• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    University Learning and Anti-Plagiarism Back-End Services

    2021-12-15 12:45:58ManjurKolharandAbdallaAlameen
    Computers Materials&Continua 2021年2期

    Manjur Kolhar and Abdalla Alameen

    Prince Sattam Bin Abdulaziz University, Wadi Ad Dawaser, 11990,Saudi Arabia

    Abstract: Plagiarism refers to the use of other people’s ideas and information without acknowledging the source.In this research, anti-plagiarism software was designed especially for the university and its campuses to identify plagiarized text in students’written assignments and laboratory reports.The proposed framework collected original documents to identify plagiarized text using natural language processing.Our research proposes a method to detect plagiarism by applying the core concept of text, which is semantic associations of words and their syntactic composition.Information on the browser was obtained through Request application programming interface by name Url.AbsoluteUri, and it is stored in a centralized Microsoft database Server.A total of 55,001 data samples were collected from 2015 to 2019.Furthermore, we assimilated data from a university website, specifically from the psau.edu.sa network, and arranged the data into students’ categories.Furthermore, we extracted words from source documents and student documents using the WordNet library.On a benchmark dataset consisting of 785 plagiarized text and 4,716 original text data,a significant accuracy of 90.2% was achieved.Therefore, the proposed framework demonstrated better performance than the other available tools.Many students mentioned that working on assignments using the framework was suitable because they were able to work on the assignments in harmony,as per their timeframe and from different network locations.The framework also recommends procedures that can be used to avoid plagiarism.

    Keywords:NLP;information science;text data;semantic;syntactic analysis

    1 Introduction

    The purest form of research misconduct,which causes a substantial adverse impact on academics and the public, is academic plagiarism; and as [1,2] highlighted, plagiarized papers hinder the scientific research process.Plagiarized content and potentially wrong findings can adversely impact future research directions as well as practical applications [3].In fields such as medicine and pharmacology, plagiarized research can skew meta-studies, which cause a detrimental effect on patient safety, and can even jeopardize their safety.Similarly, in academics, plagiarism impacts the acquisition of knowledge as well as assessment.Authors [1] reported that when a student receives a grade for plagiarized work, their extrinsic motivation reduces learning and knowledge acquisition.Likewise, this distorts competency assessment, which can result in an undue advantage to the plagiarist in terms of career prospects [4].Plagiarism in education is not new and has prevailed for centuries.The continuous upsurge in information technology (IT) has made academic plagiarism easy due to an increased access to different information sources.Universities and colleges regularly conduct workshops on plagiarism for new students and warn them about the severe consequences.However, students continue to plagiarize text to complete their assignments and engage in dishonest practices during practical examinations [4,5].To overcome this, the use of anti-plagiarism software is quite common in universities [6].The software can be accessed through software clients or by connecting a browser to a backend server.A backend server involves crucial software and hardware-based logic, which hosts the services.The actual plagiarism software process involves three significant steps:

    ? The client uploads information on the title and author’s name and the document to be checked.

    ? The server refers to the database of originally published documents for computing the similarity index.

    ? The server produces the result of the similarity between the uploaded document and the already published text.

    This paper presents an approach for identifying original documents and detecting academic plagiarism and involves collecting documents, URLs, and other means used by students as information sources and acquired through their computers in a network-based environment to complete their assignments.Through a literature review, to the best of the researchers’ knowledge, the methods, and systems presented in this approach have not been proposed elsewhere.The proposed client allows the results to be filtered to reduce the similarity index in the bibliography, quotations, and author details.The backend server used for hosting anti-plagiarism services should be equipped with software logic to find original documents and similar text under time constraints.However, the backend server may require more time if the submitted document or research paper is lengthy, given the increased burden on the server.Therefore,in this study, anti-plagiarism services were designed and implemented specifically for the university learning setup.

    The remainder of this paper is organized into five sections.Sections 2 and 3 discuss current systems and the proposed framework and its modules.Section 4 lists the advantages of the proposed system,including a brief account of the implemented framework experience and the student’s behavior.Finally, Section 5 highlights the limitations of the study and briefly presents our conclusions.

