and/or the encrypted arrays of votes.By intercepting the latter,Amay try to decipher the arrays to obtain hospitals’votes.Whereas,with the former,Amay be able to reconstruct the original training datasets.However,we assume no collusion occurs between the system parties that would result in disclosing patients’personal health records since they are not part of the decision trees.Furthermore,we assume any hospitalHwill provide the cloud with legitimate ensembles.

    Table1:Notation

    2.3 Privacy requirements

    PHRs and patients’symptoms are the most important assets and should remain private.The following privacy requirements must be met to guarantee hospital and patient privacy:

    1.Privacy of the hospitals’ datasets:Each hospital records patients’ medical histories and diagnoses in their databases,thereby forming a dataset that could be used as a training corpus for the PPRF algorithm.However,due to the sensitive nature of such records,hospitals normally refrain from sharing them.Therefore,their privacy must be ensured and preserved when we design our model.

    2.Privacy of the hospitals’ votes:Hospitals may want to remove a single or a set of trees from the ensemble; however,revealing their votes could expose information from their datasets.Hence,hospitals’ votes must remain private.

    3.Privacy of the patients’ diagnosed symptoms:To diagnose a patient,a physician would use the CDSS to retrieve the possible diagnoses based on the patient’s symptoms.However,if no privacy guarantees were offered,then no patient would allow his or her symptoms to be fed into the system.Therefore,patients’ symptoms must remain private.

    3 Notations and preliminaries

    3.1 Notations

    In this section,we explain the notations that are used throughout the paper.Tab.1 lists the notations and their meanings.

    3.2 Preliminaries

    In this section,we present the details of the C4.5 algorithm for generating decision trees and the definition of random forests.

    3.2.1 Decision tree algorithm C4.5

    Quinlan’s C4.5 decision tree algorithm is commonly used in classification problems[Quinlan(2014)].The main objective of the algorithm is to construct a decision tree from a dataset of examples and their classes.The algorithm follows the divide-and-conquer model,where at each step it tries to find the best attribute for splitting the dataset.This is done by calculating two values:entropy and information gain.To calculate these values,we setajto be one of the possible values of attributeA,where1≤j≤p;letndenote the number of classes in datasetD;and select a decision classci∈C,whereCis the set of decision classes and1≤i≤n.See Eqs.(1)to(3)for more details.In Eq.(2),the entropy of each attribute in the dataset is calculated.Entropy(aj)is evaluated using Eq.(1),whereDis substituted byaj.

    The attribute of maximum Information Gain(IG)will be selected as the best attribute for splitting the dataset intoppartitions.The process will iterate until there are no more partitions.

    3.2.2 Random forest

    To construct a random forest,distinct subsets of the dataset are extracted first.Then,a single decision tree is generated from each subset.The generated trees form a random forest ensemble.The classification result is the class returned by the majority of trees[Wu,Feng,Naehrig et al.(2016)].

    4 The proposed PPRF algorithm

    The PPRF algorithm uses the C4.5 algorithm to generate single decision trees to form the RF ensemble.In this section,we describe the proposed PPRF algorithm by explaining its steps,followed by a description of the complete algorithm.

    4.1 Design rationale

    Physicians usually collect patient’s vital signs and symptoms for diagnosis.The symptomdisease matching process can be time consuming [Ledley and Lusted (1959)].Inourmodel,we propose a privacy-preserving design for a PPCDSS model to improve physicians’productivity and accuracy.The PPCDSS model is based on our privacy-preserving random forest(PPRF)algorithm.The algorithm repeatedly executes a C4.5 algorithm to generate decision trees from subsets.Then the algorithm aggregates and shares the final ensemble with all hospitals while preserving the privacy of the patients.

    An RF is an ensemble of single decision trees,where each is built from a random subset of the dataset.Since our dataset is an aggregation of datasets of all hospitals,we can consider each single dataset as a random horizontal subset.Therefore,each hospital can generate its own random forest and transmit it to the cloud(Fig.1(a)).There,the ensemble aggregator(Fig.1(b))will form the initial global ensemble by removing all redundant trees.The output of the previous step will be sent to the electronic vote manager(EVM)(Fig.1(c)),which it will send it to all hospitals to review and vote(Fig.1(d)).Each hospital will review the initial ensemble and vote out any tree that reveals knowledge of its own dataset.Then,the hospital will send its vote back to the cloud(Fig.1(e)).Each vote can only be seen by the cloud.Thus,the identity of an objecting hospital is hidden from the others.Finally,the EVM will remove the trees that have been voted out from the ensemble and transmit the final global ensemble to all hospitals (Fig. 1(f)). Although no security or privacy techniques were used in this model, privacy preservation was achieved by hiding the original datasets.

    Figure1:Privacy-preserving random forest(PPRF)model

    4.2 Construction

    The following steps describe the PPRF algorithm and the roles of the cloud and hospitals:

    Step 1.The cloud will prompt each hospitalhto prepare its local RF ensemble,which is denoted asRFh.

