• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Research on construction of operation architecture based on complex network

    2020-04-09 18:44:24YouChenXingWangYuanzhiYangChengweiRuanYipengZhou
    Defence Technology 2020年1期

    You Chen ,Xing Wang ,Yuan-zhi Yang ,*,Cheng-wei Ruan ,Yi-peng Zhou

    a Xidian University,Xi'an,Shaanxi,China

    b Aeronautics Engineering College,Air Force Engineering University,Xi'an,Shaanxi,China

    c 95910 Army,Jiuquan,Gansu,China

    Keywords:Operation architecture Network centric warfare Topology Complex network

    ABSTRACT Operation architecture plays a more important role in Network Centric Warfare(NCW),which involves dynamic operation networks with complex properties.Thus,it is essential to investigate the operation architecture under the informatization condition within NCW and find a proper network construction method to efficiently coordinate various functional modules on a particular situation,i.e.,the aerial combat.A new method integrating the physical level and functional level of NCW is proposed to establish the operation architecture,where the concept of network operation constraints unit and net constructing mechanisms are employed to avoid conflicts among different platforms.Meanwhile,we conduct simulations to assess the effectiveness and feasibility of the constructed operation architecture and analyze the influence of the network parameters.?2020 China Ordnance Society.Production and hosting by Elsevier B.V.on behalf of KeAi Communications Co.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/).

    1.Introduction

    As the main tool to describe complex systems,complex networks have been widely used in various fields in recent year,such as airline lines[1,2],power grids[3,4],social networks[5,6],biological networks[7,8]and ecological networks[9-11].With the development of information technology,networked warfare has become the basic mode of future warfare,which connects command&control(C2)network,sensor network and weapon network into a unified whole to realize unified command and situation sharing on the battle field.Operation architecture provides structural support for the technical application of networked warfare.

    Although the extended application of complex network around the world can describe the long-term development of the field,there are few researches on the application of complex network in the military field.Weixin Jin[12]studied the system-of-systems antagonism model of networked warfare,gave the basic method of constructing combat network,and confirmed the distribution law of network nodes.Dongfeng Tan[13]proposed a new network based on the assumption of random combat,aiming at the problem that the classic Lanchester combat model could not clearly describe the local engagement relationship between the combat units in the battle.Anthony H Dekker[14,15]studied the construction and important technologies of Network Centric Warfare(NCW)with complex networks.Hunkar Toyoglu[16]proposed a novel threelayer commodity-flow location routing formulation and designed the distribution system in consecutive time periods for the entire combat duration.Shoulin Shen[17]studied the general structure of combat network and discussed the method of measuring network effect by using adjacency matrix.Qiang Zhang[18]constructed a multi-dimensions weighted operational network model to assess the influence of combat organizational structure on operational effectiveness dynamically.Mingke Zhang[19]added two assumptions(classification of nodes and changes of the attachment)and presented a topology model of the complex networks in network centric warfare based on BA model.Jinjun Li[20]established the network description model and characteristic parameter measurement index of the operational command architecture,and analyzed the influence law of the change of command span,command level and command mode on the overall characteristics of the command architecture.

    Up to now,the researches about combat system with complex network have penetrated in many academic fields and the conclusions resulted from the researches are leading to a new solution towards the Network Centric Warfare(NCW)[21].NCW system,which contains many independent subsystems and key factors,is a dynamic evolving system in which the nodes and edges may change through different time-steps according to the continuously changing combat situations.And the interrelationships among different subsystems are more complex than any other system.Thus,we cannot use a static model to describe NCW system.In this paper,we consider the NCW system as a self-organized evolving system,and put forward one of the possible operation architecture models.We establish an operation architecture including C2 net,target detecting net,weapon launch net and communication net,which can break the limitation between single platform and realize the collaboration between nodes in different platforms.Besides,we propose some constraint rules and operators to describe the model in a concrete mathematical language.And the simulation results verify the effectiveness and feasibility of operation architecture.

    The rest of the paper is organized as follow s:1)The NCW features associated with complex network and operation architecture model are analyzed in Section 2.2)The method to construct operation architecture in topology field is put forward in Section 3 to shape the NCW system.3)In Section 4,the specific steps of operation architecture construction are presented and the generalized operation loop is defined to evaluate the performance of operation architecture.4)Simulation and analysis are presented in Section 5.5)Finally,Section 6 concludes the paper.

    2.Operation architecture analysis

    2.1.Basic concept of operation architecture

    In Network Centric Warfare,the operation architecture can be regarded as a complex network with different kinds of abstract functional nodes such as weapon,sensor,C2 and communication from the topology field.This special complex network mainly works with the circulation of the information,materials and energy among combat entities,and the organization of operation architecture changes all the time according to the combat situation.From this view,we can suppose that the operation architecture also contains the characters of several classic complex networks.

    2.2.Operation architecture characters

    The connection and operation rules of NCW can be described as“4D-4G-1L”mode which means.

    4D:Physical Domain,Information Domain,Cognitive Domain and Society Domain,which represent the structure of NCW,flow of information, information processing and cooperativity,respectively.

    4G:Information Grid,Sensor Grid,Shooter Grid and C2 Grid.

    1L:OODA Loop.