    2 Literature Review

    A critical prerequisite is the identification of plagiarized text among millions of original documents.Thus, the server needs to refer to the host database server of documents on a specific topic that is sufficient for identifying similar text during the process and producing the result.However, finding the original authors’ work is complicated because of the existence of millions of websites [7].However,plagiarism software leverages its controls to clients to analyze the text and classify the original text in it.Moreover, translated, rephrased, and similar research texts are often not identified and detected by antiplagiarism software, and consequently, many papers have been published with such text.Furthermore, the weakness of plagiarism software is that it excludes everyday phrases from the similarity index [8].Many researchers have suggested that universities should opt for specialist software to eradicate dishonest practices and plagiarism among university students [9,10].In the present research, the iThenticate software, a well-known program for detecting plagiarism, is considered.It is used to examine submissions by students and researchers for detecting plagiarized text and delivering highly accurate similarity index reports on documents [11].Plagiarism software is widely used across several disciplines,such as computer science, engineering, mathematics, and applied medical science [12,13].It was recently used for university programs and was found to improve student awareness regarding plagiarism; students were asked to resubmit their assignments to reduce the plagiarism ratio compared to that in the first submission [14-18].As per the student opinions, the software was useful against plagiarism, and its use was recommended in small colleges as well as large schools.A systematic examination for detecting plagiarism can be performed using knowledge graph analysis and cross-language lingual text alignment,which was used for fine-grained plagiarism detection, irrespective of language [15].However, these proposed experimental methods cannot detect text that has been modified to hide plagiarism.

    The authors Abdi et al.[19]suggested that there is an integration of semantic relations between words and their syntactic composition for detecting plagiarism.They used a three-step mechanism, that is, preprocessing the basic natural language, comparing the suspicious and source texts after decomposing them into several sentences, and presenting the plagiarized sentences.However, categorizing active and passive sentence constructions increases the semantic knowledge base.In [19], this categorization was currently missing and required further research.

    It is also suggested that a model of semantics of a basic block is created using symbolic formulas that represent the input-output relations of the block.Thus, the semantic similarity of these two blocks was checked using a theorem.The authors then modeled the semantic similarity, which was calculated using the longest common subsequence.This method has resulted in strong resilience to code obfuscation.However, this theorem has limitations such as opaque predicates or unsolved conjectures [20-21].According to [22], artificial publication inflation counts through plagiarism can cause adverse outcomes.Such studies on plagiarized content are often cited similar to those in the original content, increasing the citation counts,affecting research performance, and causing problems in funding and hiring.

    Fig.1 shows the process followed by iThenticate to identify plagiarism.The iThenticate system compares the document to be verified against original documents; it initially converts the source document into a digital fingerprint.This digital fingerprint is then checked against the database of original documents.Once the document is verified, the iThenticate system considers the number of matching words within the source document and divides it by the source document’s total word count to yield the similarity index.Additionally, this study contributes to university learning and software development,considering the lack of understanding of how students often use text comparison of anti-plagiarism software for plagiarism detection.It can be considered a formative learning tool in a substantial pedagogically-led discussion regarding the synthesis, critique, and understanding of the academic literature based on how the software is presented to students.

    3 Proposed System

    The proposed system architecture is shown in Fig.2.It depicts the test system that is currently running on the domain www.psau.edu.sa.The university domain hosts many services for faculty, students, and support staff.The faculty members are equipped with multimedia e-learning tools for learning, and teaching purposes.Students submit their class assignments, scientific research, and class activity sessions to their respective faculty members through a student dashboard of multimedia e-learning modules.Our university uses Blackboard as its multimedia learning tool.This tool has many features, allowing faculty members to collect data from each student’s dashboard.However, our proposed system has a plagiarism material collector module that works along with the domain name system to retrieve student data.Our plagiarism module has three main modules to detect plagiarism in student work.These modules are the data gatherer (DG), preprocessor (PP), and assessor.The DG module is responsible for collecting student data to include the browsed data collected via DNS from each student’s PC from the lab network and was in place from 2015 to 2019, collecting a total of 55,001 data instances.This data include the date, lab session name, student name,student work name, time, day,faculty name, and nature of the work plan.