    Step 2.Each hospitalhwill prepare its ensembleRFhby generating decision treest1....tsfrom various subsets and send it to the cloud.

    Step 3.The cloud will receive the ensembles and securely aggregate them into one ensemble after removing redundancies.

    Step 4.The EVM will be launched by the cloud to eliminate trees that are unwanted by the hospitals from the ensemble.

    Step 5.Each hospital will cast its votes and encrypt them using the cloud’s RSA public key.

    Step 6.Upon receiving the votes,the cloud will remove voted-out trees to form the final ensemble.

    Step 7.The cloud will send the final ensemble to all hospitals.

    4.3 Algorithm design

    As described earlier,each hospital will generate random subsets of its own dataset.Then,from each subset dataset,a decision tree will be built using the algorithm that is presented in Section 3.2.1.After the cloud securely aggregates the distinct trees,it will run the EVM.The final results will be propagated to all hospitals.This process can be detailed as follows:

    1.At each hospital siteh,random subsets (d1...ds) of the datasetDare generated.

    2.For eachdi∈(d1....ds),a decision treetiis built.

    3.All decision treest1....tsare sent to the cloud as random forest ensembleRFh(Algorithm 1).

    Algorithm 1:Build Local Random Forest Ensemble Input: k =number of generated trees Output:local RF LocalRF={}for i← 0 to k do LocalRF.add(ti)end return LocalRF di = randomSubset (D) ti = buildDecisionTree (di)if ti is unique then

    Algorithm 2:Build Global Random Forest Ensemble Input: LocalRFh =local RF ensemble from hospital h k =number of generated trees n =number of hospitals Output:global RF GlobalRF={}for i← 0 to n do GlobalRF.add(ti)end end return GlobalRF for j← 0 to k do t = LocalRFi [ j ]if t is unique then

    Figure2:Hospitals datasets.Acquired from Dheeru et al.[Dheeru and Karra Taniskidou(2003)]

    Figure3:RF of Hospital 1:(a)Hospital 1’s dataset;(b)Hospital 1’s RF model

    Algorithm 2 describes how the cloud receivesRFhfrom each hospital and securely aggregates them,while removing redundancies,into one ensemble(the initial global ensemble).Then,a secure electronic vote will be held to allow hospitals to anonymously vote out any tree without revealing their identities to other hospitals.After agreeing upon the ensemble of trees,each hospital now will acquire the same random forest ensemble(the final global ensemble).

    By the end of the training process,each hospital can diagnose new symptoms locally.Since RF returns the disease class that received the majority of the votes,the top 3 disease classes can be returned.

    4.4 Descriptive scheme

    In this section,we describe an experimental case study of the PPRF model.Consider the datasets of the three hospitals in Fig.2.We intend to show how the three hospitals will collaborate to build the RF model.

    First,each hospital will randomly draw subsets of its dataset and generate decision trees based on these subsets(Figs.3,4 and 5)to form its local RF model.

    Then,the cloud will receive the three RF models(RF1,RF2,and RF3)and remove redundancies(RF2 and RF3 in Figs.4 and 5,respectively have a common tree).Therefore,the initial global RF model will be as shown in Fig.6.Thereafter,the cloud will send the initial model to all hospitals to run the vote.Assuming no hospital objects to any decision tree in the model,the final global model will be as shown in Fig.6.

    Consider the example of Dr.Alice and Bob.Dr.Alice will use the RF model to trace Bob’s symptoms(Nausea=0,Lumbar pain=0,Urine pushing=1,Micturition pain=1,Burning of urethra=1).The model will return 7 votes for class 2,3 votes for class 0,2 votes for class 1,and 0 votes for class 3.Therefore,Dr.Alice can confirm that Bob would most likely be diagnosed with inflammation of the urinary bladder.

    Figure4:RF of Hospital 2:(a)Hospital 2’s dataset;(b)Hospital 2’s RF model

    Figure5:RF of Hospital 3:(a)Hospital 3’s dataset;(b)Hospital 3’s RF model

    Figure6:RF Model after securely aggregating the RF model of all hospitals

    5 Privacy analysis

    In this section we show how our design goals for preserving the privacies of the patients,the hospitals’datasets,the evaluated proportions and the voting process were all satisfied.

    5.1 Privacy of hospitals’datasets

    The PPRF model aims at building a random forest classification model from distributed datasets without disclosing them.Our model shows how each hospital was responsible for building the trees,and the cloud’s main task was to collect the trees and filter them.Therefore,the privacy of the datasets was preserved by not sharing or transferring them over the network.

    5.2 Privacy analysis of the EVM

    The EVM is responsible for securely collecting participants’votes.The EVM will supply all parties with its public RSA 32-bit key to encrypt their votes before sending them to the cloud.To decrypt the votes,an adversary must obtain the private key;therefore,the resistance of the EVM to attacks is dependent on the secrecy and strength of the private key.

