• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Research on construction of operation architecture based on complex network

    2020-04-09 18:44:24YouChenXingWangYuanzhiYangChengweiRuanYipengZhou
    Defence Technology 2020年1期

    You Chen ,Xing Wang ,Yuan-zhi Yang ,*,Cheng-wei Ruan ,Yi-peng Zhou

    a Xidian University,Xi'an,Shaanxi,China

    b Aeronautics Engineering College,Air Force Engineering University,Xi'an,Shaanxi,China

    c 95910 Army,Jiuquan,Gansu,China

    Keywords:Operation architecture Network centric warfare Topology Complex network

    ABSTRACT Operation architecture plays a more important role in Network Centric Warfare(NCW),which involves dynamic operation networks with complex properties.Thus,it is essential to investigate the operation architecture under the informatization condition within NCW and find a proper network construction method to efficiently coordinate various functional modules on a particular situation,i.e.,the aerial combat.A new method integrating the physical level and functional level of NCW is proposed to establish the operation architecture,where the concept of network operation constraints unit and net constructing mechanisms are employed to avoid conflicts among different platforms.Meanwhile,we conduct simulations to assess the effectiveness and feasibility of the constructed operation architecture and analyze the influence of the network parameters.?2020 China Ordnance Society.Production and hosting by Elsevier B.V.on behalf of KeAi Communications Co.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/).

    1.Introduction

    As the main tool to describe complex systems,complex networks have been widely used in various fields in recent year,such as airline lines[1,2],power grids[3,4],social networks[5,6],biological networks[7,8]and ecological networks[9-11].With the development of information technology,networked warfare has become the basic mode of future warfare,which connects command&control(C2)network,sensor network and weapon network into a unified whole to realize unified command and situation sharing on the battle field.Operation architecture provides structural support for the technical application of networked warfare.

    Although the extended application of complex network around the world can describe the long-term development of the field,there are few researches on the application of complex network in the military field.Weixin Jin[12]studied the system-of-systems antagonism model of networked warfare,gave the basic method of constructing combat network,and confirmed the distribution law of network nodes.Dongfeng Tan[13]proposed a new network based on the assumption of random combat,aiming at the problem that the classic Lanchester combat model could not clearly describe the local engagement relationship between the combat units in the battle.Anthony H Dekker[14,15]studied the construction and important technologies of Network Centric Warfare(NCW)with complex networks.Hunkar Toyoglu[16]proposed a novel threelayer commodity-flow location routing formulation and designed the distribution system in consecutive time periods for the entire combat duration.Shoulin Shen[17]studied the general structure of combat network and discussed the method of measuring network effect by using adjacency matrix.Qiang Zhang[18]constructed a multi-dimensions weighted operational network model to assess the influence of combat organizational structure on operational effectiveness dynamically.Mingke Zhang[19]added two assumptions(classification of nodes and changes of the attachment)and presented a topology model of the complex networks in network centric warfare based on BA model.Jinjun Li[20]established the network description model and characteristic parameter measurement index of the operational command architecture,and analyzed the influence law of the change of command span,command level and command mode on the overall characteristics of the command architecture.

    Up to now,the researches about combat system with complex network have penetrated in many academic fields and the conclusions resulted from the researches are leading to a new solution towards the Network Centric Warfare(NCW)[21].NCW system,which contains many independent subsystems and key factors,is a dynamic evolving system in which the nodes and edges may change through different time-steps according to the continuously changing combat situations.And the interrelationships among different subsystems are more complex than any other system.Thus,we cannot use a static model to describe NCW system.In this paper,we consider the NCW system as a self-organized evolving system,and put forward one of the possible operation architecture models.We establish an operation architecture including C2 net,target detecting net,weapon launch net and communication net,which can break the limitation between single platform and realize the collaboration between nodes in different platforms.Besides,we propose some constraint rules and operators to describe the model in a concrete mathematical language.And the simulation results verify the effectiveness and feasibility of operation architecture.

    The rest of the paper is organized as follow s:1)The NCW features associated with complex network and operation architecture model are analyzed in Section 2.2)The method to construct operation architecture in topology field is put forward in Section 3 to shape the NCW system.3)In Section 4,the specific steps of operation architecture construction are presented and the generalized operation loop is defined to evaluate the performance of operation architecture.4)Simulation and analysis are presented in Section 5.5)Finally,Section 6 concludes the paper.

    2.Operation architecture analysis

    2.1.Basic concept of operation architecture

    In Network Centric Warfare,the operation architecture can be regarded as a complex network with different kinds of abstract functional nodes such as weapon,sensor,C2 and communication from the topology field.This special complex network mainly works with the circulation of the information,materials and energy among combat entities,and the organization of operation architecture changes all the time according to the combat situation.From this view,we can suppose that the operation architecture also contains the characters of several classic complex networks.

    2.2.Operation architecture characters

    The connection and operation rules of NCW can be described as“4D-4G-1L”mode which means.

    4D:Physical Domain,Information Domain,Cognitive Domain and Society Domain,which represent the structure of NCW,flow of information, information processing and cooperativity,respectively.

    4G:Information Grid,Sensor Grid,Shooter Grid and C2 Grid.

    1L:OODA Loop.