    On the basis of this mode,we need to apply the relative solutions of complex network to operation architecture.The distributed nodes in physical level should be transformed into a united system in functional level and we need to define some net organizing constraints to complete this transformation.The process can be seen in Fig.1.

    The left side of Fig.1 describes the operation architecture in physical level,and the right side reflects the operation architecture in functional level.The net organizing constraints which contain constraint rules and constraint operators are defined based on the characters of complex network.We use the NOC(Net Organizing Constraints,a basic combat unit which contains four functional nodes and some constraint elements)units to realize the net organizing function and try to find a proper net organizing method.According to the characters of each kind of the functional nodes,we rebuild the operation architecture and the detailed description is given in the following chapters.

    2.3.Operation architecture model

    Traditional structure of distributed combat system is built based on the basic combat unit which is regarded as an agent that can execute a whole combat task(including sub-tasks such as:searching,targeting,tracking,weapon launching and so on)by itself.In this paper,we propose a new structure to improve the whole task utility.The basic unit of operation architecture is defined as a functional node which can realize its specific sub-task,and these units may belong to different platforms.The structure of distributed combat system,shown in Fig.2,can realize the separation of sub-system function in space domain,the single combat unit is divided into several functional parts to set them free,then the distributed nodes with outstanding specific performance are connected by a communication net to build a strong union combat system.

    Fig.1.Operation architecture in physical and functional level.

    Fig.2.Basic combat unit with nodes in operation architecture.

    Fig.3.Operation architecture model.

    As we can see in Fig.2,the basic combat unit,widely used in many distributed combat system today,consists of four functional nodes and an inner data bus.These four functional nodes can work in sequence to complete a whole combat task.This structure can be useful under the situation with fewer tasks,if there are more basic units,we should coordinate both the relationships between basic combat units and the relationships among different nodes in a basic unit.The complex combat task with many basic combat units may bring a lot of conflicts in space and time domain.In order to get a more flexible mechanism,we propose an operation architecture seen in Fig.3.The combined but free TDNs and CCNs can work together to build a full-dimension target detecting net,the WLNs and CNs can also work together to construct a more efficient shooting net,this model is called operation architecture.

    Fig.3 shows the operation architecture model of distributed operations which is constructed by four different parts

    and every functional node has all the shared information,so the nodes can exchange their roles at any time within the setting constraints,and we consider the network of operation architecture undirected.Every part contains the same kind of functional nodes,but node with the same function may have different attributes and characters.

    3.Constraints model

    3.1.Constraint rules

    When constructing operation architecture,we need to describe the model in a concrete mathematical language and some constraint rules are very important in NOC unit.We use the graph G(V,E) to depict the operation architecture,where V={v1,v2,...,vS}and E={e1,e2,...,eT}are the sets of nodes and edges,respectively.And each edge ei(i=1,2,…,T)can find two relative nodes(vj,vk).GD,GW,GC2,GCcan be respectively denoted as the non-empty finite sets of target detection entity,weapon launch entity,command&control entity and communication entity.

    Definition 1 C2 network

    We define C2 network as

    where ωGC2represents the command&control enabling relationships and it describes the relationships between the elements in set V and set E.For example,if(x,y)∈ωGC2,then there exists a connection edge between x and y.And ωGC2should obey the following conditions:

    If y∈GD∪GW∪GC2∪GCand?x∈GC2,then(x,y)∈ωGC2(when y∈GC2,y≠x,(x,y)∈ωGC2).

    Definition 2 Target detection network

    The target detection network is denoted as

    where ωGDrepresents the detection and C2 enabling relationships and it makes the elements in E match the elements in V.The constraints of ωGDare listed as follows:

    Definition 3 Weapon launch network

    We also define the weapon launch network as

    where ωGWis the weapon launching and C2 enabling relationships and it makes the elements in E match the elements in V.It also needs to satisfy the following conditions:

    Definition 4 Communication network

    GC=(V(GC),E(GC),ωGC)is the symbol of communication network,where ωGCis the communication and C2 enabling relationships and it makes the elements in E match the elements in V.It also needs to satisfy the following conditions:

    Definition 5 Operation architecture

    Similarly,we define the operation architecture as

    4 V(GF,t)=

    5 E(GF,t)=E(GF,t-1));

    6 GF(0)=(V(GF,0),E(GF,0),is the initial status of operation architecture.

    3.2.Constraint operators

    When the constraint rules are given,some operators are required to execute them.And the constraint operators are the execution part of NOC unit which play an important role in network construction.The operators are then given to describe the generating graph and they are listed as follows:

    a.Let W be the set of x,and the definition del(x,W)=W∩﹁{x}denotes deleting an element from W.

    c.If x,y∈V(GF,t),then define σtFE=edge_linking(x,y),

    d e∈E(GF,t+1)=E(GF,t)∪{e}and GF(t+1)=(V(GF,t),E(GF,t+1),).Besides,edge linking(x,y)is defined as the connection of two elements.

    e.If x,y∈V(GF,t)and e=(x,y)∈E(GF,t),then defineedge_deleting(x,y),E(GF,t+1)=E(GF,t)∩﹁{e}and GF(t+1)=(V(GF,t),E(GF,t+1),.We also define edge deleting(x,y)as the disconnection of two elements.