    5.3 Privacy of the diagnosed symptoms

    The proposed model allows the hospitals to store the classification model at their sites.Thus,physicians may use the system locally and off line for diagnosis.Hence,patients’symptoms will not be exposed to cyber-attacks by transmitting them over the network.

    6 Performance evaluation

    To simulate the model,we have used a laptop with an Intel Core Processor i7 and 8 GB RAM with a Linux OS(Ubuntu 16.04)and Python as the programming language.We aim at evaluating our PPCDSS in terms of confidentiality and correctness through security analysis.Our goal is to ensure that the implemented security measures do not affect the accuracy of the data-mining techniques that are used.

    Dataset.The dataset that we use to generate the decision trees was acquired from[Dheeru and Karra Taniskidou(2003)]with one amendment:We have removed the “Temperature”attribute,because after converting it from a continuous to a discrete attribute(0= “no fever”and 1= “fever”),it was found that it always yielded the lowest information gain(IG)value.Hence,we considered five attributes:Nausea(N),Lumbar pain(LP),Urine pushing(UP),Micturition pain(MP),and Burning of the urethra(BU).

    Implementation.The dataset was distributed among the hospitals and each hospital generated decision trees from a randomly sampled subset of the dataset.During set-up,the number of generated trees(n)will be decided.After each hospital has generatedndistinct decision trees,they will be sent to the cloud for assembly into a single collection or ensemble.Then,the ensemble will be sent back to the hospitals for them to approve it.Each hospital will review the ensemble and fill their votes into an array,of which each element corresponds to one tree in the ensemble.Before the votes are returned,they will be encrypted using the RSA algorithm to hide them from other hospitals so that no hospital can know the others’votes;the cloud’s public key will be used in this case.After receiving the votes,the cloud will exclude every voted-out tree from the ensemble to form the final RF ensemble.The final ensemble will be propagated back to the hospitals;hence,all hospitals will obtain the same RF model.

    Performance on datasets.Using datasets(DSs)of various sizes that range from 10 to 120 tuples,we find that the average runtime of PPRF increases as the size of the DS increases(Fig.7).However,the of increase is not significant;the shortest runtime(0.2seconds)is observed when the DS size is10tuples and the longest runtime(1second)when the DS size is120tuples.

    Figure7:Average runtimes of the PPRF and PPNBC algorithms over various DS sizes.NOT=100

    Evaluation on NOT.The simulation code was tested using various numbers of generated trees(NOTs)that ranged from 10 to 100.Fig.8 depicts the changes in the average runtime when increasing NOT.We find that the the average runtime increases as NOT increases;the longest runtime of0.1seconds is observed when NOT=10 and the slowest runtime of 1.1seconds when NOT=100.

    Performance of cipher functions.We use RSA in our PPRF algorithm to encrypt the votes,which are stored in an array,element by element.The details of the runtime results show that the encryption and decryption operations take≈0.21%of the average total runtime.The encryption operation took an average of approximately≈0.0002seconds,whereas the decryption operation took approximately≈0.001seconds.Fig.9 and 10 depict the average runtimes for the encryption and decryption operations,respectively.The figures show a slight linear increase in the runtime as the NOT increases;that is because the array size is equal to the size of the global ensemble,and therefore,the growth of the functions isO(n).

    Figure8:Average runtime of the PPRF algorithm over various NOTs. |DS| =120

    Figure9:Average runtime of the encryption function. |DS| =120

    Figure10:Average runtime of the decryption function. |DS| =120

    Evaluation of cipher key size.All previous simulations were conducted using RSA key pairs of 32 bits.Even though the key length should be atleast 2048 bits,we were limited to our choice due to the machine specifications.However,since the encryption and decryption functions are used to encrypt arrays of small integers,the overhead of using larger keys is expected to be negligible.Therefore,it is recommended to use larger key sizes.

    To determine how the key size affects the average runtime of the PPRF algorithm,we repeat the simulations with three key sizes:8 bits,16 bits,and 24 bits.According to Fig.11,the key size has no major effect on the average runtime.

    Figure11:Average runtime of the PPRF algorithm using various key sizes. |DS| =120

    Performance comparison.The study in Liu et al.[Liu,Lu,Ma et al.(2016)]proposed a PPNBC classification algorithm that uses Paillier,the secure multiplication protocol[Samanthula,Elmehdwi and Jiang(2015)],and their novel additive homomorphic proxy aggregation(AHPA)protocol for secure aggregation.Furthermore,the authors have used the same dataset in Dheeru et al.[Dheeru and Karra Taniskidou(2003)]with some modifications;they have converted the “Temperature”attribute into51attributes,one for each temperature degree.The average runtime of their algorithm when the dataset size is between50and100tuples ranges between27seconds and30seconds(Fig.7).However,our PPRF algorithm performed better,with average runtimes for the same dataset size that range between0.5seconds and0.8seconds.As a result,our PPRF algorithm has outper-formed the NBC algorithm in Liu et al.[Liu,Lu,Ma et al.(2016)]in terms of average runtime.Moreover,for diagnosing a new patient using the PPNBC model,patients’symptoms will be encrypted and transmitted to a third party(where the classification model is stored)via the cloud,thereby exposing patients’data to network attacks.Our model bypasses these risks by storing the classification model at the hospitals’sites,which enables the hospitals to diagnose patients off line.