    On the basis of this mode,we need to apply the relative solutions of complex network to operation architecture.The distributed nodes in physical level should be transformed into a united system in functional level and we need to define some net organizing constraints to complete this transformation.The process can be seen in Fig.1.

    The left side of Fig.1 describes the operation architecture in physical level,and the right side reflects the operation architecture in functional level.The net organizing constraints which contain constraint rules and constraint operators are defined based on the characters of complex network.We use the NOC(Net Organizing Constraints,a basic combat unit which contains four functional nodes and some constraint elements)units to realize the net organizing function and try to find a proper net organizing method.According to the characters of each kind of the functional nodes,we rebuild the operation architecture and the detailed description is given in the following chapters.

    2.3.Operation architecture model

    Traditional structure of distributed combat system is built based on the basic combat unit which is regarded as an agent that can execute a whole combat task(including sub-tasks such as:searching,targeting,tracking,weapon launching and so on)by itself.In this paper,we propose a new structure to improve the whole task utility.The basic unit of operation architecture is defined as a functional node which can realize its specific sub-task,and these units may belong to different platforms.The structure of distributed combat system,shown in Fig.2,can realize the separation of sub-system function in space domain,the single combat unit is divided into several functional parts to set them free,then the distributed nodes with outstanding specific performance are connected by a communication net to build a strong union combat system.

    Fig.1.Operation architecture in physical and functional level.

    Fig.2.Basic combat unit with nodes in operation architecture.

    Fig.3.Operation architecture model.

    As we can see in Fig.2,the basic combat unit,widely used in many distributed combat system today,consists of four functional nodes and an inner data bus.These four functional nodes can work in sequence to complete a whole combat task.This structure can be useful under the situation with fewer tasks,if there are more basic units,we should coordinate both the relationships between basic combat units and the relationships among different nodes in a basic unit.The complex combat task with many basic combat units may bring a lot of conflicts in space and time domain.In order to get a more flexible mechanism,we propose an operation architecture seen in Fig.3.The combined but free TDNs and CCNs can work together to build a full-dimension target detecting net,the WLNs and CNs can also work together to construct a more efficient shooting net,this model is called operation architecture.

    Fig.3 shows the operation architecture model of distributed operations which is constructed by four different parts

    and every functional node has all the shared information,so the nodes can exchange their roles at any time within the setting constraints,and we consider the network of operation architecture undirected.Every part contains the same kind of functional nodes,but node with the same function may have different attributes and characters.

    3.Constraints model

    3.1.Constraint rules

    When constructing operation architecture,we need to describe the model in a concrete mathematical language and some constraint rules are very important in NOC unit.We use the graph G(V,E) to depict the operation architecture,where V={v1,v2,...,vS}and E={e1,e2,...,eT}are the sets of nodes and edges,respectively.And each edge ei(i=1,2,…,T)can find two relative nodes(vj,vk).GD,GW,GC2,GCcan be respectively denoted as the non-empty finite sets of target detection entity,weapon launch entity,command&control entity and communication entity.

    Definition 1 C2 network

    We define C2 network as

    where ωGC2represents the command&control enabling relationships and it describes the relationships between the elements in set V and set E.For example,if(x,y)∈ωGC2,then there exists a connection edge between x and y.And ωGC2should obey the following conditions:

    If y∈GD∪GW∪GC2∪GCand?x∈GC2,then(x,y)∈ωGC2(when y∈GC2,y≠x,(x,y)∈ωGC2).

    Definition 2 Target detection network

    The target detection network is denoted as

    where ωGDrepresents the detection and C2 enabling relationships and it makes the elements in E match the elements in V.The constraints of ωGDare listed as follows:

    Definition 3 Weapon launch network

    We also define the weapon launch network as

    where ωGWis the weapon launching and C2 enabling relationships and it makes the elements in E match the elements in V.It also needs to satisfy the following conditions:

    Definition 4 Communication network

    GC=(V(GC),E(GC),ωGC)is the symbol of communication network,where ωGCis the communication and C2 enabling relationships and it makes the elements in E match the elements in V.It also needs to satisfy the following conditions:

    Definition 5 Operation architecture

    Similarly,we define the operation architecture as

    4 V(GF,t)=

    5 E(GF,t)=E(GF,t-1));

    6 GF(0)=(V(GF,0),E(GF,0),is the initial status of operation architecture.

    3.2.Constraint operators

    When the constraint rules are given,some operators are required to execute them.And the constraint operators are the execution part of NOC unit which play an important role in network construction.The operators are then given to describe the generating graph and they are listed as follows:

    a.Let W be the set of x,and the definition del(x,W)=W∩﹁{x}denotes deleting an element from W.

    c.If x,y∈V(GF,t),then define σtFE=edge_linking(x,y),

    d e∈E(GF,t+1)=E(GF,t)∪{e}and GF(t+1)=(V(GF,t),E(GF,t+1),).Besides,edge linking(x,y)is defined as the connection of two elements.

    e.If x,y∈V(GF,t)and e=(x,y)∈E(GF,t),then defineedge_deleting(x,y),E(GF,t+1)=E(GF,t)∩﹁{e}and GF(t+1)=(V(GF,t),E(GF,t+1),.We also define edge deleting(x,y)as the disconnection of two elements.