    4.Operation architecture construction

    4.1.Steps to construct operation architecture

    The constraint rules and operators are put forward,then we need to describe the topology graph of operation architecture which contains C2 net,D&W(Detection&Weapon)net and C(communication)net.Different kinds of nets have their ow n special rules,and we can see the general topology graph in Fig.4.

    From Fig.4,we can see that different kinds of operation nets should combine together with strict rules.The right side is the hierarchical structure of C2 net and the left side is the combat execution unit which contains detection and weapon nodes.In the left side,D&W nodes and C2 nodes are denoted as black circle and black rectangle,respectively.There is relationship denoted as N∝eKlbetween D&W nodes and C2 nodes,where N is the number of D&W nodes,l is the level of C2 net,K is a constant.

    a.C2 net construction

    C2 net owns some nodes which act as commander in the whole network.The information flow should correspond to the real situation.Here,we give a simple example of the structure of C2 net in Fig.5.We can easily find that C2 net is built in the form of tree diagram where the root node is the command center with the highest priority.

    b.D&W net construction

    From that moment nothing was the same for Steve. Life at home remained the same, but life still changed. He discovered that not only could he learn, but he was good at it!

    D&W nodes represent task execution units,which are directly connected with C2 nodes in priority order to form a command and control relationship.The typical example of D&W net is shown in Fig.6.D&W nodes are described as the terminal execution units in operation architecture,they are directly connected to C2 nodes with different priorities.

    Fig.4.Operation architecture constructing description.

    Fig.5.C2 net(level=4,span=5).

    Fig.6.D&W net(d N=w N=20).

    Cnet is a virtual net with no entities,it is used to connect C2 nodes and D&W nodes.Researchers have tried various models,such as random networks,small-world networks and scale-free networks,to describe a complex network.How ever,we cannot describe Cnet with only one of the three kinds of networks due to the special characters of combat restrictions.Random networks and small-world networks are effective in some degree to resist the deliberate attack,while they cannot reflect the different capabilities among different communication nodes,then much costs may be brought in.Scale-free networks can avoid the huge destruction when confronting a random attack,but it may lead to communication overload in some nodes and may even lead to a collapse in the whole operation net[22].Thus,a modified variable r1∈[0,1]is introduced to decide the proportion in net connection process,if r1=0,we adopt the random net connection mechanism,and if r1=1,the scale-free net connection mechanism would be chosen.If r1∈(0,1),we would use the fused mechanism.Simulation of C net can be seen in Fig.7.

    In order to get the complete operation architecture,we need to connect all the C2 nodes and D&W nodes with Cnet.First,we need to disconnect all the connections which contain some relationships of command and control among C2 and D&W nodes.Second,communication nodes should be chosen to connect the old nodes which were connected at first,and the chosen method also obey the fusion mechanism.In this study,we define the fusion mechanism as below:

    ①set a proper modified variable r2(r2∈[0,1])to decide the C nodes chosen mechanism,if r2=0,C nodes should be selected with exponential distribution,and if r2=1,power law distribution would be chosen.

    ②when searching for the node with maximum degree in circulation,the searching space cannot be set as all the elements of Cnet adjacency matrix which can be described as

    We define the searching space as a random piece of A′i,where

    The process can be seen in Fig.8,the designed fusion mechanism is aiming to soften the high pressure of the node which has gotten the highest degree number,and it can also change the phenomenon“the rich get richer and the poor get poorer”[23].

    4.2.Generalized operation loop description

    The operation architecture construction method is given according to the constraint above,and some essential analysis is needed to test the whole system in some degree.In this study,GOL(generalized operation loop)is brought in.

    Definition 5 GOL is a concrete description of OODA loop which contains at least one complete NOC unit,but GOL can also contain several single functional nodes.It is a basic unit which can complete the whole OODA process.Its description can be presented in Fig.9.

    From Fig.9,we can see that the execution units such as D&W nodes can communicate with each other,and in real combat,we need to define some characters about the GOL.

    a.Number of GOL

    The more basic GOL we get,the more stable the operation architecture will be.The operation architecture can make many other useable projects to continue the broken work with a new replaced GOL when being attacked.

    Fig.7.Cnet constructing sketch map.

    Fig.8.Node choosing method description.

    Fig.9.Description of GOL

    b.Length of GOL

    Length of GOL is determined by the number of D&W nodes.

    i=0,l=0;

    Repeat(While l≤L):

    i=g3;j=g2+1;d=0;

    Repeat(While i≤g2 and j≤g1):

    Step 3.Detection net organization

    Excessive D&W nodes may lead to the attenuation of the information.So,we set 5 as the maximum number of the execution nodes in a basic GOL.

    c.Evaluation indexes of GOL

    4.3.Mathematical description

    We can conclude the mathematical description of operation architecture construction as follow s:

    Step 1.Initialization

    edge_linkingR(x,y)∝Random-Graph-Link-Mechanism;

    edge_linkingSF(x,y)∝SF-Graph-Link-Mechanism;edge_linkingEXP(x,y)∝EXP-Graph-Link-Mechanism.

    Step 2.C2 net organization

    Step 4.Weapon net organization

    Step 5.Communication net organization

    Step 6.Operation architecture organization

    5.Simulation

    We conduct two experiments to verify the effectiveness and feasibility of operation architecture.The first experiment assesses the model with some indexes such as degree distribution probability,number of GOL,invulnerability and information connectivity under attack,and the other experiment analyzes the network parameters r1 and r2,gives some suggestions to construct a better operation architecture.