    Scalability.As the system grows by increasing the number of participating hospitals,it is expected to have more ensembles to filter.The growth of this function depends on the number of trees per ensemble.However,the array of votes’size is not effected by the system’s growth because it is linked to the NOT.Furthermore,the growth of the tree generation process is determined by the NOT,subsets’sizes,and/or number of features.The increase in any of these parameters will increase the growth of the ensemble generation.

    7 Related work

    Ledley et al.[Ledley and Lusted(1959)]are the pioneers of the CDSS.They demonstrated the efficiency of computers in simplifying complicated diagnostic processes.Later,additional studies,suchas Warner[Warner(1961)],proposed new CDSSs.The authors werethe first to classify congenital heart diseases using a Bayesian classifier.The study in Schurink et al.[Schurink,Lucas,Hoepelman et al.(2005)]proposed models that addressed issues that intensive care unit physicians commonly face in relation to the diagnosis and treatment of infectious diseases,using na?ve Bayes.Addressing privacy issues that are related to CDSS,the authors in Liu et al.[Liu,Lu,Ma et al.(2016)]have proposed a PPNBC algorithm for a PPCDSS to preserve patients’privacy while using the system.They have solved the collusion problem between the cloud and the processing unit through their novel AHPA algorithm.

    Random ensembles of decision trees were also used in medical applications.For instance,the study in Alickovic et al.[Alickovic and Subasi(2016)]used RF,CART,and C4.5 to diagnose heart arrhythmia;their RF model performed the best in terms of accuracy.Furthermore,the study in Azar et al.[Azar and El-Metwally(2013)]compared the SDT,boosted decision tree,and decision tree forest and found that the decision tree forest performed the best in terms of accuracy.The study in ?z?ift et al.[?z?ift(2011)]proposed an RF model that yielded 76-90%classification accuracy and compared their model to other studies in literature.As a result,we conclude that random ensembles of decision trees yield a better accuracy than that of single decision trees.

    8 Conclusion

    Taking the advantage of technological advancements in medical field increases the efficiency and quality of the healthcare services that are provided by health institutions.CDSS is an example of a medical application that improves physicians’performances and patients’experiences.However,requiring these systems to work over the network poses a threat to patients’privacy by exposing their data to network attacks.

    In this work,we proposed a privacy-preserving healthcare system,namely,PPCDSS,based on the proposed PPRF algorithm.With the removal of unnecessary attributes and the avoidance of cryptography methods,simulation results have demonstrated that the PPRF algorithm outperformed the PPNBC algorithm in Liu et al.[Liu,Lu,Ma et al.(2016)] in terms of average runtime.Thus,our proposed PPRF algorithm provides a privacy-preserving environment for transmitting patients’ records over the network and building a decision-tree ensemble without disclosing patients’ information.As a future work,we intend to generalize our model to accept attributes with more possible values,and also to insure integrity of the model with Message Authentication Code (MAC).

    Acknowledgement:This research project was supported by a grant from the "Research Center of the Female Scientific and Medical Colleges",Deanship of Scienti fic Research,King Saud University.