    4.Operation architecture construction

    4.1.Steps to construct operation architecture

    The constraint rules and operators are put forward,then we need to describe the topology graph of operation architecture which contains C2 net,D&W(Detection&Weapon)net and C(communication)net.Different kinds of nets have their ow n special rules,and we can see the general topology graph in Fig.4.

    From Fig.4,we can see that different kinds of operation nets should combine together with strict rules.The right side is the hierarchical structure of C2 net and the left side is the combat execution unit which contains detection and weapon nodes.In the left side,D&W nodes and C2 nodes are denoted as black circle and black rectangle,respectively.There is relationship denoted as N∝eKlbetween D&W nodes and C2 nodes,where N is the number of D&W nodes,l is the level of C2 net,K is a constant.

    a.C2 net construction

    C2 net owns some nodes which act as commander in the whole network.The information flow should correspond to the real situation.Here,we give a simple example of the structure of C2 net in Fig.5.We can easily find that C2 net is built in the form of tree diagram where the root node is the command center with the highest priority.

    b.D&W net construction

    From that moment nothing was the same for Steve. Life at home remained the same, but life still changed. He discovered that not only could he learn, but he was good at it!

    D&W nodes represent task execution units,which are directly connected with C2 nodes in priority order to form a command and control relationship.The typical example of D&W net is shown in Fig.6.D&W nodes are described as the terminal execution units in operation architecture,they are directly connected to C2 nodes with different priorities.

    Fig.4.Operation architecture constructing description.

    Fig.5.C2 net(level=4,span=5).

    Fig.6.D&W net(d N=w N=20).

    Cnet is a virtual net with no entities,it is used to connect C2 nodes and D&W nodes.Researchers have tried various models,such as random networks,small-world networks and scale-free networks,to describe a complex network.How ever,we cannot describe Cnet with only one of the three kinds of networks due to the special characters of combat restrictions.Random networks and small-world networks are effective in some degree to resist the deliberate attack,while they cannot reflect the different capabilities among different communication nodes,then much costs may be brought in.Scale-free networks can avoid the huge destruction when confronting a random attack,but it may lead to communication overload in some nodes and may even lead to a collapse in the whole operation net[22].Thus,a modified variable r1∈[0,1]is introduced to decide the proportion in net connection process,if r1=0,we adopt the random net connection mechanism,and if r1=1,the scale-free net connection mechanism would be chosen.If r1∈(0,1),we would use the fused mechanism.Simulation of C net can be seen in Fig.7.

    In order to get the complete operation architecture,we need to connect all the C2 nodes and D&W nodes with Cnet.First,we need to disconnect all the connections which contain some relationships of command and control among C2 and D&W nodes.Second,communication nodes should be chosen to connect the old nodes which were connected at first,and the chosen method also obey the fusion mechanism.In this study,we define the fusion mechanism as below:

    ①set a proper modified variable r2(r2∈[0,1])to decide the C nodes chosen mechanism,if r2=0,C nodes should be selected with exponential distribution,and if r2=1,power law distribution would be chosen.

    ②when searching for the node with maximum degree in circulation,the searching space cannot be set as all the elements of Cnet adjacency matrix which can be described as

    We define the searching space as a random piece of A′i,where

    The process can be seen in Fig.8,the designed fusion mechanism is aiming to soften the high pressure of the node which has gotten the highest degree number,and it can also change the phenomenon“the rich get richer and the poor get poorer”[23].

    4.2.Generalized operation loop description

    The operation architecture construction method is given according to the constraint above,and some essential analysis is needed to test the whole system in some degree.In this study,GOL(generalized operation loop)is brought in.

    Definition 5 GOL is a concrete description of OODA loop which contains at least one complete NOC unit,but GOL can also contain several single functional nodes.It is a basic unit which can complete the whole OODA process.Its description can be presented in Fig.9.

    From Fig.9,we can see that the execution units such as D&W nodes can communicate with each other,and in real combat,we need to define some characters about the GOL.

    a.Number of GOL

    The more basic GOL we get,the more stable the operation architecture will be.The operation architecture can make many other useable projects to continue the broken work with a new replaced GOL when being attacked.

    Fig.7.Cnet constructing sketch map.

    Fig.8.Node choosing method description.

    Fig.9.Description of GOL

    b.Length of GOL

    Length of GOL is determined by the number of D&W nodes.

    i=0,l=0;

    Repeat(While l≤L):

    i=g3;j=g2+1;d=0;

    Repeat(While i≤g2 and j≤g1):

    Step 3.Detection net organization

    Excessive D&W nodes may lead to the attenuation of the information.So,we set 5 as the maximum number of the execution nodes in a basic GOL.

    c.Evaluation indexes of GOL

    4.3.Mathematical description

    We can conclude the mathematical description of operation architecture construction as follow s:

    Step 1.Initialization

    edge_linkingR(x,y)∝Random-Graph-Link-Mechanism;

    edge_linkingSF(x,y)∝SF-Graph-Link-Mechanism;edge_linkingEXP(x,y)∝EXP-Graph-Link-Mechanism.

    Step 2.C2 net organization

    Step 4.Weapon net organization

    Step 5.Communication net organization

    Step 6.Operation architecture organization

    5.Simulation

    We conduct two experiments to verify the effectiveness and feasibility of operation architecture.The first experiment assesses the model with some indexes such as degree distribution probability,number of GOL,invulnerability and information connectivity under attack,and the other experiment analyzes the network parameters r1 and r2,gives some suggestions to construct a better operation architecture.