    Experiment 1:operation architecture assessment.

    Set simulation condition:L=4,S=1,2,...,15,r1=0.85,r2=0.75,N1=40,N2=40,N3=30.The operation architecture can be obtained as shown in Fig.10,and we also analyze some features of the network as presented in Fig.11.

    Fig.10.Operation architecture construction description.

    Fig.11.C&C2°distribution probability.

    Fig.12.The number of GOL of different level and span.

    Fig.10 shows the operation architecture which is consisted of a C2 net,a communication net and two execution nets.Fig.11 describes the degree distribution probability of C net and C2 net.From Fig.11,we can conclude that C net has some obvious characteristics of BA and ER net due to its construction method(r1=0.85,r2=0.75),and the characteristics of ER net come from the node choosing method we mentioned.Besides,only two nodes have high degree probabilities and others obey uniform distribution approximately.This kind of C net construction method can be useful to resist random and deliberate attack in some degree and the construction style can be modified by changing r1 and r2 easily.At the same time,we can get the degree distribution probability of C2 net and the nodes obey exponential distribution approximately.The results in C2 net are consistent with traditional C2 construction rule(the higher priority the node gets,the less execution unit the node connects).

    The comparison of the number of GOL when changing level and span in C2 net is shown in Fig.12.We can see that with the increasing of the level and the span,the number of GOL presents a rising trend.And we can conclude as follow s:(1)When the value of level and span is relatively small,the change of span may have more influence on the number of GOL than that of level.When the value of level and span get greater,the change of level may lead to an exponential grow th of GOL.

    (2)A large number of GOL may lead to a bad timeliness and an exponential grow th of GOL may increase the probability of a single GOL expansion and may lead to an attenuation of information transmission.

    (3)According to the analysis,we can set a proper value of level which varies from 3 to 5.And we can set the value of span according to a specific task.

    Fig.13.Evaluation indexes comparison.

    Fig.14.Operation architecture description.

    Fig.15.C&C2°distribution probability.

    The evaluation of operation architecture in the level of invulnerability and information connectivity is presented in Fig.13.The first sub-figure describes the invulnerability of operation architecture under random attack and deliberate attack.We can easily find that operation architecture may become more reliable under a random attack.The following two sub-figures describe the information connectivity rates of operation architecture under attack.With the changing of NAR(node attack rate),the information connectivity rate may have relationship with the change of level and span.When NAR=0.1 and NAR=0.4,the change of the span may have a greater influence on the information connectivity rate than that of level.But when NAR gets larger,the results are the opposite.

    Experiment 2:influence analysis of network parameters.

    Set simulation condition:L=4,S=4,r1=0.35,r2=0.25,N1=40,N2=40,N3=30.

    The operation architecture with the parameters of experiment 2 is shown in Fig.14.The degree distribution probabilities of C and C2 net are presented in Fig.15.From Fig.15,we can conclude that C net has more ER characteristics due to its construction method(r1=0.35, r2=0.25),and most nodes obey uniform distribution approximately.Different from experiment 1,we pay more attention to the influence caused by the modified variables r1 and r2 in this experiment.r1 and r2 can change the net construction style in some degree.

    The comparison of the characteristics of GOLw hen r1 and r2 are changing is shown in Fig.16.From the first and the second subfigures,we can find that there is a proper range from 0.4 to 0.8 for r1,as well as the ranges from 0.1 to 0.2 and from 0.4 to 0.6 for r2.When r1 and r2 are in the intervals,we can obtain more GOLs,and the operation architecture can be more stable.The third and the last sub-figures show the comparison of max GOL length influenced by r1 and r2.From those sub-figures,we can see that with the increasing of r1 and r2,the length of max GOL shows an increasing trend,but r2 may have more influences than r1,in the last subfigure,the average length is longer than that in the third subfigure.Thus we should set the value of r1 within the interval we mentioned above,and r2 should be set smaller than r1.

    6.Conclusion

    In this paper,we propose a method to construct operation architecture based on complex network.Aiming at the limitations of traditional single platform operations,this paper combines nodes distributed on different platforms and propose a novel method to construct operation architecture based on complex network theory.Some constraints of operation architecture are also proposed.In order to evaluate the feasibility and effectiveness of operation architecture,the evaluation index of operation architecture is put forward.The effectiveness of the proposed operation architecture is verified by simulation analysis,and some characteristics are analyzed to acquire different influences with various parameters and the proper construction parameters of this new structure are obtained.The proposed method provides a novel way to construct an operation architecture which is suitable for modern combat under information situation,and provides theoretical support for the application of network warfare in the future.

    Fig.16.Evaluation indexes comparison.

    According to the experiments,we can get the following conclusions:1)the final net connection result is influenced by many factors such as combat scale,connection mechanism,the number of nodes,modified variables and the setting constraints rules.2)operation architecture may be more efficient with fewer levels and more spans.3)the invulnerability of operation architecture can be improved by setting a proper value of NAR according to the combat conditions.4)the modified variables should be set with their value intervals.

    Acknowledgements

    The work described in this paper was fully supported by a grant from the National Natural Science Foundation of China(No.61472443).