    97精品久久久久久久久久精品| 男女下面插进去视频免费观看| 叶爱在线成人免费视频播放| 国产一卡二卡三卡精品 | 国产亚洲一区二区精品| 欧美日韩精品网址| 一二三四中文在线观看免费高清| 日日摸夜夜添夜夜爱| 最近中文字幕2019免费版| 悠悠久久av| 亚洲精品成人av观看孕妇| 国产精品免费视频内射| 高清欧美精品videossex| 啦啦啦在线免费观看视频4| 成人18禁高潮啪啪吃奶动态图| 性少妇av在线| 美女主播在线视频| 色精品久久人妻99蜜桃| 久久免费观看电影| 亚洲精品aⅴ在线观看| 大话2 男鬼变身卡| 欧美黑人欧美精品刺激| 国产精品香港三级国产av潘金莲 | 97在线人人人人妻| 老汉色∧v一级毛片| 欧美 日韩 精品 国产| 伊人久久大香线蕉亚洲五| 自线自在国产av| 男人舔女人的私密视频| 亚洲专区中文字幕在线 | 国产精品秋霞免费鲁丝片| 欧美精品一区二区免费开放| 国产精品久久久久久人妻精品电影 | 激情五月婷婷亚洲| 一级片'在线观看视频| 久久久国产一区二区| 大码成人一级视频| 亚洲国产欧美在线一区| 国产男人的电影天堂91| 一级片'在线观看视频| svipshipincom国产片| 18禁裸乳无遮挡动漫免费视频| 日韩制服骚丝袜av| 桃花免费在线播放| 久久久国产一区二区| 免费av中文字幕在线| 国产片内射在线| 大片电影免费在线观看免费| 免费久久久久久久精品成人欧美视频| 亚洲免费av在线视频| av片东京热男人的天堂| 国产一区二区在线观看av| 亚洲精品乱久久久久久| 可以免费在线观看a视频的电影网站 | 男女国产视频网站| 制服人妻中文乱码| 久久热在线av| 久久影院123| 久久久久人妻精品一区果冻| 精品第一国产精品| 精品少妇久久久久久888优播| 看免费av毛片| 卡戴珊不雅视频在线播放| 亚洲欧美清纯卡通| 国语对白做爰xxxⅹ性视频网站| 午夜日韩欧美国产| 欧美日韩国产mv在线观看视频| 日韩欧美精品免费久久| 无限看片的www在线观看| 热re99久久国产66热| √禁漫天堂资源中文www| 国产视频首页在线观看| 国产精品欧美亚洲77777| 丰满迷人的少妇在线观看| 国产成人av激情在线播放| 青青草视频在线视频观看| 日本av手机在线免费观看| 午夜福利视频精品| 老司机深夜福利视频在线观看 | 久久免费观看电影| 欧美人与性动交α欧美精品济南到| 成人黄色视频免费在线看| 69精品国产乱码久久久| 精品久久久久久电影网| av片东京热男人的天堂| 大码成人一级视频| 国产日韩一区二区三区精品不卡| 国产精品三级大全| 精品一区在线观看国产| 国产一区二区 视频在线| 精品少妇久久久久久888优播| 亚洲精品久久午夜乱码| 亚洲精品国产av成人精品| 欧美日韩av久久| 亚洲三区欧美一区| 啦啦啦啦在线视频资源| 亚洲精品国产av蜜桃| 老熟女久久久| 免费少妇av软件| av视频免费观看在线观看| 美女高潮到喷水免费观看| 叶爱在线成人免费视频播放| 天天操日日干夜夜撸| 老鸭窝网址在线观看| 国产精品成人在线| 久久久精品国产亚洲av高清涩受| 国产成人欧美在线观看 | 国产男女超爽视频在线观看| 男女下面插进去视频免费观看| 欧美日韩视频精品一区| 亚洲一级一片aⅴ在线观看| 久久久久精品国产欧美久久久 | av视频免费观看在线观看| 不卡视频在线观看欧美| 国产精品av久久久久免费| 午夜日本视频在线| 亚洲精品,欧美精品| 久久国产精品大桥未久av| 国产成人精品久久二区二区91 | 多毛熟女@视频| 青春草亚洲视频在线观看| av国产精品久久久久影院| 夜夜骑夜夜射夜夜干| 秋霞在线观看毛片| 涩涩av久久男人的天堂| 亚洲国产日韩一区二区| 高清黄色对白视频在线免费看| 久久精品亚洲av国产电影网| 婷婷色综合大香蕉| 成人国语在线视频| 黑人猛操日本美女一级片| 91精品国产国语对白视频| 在现免费观看毛片| 久久久久国产精品人妻一区二区| 欧美日韩亚洲高清精品| 日韩视频在线欧美| 久久久久精品人妻al黑| 久久人妻熟女aⅴ| 视频在线观看一区二区三区| 如日韩欧美国产精品一区二区三区| 最黄视频免费看| 精品一区二区三区四区五区乱码 | 国产伦理片在线播放av一区| 成人亚洲欧美一区二区av| 亚洲av欧美aⅴ国产| 黄片无遮挡物在线观看| 国产成人免费观看mmmm| av片东京热男人的天堂| 免费av中文字幕在线| 一二三四中文在线观看免费高清| 