    Experiment 1:operation architecture assessment.

    Set simulation condition:L=4,S=1,2,...,15,r1=0.85,r2=0.75,N1=40,N2=40,N3=30.The operation architecture can be obtained as shown in Fig.10,and we also analyze some features of the network as presented in Fig.11.

    Fig.10.Operation architecture construction description.

    Fig.11.C&C2°distribution probability.

    Fig.12.The number of GOL of different level and span.

    Fig.10 shows the operation architecture which is consisted of a C2 net,a communication net and two execution nets.Fig.11 describes the degree distribution probability of C net and C2 net.From Fig.11,we can conclude that C net has some obvious characteristics of BA and ER net due to its construction method(r1=0.85,r2=0.75),and the characteristics of ER net come from the node choosing method we mentioned.Besides,only two nodes have high degree probabilities and others obey uniform distribution approximately.This kind of C net construction method can be useful to resist random and deliberate attack in some degree and the construction style can be modified by changing r1 and r2 easily.At the same time,we can get the degree distribution probability of C2 net and the nodes obey exponential distribution approximately.The results in C2 net are consistent with traditional C2 construction rule(the higher priority the node gets,the less execution unit the node connects).

    The comparison of the number of GOL when changing level and span in C2 net is shown in Fig.12.We can see that with the increasing of the level and the span,the number of GOL presents a rising trend.And we can conclude as follow s:(1)When the value of level and span is relatively small,the change of span may have more influence on the number of GOL than that of level.When the value of level and span get greater,the change of level may lead to an exponential grow th of GOL.

    (2)A large number of GOL may lead to a bad timeliness and an exponential grow th of GOL may increase the probability of a single GOL expansion and may lead to an attenuation of information transmission.

    (3)According to the analysis,we can set a proper value of level which varies from 3 to 5.And we can set the value of span according to a specific task.

    Fig.13.Evaluation indexes comparison.

    Fig.14.Operation architecture description.

    Fig.15.C&C2°distribution probability.

    The evaluation of operation architecture in the level of invulnerability and information connectivity is presented in Fig.13.The first sub-figure describes the invulnerability of operation architecture under random attack and deliberate attack.We can easily find that operation architecture may become more reliable under a random attack.The following two sub-figures describe the information connectivity rates of operation architecture under attack.With the changing of NAR(node attack rate),the information connectivity rate may have relationship with the change of level and span.When NAR=0.1 and NAR=0.4,the change of the span may have a greater influence on the information connectivity rate than that of level.But when NAR gets larger,the results are the opposite.

    Experiment 2:influence analysis of network parameters.

    Set simulation condition:L=4,S=4,r1=0.35,r2=0.25,N1=40,N2=40,N3=30.

    The operation architecture with the parameters of experiment 2 is shown in Fig.14.The degree distribution probabilities of C and C2 net are presented in Fig.15.From Fig.15,we can conclude that C net has more ER characteristics due to its construction method(r1=0.35, r2=0.25),and most nodes obey uniform distribution approximately.Different from experiment 1,we pay more attention to the influence caused by the modified variables r1 and r2 in this experiment.r1 and r2 can change the net construction style in some degree.

    The comparison of the characteristics of GOLw hen r1 and r2 are changing is shown in Fig.16.From the first and the second subfigures,we can find that there is a proper range from 0.4 to 0.8 for r1,as well as the ranges from 0.1 to 0.2 and from 0.4 to 0.6 for r2.When r1 and r2 are in the intervals,we can obtain more GOLs,and the operation architecture can be more stable.The third and the last sub-figures show the comparison of max GOL length influenced by r1 and r2.From those sub-figures,we can see that with the increasing of r1 and r2,the length of max GOL shows an increasing trend,but r2 may have more influences than r1,in the last subfigure,the average length is longer than that in the third subfigure.Thus we should set the value of r1 within the interval we mentioned above,and r2 should be set smaller than r1.

    6.Conclusion

    In this paper,we propose a method to construct operation architecture based on complex network.Aiming at the limitations of traditional single platform operations,this paper combines nodes distributed on different platforms and propose a novel method to construct operation architecture based on complex network theory.Some constraints of operation architecture are also proposed.In order to evaluate the feasibility and effectiveness of operation architecture,the evaluation index of operation architecture is put forward.The effectiveness of the proposed operation architecture is verified by simulation analysis,and some characteristics are analyzed to acquire different influences with various parameters and the proper construction parameters of this new structure are obtained.The proposed method provides a novel way to construct an operation architecture which is suitable for modern combat under information situation,and provides theoretical support for the application of network warfare in the future.

    Fig.16.Evaluation indexes comparison.

    According to the experiments,we can get the following conclusions:1)the final net connection result is influenced by many factors such as combat scale,connection mechanism,the number of nodes,modified variables and the setting constraints rules.2)operation architecture may be more efficient with fewer levels and more spans.3)the invulnerability of operation architecture can be improved by setting a proper value of NAR according to the combat conditions.4)the modified variables should be set with their value intervals.

    Acknowledgements

    The work described in this paper was fully supported by a grant from the National Natural Science Foundation of China(No.61472443).