    男女无遮挡免费网站观看| 久久天躁狠狠躁夜夜2o2o | 国产黄频视频在线观看| 考比视频在线观看| 午夜日韩欧美国产| 日本一区二区免费在线视频| 国产精品久久久久久人妻精品电影 | 国产一区二区三区av在线| 99国产综合亚洲精品| 日韩欧美一区视频在线观看| 熟妇人妻不卡中文字幕| 丰满少妇做爰视频| 男女国产视频网站| 一级片'在线观看视频| 精品国产一区二区久久| 一区二区三区精品91| 性高湖久久久久久久久免费观看| 精品一区二区三卡| 亚洲专区中文字幕在线 | 一级毛片黄色毛片免费观看视频| 国产精品国产av在线观看| 女人被躁到高潮嗷嗷叫费观| 一边摸一边抽搐一进一出视频| 黄色怎么调成土黄色| 成人影院久久| 大片电影免费在线观看免费| 久久这里只有精品19| 欧美日韩一级在线毛片| 中文欧美无线码| 一级片免费观看大全| 天天添夜夜摸| 国产不卡av网站在线观看| 伊人久久国产一区二区| 成年av动漫网址| 在线观看www视频免费| 在线免费观看不下载黄p国产| 丰满少妇做爰视频| 亚洲国产最新在线播放| 啦啦啦在线免费观看视频4| 制服人妻中文乱码| 免费av中文字幕在线| 各种免费的搞黄视频| 99久久精品国产亚洲精品| 亚洲av男天堂| 日日撸夜夜添| 亚洲国产av影院在线观看| 只有这里有精品99| 国产精品国产三级专区第一集| 欧美xxⅹ黑人| 大陆偷拍与自拍| av有码第一页| 国产成人精品在线电影| 大香蕉久久网| 午夜福利在线免费观看网站| 国产一区二区激情短视频 | 最新在线观看一区二区三区 | 亚洲第一青青草原| 久热这里只有精品99| 天天躁狠狠躁夜夜躁狠狠躁| 国产成人系列免费观看| 亚洲少妇的诱惑av| 一级黄片播放器| 亚洲综合精品二区| 多毛熟女@视频| 亚洲av福利一区| 日本wwww免费看| 日韩不卡一区二区三区视频在线| 中文欧美无线码| 亚洲人成电影观看| 中文天堂在线官网| 天堂中文最新版在线下载| 国产成人精品久久久久久| 国产在线视频一区二区| 另类亚洲欧美激情| 国产精品久久久人人做人人爽| 午夜影院在线不卡| 亚洲第一青青草原| 日日啪夜夜爽| 成年av动漫网址| 亚洲专区中文字幕在线 | av在线观看视频网站免费| 国产成人精品在线电影| 性高湖久久久久久久久免费观看| 大香蕉久久网| 午夜福利,免费看| 91精品三级在线观看| 久久亚洲国产成人精品v| 在线 av 中文字幕| 久久久久人妻精品一区果冻| 欧美少妇被猛烈插入视频| 美女扒开内裤让男人捅视频| 激情五月婷婷亚洲| 欧美日韩亚洲国产一区二区在线观看 | 国产精品无大码| 国产精品久久久久久人妻精品电影 | 国产精品熟女久久久久浪| 大片免费播放器 马上看| 9色porny在线观看| 校园人妻丝袜中文字幕| 日本av手机在线免费观看| 青青草视频在线视频观看| 亚洲欧洲精品一区二区精品久久久 | 天天躁夜夜躁狠狠久久av| 高清黄色对白视频在线免费看| 一级毛片黄色毛片免费观看视频| 国产成人精品久久久久久| 久久久亚洲精品成人影院| av网站免费在线观看视频| 男女之事视频高清在线观看 | 性色av一级| 热re99久久精品国产66热6| 麻豆乱淫一区二区| 亚洲av综合色区一区| 一级黄片播放器| 免费黄色在线免费观看| 欧美成人午夜精品| 最近的中文字幕免费完整| 国产精品免费视频内射| 欧美日韩av久久| 老司机在亚洲福利影院| 国产亚洲av高清不卡| 韩国高清视频一区二区三区| 亚洲熟女毛片儿| 亚洲专区中文字幕在线 | 久久久精品国产亚洲av高清涩受| 99久久精品国产亚洲精品| 精品一区二区三区四区五区乱码 | 国产精品久久久久久人妻精品电影 | videosex国产| 欧美日韩一区二区视频在线观看视频在线| 国产熟女欧美一区二区| 老鸭窝网址在线观看| 操出白浆在线播放| 精品久久蜜臀av无| 激情五月婷婷亚洲| 久久国产亚洲av麻豆专区| 亚洲国产欧美网| 国产1区2区3区精品| a级毛片黄视频| 欧美 日韩 精品 国产| videos熟女内射| 成人午夜精彩视频在线观看| 18禁国产床啪视频网站| 亚洲,欧美,日韩| 男女之事视频高清在线观看 | 欧美av亚洲av综合av国产av | 免费av中文字幕在线| 亚洲 欧美一区二区三区| av电影中文网址| 性色av一级| 免费黄频网站在线观看国产| 午夜免费观看性视频| 看免费成人av毛片| 成年美女黄网站色视频大全免费| 青草久久国产| 人人妻人人澡人人看| 