热re99久久精品国产66热6| 亚洲国产精品999| 久久久久久久久久久久大奶| 日本一区二区免费在线视频| 男女高潮啪啪啪动态图| 观看美女的网站| www日本在线高清视频| 女人精品久久久久毛片| 日韩视频在线欧美| 宅男免费午夜| 波野结衣二区三区在线| 日韩一本色道免费dvd| 菩萨蛮人人尽说江南好唐韦庄| 大片电影免费在线观看免费| 热re99久久国产66热| 国产精品一二三区在线看| 九九爱精品视频在线观看| 一区二区日韩欧美中文字幕| 人妻一区二区av| 免费高清在线观看日韩| 大话2 男鬼变身卡| 美女主播在线视频| 激情五月婷婷亚洲| 青春草亚洲视频在线观看| 美国免费a级毛片| 久久精品久久久久久久性| 亚洲欧美色中文字幕在线| 五月开心婷婷网| 两性夫妻黄色片| 国产97色在线日韩免费| 成人18禁高潮啪啪吃奶动态图| 久久久久网色| 亚洲图色成人| 午夜福利一区二区在线看| 国产欧美亚洲国产| 男的添女的下面高潮视频| 精品久久久久久电影网| 人人澡人人妻人| 国语对白做爰xxxⅹ性视频网站| 热re99久久精品国产66热6| 欧美97在线视频| 最近中文字幕2019免费版| 大香蕉久久成人网| 大片电影免费在线观看免费| 夜夜骑夜夜射夜夜干| 亚洲av综合色区一区| 天天影视国产精品| 性高湖久久久久久久久免费观看| 免费高清在线观看视频在线观看| 成人国语在线视频| 免费观看性生交大片5| 国产精品免费视频内射| 国产免费又黄又爽又色| 90打野战视频偷拍视频| 大香蕉久久成人网| 又粗又硬又长又爽又黄的视频| 久久韩国三级中文字幕| 丝袜在线中文字幕| 赤兔流量卡办理| 美女脱内裤让男人舔精品视频| 日本午夜av视频| 久久ye,这里只有精品| 黄色视频在线播放观看不卡| 国产欧美日韩一区二区三区在线| 午夜福利,免费看| 亚洲av国产av综合av卡| 熟女少妇亚洲综合色aaa.| 欧美日韩国产mv在线观看视频| 老司机靠b影院| 18禁国产床啪视频网站| 精品免费久久久久久久清纯 | 尾随美女入室| 亚洲第一区二区三区不卡| 桃花免费在线播放| 99久久综合免费| 婷婷色av中文字幕| 亚洲视频免费观看视频| 国产精品久久久久久人妻精品电影 | 蜜桃在线观看..| 亚洲av日韩在线播放| 日本wwww免费看| 我的亚洲天堂| 亚洲欧美一区二区三区国产| 天天躁狠狠躁夜夜躁狠狠躁| 黑丝袜美女国产一区| 日韩不卡一区二区三区视频在线| 精品一区二区三区av网在线观看 | 王馨瑶露胸无遮挡在线观看| 啦啦啦啦在线视频资源| 欧美变态另类bdsm刘玥| 国产一卡二卡三卡精品 | 制服人妻中文乱码| 2021少妇久久久久久久久久久| 国产精品一二三区在线看| av网站在线播放免费| 在线观看国产h片| 咕卡用的链子| 黄色 视频免费看| 青春草视频在线免费观看| 男女免费视频国产| 各种免费的搞黄视频| 亚洲自偷自拍图片 自拍| 欧美精品高潮呻吟av久久| 狠狠婷婷综合久久久久久88av| 18禁裸乳无遮挡动漫免费视频| 2021少妇久久久久久久久久久| 精品人妻一区二区三区麻豆| 免费观看人在逋| 国产男女内射视频| 美女国产高潮福利片在线看| 涩涩av久久男人的天堂| 大话2 男鬼变身卡| av网站在线播放免费| netflix在线观看网站| 悠悠久久av| 精品人妻熟女毛片av久久网站| av免费观看日本| 国产免费视频播放在线视频| 18禁动态无遮挡网站| videosex国产| 又大又黄又爽视频免费| 一区二区三区四区激情视频| 在线亚洲精品国产二区图片欧美| 亚洲中文av在线| 久久久精品国产亚洲av高清涩受| 精品卡一卡二卡四卡免费| 99久久人妻综合| 免费观看人在逋| 一级片'在线观看视频| 777久久人妻少妇嫩草av网站| 成人午夜精彩视频在线观看| 国产精品 国内视频| 欧美日韩亚洲国产一区二区在线观看 | 亚洲伊人色综图| 人体艺术视频欧美日本| 最新在线观看一区二区三区 | 欧美另类一区| 日本欧美国产在线视频| 在线观看人妻少妇| 亚洲欧美精品自产自拍| 一边亲一边摸免费视频| www日本在线高清视频| 在线观看免费视频网站a站| 日韩人妻精品一区2区三区| 色综合欧美亚洲国产小说| 欧美人与性动交α欧美软件| 女人高潮潮喷娇喘18禁视频| 亚洲七黄色美女视频| av一本久久久久| 韩国高清视频一区二区三区| 不卡视频在线观看欧美| 欧美日韩福利视频一区二区| 高清av免费在线| 久久久久网色| 