• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient MAC Protocols for Brain Computer Interface Applications

    2021-12-10 11:55:04ShamsAlAjrawiRameshRaoandMahaswetaSarkar
    Computers Materials&Continua 2021年10期

    Shams Al Ajrawi,Ramesh Rao and Mahasweta Sarkar

    1Department of Electrical and Computer Engineering,San Diego State University,San Diego,CA,USA

    2Department of Electrical Engineering,University of California,San Diego,La Jolla,CA,USA

    3Department of Electrical and Computer Engineering,San Diego State University,San Diego,CA,USA

    Abstract:Brain computer interface(BCI)systems permit individuals with motor disorders to utilize their thoughts as a mean to control external devices.BCI is a promising interdisciplinary field that gained the attention of many researchers.Yet,the development of BCI systems is facing several challenges,such as network lifetime.The Medium Access Control(MAC)Protocol is the bottle- neck of network reliability.There are many MAC protocols that can be utilized for dependable transmission in BCI applications by altering their control parameters.However,modifying these parameters is another source of concern due to the scarcity in knowledge about the effect of modification.Also,there is still no instrument that can receive and actualize these parameters on transmitters embedded inside the cerebrum.In this paper,we propose two novel MAC protocols using passive UHF-RFID,the proposed protocols provide efficient and reliable communication between the transmitters and the receiver.The UHF-RFID transmitters were used because they are energy efficient which makes them compatible with BCI application.The first protocol is designed for the EEG signals.While the second protocol was designed for the ECoG signals.The evaluation results showed the validity of the proposed protocols in terms of network performance.The results also proved that the protocols are suitable and reliable for designing efficient BCI applications.

    Keywords:Brain–computer interface;MAC protocol;UHF-RFID;TDMA;FDMA;CSMA

    1 Introduction

    Brain Computer Interface(BCI)applications allows the central nervous system of human beings to communicate with external device[1].The objective of BCI applications is to sidestep the damaged nervous system in the spinal cord and to develop an immediate connection between the brain and the embedded electrodes that can receive neural signals to imitate muscle function in order to overcome paralysis[2,3]For example,individuals who are tetraplegic have normal neural signaling.However,they suffer from paralysis due to downstream damage at the spinal cord.BCI technology manipulates the functional cerebrum to communicate directly to computer assisted devices that serve in place of muscles to reestablish the functional movements.By embed-ding bio-compatible electrodes in the brain,people can have the ability to rehearse contemplation,and in this manner,induce neural signals that are deciphered by a computer[4].With the widespread of Internet of Things applications,varied innovative tools are required to control the nearby smart devices.Brain-Computer Interfaces was developed in the 1970’s,whose purpose was to study and process brain activity to convert brain processes to be used with machines and devices.A brain computer interface(BCI)permits control to smart devices and control objects such as smart homes and robots for people through their thoughts which uses wireless or wired communication to transmit and receive signals.BCI systems use implantable electrodes that send brain signals,external receivers that receive the transmitted signal,a wireless medium through which the signals can be transmitted,and signal decoding algorithms[5–7].BCI applications are time sensitive in which the time needed for transmitting and analyzing the signal must be as short as possible.This makes the medium access control that is used to transmit the signal from the electrodes to the receivers a very important factor in designing BCI applications.Several MAC protocols have been used in developing these systems,such as FDMA,TDMA,and CSMA.These protocols have provided good results.However,developing a MAC protocol that can improve the network performance will significantly improve the performance and the reliability of BCI applications.There are many factors that must be considered before building a MAC protocol for Brain-related sensor networks.For example,the number of electrodes implanted inside the skull.Most of the work on BCI field focused on the physical layer[8,9].However,complications in using MAC implementation represents a roadblock to the research,as there usually are several transmitters embedded in the brain.Several studies have utilized the Electrocorticographic(ECoG)electrodes that interface with neurons in the cortex of the brain to quantify brain activities.While,other studies have utilized the EEG signal to identify the activities of the brain.

    In this paper,we proposed two MAC protocols for developing efficient BCI applications:

    ?The first protocol combines the capabilities of three existing MAC protocols.It combines the conventional multiplexing schemes such as time division multiple access(TDMA),frequency division multiple access(FDMS)and carrier sense multiple access(CSMA).It is designed to transmit the EEG signals of the brain.Passive RFID tags were used to collect brain signals[10].We have selected the passive RFID tags because they remain idle until they receive a signal,which will reduce the transmission power.The protocol was simulated using the OPNET simulator.We evaluated our protocol that uses TDMA,CSMA,and FDMA with two other protocols(i.e.,FDMA combined with TDMA,and FDMA combined with CSMA).

    ?Our second proposed protocol was designed to reliably transmit the ECoG signals of the brain with minimum power,collisions,and delay.The protocol is based on selecting random time by the RFID tags to transmit the brain signal.The protocol was simulated using the NS 2 simulator.The evaluation results showed that the protocol can improve the network performance and ease the development of BCI applications.

    Any neural activity in the brain like implanting electrode to capture ECoG signals and connecting it to a transmitter sitting outside the brain through wires creates infection in the brain due to scar tissue which might lead to neural injuries.BCI systems where implanted sensors are assisted by batteries to power up,require treacherous and repetitive neural surgeries to replace the batteries.Therefore,due to above limitation,achieving fully wireless battery free BCI systems is a major focus among researches.There have been many methods for subsuming sensing potential of RFID.One of the subclasses of RFID named active tags use batteries to provide power to excite modulation circuits and micro-controller.Batteries required by active tags are disadvantageous for lifetime,weight,and volume.Active RFID tag as an implantable sensor would not be feasible as the battery life would be around 3–4 years.This would require numerous neurosurgeries for the replacement of the batteries which is not practical.In contrast to it,certain sub class of RFID called passive tags operate without battery as it receives all its power externally from an interrogator which emits RF signals continuously.Ultralow power of the implantable sensors is one of the major requirements while designing a brain computer interface system.Past study reveals that passive RFID systems plays an important role in designing implantable sensors where low power,security,etc.constraints are primary.Passive RFID uses ultralow power which is one of the important constraints of the sensors implanted in the brain.High power of sensors in brain may burn the tissue of the brain which may lead to serious neural problems.Considering power and non-use of battery we opt for passive RFID overactive RFID.In this paper we have showcased a wireless neural interface named WISP which is a UHF RFID tag that uses power harvesting technique to excite its circuitry by receiving radio frequency(RF)energy provided by a UHF-RFID reader[4].ECoG signals are generated by the voltage variations of the neurons and is captured by a grid of implantable bio-compatible electrodes inside the brain.ECoG signals mainly originate from the cortical pyramidal cells of the brain which consists of certain synchronized potentials called local field potentials and are captured from the surface of the cortex.Changes in synaptic activity results in variations in action potentials and graded potentials.This is the source of voltage variations in the brain which are generated in the local extra cellular space.These potentials or neural spikes are the source of the ECoG signals,which are captured by implantable electrodes with high sampling rate.The resting potential of neuron is at ?70 mV and the maximum potential acquired by it is +40 mV which occurs on excitement.The potential of the neuron after excitement goes below ?90 mV by losing energy and excites back to the resting potential ?55 mV is the minimum strength required by neuron to generate action potential.Clearly the neural spikes of the neurons vary between ?70 to +40 mV voltage level.Action potential lasts for almost 4 ms and the increase in the voltage level from the threshold stays for 2 ms which is the period the electrode captures the signal and feeds the implantable transmitter for transmission.Grids of electrodes are implanted in for neural spike capture in the subdural region.The signals which are generated impinge on the electrode for the capture which are then sent to the transmitter for transmission,propagates through cerebral cortex,grey matter,cerebrospinal fluid[5].Signals which are captured propagates through medium in the brain mainly consisting of tissue fluid,blood,skin,and skull to reach an external receiver after undergoing some signal processing technique.The reminder of this paper is organized as follows.Section 2 introduces the work that has been carried out in this field.Section 3 illustrates our first proposed protocol.Section 4 explains the evaluation of our first proposed protocol.Our second proposed protocol is introduced in Section 5.Section 6 explains the evaluation of our second proposed protocol,and the conclusion is given in Section 7.