    Figure 1:Process of iThenticate system(courtesy of Turnitin)

    Figure 2:Proposed system architecture

    3.1 Data Gathering

    To understand the student activities in lab sessions, browsed data were collected from the website www.psau.edu.sa.The lab session platform enables the students, faculty, and departmental heads to attend online exams.This site began in 2009 and records the LAB work, LAB tests, and LAB final exams.These sessions aimed to enhance the examination procedures and provide improved faculty and student services to overcome the problem of plagiarism.The university was recognized under the Saudi Education Ministry, and it offered various programs across domains, including computers, medicine, engineering,nursing, and science, along with various other courses targeted to suit the needs of foreign and local students.In the plagiarism network for the examinations, student activities concerning mouse and keyboard behavior were uploaded on the database.The system describes these activities based on student identification and their IP addresses.In addition, it also describes the keywords and their respective tasks.Fig.3 presents a sample of student lab/assignment/classwork.After obtaining approval from the university, the browsed data were collected from each student’s PC on the lab network collected from 2015 to 2019, for a total of 55,001 data instances.This data includes the date, lab session name, student name, student work name,time, day,faculty name,and nature of the work plan.

    Figure 3:Student’s lab/assignment work sample

    3.2 Preprocessing(PP)

    The PP module prepares the data for the assessor; the preparation involves breaking each student document into sentences and then removing any stop words.Further, each word stems from its root words; this process eventually removes morphological affixes from words, leaving only the word stem.For stemming purposes, we employed a lexical database to create stem words from the WordNet database.However, there are a number of pre-processing operations on gathered text that can be applied to obtain a machine-readable format for further processing.The following are the facilities provided in our PP module to prepare student data for assessing plagiarism.

    a) Conversion of all letters (upper to lower case)

    b) Conversion of numbers into words.

    c) Detect and delete punctuation.

    d) Detect and remove white spaces

    e) Expansion of abbreviations or vice-versa

    f) Text canonicalization

    There are many features of PP module,which were incorporated and yielded highly desirable processing results.One such feature was saving processing time and database space.Hence,the result of this process is used for a more complicated natural language processing (NLP)task called Assessor.

    3.3 Assessor

    The Assessor module is responsible for detecting plagiarized material in the sentences of a submitted assignment collected during the submission process and their corresponding reference material.The Assessor employs semantic analysis after the extraction of the semantic evaluation of both documents;results are presented in the form of a similarity index.For plagiarism detection, we need to construct vectors of each word appearing in both documents.Hence, words used from both documents that have similarity in text obtain similar vector representations.Once we map the words into a vector space, we can then use them to find words that have similar semantics.Algorithm 1 is used to perform the semantic analysis.The vector space model is a statistical model representing text information for our proposed method.

    Algorithm 1:Semantic analysis

    The first step is to form word-embedding for a given document to quantify the similarity index.To form such an index,the WordNet algorithm uses a feedforward neural network to predict the vector representation of words derived from both sources.When we compare words between two documents using the lexical knowledge-based library called WordNet, it gives an arrangement of words in the lexical database.Hence, we can create a relation between words using synsets in the lexical database.Before comparing the original and plagiarized documents, it is better to understand many important elements of sentences and words that were formed together to create a report complete document.First, the word set between these two documents is compared.Hence, a similarity is derived based on the semantic level from the WordNet library; further, the semantic similarity results derived from WordNet and the tree kernel are combined.The lexical database gives information content for each word from WordNet, which also hosts synonym set called synsets; this is obtained using the following Eq.(1):

    where IC is the information content concerning each word present in both documents for the WordNet lexical database.Furthermore,the similarity of two words in the equation,as mentioned earlier,IC can also be used to find similarity by Least Common Subsume.