80岁老熟妇乱子伦牲交| 色精品久久人妻99蜜桃| 亚洲欧洲精品一区二区精品久久久 | 妹子高潮喷水视频| 国产探花极品一区二区| 免费观看a级毛片全部| 人人澡人人妻人| 黑人巨大精品欧美一区二区蜜桃| www.av在线官网国产| 亚洲成国产人片在线观看| 老司机影院成人| kizo精华| 一区二区av电影网| 夜夜骑夜夜射夜夜干| 欧美97在线视频| 伊人亚洲综合成人网| 综合色丁香网| 欧美日韩精品网址| 80岁老熟妇乱子伦牲交| 美女主播在线视频| 亚洲精品国产av成人精品| 国产色婷婷99| 久久天躁狠狠躁夜夜2o2o | 丝袜美足系列| 亚洲欧美色中文字幕在线| 大香蕉久久成人网| 精品少妇内射三级| 亚洲成人免费av在线播放| 这个男人来自地球电影免费观看 | 免费在线观看完整版高清| 99香蕉大伊视频| 国产精品熟女久久久久浪| kizo精华| 别揉我奶头~嗯~啊~动态视频 | 欧美日韩成人在线一区二区| 日本爱情动作片www.在线观看| 男女午夜视频在线观看| 永久免费av网站大全| 国产精品女同一区二区软件| 嫩草影视91久久| 男女免费视频国产| 街头女战士在线观看网站| 王馨瑶露胸无遮挡在线观看| 精品亚洲成国产av| 一级片免费观看大全| 久久97久久精品| 老熟女久久久| 日韩大码丰满熟妇| 我的亚洲天堂| 在线观看人妻少妇| 久久久亚洲精品成人影院| 日韩成人av中文字幕在线观看| videos熟女内射| 亚洲精品自拍成人| 久久韩国三级中文字幕| 日韩 欧美 亚洲 中文字幕| 日韩精品有码人妻一区| 国产片特级美女逼逼视频| 亚洲精品美女久久av网站| 狂野欧美激情性xxxx| 亚洲欧美激情在线| 精品酒店卫生间| 777米奇影视久久| 婷婷成人精品国产| 中文字幕人妻丝袜制服| 激情五月婷婷亚洲| 亚洲av在线观看美女高潮| 母亲3免费完整高清在线观看| 久久久久久久久免费视频了| 国产亚洲精品第一综合不卡| 亚洲精品aⅴ在线观看| 欧美日韩视频高清一区二区三区二| 亚洲av在线观看美女高潮| 麻豆av在线久日| 国产成人av激情在线播放| 午夜影院在线不卡| 黄片无遮挡物在线观看| 亚洲欧美一区二区三区久久| 少妇被粗大的猛进出69影院| 久久精品久久久久久噜噜老黄| 中文字幕精品免费在线观看视频| 蜜桃在线观看..| 亚洲免费av在线视频| 一级a爱视频在线免费观看| 国产一区二区激情短视频 | 尾随美女入室| 日韩一卡2卡3卡4卡2021年| 国产精品国产三级国产专区5o| 国产精品一区二区在线观看99| 9色porny在线观看| 丝袜在线中文字幕| 成年美女黄网站色视频大全免费| 国产亚洲最大av| 国产亚洲av片在线观看秒播厂| 如日韩欧美国产精品一区二区三区| 人妻人人澡人人爽人人| 久久亚洲国产成人精品v| 桃花免费在线播放| 悠悠久久av| 老鸭窝网址在线观看| 美女福利国产在线| 国产av一区二区精品久久| 女人精品久久久久毛片| 日韩中文字幕欧美一区二区 | 电影成人av| 国产成人a∨麻豆精品| 欧美老熟妇乱子伦牲交| 狂野欧美激情性xxxx| 999精品在线视频| 纵有疾风起免费观看全集完整版| 国产av国产精品国产| 亚洲第一av免费看| 中文字幕人妻熟女乱码| 午夜激情av网站| 看免费成人av毛片| 男女国产视频网站| 国产日韩欧美亚洲二区| 国产 一区精品| 一级黄片播放器| 亚洲第一区二区三区不卡| 校园人妻丝袜中文字幕| 欧美97在线视频| 操美女的视频在线观看| 韩国高清视频一区二区三区| 国产成人精品久久二区二区91 | 亚洲精品国产av蜜桃| 久久免费观看电影| 精品久久久精品久久久| 19禁男女啪啪无遮挡网站| 欧美中文综合在线视频| 久久久久久久国产电影| 亚洲人成电影观看| 99久国产av精品国产电影| 亚洲国产日韩一区二区| 免费av中文字幕在线| 日本欧美视频一区| 十分钟在线观看高清视频www| 韩国精品一区二区三区| 成人手机av| 9热在线视频观看99| 夫妻性生交免费视频一级片| 久久av网站| 日韩中文字幕视频在线看片| 18禁动态无遮挡网站| 久久性视频一级片| 亚洲欧美一区二区三区国产| 中文字幕另类日韩欧美亚洲嫩草| 日日摸夜夜添夜夜爱| 亚洲成人国产一区在线观看 | 搡老乐熟女国产| 午夜福利视频在线观看免费| 看非洲黑人一级黄片| 九色亚洲精品在线播放| 叶爱在线成人免费视频播放| 久久精品久久精品一区二区三区| 国产精品香港三级国产av潘金莲 | 日韩中文字幕视频在线看片| 中文乱码字字幕精品一区二区三区| 亚洲精品国产av成人精品| 男女床上黄色一级片免费看| www.