    成年av动漫网址| 男人操女人黄网站| 免费人成在线观看视频色| 成人国语在线视频| 欧美日本中文国产一区发布| 亚洲高清免费不卡视频| 日韩不卡一区二区三区视频在线| 午夜福利视频在线观看免费| xxxhd国产人妻xxx| av免费观看日本| 人人妻人人澡人人爽人人夜夜| 涩涩av久久男人的天堂| 赤兔流量卡办理| 内地一区二区视频在线| 免费看av在线观看网站| 91久久精品国产一区二区三区| 制服诱惑二区| 2022亚洲国产成人精品| 国产有黄有色有爽视频| 成年美女黄网站色视频大全免费 | 久久久久久久久大av| 最新的欧美精品一区二区| 老司机影院毛片| 涩涩av久久男人的天堂| 亚洲精品久久成人aⅴ小说 | 亚洲欧美成人精品一区二区| 成人综合一区亚洲| 一区二区三区免费毛片| 制服人妻中文乱码| 这个男人来自地球电影免费观看 | 精品少妇内射三级| 亚洲欧洲国产日韩| 成人毛片60女人毛片免费| 不卡视频在线观看欧美| 考比视频在线观看| 中文字幕制服av| 国产精品久久久久久久久免| 午夜激情av网站| 亚洲国产最新在线播放| 91精品伊人久久大香线蕉| 91精品国产国语对白视频| 欧美少妇被猛烈插入视频| 观看美女的网站| 亚洲内射少妇av| 综合色丁香网| xxxhd国产人妻xxx| av卡一久久| 国产午夜精品久久久久久一区二区三区| 久久99一区二区三区| 18在线观看网站| 22中文网久久字幕| 日本-黄色视频高清免费观看| 欧美最新免费一区二区三区| 国产在线免费精品| 欧美变态另类bdsm刘玥| 国产日韩欧美亚洲二区| 成人综合一区亚洲| 精品久久久噜噜| 久久精品熟女亚洲av麻豆精品| 高清在线视频一区二区三区| 久久久久久久久久久丰满| 如何舔出高潮| 十八禁高潮呻吟视频| 乱人伦中国视频| 日韩电影二区| 成人午夜精彩视频在线观看| 免费看光身美女| av专区在线播放| 欧美一级a爱片免费观看看| 婷婷色av中文字幕| 久久久久久久大尺度免费视频| 亚洲精品乱码久久久v下载方式| 国产精品久久久久久精品电影小说| 亚洲欧美日韩另类电影网站| 激情五月婷婷亚洲| 成人黄色视频免费在线看| 国产极品粉嫩免费观看在线 | 日本av手机在线免费观看| 一本久久精品| 亚洲精品av麻豆狂野| 欧美日韩国产mv在线观看视频| 在线 av 中文字幕| 久久精品夜色国产| 新久久久久国产一级毛片| 国产成人freesex在线| 亚洲第一区二区三区不卡| 国产极品粉嫩免费观看在线 | 亚洲精品456在线播放app| 欧美日韩av久久| 一二三四中文在线观看免费高清| 国产成人精品婷婷| 亚洲av福利一区| 国产视频首页在线观看| 久久ye,这里只有精品| 777米奇影视久久| 啦啦啦视频在线资源免费观看| 久久久久国产精品人妻一区二区| av黄色大香蕉| 久久久久久久久久成人| 99九九线精品视频在线观看视频| 精品久久国产蜜桃| 男人操女人黄网站| 亚洲欧洲国产日韩| 精品国产一区二区久久| 亚洲天堂av无毛| 亚洲精品色激情综合| 精品久久久久久电影网| 亚洲国产欧美在线一区| 啦啦啦在线观看免费高清www| 久久久久人妻精品一区果冻| 夜夜骑夜夜射夜夜干| 日本黄色片子视频| 国产亚洲av片在线观看秒播厂| 国产免费又黄又爽又色| 一个人看视频在线观看www免费| 日本免费在线观看一区| 国产国语露脸激情在线看| 日本vs欧美在线观看视频| 十分钟在线观看高清视频www| 人人妻人人添人人爽欧美一区卜| 亚洲午夜理论影院| 亚洲av片天天在线观看| 老司机在亚洲福利影院| 岛国在线观看网站| 国产精品久久久久久精品古装| 精品亚洲乱码少妇综合久久| 男女无遮挡免费网站观看| 捣出白浆h1v1| 久久久久久久精品吃奶| 欧美日韩一级在线毛片| 啦啦啦在线免费观看视频4| av线在线观看网站| 夜夜爽天天搞| 91老司机精品| 丝袜喷水一区| 久久午夜亚洲精品久久| 丝袜美足系列| 亚洲国产看品久久| 中文欧美无线码| 淫妇啪啪啪对白视频| 大型黄色视频在线免费观看| 亚洲一码二码三码区别大吗| 99精品在免费线老司机午夜| 国产精品香港三级国产av潘金莲| 中文字幕人妻熟女乱码| 欧美人与性动交α欧美软件| 深夜精品福利| 色婷婷av一区二区三区视频| 在线观看免费视频日本深夜| 美女高潮到喷水免费观看| 三级毛片av免费| 女性被躁到高潮视频| 18禁国产床啪视频网站| 国产熟女午夜一区二区三区| 黑人操中国人逼视频| 