    4 Experiments

    This prototype application was developed to detect plagiarism by comparing students’documents against the data gathered on the university network.To accomplish this task,we used the NLP library for the Python programming language.The NLP has built-in libraries for pre-processing data for tokenization, parsing,classification, stemming, tagging, and semantic reasoning.We also employed the Gensim library, which has packages to process documents and also possesses the ability to create word vectors using WordNet.For evaluation purposes, different evaluation metrics were employed, such as precision, recall, F-measure, and granularity.Eqs.(2)-(4)were used to detect plagiarism,based on[19].

    whereas

    Ifrdetects s and otherwise ?,whereSis a set of cases of plagiarism,Ris the set of detection reported by the developed framework,andsandrare the elements ofSandR,respectively.Further,the F-measure was obtained using Eq.(6).

    It was observed that precision and recall produced overlapping results for a given document;hence,it was necessary to quantify granularity.

    whereas SR∈S is the cases of plagiarism detected in R,Rs ∈R is detection in s as follows in Eqs.(8)and(9).

    An experiment was conducted on the gathered dataset collected for the included years.This dataset was dubious and compared to the student work.Tab.1 shows the comparative results of the study proposal and various state-of-the-art research proposals.The proposed framework outperformed the PANPC-18 system proposals.Different evaluation metrics, including recall, precision, and F-measure, were used for the experiment.

    Table 1:Performance comparison between PAN-PC-18 systems

    The proposed framework was useful for identifying plagiarism in assignments and laboratory works.Furthermore, the anti-plagiarism software executed without any special library, tools, and software packages.Although iThenticate, Grammarly, plagiarism software, smallseotools.com, Plagiarism Checker X, and EduBirdie.com are easy to use, they are also troublesome and inaccurate concerning the detection of polarized content.For instance, an online plagiarism system requires backend servers or real-time access to large databases.Such services were not reliable because they only refer to a very few sites.Moreover, the documents included were not accessible via Google.Tab.2 lists the performances of the methods arranged in order of regency.It also demonstrates the best recent work.The proposed method was outstanding, as it performed better than the other state-of-the-art research proposals.Tabs.3 and 4 list entries of state of the art of proposals, wherein the formula below was applied [19] to calculate the percentage of improvement over the other methods for the PAN-PC-18 dataset.

    Table 3:Our proposed method performance improvement over pan-pc-18 systems

    The proposed framework was useful for identifying plagiarism in assignments and laboratory work.Furthermore, the anti-plagiarism software was executed without any special library, tools, and software packages.Although iThenticate, Grammarly, smallseotools.com, Plagiarism Checker X, and EduBirdie.com are easy to use, they are troublesome and inaccurate for the detection of plagiarized content.For instance,an online plagiarism system requires backend servers or real-time access to large databases.Such services are not reliable because they only refer to very few sites.Moreover,the documents included were not accessible via Google.The proposed project aids teachers by highlighting the similarity index and the source,which can be extremely cumbersome for teachers to find.In contrast,the use of the proposed client service model for plagiarism detection helps obtain instant results.Notably, the client-server model includes realtime capturing of URL and keypress events, particularly Ctrl+V and Ctrl+C, which are present on local servers.Thus, these stored databases need to be downloaded and sent to the service provider to verify that no plagiarism was present in student assignments.Globally, the number of plagiarism cases by students and faculty is growing.However, academic institutions are steadfast in maintaining moral standards for students and faculty.To protect academic integrity and avoid plagiarism, most universities either buy or develop plagiarism detection technology.This section describes a few plagiarism detection software programs used by highly ranked institutions to avoid plagiarism.IThenticate is a plagiarism detection software program that runs on the website Turnitin and protects intellectual property.In 2006,leading newspapers reported that the novel “Godless” had an instance of plagiarism.The proposed framework provided other key benefits apart from removing plagiarized text.Because the framework is programmed using a Windows login system, it does not allow students to work if the framework itself is not working.This Windows login arrangement is necessary, particularly when students are assigned a task, which further enables faculty members to supervise students.Second, as the proposed framework runs as a background process, it does not affect the university campus network.Hence, this framework collected data in a secure environment.Duplichecker is another web-based plagiarism service that performs sentence-by-sentence comparisons over the Internet; it probably depends on Google.However,it might miss some rephrased sentences.Numerous online plagiarism verifiers are currently available;however, most do not disclose their work mode.Moreover, they do not generate comprehensive plagiarism reports.The study used these verifiers on many documents containing copied sample text for verification and found that the verifiers were unable to detect plagiarism.Third, students need to adopt honest practices to rapidly complete their non-plagiarized assignments.Fourth, instructors can grade students’ work remotely and submit their assignments for plagiarism detection.Fifth, it reduces the university practices of buying expensive plagiarism software, for which a license fee/use is charged.Finally, the laboratory slot problem is no longer an issue because students can work on their assignments anytime and from anywhere.