    2 Related Work

    The development of BCI applications attracted many researchers from different fields.Some researchers investigated the use of signal processing techniques to detect and classify brain signals.While other researchers have explored the implementation of different kinds of electrodes inside the skull in order to collect brain signals(e.g.,ECoG and EEG signals).BCI applications are time sensitive in which the time required by the electrodes to send the signals to external receivers must be as short as possible.Developing an efficient medium access control through which the signal can be transmitted is still a dilemma that faces the development of BCI applications because the characteristics of the brain network are different from the traditional networks(e.g.,WAN)[11,12].An efficient access medium that reduces the collisions and the delay time will have a significant impact on improving the performance of BCI applications.The following sections explain the work that has been carried out in this area of research.The IEEE 802.15.4 and IEEE 802.15.1 have been utilized for Personal Area Networks(PANs)[13–15].The IEEE 802.15.4 MAC standard is intended for PANs.The main benefits of using this technology include its low duty cycle,low data rate,and low vitality utilization.Over the last few years,the IEEE 802.15.4 standard has been utilized for WBANs.The primary explanation behind its utilization is the super-outline structure to build the Quality of Service(QoS)necessities for WBANs.One of the significant disadvantages of the IEEE 802.15.4 is its occasional tuning into guide messages,which is the wellspring of vitality utilization in WBANs.In[16],the authors investigated this problem in terms of movement by utilizing the activity data of the nodes.This activity data is spared in the traffic wake-up table and coordinator maintains this table according to the resultant pattern.They changed the duty cycles of the nodes as indicated by their information examples to spare energy.A wake-up radio was additionally used to send the control signals to the facilitator during emergency data transfer.WBANs require an appropriate protocol with low duty cycle,low vitality utilization,and short delay.Periodic listening,idle listening,additional control overhead,and collision are the main purposes for energy consumption.To manage these issues,the authors in[17]give the examination of the out-of-band wake-up radio.Nodes switch into sleep mode when there is no information for transmission.At the point when a node has data to transmit,wake-up radio transmits the control signal to the fundamental circuit for the wake-up and information transmission.In addition,the node remains in sleep mode to spare energy.The authors have not provided any system for crisis occasions.A review of various MAC protocols and IEEE 802.15.4 for WBANs is carried out in.The authors assess and present their approach with a diagnostic model using the following parameters:delay,throughput,which effects low power tuning in,and vitality minimization.They likewise gave the path loss analysis for in body,on body,and off body correspondence.The existing MAC protocols(MAC and No MAC protocols)were analyzed to be used in a BCI application[18].The performance of existing protocols and various combinations of the same were studied in detail.Though the combination of existing protocols seems like a good tool to be used in BCI systems,the complexity of such a protocol is expected to be high.This Dalmia can be tackled by proposing a novel MAC protocol.This paper proposes two MAC protocols that ease the development of BCI applications and solve the above problems.The first protocol is designed for EEG signals transmission.While the other is proposed for ECoG signals transmission.

    3 Protocol 1

    Power consumption wasted energy due to idle listening,and end-to-end delay are critical factors to the development of BCI systems because the total time between brain activity and muscle movement must be less than 2 ms.The throughput and received data are critical to ex-tract sufficient information to translate the neural signals into the desired movement.This paper proposes a new MAC protocol for BCI applications which mitigates the above problems and enhances the network performance.The proposed protocol combines the benefits of FDMA that allows scientists to use multiple channels,with TDMA to avoid collisions using a scheduled algorithm based on Breath First Search(BFS)approach,and CSMA/CA to reduce power consumption by reducing the idle listening state[19,20].For each BCI application there are specific requirements including data rate,sampling rate,path loss and other transmission factors.In this case we are targeting the upper limp which need 512 electrodes with a sample rate of 8 KHz which is more practical in case of WISP,continuous action potential signals are sampled at 8 K samples/second.When we consider each sample to be 8 bits,we get 64 K bits/second which is the raw data without headers,error correcting codes,synchronization bits,etc.Including all the above overhead it can go up to 100 KHz.If we use a grid of 512 electrodes it rises to 51.2 Mbps,we need around 50 RFID tags because the maximum data rate transmission for each RFID tag is around 1 Mbps.Although the data rates for certain BCI applications such as the P300-based BCI can be very low,there are other applications that is currently being investigated were much higher data rates might be required.For example,Kaplan et al.[2]considered adapting the P300-BCI for gaming applications.Furthermore,it is shown in[3]that an EEG signal might require about 85 kbps in particular scenarios.Therefore,the need for high data rate support for BCI systems is a key enabler for future BCI applications.For different BCI paradigms such as movement imagery(MI)we need to use more tags because we need more information.For our scenario we considered just the upper limp.The motor cortex comprises three different areas of the frontal lobe,immediately anterior to the central sulcus.These areas are the primary motor cortex,the premotor cortex,and the supplementary motor area.The primary motor cortex,or M1,is located on the precentral gyrus and on the anterior paracentral lobule on the medial surface of the brain.The stimulation of the primary motor cortex requires the least amount of electrical current to elicit a movement.Stimulation of premotor cortex or the supplementary motor area requires higher levels of current to elicit movements,and often results in more complex movements than stimulation of primary motor cortex.Stimulation for longer time periods(500 ms)in monkeys results in the movement of a particular body part to a stereotyped posture or position,regardless of the initial starting point of the body part.The tags positions are fixed outside the brain on the scalp where the primary motor cortex of cerebellum is located,because the cerebellum responsible on generating neuron signals for the upper limp.Our proposed protocol uses 50 transceivers on the scalp to collect and transmit the EEG brain signals.To reduce the transmission power,we used passive RFID sensors(i.e.,they stay idle until they receive the brain signals to transmit).The 50 transceivers are classified as 45 transmitters and 5 receivers.They are divided into five clusters;each cluster has a different frequency and consists of one receiver and 45 transmitters.This design allows the use of multi-channels to transmit and receive signals in a full duplex mode[21].To reduce the idle listening time and avoid collisions,different time slots were used for each node in each cluster.To further reduce the idle listening state,we used the CSMA/CA.Periodically,every node wakes up to communicate with its neighbors and goes to sleep mode until the next time slot becomes available.Therefore,the next message is queued.The communication between nodes takes place through Request-To-Send(RTS)and Clear-To-Send(CTS)Acknowledgement(ACK).Hence,it requires a MAC protocol that provides both collision avoidance and reliable transmission.The brain signals that are collected by the wireless sensors must be delivered to the receiver in a timely manner.The collected signal is divided into three clusters based on frequency;this is done using the FDMA technique.Then,in each cluster,the TDMA and CSMA techniques are utilized to avoid collisions during sending the signal to the receiver.In our design,we divided the nodes into three clusters based on the FDMA technique.Each cluster works at different frequencies.The TDMA and CSMA/CA were implemented as a polynomial equation of the first degree for each of the cluster nodes,as follows:

    whereDF,DT,andDCare the time delays for FDMA,TDMA,and CSMA/CA,respectively.For Dt there are three important factors that can cause it,which are:transmission delay,queuing delay,and propagation delay.While Df can be caused If data packet is unavailable for transmission,otherwise node transmits it without any further process.Dc the delay can be caused by If ACK packet is successfully received,then nodes check for available data packets.However,if ACK is not received which results in collision,nodes go to back-off timer state.If there are no data packets to be sent node terminates communication.However,if data packets are to be sent,node again checks for medium to get free and this process repeats for every data packet.Delay is inversely proportional to N clusters because by increasing number of distributive clusters using FDMA this going to increase the throughput and in order decrease the delay.

    3.1 Scheduling Algorithm

    The main node is used to construct the schedule for all the scheduled nodes and to implement the network connectivity graph which maximizes the network data rate and reduces the delay to zero(for 12 nodes).By applying the practical heuristics technique,we determined how to improve the throughput[22].Breadth First Search(BFS)algorithm was used to assign a specific time slot and frequency band for each node.Using the BFS,the main node served as the root as we traverse through the nodes.Therefore,the default time slot and frequency were assigned for each node in the first level.Then,the interference probability between one hop and two hops was checked.If there was a conflict between theNjneighbor nodes forNi,we checked the siblings.If they were in fact siblings,the algorithm assigned different time slots forNi.The multi-channel was used to send data to the same root node(parent)at the same time slot using different assigned frequencies[23–25].At the beginning,the default time slot increased by one for the initial levels.Then,the time slot was inverted to ensure that the time slot of the children nodes is less than the time of their parents,this is expressed in the following equation:

    whereTNewrepresents the inverted time slot,TMaxrepresents the total number of slots,andTCurrentrepresents the current time slot.

    Figure 1:Breadth first search algorithm for five clusters

    The above figure shows how divided the network into 5 clusters,each circle has two numbers first one represents frequency number and second one represents time slot.Five clusters have been used from 1 to 5,1 represent the frequency 912 MHz,2 represent 915 MHz,3 represents 920 MHz,4 represents 925 MHz,and 5 represents 930 MHz.Each cluster has ten nodes,we gave different time slot for each node.At the beginning we are given default frequencies and time slots for each node based on Breadth First Search(BFS)algorithm.After running the network,the interference probability between one hope and other hops was checked.If there were Collison between the neighbor nodes for the specified node,we are checking the siblings.If they were in fact siblings,the algorithm assigned different timeslots for that specific node.So the multi-channel was used to send data to the same root node(parent)at the same time slot using different assigned frequencies.At the beginning,the default time slot increased by one for the initial levels.Then the timeslots inverted to ensure that the time slot for the children nodes was less than their parents,by using slot inversion Eq.(2).TNewrepresent new time slot,TMaxrepresents the maximum time slot in the cluster,TCurrentrepresents the current time slot.So,the pair for the first left leave node has the set(1,2)which 1 represents the frequency so we are not going to change it and 2 represents the time slot which should be adjusted if collision happened.The new values for the same node after colliding will be(1,9),the new time slot is 9 after applying slot inversion equation as explained in the bellow steps:

    1.TCurrentt=2

    2.TMax=10

    3.TNew=TMax?TCurrent+1

    4.TNew=10 ?2+1=9

    The steps of our Scheduling Algorithm 1 are explained below.Requirements:Wireless sensor Network Topology Graph:

    Scheduling Algorithm 1 G=(N,E)N=set of 50 sensors 1:Initialization 2:N=u 3:for all nodes N i loop 4:Time Slot[u]←current Time Slot 5:Cluster Channel[u]←1 6:for all the same level visited n of u do 7:if(Time Slot[u]=Time Slot[n])then 8:Time Slot[u]←Time Slot[n]+1 9:end if-10:end for 11:for all not visited edge e of u do 12:let L be the other not visited endpoint of edge e 13:Parent[L]←u 14:Height[u]←Height[L]+1 15:end for 16:end for Scheduling algorithm.

    3.2 Sender and Receiver Behaviors

    The sending mechanism is depicted in Fig.2.As shown in the figure,if the nodeNhas its own time slot then the node sends an RTS control message to transmit a packet to a predefined receiver.If the channel is declared idle(i.e.,the RTS signals successfully received by the receiver that sends a CTS control message),this allows the sending node to transmit the packet.Otherwise,if the node sensorNdoes not have an available time slot,the node will wait for a random time and start back-off algorithm.The back-off algorithm is defined as waiting for a random period before sending new packets.However,if the CTS is not received by the sender(i.e.,a collision takes place),the transmission is inhibited to start the back-off algorithm to wait for a random number of frames before the next attempt to re-transmit an RTS in the same slot.Fig.3 depicts the receiver node behavior.As shown in the figure,at the receiver side,the node listens to receive,if the channel is idle,the node will receive the RTC message and will send CTS to receive data with ACK to the sender node.While,if there is no RTC received by the receiver,the channel is occupied and should wait until it can send.