精华液| 男人添女人高潮全过程视频| 国产成人91sexporn| 国产爽快片一区二区三区| 亚洲熟女精品中文字幕| 秋霞在线观看毛片| 人成视频在线观看免费观看| 国语对白做爰xxxⅹ性视频网站| 亚洲中文av在线| 国产男人的电影天堂91| 乱人伦中国视频| 操出白浆在线播放| 激情视频va一区二区三区| 母亲3免费完整高清在线观看| 最近手机中文字幕大全| 久久精品人人爽人人爽视色| 久久97久久精品| 精品少妇黑人巨大在线播放| 免费av中文字幕在线| 精品一区二区三卡| 国产97色在线日韩免费| 丝瓜视频免费看黄片| 操出白浆在线播放| 丰满饥渴人妻一区二区三| 日韩av在线免费看完整版不卡| 老司机亚洲免费影院| 国产av码专区亚洲av| 色播在线永久视频| av有码第一页| 亚洲精品av麻豆狂野| 不卡视频在线观看欧美| 久久久久久久久免费视频了| 国产精品久久久人人做人人爽| 国产精品三级大全| 精品视频人人做人人爽| 国产精品人妻久久久影院| 波多野结衣av一区二区av| 99热网站在线观看| 九九爱精品视频在线观看| 男人操女人黄网站| 精品国产超薄肉色丝袜足j| 十八禁人妻一区二区| 一二三四在线观看免费中文在| 中文天堂在线官网| 不卡av一区二区三区| 成年美女黄网站色视频大全免费| 欧美乱码精品一区二区三区| 美女高潮到喷水免费观看| 久久久久久久精品精品| 国产精品二区激情视频| 成人漫画全彩无遮挡| 久久久欧美国产精品| 亚洲欧洲日产国产| 一区二区日韩欧美中文字幕| 国产精品三级大全| 国产淫语在线视频| 精品久久蜜臀av无| 亚洲国产看品久久| av网站在线播放免费| 成年动漫av网址| av一本久久久久| 1024香蕉在线观看| 中文字幕最新亚洲高清| 亚洲精品一二三| 久久午夜综合久久蜜桃| 亚洲第一青青草原| 伦理电影免费视频| 亚洲精品国产av蜜桃| 国产一区二区三区av在线| 韩国av在线不卡| 青草久久国产| 另类精品久久| 欧美人与性动交α欧美精品济南到| 美女视频免费永久观看网站| 免费观看a级毛片全部| 欧美亚洲日本最大视频资源| 国产 一区精品| 晚上一个人看的免费电影| 国产极品粉嫩免费观看在线| 伊人久久大香线蕉亚洲五| 精品国产一区二区久久| 自线自在国产av| 最近最新中文字幕免费大全7| 搡老岳熟女国产| 黑人猛操日本美女一级片| 蜜桃在线观看..| 黄片播放在线免费| 老汉色av国产亚洲站长工具| 日日摸夜夜添夜夜爱| 久久女婷五月综合色啪小说| 午夜福利影视在线免费观看| 久久精品国产亚洲av高清一级| 欧美国产精品va在线观看不卡| 男女下面插进去视频免费观看| 国产精品99久久99久久久不卡 | 午夜激情av网站| 十八禁人妻一区二区| 纯流量卡能插随身wifi吗| 精品一区二区三区四区五区乱码 | 建设人人有责人人尽责人人享有的| 在线观看免费日韩欧美大片| 另类精品久久| 别揉我奶头~嗯~啊~动态视频 | 国产高清国产精品国产三级| 国产xxxxx性猛交| 男女高潮啪啪啪动态图| 在线精品无人区一区二区三| 日日摸夜夜添夜夜爱| 黑丝袜美女国产一区| 99久国产av精品国产电影| 久久久亚洲精品成人影院| 97精品久久久久久久久久精品| 91国产中文字幕| 蜜桃国产av成人99| 国产一区二区在线观看av| 人人妻,人人澡人人爽秒播 | 亚洲激情五月婷婷啪啪| 性色av一级| 国产麻豆69| 高清在线视频一区二区三区| 少妇的丰满在线观看| 日韩欧美一区视频在线观看| 国产精品一区二区在线不卡| 不卡视频在线观看欧美| 王馨瑶露胸无遮挡在线观看| 精品免费久久久久久久清纯 | 国产女主播在线喷水免费视频网站| 一级a爱视频在线免费观看| 超色免费av| 久久久久久久国产电影| 成人国语在线视频| 久久久精品免费免费高清| 观看美女的网站| 亚洲人成77777在线视频| 国产精品久久久久成人av| 欧美精品一区二区大全| 麻豆乱淫一区二区| 美女主播在线视频| 国产乱人偷精品视频| 成人三级做爰电影| 国产一卡二卡三卡精品 | 老汉色∧v一级毛片| 日本wwww免费看| 97在线人人人人妻| 免费久久久久久久精品成人欧美视频| 免费看不卡的av| 黄色毛片三级朝国网站| 免费观看人在逋| 在线免费观看不下载黄p国产| 亚洲天堂av无毛| 丁香六月天网|