亚洲av成人精品一二三区| 大码成人一级视频| 国产一区二区 视频在线| 91精品伊人久久大香线蕉| 最近的中文字幕免费完整| 丝袜喷水一区| 欧美激情极品国产一区二区三区| 夫妻性生交免费视频一级片| 老司机影院毛片| 两性夫妻黄色片| 十分钟在线观看高清视频www| 91老司机精品| 欧美日韩av久久| 涩涩av久久男人的天堂| 久久精品国产亚洲av涩爱| 制服丝袜香蕉在线| av免费观看日本| 日本猛色少妇xxxxx猛交久久| 久久国产亚洲av麻豆专区| 水蜜桃什么品种好| 国产伦理片在线播放av一区| 欧美黑人欧美精品刺激| 亚洲欧美一区二区三区黑人| 街头女战士在线观看网站| 亚洲美女视频黄频| 久久久久精品国产欧美久久久 | 日韩制服丝袜自拍偷拍| 国产又色又爽无遮挡免| 久久国产精品大桥未久av| 日韩av不卡免费在线播放| 国产欧美日韩综合在线一区二区| 亚洲国产中文字幕在线视频| 美女福利国产在线| 韩国av在线不卡| 人人妻,人人澡人人爽秒播 | 久久久久久免费高清国产稀缺| 免费黄频网站在线观看国产| 在线天堂中文资源库| 亚洲精品aⅴ在线观看| 日本wwww免费看| www.熟女人妻精品国产| 黄色毛片三级朝国网站| 欧美精品亚洲一区二区| 精品国产超薄肉色丝袜足j| 精品人妻在线不人妻| 一级毛片黄色毛片免费观看视频| 日本av免费视频播放| 国产精品欧美亚洲77777| 又黄又粗又硬又大视频| 蜜桃国产av成人99| avwww免费| 国产精品一区二区在线观看99| 十八禁人妻一区二区| 国产一区亚洲一区在线观看| 一区二区三区四区激情视频| 不卡av一区二区三区| 一区二区三区激情视频| av在线老鸭窝| 国产精品一区二区在线观看99| 男人操女人黄网站| 国产成人啪精品午夜网站| 久久久久久久精品精品| av女优亚洲男人天堂| 亚洲欧美色中文字幕在线| 精品人妻熟女毛片av久久网站| 国产女主播在线喷水免费视频网站| 亚洲免费av在线视频| 我的亚洲天堂| 久久久久精品性色| 免费在线观看视频国产中文字幕亚洲 | 狠狠精品人妻久久久久久综合| 一本一本久久a久久精品综合妖精| 国产精品熟女久久久久浪| 欧美成人午夜精品| 免费黄频网站在线观看国产| 亚洲久久久国产精品| 亚洲精品,欧美精品| 国产亚洲欧美精品永久| 久久国产亚洲av麻豆专区| 免费黄色在线免费观看| 国产精品香港三级国产av潘金莲 | 国产毛片在线视频| 香蕉丝袜av| 少妇被粗大猛烈的视频| 一级毛片电影观看| 亚洲国产最新在线播放| 韩国av在线不卡| 午夜免费观看性视频| 亚洲av日韩在线播放| 国产一区二区在线观看av| 人人澡人人妻人| 国产精品一区二区精品视频观看| 欧美av亚洲av综合av国产av | 国产亚洲欧美精品永久| 一区二区三区乱码不卡18| 精品少妇一区二区三区视频日本电影 | 秋霞在线观看毛片| 久久久久久久国产电影| 日韩欧美一区视频在线观看| av.在线天堂| 国产一区二区在线观看av| 青青草视频在线视频观看| 国产日韩欧美视频二区| 亚洲国产看品久久| 岛国毛片在线播放| 国产精品成人在线| 国产视频首页在线观看| 超碰成人久久| 国产成人系列免费观看| 狠狠婷婷综合久久久久久88av| 波多野结衣一区麻豆| 黄色怎么调成土黄色| 久久久精品区二区三区| 波多野结衣av一区二区av| 国产精品二区激情视频| 亚洲精品自拍成人| 美女扒开内裤让男人捅视频| 2021少妇久久久久久久久久久| 亚洲美女搞黄在线观看| 不卡视频在线观看欧美| 亚洲av欧美aⅴ国产| e午夜精品久久久久久久| 啦啦啦视频在线资源免费观看| 亚洲成人一二三区av| 国产午夜精品一二区理论片| 母亲3免费完整高清在线观看| 精品久久蜜臀av无| 老司机靠b影院| 97在线人人人人妻| 夫妻性生交免费视频一级片| 精品国产乱码久久久久久小说| 日日摸夜夜添夜夜爱| 日韩制服丝袜自拍偷拍| 亚洲久久久国产精品| 日本午夜av视频| 啦啦啦中文免费视频观看日本| 蜜桃国产av成人99| 欧美老熟妇乱子伦牲交| 久久久久久久久久久久大奶| 成人影院久久| 激情视频va一区二区三区| 尾随美女入室| 91aial.com中文字幕在线观看| av天堂久久9| 悠悠久久av| 日韩熟女老妇一区二区性免费视频| 99香蕉大伊视频| 国产1区2区3区精品| 天天躁夜夜躁狠狠躁躁| 啦啦啦 在线观看视频| 午夜老司机福利片| 国产免费一区二区三区四区乱码| 久久精品国产a三级三级三级| 