    Figure 2:Sender behavior

    Figure 3:Receiver behavior

    4 Evaluation of Protocol 1

    This protocol was simulated using the OPNET simulator[26,27].To place the nodes in the simulator,we had to select WLAN-station-adv from the object palette and place the nodes.After placing the nodes,we investigated different MAC protocols by assigning the MAC address of each node and the target address for the receiver,which was set to each transmitting node.OPNET simulator is a general simulation tool that is used to simulate the behavior of any kind of networks.Therefore,there will be no difference in terms of performance if it is used to simulate a cellular network or a BCI application.In the evaluation,45 transmitting nodes and 5 receiving nodes were used such that each receiver could receive packets from three nodes in a short range,which mimics the range of brain environment.Tab.1 illustrates the parameters used during the simulation.The values of each node were changed using edit attributes so that we could send the data packets according to our application.After the nodes were placed with all the values,we saved the project and ran it to see the simulation results.Before running the project,we selected the individual DES statistics so that we could visualize the individual statistic results.In the OPNET simulator,the transmission of the data performs differently for the brain than the regular cellular networks.Three scenarios have been considered for RFID technology,which are:FDMA+CSMA,FDMA+TDMA,and FDMA+TDMA+CSMA(i.e.,our proposed approach)to check the dropped data,delay,traffic sent,and traffic received.In the first scenario,we studied the network behavior using 45 transmitters signaling the data with different frequencies at different times for 5 receivers.This method is like the Time Division Multiplexing in the FDMA protocol.The transmitters were organized as five clusters,each of which uses different frequencies and times.The frequencies used are:912,915,920,925 and 930 MHz[28–30].In the second scenario,we assumed that the data is transmitted with different frequencies at the same time.This method is like the Frequency Division Multiplexing in CSMA/CA protocol.45 transmitters were signaled for 5 receivers.They were organized in 5 clusters,each cluster uses different frequencies,yet generates traffic at the same time.The frequencies used are 912,915,920,925 and 930 MHz,and the starting time for the nodes to transmit data is 1×10?2s.In the third scenario,we analyzed the network behavior using 45 transmitters transmitting the data with different frequencies at a different time for 5 receivers.It is like the TDMA and FDMA in CSMA protocol.The transmitters were organized as 5 clusters,each cluster uses different frequencies and time.The frequencies used in this scenario are 912,915,920,925 and 930 MHz for each cluster,a different time was used.

    Table 1:Parameters used for protocol simulation

    Figs.4–6 show the results of FDMA+CSMA,FDMA+TDMA,and our proposed protocol(i.e.,FDMA + TDMA + CSMA)in terms of traffic sent,traffic received,data dropped,and network delay,respectively.In these figures,the x-axis represents the run time of the simulation.While the y-axis denotes to the parameters.

    As shown in the figures,for FDMA+CSMA,traffic sent and received is approximately 1.8 and 0.4 kbps,respectively.The data dropped is between zero and 0.8 kbps.The network delay is dropped from zero to(1.5×10?3)s.For the FDMA+TDMA protocol,traffic sent and received is between 1.5–1.78 kbps and 0.240–0.380 kbps,respectively,the data similarly dropped between zero and 0.60 kbps,and the network delay similarly dropped from zero to 1.5×10?3s.It can also be seen from the figures that for our proposed protocol,traffic sent and received is between 1.2–1.8 kbps,the data dropped,and the network delay are zeros.The evaluation results showed that our proposed protocol performs better than the other proto-cols in terms of traffic sent,traffic received,data dropped,and network delay.According to[13],the end-to-end time needed for the neural signal to travel from the action potential to the arm is nearly(90 to 100)×10?3s.our proposed protocol satisfied this requirement as its delay was less than this time.

    Figure 4:Traffic sent,and traffic received for three

    Figure 5:Data dropped for three scenarios

    Figure 6:Network delay for three scenarios

    5 Proposed Protocol 2

    This section explains our second proposed protocol that can reliably transmit data with minimum power and delay.Also,it reduces the number of collisions while providing scalability and throughput.Our proposed protocol does not require complex hardware or high power.The protocol is based on back-off the transmission of data by RFID tags for a random time.The protocol minimizes the energy consumption by decreasing the number of collisions as compared to the traditional anti-collision Q algorithm that used RFID tags[31].There are several reasons that make the RFID as a very effective solution for BCI applications,such as low power,low cost,and the ability of its signal to pass the signal through several layers of the brain.Passive RFID is a great solution for medical applications because it operates with less power than other technologies.The technique used in these tags is called backscatter communication,they are powered by electromagnetic coupling.They receive power externally from the reader and send back the reflected signals that contain the data.The RFID tags showed great promise for real time monitoring of fully implantable sensors in human body[29,30,32].According to the Federal Communication Commission(FCC)of the United States of America,the power transmitted in the ISM band has to be less than 4 W(EIRP),making UHF-RFID as the best fit for BCI applications[28–30].The reader sends out query commands to initiate the communication.The query commands inform the senders about its availability to read.The RFID tags that are available in the reader’s region may reply to the reader.A collision might occur if more than one tag reply.To avoid collisions,each tag delays its transmission of data for a random time interval.Upon a successful reception of data,the reader sends an ACK.If the reader receives multiple replies,it will send a NACK to the tags that are involved in the collision.Then,the tags will send the data again by following the same procedure.The phases involved in this process are explained in the following sections.

    5.1 Query

    The query command is a broadcast message the reader sends when it is ready to read.Every tag in the range of the reader receives this query command.If the tags have data to send,it starts transmitting the data after a random back-off time.Otherwise,it remains idle.Staying in the idle state helps the tag to save power.The time taken for the query to reach the tag is called the propagation delay.

    5.2 Tag Reply

    After receiving the query command,tags prepare themselves for sending the data.The time taken for a tag to send back the reply to the reader is called the system delay of the tag.This time includes any actual system delay and the random back-off time.The random back-off time is uniformly chosen in the interval of[0.1 to 0.5]s.This interval is chosen since BCI applications are time sensitive.The overall delay with and without retransmissions is explained in the next sections.

    5.3 Successful Transmission

    A successful transmission is defined as the transmission that does not involve any collision.The probability of a successful transmission will be high when the number of tags is low.When two tags receive the query command,they choose a random back-off time uniformly from the interval[0.1,0.5].If the two tags choose different times,there will be no collision and the data can be sent to the reader successfully.