精品人妻1区二区| 国产福利在线免费观看视频| 国产精品一区二区免费欧美| 国产精品影院久久| 免费观看人在逋| 精品欧美一区二区三区在线| 每晚都被弄得嗷嗷叫到高潮| 最近最新中文字幕大全免费视频| av一本久久久久| 超碰97精品在线观看| 国产亚洲欧美在线一区二区| 亚洲精品乱久久久久久| 亚洲午夜精品一区,二区,三区| 久久精品国产亚洲av香蕉五月 | 日本一区二区免费在线视频| 九色亚洲精品在线播放| 老汉色av国产亚洲站长工具| 国产男女内射视频| 飞空精品影院首页| 久久久久久久久久久久大奶| 日本av手机在线免费观看| 国产精品影院久久| 丝袜人妻中文字幕| 夜夜骑夜夜射夜夜干| 欧美午夜高清在线| 18禁裸乳无遮挡动漫免费视频| 精品福利观看| av有码第一页| 性少妇av在线| 变态另类成人亚洲欧美熟女 | 啦啦啦在线免费观看视频4| 涩涩av久久男人的天堂| 成年人黄色毛片网站| av电影中文网址| 久久久精品免费免费高清| 国产av又大| 大片免费播放器 马上看| 天天影视国产精品| 亚洲人成电影免费在线| 又紧又爽又黄一区二区| 亚洲人成77777在线视频| 欧美中文综合在线视频| 飞空精品影院首页| 满18在线观看网站| 中文字幕av电影在线播放| 天天影视国产精品| 成年人黄色毛片网站| 我要看黄色一级片免费的| 少妇被粗大的猛进出69影院| 免费不卡黄色视频| 亚洲三区欧美一区| 交换朋友夫妻互换小说| 久久 成人 亚洲| 搡老岳熟女国产| 在线观看免费日韩欧美大片| 亚洲午夜理论影院| www.999成人在线观看| 国产精品成人在线| 欧美乱码精品一区二区三区| 人妻一区二区av| 国产亚洲精品久久久久5区| 国产精品一区二区在线观看99| 超碰97精品在线观看| 亚洲专区国产一区二区| 亚洲成人免费电影在线观看| 丝袜在线中文字幕| videos熟女内射| 亚洲精品美女久久av网站| cao死你这个sao货| 亚洲国产欧美在线一区| 一本大道久久a久久精品| 国产在线一区二区三区精| 国产在线视频一区二区| 汤姆久久久久久久影院中文字幕| 色综合欧美亚洲国产小说| 999精品在线视频| 久久狼人影院| 日本a在线网址| 国产欧美日韩综合在线一区二区| xxxhd国产人妻xxx| 国产深夜福利视频在线观看| 一级,二级,三级黄色视频| 午夜免费鲁丝| 国产av一区二区精品久久| 亚洲色图 男人天堂 中文字幕| 亚洲专区字幕在线| 国产一区二区激情短视频| 国产男女内射视频| 久久久国产欧美日韩av| 久久久精品国产亚洲av高清涩受| 国产精品久久久久久精品古装| 亚洲国产精品一区二区三区在线| 精品高清国产在线一区| 自线自在国产av| 久久精品aⅴ一区二区三区四区| 久久精品国产综合久久久| 蜜桃国产av成人99| 久久久久久人人人人人| 欧美在线黄色| 欧美+亚洲+日韩+国产| 日韩欧美国产一区二区入口| 国产高清视频在线播放一区| 欧美老熟妇乱子伦牲交| 久久午夜亚洲精品久久| 在线观看免费高清a一片| 日韩欧美国产一区二区入口| 国产伦人伦偷精品视频| 老司机福利观看| 亚洲精品成人av观看孕妇| 十八禁网站免费在线| 操出白浆在线播放| 国产在视频线精品| 久久精品熟女亚洲av麻豆精品| 丝袜人妻中文字幕| 国产成人av激情在线播放| 老熟妇仑乱视频hdxx| 成年动漫av网址| 欧美日韩亚洲综合一区二区三区_| 欧美日韩成人在线一区二区| 亚洲精品国产色婷婷电影| 久久久精品区二区三区| 久久亚洲精品不卡| 桃红色精品国产亚洲av| 成人18禁高潮啪啪吃奶动态图| 五月天丁香电影| 亚洲成人免费av在线播放| 韩国精品一区二区三区| 老司机靠b影院| 狠狠精品人妻久久久久久综合| 国产野战对白在线观看| 五月开心婷婷网| 一边摸一边抽搐一进一小说 | 少妇裸体淫交视频免费看高清 | 国产高清国产精品国产三级| 国产xxxxx性猛交| 国产极品粉嫩免费观看在线| 成人av一区二区三区在线看| 久久午夜亚洲精品久久| 日韩中文字幕欧美一区二区| 这个男人来自地球电影免费观看| 国产精品免费视频内射| 精品福利永久在线观看| 成年人午夜在线观看视频| 亚洲性夜色夜夜综合| 免费在线观看日本一区| 美女高潮喷水抽搐中文字幕| 欧美大码av| 男女无遮挡免费网站观看| 国产区一区二久久| 国产深夜福利视频在线观看| 国产成人av教育| 蜜桃国产av成人99| 欧美精品一区二区免费开放| 国产亚洲一区二区精品| 一边摸一边抽搐一进一小说 | 久久国产精品男人的天堂亚洲| 国产精品美女特级片免费视频播放器 | 91九色精品人成在线观看| 十八禁网站网址无遮挡| 高潮久久久久久久久久久不卡| 国产主播在线观看一区二区| 欧美成人免费av一区二区三区 | 日韩一区二区三区影片| 十八禁网站免费在线| 久久性视频一级片| 黑人欧美特级aaaaaa片| 在线观看免费高清a一片| 国产在视频线精品| 老熟妇乱子伦视频在线观看| 国产高清视频在线播放一区| 极品少妇高潮喷水抽搐| 免费少妇av软件| 在线观看66精品国产| 午夜福利乱码中文字幕| tocl精华| 9191精品国产免费久久| 热99久久久久精品小说推荐| 无人区码免费观看不卡 | 天天添夜夜摸| av一本久久久久| 亚洲精品在线观看二区| 亚洲av国产av综合av卡| 多毛熟女@视频| 免费观看av网站的网址| 国产片内射在线| 久久久久久久国产电影| 精品免费久久久久久久清纯 | 亚洲一码二码三码区别大吗| 黑人猛操日本美女一级片| 免费在线观看影片大全网站| 电影成人av| 久久久久视频综合| 中文亚洲av片在线观看爽 | 香蕉丝袜av| 美女扒开内裤让男人捅视频| 亚洲专区中文字幕在线| 亚洲精品自拍成人| 欧美日韩亚洲综合一区二区三区_| 亚洲综合色网址| 久热爱精品视频在线9| 在线天堂中文资源库| 欧美一级毛片孕妇| 不卡一级毛片| 性色av乱码一区二区三区2| 黑人欧美特级aaaaaa片| 亚洲美女黄片视频| 嫁个100分男人电影在线观看| 亚洲午夜理论影院| 国产精品国产av在线观看| 国产精品美女特级片免费视频播放器 | 9热在线视频观看99| 中文字幕人妻丝袜一区二区| 国产精品成人在线| 午夜福利免费观看在线| 国产成人欧美在线观看 | av又黄又爽大尺度在线免费看| 精品国产亚洲在线| 天堂中文最新版在线下载| 免费在线观看日本一区| 精品一品国产午夜福利视频| 国产精品秋霞免费鲁丝片| 国产精品一区二区精品视频观看| 午夜福利免费观看在线| 91大片在线观看| 精品亚洲成国产av| 久久九九热精品免费| 91大片在线观看| 国产精品亚洲一级av第二区| 国产又爽黄色视频| 精品久久久久久久毛片微露脸| 久久午夜亚洲精品久久| 欧美国产精品一级二级三级| 亚洲专区字幕在线| 亚洲,欧美精品.| 丝袜人妻中文字幕| 色综合欧美亚洲国产小说| netflix在线观看网站| 成人av一区二区三区在线看| 国产精品国产av在线观看| 午夜福利在线观看吧| 我的亚洲天堂| videos熟女内射| 电影成人av| 国精品久久久久久国模美| 国产在线观看jvid| 国产欧美日韩一区二区精品| 女人爽到高潮嗷嗷叫在线视频| 精品视频人人做人人爽| 美女主播在线视频| 免费日韩欧美在线观看| 亚洲精品美女久久av网站| 午夜免费鲁丝| 午夜福利免费观看在线| 成人永久免费在线观看视频 | 亚洲欧美日韩另类电影网站| 香蕉国产在线看| 久久婷婷成人综合色麻豆| 欧美日韩一级在线毛片| 国产日韩欧美亚洲二区| 欧美日韩亚洲国产一区二区在线观看 | 另类精品久久| 免费在线观看黄色视频的| 乱人伦中国视频| 国产区一区二久久| 成年动漫av网址| 久久久久精品国产欧美久久久| 久久中文看片网| 怎么达到女性高潮| 国产男女超爽视频在线观看| 超碰成人久久| 欧美精品人与动牲交sv欧美| 日韩一区二区三区影片| 欧美日韩福利视频一区二区| 精品亚洲成a人片在线观看| 国产单亲对白刺激| av视频免费观看在线观看| 久久国产精品人妻蜜桃| 美女高潮到喷水免费观看| 欧美日韩国产mv在线观看视频| 国产一区二区三区在线臀色熟女 | 18禁国产床啪视频网站| 99久久精品国产亚洲精品| 精品卡一卡二卡四卡免费| 国产av一区二区精品久久| 大香蕉久久成人网| 国产成人免费无遮挡视频| 亚洲伊人色综图| 最近最新中文字幕大全免费视频| 成人18禁在线播放| 另类精品久久| 90打野战视频偷拍视频| 久久精品国产99精品国产亚洲性色 | 一区二区三区精品91| 视频在线观看一区二区三区| 免费在线观看视频国产中文字幕亚洲| 亚洲成人国产一区在线观看| 久久ye,这里只有精品| 久久毛片免费看一区二区三区| 成年女人毛片免费观看观看9 | 黄色a级毛片大全视频| 日本精品一区二区三区蜜桃| 人人澡人人妻人| 欧美激情 高清一区二区三区| 最新美女视频免费是黄的| 精品一品国产午夜福利视频| 亚洲精品国产一区二区精华液| 亚洲精品国产区一区二| 