国产探花极品一区二区| av免费观看日本| 日日爽夜夜爽网站| 亚洲精品一区蜜桃| 午夜福利免费观看在线| 桃花免费在线播放| 欧美国产精品va在线观看不卡| 一区二区日韩欧美中文字幕| 久久99一区二区三区| 免费久久久久久久精品成人欧美视频| 国产精品久久久久久精品电影小说| 亚洲国产看品久久| 亚洲激情五月婷婷啪啪| 色视频在线一区二区三区| 纯流量卡能插随身wifi吗| 99国产精品免费福利视频| 免费在线观看黄色视频的| av国产精品久久久久影院| 精品亚洲乱码少妇综合久久| 人体艺术视频欧美日本| 国产精品亚洲av一区麻豆 | 一本一本久久a久久精品综合妖精| 91国产中文字幕| av卡一久久| 国产野战对白在线观看| 交换朋友夫妻互换小说| 国产亚洲最大av| 热re99久久精品国产66热6| 国产探花极品一区二区| 操美女的视频在线观看| 一本大道久久a久久精品| 男人添女人高潮全过程视频| 午夜福利网站1000一区二区三区| 成人国语在线视频| 久久久久网色| 午夜福利一区二区在线看| 天天躁夜夜躁狠狠久久av| 久久热在线av| 亚洲精品中文字幕在线视频| 久久国产精品大桥未久av| e午夜精品久久久久久久| 欧美乱码精品一区二区三区| 91成人精品电影| 久久免费观看电影| 久久影院123| 超碰97精品在线观看| 岛国毛片在线播放| 日日撸夜夜添| 91精品伊人久久大香线蕉| 97在线人人人人妻| 成年美女黄网站色视频大全免费| 欧美中文综合在线视频| 国产一级毛片在线| 一本一本久久a久久精品综合妖精| 如日韩欧美国产精品一区二区三区| 一区二区三区四区激情视频| 高清在线视频一区二区三区| 久久免费观看电影| 日本av手机在线免费观看| 欧美 日韩 精品 国产| 中文字幕人妻丝袜制服| 日韩大片免费观看网站| 少妇 在线观看| 亚洲中文av在线| 国产精品亚洲av一区麻豆 | 亚洲成色77777| 精品久久蜜臀av无| 777久久人妻少妇嫩草av网站| 黄片小视频在线播放| 哪个播放器可以免费观看大片| av在线播放精品| 免费黄频网站在线观看国产| 欧美精品一区二区大全| 制服人妻中文乱码| 欧美成人精品欧美一级黄| 中文字幕另类日韩欧美亚洲嫩草| 国产精品免费大片| 国产无遮挡羞羞视频在线观看| 国产av精品麻豆| 又粗又硬又长又爽又黄的视频| 国产精品久久久久久精品电影小说| 中文字幕人妻丝袜一区二区 | 免费黄网站久久成人精品| 成人毛片60女人毛片免费| 国产精品一区二区在线不卡| 纯流量卡能插随身wifi吗| 精品国产一区二区三区久久久樱花| 2018国产大陆天天弄谢| 国产日韩欧美视频二区| 午夜福利在线免费观看网站| 一级片'在线观看视频| 黄网站色视频无遮挡免费观看| 国产成人精品在线电影| www.熟女人妻精品国产| 天天躁夜夜躁狠狠躁躁| 一区二区三区精品91| 亚洲精品国产av成人精品| 亚洲人成网站在线观看播放| 久久性视频一级片| 精品国产国语对白av| 亚洲视频免费观看视频| 色婷婷av一区二区三区视频| 欧美成人午夜精品| 老司机影院毛片| 国产高清国产精品国产三级| 99久久人妻综合| 男女边摸边吃奶| 亚洲精品av麻豆狂野| 精品国产一区二区三区四区第35| 久久免费观看电影| 久久青草综合色| avwww免费| 又大又黄又爽视频免费| 国产黄色视频一区二区在线观看| 美女高潮到喷水免费观看| 纵有疾风起免费观看全集完整版| 伦理电影免费视频| 老熟女久久久| 亚洲人成电影观看| 一本大道久久a久久精品| 国产成人一区二区在线| 中文字幕色久视频| 飞空精品影院首页| 满18在线观看网站| 久久97久久精品| h视频一区二区三区| 免费在线观看黄色视频的| av女优亚洲男人天堂| 日韩熟女老妇一区二区性免费视频| 男女高潮啪啪啪动态图| 老熟女久久久| 又大又爽又粗| 国语对白做爰xxxⅹ性视频网站| 蜜桃在线观看..