    5.4 Collision and Re-Transmission

    The collision occurs when two or more tags send reply the reader at the same time.The following scenario explains the event in which a collision might occur.Assume that two tags selected the same back-off time.If two tags have data to send,a collision will take place at the reader.In this case,the propagation delay and system delay are expected to be the same.If the reader detects the collision,it will send a NACK and a new query command.The time the reader takes to send a new query after a NACK is called the system delay at the reader side.When the tags receive the new query,they will choose a random back-off time again.If the random time is different,a successful transmission will take place.The above scenario explains the implementation of our proposed protocol with two RFID tags.However,there could be multiple tags implanted in the brain.In our model,a tag with a new packet to transmit delays the transmission for a random time after it receives the query from the reader.The behavior of a single tag is studied using a Markov model[33],and the probability of packet transmission and collision was calculated.

    6 Evaluation of Protocol 2

    This protocol was simulated using the NS 2 simulator[34,35].It is a discrete-event network simulator for Internet systems.We have used 10 tags as passive RFID that work on backscatter,we used frequency hop to assign random channel frequency to each tag.The frequency ranges from 900 to 930 MHZ frequency hop.During the simulation,the delay and collisions were calculated.The parameters used in the simulation are shown Tab.2.

    Ten RFID tags were used to analyze the effectiveness of the protocol assuming that the transmitters are implanted in the brain[24].The transmit power and receive power are kept as low as possible which abides by the FCC recommendations[30,31].The bandwidth range of the RFID UHF was set from 900 to 930 MHZ[4,24]In our previous tests,we found that the center frequency must be set to 914 MHz.Therefore,we set the frequency of operation to 914 MHz.We used a single reader to analyze the performance of multiple implantable transmitters that are communicating to it.Because of BCI systems were designed to operate without human intervention for long time,the simulation was carried out for a duration of up to 48 h.The following sections explain the evaluation results.

    Table 2:Parameters used for protocol simulation

    6.1 Collision

    One of the most important factors for BCI applications is collision.The purpose of developing this protocol is to minimize the number of collisions when multiple tags are used inside the brain.The collision is detected at the reader when replies from more than one tag reach the reader at the same time.Tab.3 shows the average number of collisions that are detected at the reader for a duration of 48 h.The number of collisions detected is calculated as a function of the simulation time in hours.As illustrated in the table,the total number of collisions for the duration of 6 h is 12145 collisions.While the number of collisions for the duration of 48 h is 984269 collisions.The average number of collisions detected is 530000 collisions.The average number of collisions is less than,by 5000,the number of collisions of the Slotted Aloha MAC protocol and 25000 less than the number of collisions of the No MAC protocol[18].This proved that our proposed protocol enhanced the network performance by reducing the number of collisions.

    Table 3:Collision comparison-10 tags

    6.2 Delay

    BCI applications are delay sensitive.The total time taken for neuron firing to lead to a muscle activity or a reaction is called the delay.The average time taken by a human to put thoughts into action is about 150 ms[13,18,36].The auditory and visual reaction time are about 140 to 160 ms and 180 to 200 ms,respectively[18].Reflex actions are even faster(in the order of micro seconds)as they do not involve the neuron firings[4,18,37–39].The delay in our protocol can be of two types,which are:delay without retransmissions and delay with retransmissions.Delay without retransmissions is the time taken to receive a successful reply in the first attempt itself,it is involved in a successful transmission.While the delay with retransmissions is the total time taken by for the reader to read a successful reply from a tag after several attempts.Hence,this delay includes the time taken to send a NACK,and the systems delays of the tag and the reader.As shown in Tab.4,the average delay with retransmission is higher than the delay without retransmission.It is more likely to have several inventories rounds before reading a selected tag[28].The proposed algorithm does not have multiple command exchanges which decreases the delay and overhead.As shown in the table,the average delay with retransmission is 60 ms,which is 9 ms less than the delay time of the Slotted Aloha protocol and 17 ms less as compared to the No MAC protocol.The delay time of the Slotted Aloha protocol is 69 ms,and the delay of the No MAC algorithm is 77 ms[18].This proved that our proposed protocol enhanced the network performance by reducing the delay time.

    Table 4:Delay comparison-10 tags

    7 Conclusion

    BCI applications are designed to allow people with disabilities to communicate with external devices.This takes place by analyzing and translating the brain signals(e.g.,ECoG and EEG)to generate useful commands to control the external devices.BCI applications use implanted sensors inside the skull to read the brain signals.These sensors communicate in a wireless manner with external readers to send and receive signals.This paper proposed two MAC protocols that improve the communication between the implanted RFID sensors and the external readers.The first protocol combined the functionalities of CSMA,TDMA,and the FDMA to improve the performance of the network.The first protocol was designed for the EEG signals,it was simulated using the OPNET simulator.The second protocol was designed for the ECoG signals,it was simulated using the NS 2 simulator.The evaluation results showed that both protocols have improved the performance of the brain network and they are suitable for BCI applications.Our future work includes investigating the use of different sensing devices(e.g.,WUB)and test our proposed algorithms with more sensors than the sensors we used in this work.