    Table 4:Our proposed method’s performance improvement over other proposals

    5 Framework Assessment by Students

    A plagiarism collection framework was developed for university courses and evaluated using a smallgroup setting in a pilot study.Tab.5 shows that the scores marked by various faculty members for the student laboratory reports and assignments were not satisfactory before they received any information on plagiarism.

    Table 5:Students survey results

    *Average Values:5 Strongly Agree,4 Agree, 3 Neutral, 2 Disagree, and 1 Strongly Disagree.

    The evaluation results showed that this anti-plagiarism framework has the potential for use in university programs.In the pilot study,25 students(all male)participated in the assignments and laboratory reports of the course; 22 students in this group completed a questionnaire.The questionnaire reflected high overall satisfaction in the study.In the second question, students reported that the course had improved their knowledge of plagiarism, attitudes toward coding, and writing skills.Most respondents (n = 22)completed assignments and laboratory reports after the course.Specifically, the assignment assessed in the survey (second question) had significantly improved grades.The course syllabus has a real-time application, and one of the learning outcomes is the student awareness of plagiarism when submitting assignments and laboratory reports on the latest topics.However, a few students expressed the need for similar sessions for other subjects.The researchers also asked the students to assess their knowledge before and after obtaining plagiarism information.Therefore, as information on plagiarism was disseminated course learning outcomes were improved.Some written comments were also received, in which students stated that the use of the developed framework helped them prepare laboratory reports and assignments.This approach is highly inspired from two perspectives:knowledge about plagiarism and gaining skills, mainly writing skills, for research publication.Many students mentioned that working on assignments using the framework was suitable because they were could work on the assignments conveniently, as per their timeframe, and from different network locations.The students specified that no time was spent on configuring and installing the anti-plagiarism framework.

    6 Conclusion

    University learning and anti-plagiarism require efforts from both instructors and students.This study found that dissemination of information concerning plagiarism was extremely critical for the undergraduate program.However, a limitation was that every university could not afford plagiarism software, but certain courses that involve research paper writing tasks and coding should incorporate plagiarism check to ensure that it has not occurred.To date, the proposed framework was the only existing software to combat plagiarism effectively, and it may be updated to include more features to work independently without the intervention of third-party plagiarism software.As an alternative to thirdparty software, students can complete laboratory reports and assignments without any software while attempting to be insightful when writing research papers.To effectively utilize anti-plagiarism software,the author must follow comprehensive ethics while adding citations to their work.Existing anti-plagiarism software can be easily misled by removing words and phrases from the document.The authors have built a plagiarism backend framework and installed it on each computer in the university and its affiliated colleges.The framework collected browsed articles and online text and images while laboratory reports were being written.Thus, the framework collected the students’ browsed history and their respective URLs, images, and other text materials present in their local drive, that is, anything copied using a keyboard or mouse.These collected browser data and other data were transferred to the plagiarism software provider to reduce the burden on their server; the software scanned millions of data sets and produced similarity indices of a student’s submitted work.Hence, overall, this approach reduces the burden on the university server instead of completely scanning millions of data.A student-targeted anti-plagiarism framework is proposed in this paper.This approach increases student awareness of plagiarism without revealing their identity.The study provided a prototype implementation of the proposed architecture based on the university network setup that can be dynamically connected to obtain data from students and note their activities when writing an assignment.Although the frequency of reported plagiarism is high in number, many students involved in plagiarism have a low level of plagiarism awareness.Others may claim that they understand the consequences of plagiarism, but they continue to practice plagiarism.Students who truly prioritize their personal growth should focus on originality and find innovative ideas instead of practicing plagiarism.