| 日韩一卡2卡3卡4卡2021年| 一边摸一边做爽爽视频免费| 国产精品一区二区在线观看99| av一本久久久久| 91成人精品电影| 成人手机av| 国产精品久久久久久精品电影小说| 国产在线免费精品| www日本在线高清视频| 国产1区2区3区精品| 国产不卡av网站在线观看| 爱豆传媒免费全集在线观看| 悠悠久久av| 交换朋友夫妻互换小说| 综合色丁香网| avwww免费| 99热网站在线观看| 老司机靠b影院| a级毛片在线看网站| 人妻人人澡人人爽人人| 久久亚洲国产成人精品v| 自拍欧美九色日韩亚洲蝌蚪91| 伊人久久大香线蕉亚洲五| 伊人亚洲综合成人网| 天天躁日日躁夜夜躁夜夜| 赤兔流量卡办理| 各种免费的搞黄视频| 九九爱精品视频在线观看| 亚洲av国产av综合av卡| 在现免费观看毛片| 90打野战视频偷拍视频| 我的亚洲天堂| 国产成人午夜福利电影在线观看| 久久久久国产一级毛片高清牌| 熟妇人妻不卡中文字幕| 欧美亚洲 丝袜 人妻 在线| 国产老妇伦熟女老妇高清| 国产有黄有色有爽视频| 日日爽夜夜爽网站| 亚洲国产精品999| 夫妻午夜视频| 欧美在线黄色| 精品一区二区三区四区五区乱码 | 看免费av毛片| 日韩欧美一区视频在线观看| 可以免费在线观看a视频的电影网站 | 欧美精品高潮呻吟av久久| 精品国产一区二区久久| 黄色 视频免费看| 十八禁人妻一区二区| 国产精品久久久久久精品电影小说| 国产有黄有色有爽视频| 少妇猛男粗大的猛烈进出视频| 欧美人与善性xxx| 丰满乱子伦码专区| 久久国产精品男人的天堂亚洲| 人人妻人人澡人人看| 欧美成人精品欧美一级黄| 久久精品亚洲av国产电影网| 热99国产精品久久久久久7| 欧美日韩综合久久久久久| 日日爽夜夜爽网站| 99re6热这里在线精品视频| 久久久精品94久久精品| 女人高潮潮喷娇喘18禁视频| 美女主播在线视频| 久久久精品区二区三区| 男的添女的下面高潮视频| 无限看片的www在线观看| 色94色欧美一区二区| 最近中文字幕高清免费大全6| 欧美激情 高清一区二区三区| 男女国产视频网站| 精品人妻在线不人妻| 自拍欧美九色日韩亚洲蝌蚪91| 久久精品国产a三级三级三级| 免费观看a级毛片全部| 亚洲精品成人av观看孕妇| 欧美日韩亚洲综合一区二区三区_| 少妇猛男粗大的猛烈进出视频| 免费在线观看完整版高清| 男女边吃奶边做爰视频| 新久久久久国产一级毛片| 久久这里只有精品19| 99久久人妻综合| 99热国产这里只有精品6| 国产成人欧美| 青草久久国产| 亚洲欧美精品综合一区二区三区| 亚洲成人av在线免费| 久久97久久精品| 国产一区二区三区综合在线观看| 亚洲精品国产色婷婷电影| 人妻 亚洲 视频| √禁漫天堂资源中文www| 久久狼人影院| 成年女人毛片免费观看观看9 | 亚洲精品久久久久久婷婷小说| 欧美日韩av久久| 天天添夜夜摸| 黄片播放在线免费| 国产午夜精品一二区理论片| 午夜久久久在线观看| 日韩 欧美 亚洲 中文字幕| 中文精品一卡2卡3卡4更新| 国产一区有黄有色的免费视频| e午夜精品久久久久久久| 新久久久久国产一级毛片| 少妇人妻久久综合中文| 狠狠精品人妻久久久久久综合| 波多野结衣一区麻豆| 18禁动态无遮挡网站| 99香蕉大伊视频| 日韩制服丝袜自拍偷拍| 亚洲熟女精品中文字幕| 欧美日韩亚洲高清精品| 午夜av观看不卡| 飞空精品影院首页| 成人黄色视频免费在线看| 亚洲国产成人一精品久久久| 如日韩欧美国产精品一区二区三区| 久久精品久久久久久久性| 欧美人与善性xxx| 亚洲av福利一区| videos熟女内射| 国产国语露脸激情在线看| 久久久久久久大尺度免费视频| 99香蕉大伊视频| 亚洲av成人不卡在线观看播放网 | 久久久国产欧美日韩av| 欧美日韩一级在线毛片| 韩国精品一区二区三区| 亚洲国产av新网站| 日本91视频免费播放| 日韩大片免费观看网站| 精品一区二区三卡| √禁漫天堂资源中文www| 国产精品国产av在线观看| 国产精品女同一区二区软件| 久久久久精品人妻al黑| 91精品国产国语对白视频| 午夜福利在线免费观看网站| 午夜日韩欧美国产| 你懂的网址亚洲精品在线观看| 久久精品亚洲熟妇少妇任你| 天天躁夜夜躁狠狠久久av| 秋霞在线观看毛片| 一区二区三区精品91| 女人被躁到高潮嗷嗷叫费观| 人人妻人人澡人人看| 91成人精品电影| 一级片'在线观看视频| 热99久久久久精品小说推荐| 成人漫画全彩无遮挡| 国产精品二区激情视频| 免费观看性生交大片5| 亚洲人成77777在线视频| 老司机深夜福利视频在线观看 | 日韩一区二区三区影片| 久久99精品国语久久久| 如何舔出高潮| 亚洲av男天堂| 国产精品久久久av美女十八| 亚洲精品国产一区二区精华液| 亚洲精品一二三| 久久精品久久精品一区二区三区| 午夜福利在线免费观看网站| 中文字幕精品免费在线观看视频| 人成视频在线观看免费观看| 亚洲精品成人av观看孕妇| 一区在线观看完整版| 精品人妻一区二区三区麻豆|