    Acknowledgement:We would like to thank our colleagues who supported us during this work.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    人妻夜夜爽99麻豆av| 亚洲av成人av| 国产爱豆传媒在线观看| 亚洲国产精品合色在线| 99热精品在线国产| 国产精品伦人一区二区| 又爽又黄无遮挡网站| 九九爱精品视频在线观看| 亚洲一区高清亚洲精品| 国产午夜精品一二区理论片| 国产爱豆传媒在线观看| 亚洲精品国产成人久久av| 99久久无色码亚洲精品果冻| 九九爱精品视频在线观看| 欧美高清成人免费视频www| 我的老师免费观看完整版| 久久久久久伊人网av| 久久久精品欧美日韩精品| 国产成人影院久久av| 久久精品久久久久久久性| 久久久a久久爽久久v久久| 国产黄片美女视频| 日韩制服骚丝袜av| 亚洲aⅴ乱码一区二区在线播放| 久99久视频精品免费| 日本一本二区三区精品| 亚洲av二区三区四区| 日本色播在线视频| 国产高清有码在线观看视频| 成年av动漫网址| 特级一级黄色大片| 国产午夜精品久久久久久一区二区三区| 国国产精品蜜臀av免费| 国产黄色视频一区二区在线观看 | 99热精品在线国产| 久久精品人妻少妇| 国产精品精品国产色婷婷| 男人和女人高潮做爰伦理| 亚洲国产精品国产精品| 成人特级黄色片久久久久久久| 久久婷婷人人爽人人干人人爱| 黄色视频,在线免费观看| 最近2019中文字幕mv第一页| 日韩在线高清观看一区二区三区| 亚洲成人精品中文字幕电影| 女人十人毛片免费观看3o分钟| 国产亚洲欧美98| 免费av观看视频| 中文字幕av成人在线电影| 亚洲中文字幕一区二区三区有码在线看| 深夜a级毛片| 狂野欧美激情性xxxx在线观看| 老司机影院成人| 国产高清三级在线| 男的添女的下面高潮视频| 免费电影在线观看免费观看| 高清毛片免费观看视频网站| 国产久久久一区二区三区| 欧美不卡视频在线免费观看| 成人国产麻豆网| 亚洲欧美日韩卡通动漫| 日韩欧美国产在线观看| 波野结衣二区三区在线| av免费在线看不卡| av女优亚洲男人天堂| 亚洲三级黄色毛片| 波多野结衣高清无吗| 国国产精品蜜臀av免费| 性欧美人与动物交配| 国产亚洲精品av在线| 最好的美女福利视频网| a级毛片a级免费在线| 国产精品嫩草影院av在线观看| 久久人妻av系列| 你懂的网址亚洲精品在线观看 | 精品久久久久久久末码| 黄色欧美视频在线观看| 2022亚洲国产成人精品| 日本爱情动作片www.在线观看| 亚洲精品456在线播放app| 久久久久久久久久成人| av免费观看日本| а√天堂www在线а√下载| 男人狂女人下面高潮的视频| 日韩国内少妇激情av| 亚洲欧美日韩无卡精品| 亚洲七黄色美女视频| 国产精品伦人一区二区| 人体艺术视频欧美日本| 国产一区二区在线av高清观看| 国产黄色视频一区二区在线观看 | 最好的美女福利视频网| 日本免费a在线| 久久精品国产99精品国产亚洲性色| 欧美高清成人免费视频www| 国产三级在线视频| 毛片一级片免费看久久久久| 成人美女网站在线观看视频| 免费看a级黄色片| 偷拍熟女少妇极品色| 一进一出抽搐动态| 欧美+日韩+精品| 深夜a级毛片| 欧美激情在线99| 亚洲久久久久久中文字幕| 黄色日韩在线| 国产精品日韩av在线免费观看| 亚洲人与动物交配视频| 欧美日本视频| 国产伦精品一区二区三区视频9| 最后的刺客免费高清国语| 中文字幕免费在线视频6| 国产白丝娇喘喷水9色精品| 国产伦精品一区二区三区视频9| 性色avwww在线观看| 亚洲av成人精品一区久久| 国产精品一区二区性色av| 欧美一区二区国产精品久久精品| 青春草国产在线视频 | 一级毛片电影观看 | 日本在线视频免费播放| 在线a可以看的网站| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 黄色欧美视频在线观看| 中文字幕av成人在线电影| av在线天堂中文字幕| 精品无人区乱码1区二区| 麻豆成人av视频| 22中文网久久字幕| 69人妻影院| 欧美另类亚洲清纯唯美| 亚洲一区二区三区色噜噜| 国产成人福利小说| 极品教师在线视频| 精品熟女少妇av免费看| 中国国产av一级| 又爽又黄无遮挡网站| 成年版毛片免费区| 国产亚洲91精品色在线| 熟女人妻精品中文字幕| 日韩在线高清观看一区二区三区| 欧美+亚洲+日韩+国产| 99九九线精品视频在线观看视频| 免费黄网站久久成人精品| 欧美日韩综合久久久久久| 美女黄网站色视频| 亚洲成人久久爱视频| 可以在线观看毛片的网站| 2022亚洲国产成人精品| 亚洲婷婷狠狠爱综合网| 波多野结衣巨乳人妻| 日本与韩国留学比较| 女人十人毛片免费观看3o分钟| 日韩欧美国产在线观看| 欧美日本亚洲视频在线播放| 性色avwww在线观看| 日韩大尺度精品在线看网址| 天天躁夜夜躁狠狠久久av| 我要搜黄色片| 男女那种视频在线观看| 日本五十路高清| 色播亚洲综合网| 国产在视频线在精品| 男的添女的下面高潮视频| 美女xxoo啪啪120秒动态图| 精品日产1卡2卡| 在线观看66精品国产| 国产男人的电影天堂91| 久久精品久久久久久久性| 99久久九九国产精品国产免费| 久久中文看片网| 成人av在线播放网站| 中文资源天堂在线| 国产精品久久久久久精品电影| 久久九九热精品免费| 午夜免费男女啪啪视频观看| 久久精品国产自在天天线| 高清毛片免费观看视频网站| 91精品一卡2卡3卡4卡| 黄片wwwwww| 18禁裸乳无遮挡免费网站照片| 欧美最黄视频在线播放免费| 18禁黄网站禁片免费观看直播| 99热全是精品| 麻豆一二三区av精品| 黄片wwwwww| 国产亚洲av嫩草精品影院| 精品久久久久久久人妻蜜臀av| 97人妻精品一区二区三区麻豆| 日韩高清综合在线| 国产亚洲精品av在线| 草草在线视频免费看| 精品欧美国产一区二区三| 