    Acknowledgement:We acknowledge that the Deanship of Scientific Research at Prince Sattam Bin Abdulaziz University supported this project under the research project 2019/01/10440 and we appreciate their kind support thought the research.

    Funding Statement:The Deanship of Scientific Research at Prince Sattam Bin Abdulaziz University supported this project under the research project 2019/01/10440.

    Conflicts of Interest:The author(s)declare(s)that there is no conflict of interest regarding the publication of this paper.

    亚洲国产精品999| 一级毛片黄色毛片免费观看视频| 永久网站在线| 午夜av观看不卡| 我的女老师完整版在线观看| 人人澡人人妻人| a 毛片基地| 涩涩av久久男人的天堂| 欧美老熟妇乱子伦牲交| 大话2 男鬼变身卡| 美女主播在线视频| 中文字幕最新亚洲高清| 一本一本综合久久| 亚洲精品乱码久久久v下载方式| 亚洲国产精品999| 欧美精品人与动牲交sv欧美| 亚洲av成人精品一二三区| 久久久久人妻精品一区果冻| 免费日韩欧美在线观看| 久久久久久人妻| 国产毛片在线视频| 久久久亚洲精品成人影院| 一本色道久久久久久精品综合| av在线播放精品| 少妇人妻精品综合一区二区| 丁香六月天网| 不卡视频在线观看欧美| 人人妻人人爽人人添夜夜欢视频| 日韩成人伦理影院| 欧美老熟妇乱子伦牲交| 亚洲性久久影院| 99re6热这里在线精品视频| 视频区图区小说| 欧美亚洲 丝袜 人妻 在线| 日韩一本色道免费dvd| 成人毛片a级毛片在线播放| 久久国产精品大桥未久av| 波野结衣二区三区在线| 精品人妻熟女毛片av久久网站| 国产成人午夜福利电影在线观看| 日韩精品免费视频一区二区三区 | 亚洲国产精品成人久久小说| 国产精品熟女久久久久浪| 亚洲精品国产av成人精品| 亚洲国产最新在线播放| 能在线免费看毛片的网站| 国产视频内射| 日韩欧美一区视频在线观看| 中文字幕人妻丝袜制服| av福利片在线| 久久人人爽av亚洲精品天堂| 最近2019中文字幕mv第一页| 欧美一级a爱片免费观看看| 亚洲人成77777在线视频| 国产一区二区在线观看日韩| 亚洲情色 制服丝袜| 最近2019中文字幕mv第一页| 黄色欧美视频在线观看| 中文字幕人妻丝袜制服| 亚洲综合色惰| 美女福利国产在线| 如何舔出高潮| 伦精品一区二区三区| 亚洲一区二区三区欧美精品| 少妇的逼好多水| 日韩免费高清中文字幕av| 高清毛片免费看| 久久鲁丝午夜福利片| 蜜臀久久99精品久久宅男| 免费av中文字幕在线| 色婷婷久久久亚洲欧美| videos熟女内射| 国产精品一区二区在线观看99| 五月伊人婷婷丁香| 欧美日韩视频高清一区二区三区二| 97精品久久久久久久久久精品| 久久狼人影院| 