久久久国产精品麻豆| 精品国内亚洲2022精品成人 | 嫩草影视91久久| 男女之事视频高清在线观看| 黄色a级毛片大全视频| 美女高潮喷水抽搐中文字幕| 一本—道久久a久久精品蜜桃钙片| 欧美精品亚洲一区二区| 最近最新中文字幕大全免费视频| 一区二区三区乱码不卡18| 国产真人三级小视频在线观看| 99热网站在线观看| 99久久人妻综合| 日本wwww免费看| 97在线人人人人妻| 国产97色在线日韩免费| 国产野战对白在线观看| 99香蕉大伊视频| 亚洲欧美激情在线| 国产免费福利视频在线观看| 精品卡一卡二卡四卡免费| 日本黄色日本黄色录像| 正在播放国产对白刺激| 成年动漫av网址| 国产精品免费大片| 亚洲精品久久成人aⅴ小说| 夫妻午夜视频| 午夜福利乱码中文字幕| 欧美成人免费av一区二区三区 | 国产日韩欧美视频二区| 午夜福利在线观看吧| 欧美国产精品va在线观看不卡| 男女之事视频高清在线观看| 咕卡用的链子| 国产av精品麻豆| 99久久99久久久精品蜜桃| 丝袜美腿诱惑在线| 亚洲va日本ⅴa欧美va伊人久久| 肉色欧美久久久久久久蜜桃| 久久精品亚洲熟妇少妇任你| 免费女性裸体啪啪无遮挡网站| 亚洲午夜理论影院| 亚洲,欧美精品.| 两个人看的免费小视频| 精品乱码久久久久久99久播| 欧美精品av麻豆av| 精品人妻在线不人妻| 欧美国产精品一级二级三级| 久久久精品免费免费高清| 国产激情久久老熟女| 国产淫语在线视频| 夜夜夜夜夜久久久久| videos熟女内射| 操美女的视频在线观看| 欧美亚洲日本最大视频资源| 视频在线观看一区二区三区| 九色亚洲精品在线播放| 亚洲精华国产精华精| 黄色视频在线播放观看不卡| 人成视频在线观看免费观看| 下体分泌物呈黄色| 一级,二级,三级黄色视频| 一级a爱视频在线免费观看| 麻豆av在线久日| 老司机亚洲免费影院| 精品国产一区二区三区久久久樱花| 一本—道久久a久久精品蜜桃钙片| 女人被躁到高潮嗷嗷叫费观| 操出白浆在线播放| 久久人人97超碰香蕉20202| 极品人妻少妇av视频| 99国产极品粉嫩在线观看| 一级,二级,三级黄色视频| 亚洲三区欧美一区| 国产精品成人在线| 丰满饥渴人妻一区二区三| 一区二区三区精品91| 亚洲国产欧美日韩在线播放| 日本av免费视频播放| 亚洲三区欧美一区| 成年人黄色毛片网站| 亚洲精品国产区一区二| tocl精华| 丝袜在线中文字幕| 操出白浆在线播放| 丝袜美足系列| 国产亚洲一区二区精品| 国产黄频视频在线观看| 精品国产超薄肉色丝袜足j| 在线观看免费日韩欧美大片| 激情视频va一区二区三区| 超色免费av| 久久国产精品影院| 久久精品国产亚洲av高清一级| 手机成人av网站| 亚洲七黄色美女视频| 日韩免费高清中文字幕av| 人人妻人人澡人人爽人人夜夜| 精品国内亚洲2022精品成人 | 国产成人av教育| 美女视频免费永久观看网站| 国产精品偷伦视频观看了| 丝袜在线中文字幕| 欧美成狂野欧美在线观看| 一本大道久久a久久精品| 日韩欧美免费精品| 我要看黄色一级片免费的| 黄频高清免费视频| 午夜激情av网站| 这个男人来自地球电影免费观看| 日本黄色视频三级网站网址 | av网站免费在线观看视频| 欧美精品亚洲一区二区| 久久午夜亚洲精品久久| 嫩草影视91久久| 色综合欧美亚洲国产小说| 国产精品久久久人人做人人爽| 脱女人内裤的视频| 久久人妻福利社区极品人妻图片| 亚洲色图av天堂| 在线观看免费日韩欧美大片| 乱人伦中国视频| 亚洲精品乱久久久久久| 在线观看免费视频网站a站| 国产精品一区二区在线不卡| 男女床上黄色一级片免费看| 99九九在线精品视频| 男女之事视频高清在线观看| 国产精品亚洲一级av第二区| 国产欧美日韩综合在线一区二区| 巨乳人妻的诱惑在线观看| 91大片在线观看| 人人妻人人澡人人爽人人夜夜| 在线十欧美十亚洲十日本专区| a级毛片在线看网站| 黄色 视频免费看| 一本—道久久a久久精品蜜桃钙片| 欧美午夜高清在线| 啦啦啦视频在线资源免费观看| 久久精品国产亚洲av高清一级| 亚洲精品成人av观看孕妇| av福利片在线| av天堂在线播放| 国产精品久久电影中文字幕 | 999精品在线视频| 国产欧美日韩综合在线一区二区| 十八禁高潮呻吟视频| 亚洲第一欧美日韩一区二区三区 | 视频在线观看一区二区三区| 999精品在线视频| 免费不卡黄色视频| 久久亚洲精品不卡| 亚洲欧美日韩高清在线视频 |