亚洲精华国产精华液的使用体验 | 内地一区二区视频在线| 成人毛片60女人毛片免费| 乱人视频在线观看| 丝袜喷水一区| www日本黄色视频网| 午夜免费激情av| 午夜视频国产福利| 菩萨蛮人人尽说江南好唐韦庄 | 男人狂女人下面高潮的视频| 亚洲人成网站在线播放欧美日韩| 欧美一区二区国产精品久久精品| 成人鲁丝片一二三区免费| 一级黄色大片毛片| 国产精品日韩av在线免费观看| 99久国产av精品| 在线天堂最新版资源| 国产精品日韩av在线免费观看| 精品日产1卡2卡| 国内精品美女久久久久久| 狂野欧美激情性xxxx在线观看| 亚洲不卡免费看| 男的添女的下面高潮视频| 亚洲av熟女| 联通29元200g的流量卡| 26uuu在线亚洲综合色| 久久午夜亚洲精品久久| 亚洲色图av天堂| 长腿黑丝高跟| 亚洲图色成人| av在线观看视频网站免费| 国产精品久久久久久av不卡| 午夜视频国产福利| 菩萨蛮人人尽说江南好唐韦庄 | 国产亚洲精品久久久com| 国产精品美女特级片免费视频播放器| 亚洲在线观看片| 夜夜看夜夜爽夜夜摸| 波多野结衣高清无吗| 亚洲精品粉嫩美女一区| 免费观看的影片在线观看| 校园春色视频在线观看| 国产精品乱码一区二三区的特点| 精品久久久久久久久亚洲| 成人午夜高清在线视频| 99久国产av精品| 日韩,欧美,国产一区二区三区 | 亚洲av中文av极速乱| 亚洲无线在线观看| 69人妻影院| 热99re8久久精品国产| 亚洲国产精品国产精品| 麻豆一二三区av精品| 日韩精品青青久久久久久| 久久久成人免费电影| 一个人观看的视频www高清免费观看| 老师上课跳d突然被开到最大视频| 99国产极品粉嫩在线观看| 男插女下体视频免费在线播放| 日日摸夜夜添夜夜添av毛片| 黑人高潮一二区| 国产单亲对白刺激| 男女啪啪激烈高潮av片| 在现免费观看毛片| 美女脱内裤让男人舔精品视频 | 日韩视频在线欧美| 国产成人91sexporn| 非洲黑人性xxxx精品又粗又长| 亚洲成人av在线免费| 青春草亚洲视频在线观看| 男女那种视频在线观看| 日韩制服骚丝袜av| 蜜桃亚洲精品一区二区三区| 国产精品久久久久久亚洲av鲁大| 亚洲欧美日韩高清专用| 成人亚洲欧美一区二区av| 超碰av人人做人人爽久久| 成人综合一区亚洲| 日日撸夜夜添| 色尼玛亚洲综合影院| 国产精品福利在线免费观看| 最近的中文字幕免费完整| 波野结衣二区三区在线| 岛国在线免费视频观看| 中文资源天堂在线| 淫秽高清视频在线观看| 日韩大尺度精品在线看网址| 久久久久久久久久黄片| 亚洲第一电影网av| 日本色播在线视频| 亚洲成a人片在线一区二区| av在线蜜桃| 卡戴珊不雅视频在线播放| 波多野结衣巨乳人妻| 亚洲av.av天堂| 99久国产av精品| 亚洲av中文av极速乱| 亚洲四区av| 亚洲色图av天堂| 成人漫画全彩无遮挡| av在线老鸭窝| 亚洲欧洲国产日韩| 国产一级毛片在线| 日韩欧美精品v在线| 可以在线观看的亚洲视频| 欧美日韩综合久久久久久| 亚洲av第一区精品v没综合| 午夜视频国产福利| 色哟哟·www| 久久久a久久爽久久v久久| 久久精品夜夜夜夜夜久久蜜豆| 麻豆乱淫一区二区| 中文字幕av成人在线电影| 男人的好看免费观看在线视频| 婷婷亚洲欧美| 日本爱情动作片www.在线观看| 午夜免费男女啪啪视频观看| 久久久久久久午夜电影| 精品国内亚洲2022精品成人| 亚洲av成人av| 日韩视频在线欧美| 欧美精品国产亚洲| 久久久精品大字幕| 久久精品国产清高在天天线| 校园春色视频在线观看| 国产不卡一卡二| 又爽又黄无遮挡网站| 欧美又色又爽又黄视频| 亚洲人与动物交配视频| 1000部很黄的大片| av女优亚洲男人天堂| 日本黄色视频三级网站网址| 99riav亚洲国产免费| 欧美不卡视频在线免费观看| 日韩av在线大香蕉| 久久久久国产网址| 两个人视频免费观看高清| 在线播放无遮挡| 亚洲国产欧美人成| 99久久精品一区二区三区| 97超视频在线观看视频| 精品久久久久久成人av| 中国美白少妇内射xxxbb| 久久精品久久久久久噜噜老黄 | 免费看光身美女| 国产一区二区三区在线臀色熟女| 亚洲人成网站在线观看播放| 久久久久久久午夜电影| 国产午夜精品一二区理论片| 淫秽高清视频在线观看| 在线播放无遮挡| 色综合站精品国产| 波多野结衣巨乳人妻| 一边亲一边摸免费视频| 啦啦啦韩国在线观看视频| 日韩欧美三级三区| 尤物成人国产欧美一区二区三区| 26uuu在线亚洲综合色| 91精品国产九色| 男人舔奶头视频| 亚洲成人久久爱视频| 国产高潮美女av| 老司机影院成人| 成年女人看的毛片在线观看| 日韩亚洲欧美综合| 夜夜看夜夜爽夜夜摸| 日韩高清综合在线| 成年女人看的毛片在线观看| 一本一本综合久久| 国产高潮美女av| 国产老妇伦熟女老妇高清| 婷婷精品国产亚洲av| 两个人视频免费观看高清| 日韩国内少妇激情av| 亚洲av一区综合| 麻豆成人av视频| 成人漫画全彩无遮挡| 亚洲成av人片在线播放无| 色哟哟·www| 久久这里有精品视频免费| av又黄又爽大尺度在线免费看 | 成人综合一区亚洲| 国产成人精品婷婷| 大又大粗又爽又黄少妇毛片口| 爱豆传媒免费全集在线观看| 日本一本二区三区精品| 亚洲熟妇中文字幕五十中出| 成人欧美大片| or卡值多少钱| 久久亚洲国产成人精品v| 成年女人永久免费观看视频| 国产在线男女| 国产一区二区三区在线臀色熟女| 尾随美女入室| 狠狠狠狠99中文字幕| 日韩国内少妇激情av| 搡老妇女老女人老熟妇| 国产伦理片在线播放av一区 | 国产日韩欧美在线精品| 九色成人免费人妻av| 99热精品在线国产| 国产精品爽爽va在线观看网站| 国产激情偷乱视频一区二区| 欧美性猛交黑人性爽| 欧美高清成人免费视频www| 综合色av麻豆| 欧美+日韩+精品| 日本免费a在线| 伊人久久精品亚洲午夜| 欧美激情在线99| 老熟妇乱子伦视频在线观看| 欧美xxxx黑人xx丫x性爽| 亚洲经典国产精华液单| 最近手机中文字幕大全| 国产高清不卡午夜福利| 高清毛片免费观看视频网站| 日本黄色视频三级网站网址| av女优亚洲男人天堂| 日本免费一区二区三区高清不卡| 最近的中文字幕免费完整| 国产精品久久久久久亚洲av鲁大| 国产视频内射| 在线天堂最新版资源| 青春草亚洲视频在线观看| 亚洲图色成人| 国产三级中文精品| 在线免费观看不下载黄p国产| 亚洲精品日韩在线中文字幕 | 久久精品国产自在天天线| 亚洲久久久久久中文字幕| 菩萨蛮人人尽说江南好唐韦庄 | 成年av动漫网址| 自拍偷自拍亚洲精品老妇| 一进一出抽搐动态| 久久国产乱子免费精品| 精品久久久久久久久久久久久| 国产精品免费一区二区三区在线| a级一级毛片免费在线观看| 青春草亚洲视频在线观看| 天天一区二区日本电影三级| 能在线免费看毛片的网站| 国内精品美女久久久久久| 国产麻豆成人av免费视频| 亚洲欧美精品专区久久| 国产久久久一区二区三区| 日韩欧美三级三区| 国产午夜精品一二区理论片| 国产在线男女| 一级毛片电影观看 | 高清午夜精品一区二区三区 | av免费观看日本| 别揉我奶头 嗯啊视频| 国产精品,欧美在线| 99精品在免费线老司机午夜| 国产精品精品国产色婷婷| 黄色配什么色好看| 久久国内精品自在自线图片| 91午夜精品亚洲一区二区三区| 又爽又黄无遮挡网站| 国产精品av视频在线免费观看| 久久久久久久亚洲中文字幕| a级毛片a级免费在线| 日本熟妇午夜| 午夜免费激情av| 中文字幕av成人在线电影| 久久精品国产99精品国产亚洲性色| 婷婷六月久久综合丁香| 国产色爽女视频免费观看| 97在线视频观看| 两性午夜刺激爽爽歪歪视频在线观看| 一级毛片我不卡| 亚洲成人久久性| 成年免费大片在线观看| 色综合亚洲欧美另类图片| 国产高清三级在线| 舔av片在线| 白带黄色成豆腐渣| 天天躁日日操中文字幕| 人妻夜夜爽99麻豆av| 久久精品国产清高在天天线| 中文字幕人妻熟人妻熟丝袜美| 中文资源天堂在线| 噜噜噜噜噜久久久久久91| 日日摸夜夜添夜夜添av毛片| 亚洲精品粉嫩美女一区| 少妇的逼水好多| 黄色一级大片看看| 久久久久九九精品影院| 日本三级黄在线观看| 12—13女人毛片做爰片一| 免费在线观看成人毛片| 日产精品乱码卡一卡2卡三| 干丝袜人妻中文字幕| 最好的美女福利视频网| 成年av动漫网址| 久久精品国产自在天天线| 国产在视频线在精品| 国产精品久久久久久精品电影| 国产精品永久免费网站| 日韩精品有码人妻一区| 国产麻豆成人av免费视频| 中文亚洲av片在线观看爽| 夜夜爽天天搞| 欧美日韩综合久久久久久| 国产一区二区在线av高清观看| 国内久久婷婷六月综合欲色啪| 五月玫瑰六月丁香| 精品久久久噜噜| 噜噜噜噜噜久久久久久91| 日韩成人伦理影院| a级毛片免费高清观看在线播放| 国产高清三级在线| 91av网一区二区| 亚洲天堂国产精品一区在线| 欧美一区二区国产精品久久精品| 午夜视频国产福利| 狠狠狠狠99中文字幕| 亚洲av二区三区四区| 两个人视频免费观看高清| 国产高清不卡午夜福利| 久久久久九九精品影院| 欧美三级亚洲精品| 国产精品一二三区在线看| 亚洲精品亚洲一区二区| 亚洲久久久久久中文字幕| 国产极品天堂在线| 蜜桃久久精品国产亚洲av| 精品国产三级普通话版| 大又大粗又爽又黄少妇毛片口| 长腿黑丝高跟| 日本熟妇午夜| 亚洲av熟女| 国产极品精品免费视频能看的| 99热全是精品| 亚洲真实伦在线观看| 九九爱精品视频在线观看| 亚洲一级一片aⅴ在线观看| 欧美日本视频| 美女xxoo啪啪120秒动态图| 人体艺术视频欧美日本| 春色校园在线视频观看| 亚洲自拍偷在线| 国产又黄又爽又无遮挡在线| 亚洲18禁久久av| 亚洲性久久影院| 亚洲av第一区精品v没综合| 你懂的网址亚洲精品在线观看 | 岛国毛片在线播放| 日韩亚洲欧美综合| 国内精品美女久久久久久| 夜夜夜夜夜久久久久| 91av网一区二区| 啦啦啦观看免费观看视频高清| 亚洲av一区综合| 国产精品一区二区三区四区免费观看| 亚洲国产精品成人久久小说 | 99热这里只有是精品在线观看| 亚洲av中文av极速乱| 免费看日本二区| 亚洲av免费在线观看| 午夜精品一区二区三区免费看| 国产黄色小视频在线观看| 久久精品国产亚洲av涩爱 | 女人被狂操c到高潮| av国产免费在线观看| 亚洲图色成人| 九九久久精品国产亚洲av麻豆| 赤兔流量卡办理| 久久午夜福利片| 寂寞人妻少妇视频99o| 成年免费大片在线观看| 日韩精品有码人妻一区| 在线国产一区二区在线| 国模一区二区三区四区视频| 国产极品精品免费视频能看的| 非洲黑人性xxxx精品又粗又长| 免费看a级黄色片| 午夜福利成人在线免费观看| 久久人人精品亚洲av| 亚洲精品乱码久久久v下载方式| 欧美一区二区国产精品久久精品| 免费av不卡在线播放| 午夜精品在线福利| 精品久久久久久久久亚洲| 国产精品电影一区二区三区| 亚洲最大成人av| 人体艺术视频欧美日本| 简卡轻食公司| 国产午夜精品久久久久久一区二区三区| 极品教师在线视频| www.色视频.com| 成人一区二区视频在线观看| 亚洲国产精品成人综合色| 日韩,欧美,国产一区二区三区 | 一边摸一边抽搐一进一小说| 日本五十路高清| 亚洲成a人片在线一区二区| 97超视频在线观看视频| 内射极品少妇av片p| 一夜夜www| 国产精品一区二区在线观看99 | 免费观看精品视频网站| 国产国拍精品亚洲av在线观看| 黄色配什么色好看| 高清毛片免费观看视频网站| 久久久午夜欧美精品| 国产又黄又爽又无遮挡在线| 亚洲精品国产成人久久av| 九九在线视频观看精品| 国产v大片淫在线免费观看| 日韩欧美一区二区三区在线观看| 久久亚洲国产成人精品v| 一区二区三区四区激情视频 | 人妻久久中文字幕网| 97超视频在线观看视频| 国产精品一区二区三区四区免费观看| 51国产日韩欧美| 国产一区二区在线观看日韩| 亚洲av中文字字幕乱码综合| 亚洲av第一区精品v没综合| 久久精品人妻少妇| 最近最新中文字幕大全电影3|