国产有黄有色有爽视频| av免费在线看不卡| 大片免费播放器 马上看| 国产欧美日韩一区二区三区在线 | 王馨瑶露胸无遮挡在线观看| 18禁观看日本| 免费大片黄手机在线观看| 欧美日韩视频精品一区| 91久久精品国产一区二区三区| 成年人午夜在线观看视频| 在线观看一区二区三区激情| 在线天堂最新版资源| 日本vs欧美在线观看视频| 在线观看免费高清a一片| 特大巨黑吊av在线直播| 在线精品无人区一区二区三| 国产精品偷伦视频观看了| 亚洲欧洲精品一区二区精品久久久 | 人人妻人人添人人爽欧美一区卜| 国产69精品久久久久777片| 久久久欧美国产精品| 国产精品 国内视频| 亚洲欧洲日产国产| a 毛片基地| 秋霞伦理黄片| 久久久亚洲精品成人影院| 多毛熟女@视频| 国产精品一区www在线观看| 国产免费又黄又爽又色| 日本黄大片高清| 久久久久视频综合| 免费日韩欧美在线观看| 中文字幕久久专区| 中文天堂在线官网| 日本与韩国留学比较| 国产国语露脸激情在线看| 一本色道久久久久久精品综合| 欧美国产精品一级二级三级| 天美传媒精品一区二区| 一区二区三区乱码不卡18| 五月天丁香电影| 狂野欧美白嫩少妇大欣赏| 91精品国产九色| 新久久久久国产一级毛片| 亚洲丝袜综合中文字幕| 欧美激情国产日韩精品一区| videosex国产| 亚洲av日韩在线播放| 国产黄频视频在线观看| 极品人妻少妇av视频| 免费久久久久久久精品成人欧美视频 | 国产欧美亚洲国产| 久久99一区二区三区| 亚洲美女黄色视频免费看| 最近中文字幕高清免费大全6| 飞空精品影院首页| 久久久国产精品麻豆| 精品国产一区二区久久| 日韩免费高清中文字幕av| 亚洲三级黄色毛片| 日韩av在线免费看完整版不卡| 在线观看国产h片| 啦啦啦啦在线视频资源| 看免费成人av毛片| 国产一区二区在线观看av| 精品久久久精品久久久| 国产成人精品一,二区| 中文天堂在线官网| 国产高清国产精品国产三级| 在线观看免费高清a一片| 中文字幕免费在线视频6| 欧美最新免费一区二区三区| 亚州av有码| 亚洲国产色片| kizo精华| 欧美日韩精品成人综合77777| 亚洲精品av麻豆狂野| 精品亚洲乱码少妇综合久久| 欧美日韩一区二区视频在线观看视频在线| 国产国拍精品亚洲av在线观看| 亚洲人与动物交配视频| 精品少妇黑人巨大在线播放| 亚洲av成人精品一二三区| 日韩免费高清中文字幕av| 日韩精品免费视频一区二区三区 | 日韩精品有码人妻一区| 性色avwww在线观看| 日本欧美视频一区| 亚洲精品日韩在线中文字幕| 校园人妻丝袜中文字幕| 亚洲人成网站在线播| 美女脱内裤让男人舔精品视频| 五月玫瑰六月丁香| 少妇人妻精品综合一区二区| 欧美日本中文国产一区发布| 亚洲国产精品专区欧美| 日韩亚洲欧美综合| 亚洲欧美成人精品一区二区| 免费播放大片免费观看视频在线观看| 2021少妇久久久久久久久久久| 一级爰片在线观看| freevideosex欧美| 成人漫画全彩无遮挡| 三上悠亚av全集在线观看| 插逼视频在线观看| 男女边吃奶边做爰视频| 精品一区二区三区视频在线| 午夜福利,免费看| 视频区图区小说| 热99国产精品久久久久久7| 午夜免费男女啪啪视频观看| 在线观看免费日韩欧美大片 | 永久免费av网站大全| 中文字幕最新亚洲高清| 内地一区二区视频在线| 在线看a的网站| 亚洲国产精品一区三区| 九九爱精品视频在线观看| 欧美三级亚洲精品| 亚洲欧洲精品一区二区精品久久久 | 亚洲欧美成人精品一区二区| 少妇人妻 视频| 日韩亚洲欧美综合| 99re6热这里在线精品视频| 亚洲伊人久久精品综合| 曰老女人黄片| 亚洲国产日韩一区二区| 18禁裸乳无遮挡动漫免费视频| 欧美xxxx性猛交bbbb| 亚洲国产日韩一区二区| 自拍欧美九色日韩亚洲蝌蚪91| 日本黄色片子视频| 99国产综合亚洲精品| 97在线视频观看| 中文字幕制服av| 制服丝袜香蕉在线| 欧美性感艳星| 国产日韩欧美亚洲二区| 视频在线观看一区二区三区| 美女福利国产在线| 午夜免费观看性视频| 久久精品国产自在天天线| 色婷婷久久久亚洲欧美| 日韩,欧美,国产一区二区三区| 一级毛片 在线播放| 在线免费观看不下载黄p国产| 黄色配什么色好看| 久久久国产一区二区| 飞空精品影院首页| 纵有疾风起免费观看全集完整版| 久久99热这里只频精品6学生| 亚洲精品一区蜜桃| 男女边摸边吃奶| 热re99久久国产66热| 免费人成在线观看视频色| 日本色播在线视频| 在现免费观看毛片| 日韩,欧美,国产一区二区三区| 中文精品一卡2卡3卡4更新| 妹子高潮喷水视频| 肉色欧美久久久久久久蜜桃| 在线观看美女被高潮喷水网站| av在线老鸭窝| 午夜av观看不卡| 国内精品宾馆在线| 高清视频免费观看一区二区| 国产精品人妻久久久影院| 妹子高潮喷水视频| 三级国产精品欧美在线观看| 精品少妇久久久久久888优播| 一级爰片在线观看| 五月伊人婷婷丁香| 国产精品99久久99久久久不卡 | 亚洲综合精品二区| 午夜福利,免费看| 亚州av有码| 91精品国产九色| 天天操日日干夜夜撸| 一区二区三区四区激情视频| 国产淫语在线视频| 免费播放大片免费观看视频在线观看| 免费黄色在线免费观看| 老司机影院毛片| 久久午夜综合久久蜜桃| 久久久a久久爽久久v久久| 成人黄色视频免费在线看| 久久久久网色| 看十八女毛片水多多多| 日本vs欧美在线观看视频| 亚洲国产最新在线播放| 熟女av电影| 各种免费的搞黄视频| 美女视频免费永久观看网站| 国产成人精品福利久久| 少妇人妻 视频| 少妇 在线观看| 欧美变态另类bdsm刘玥| 国产一区二区三区av在线| 亚洲精品日本国产第一区| 伦理电影大哥的女人| 一级毛片电影观看| tube8黄色片| 男人操女人黄网站| 日韩 亚洲 欧美在线| 夫妻性生交免费视频一级片| 亚洲情色 制服丝袜| 成人综合一区亚洲| 亚洲av成人精品一二三区| 人妻系列 视频| 免费观看av网站的网址| 91精品国产国语对白视频| av视频免费观看在线观看| 色吧在线观看| 特大巨黑吊av在线直播| freevideosex欧美| 色婷婷久久久亚洲欧美| 波野结衣二区三区在线| 午夜免费鲁丝| 久久久精品免费免费高清| 国产成人aa在线观看| 国产在线视频一区二区| 丰满乱子伦码专区| 日本91视频免费播放| 日本色播在线视频| 少妇 在线观看| 亚洲第一区二区三区不卡| 久久 成人 亚洲| 18+在线观看网站| 大码成人一级视频| 国产深夜福利视频在线观看| 91aial.com中文字幕在线观看| 欧美 亚洲 国产 日韩一| 看免费成人av毛片| 一级二级三级毛片免费看| 美女中出高潮动态图| 亚洲av成人精品一二三区| 欧美丝袜亚洲另类| 男女啪啪激烈高潮av片| 国内精品宾馆在线| 久久国产精品大桥未久av| 国产黄片视频在线免费观看| 另类亚洲欧美激情| xxx大片免费视频| 国产乱人偷精品视频| 日韩中字成人| 久久久精品区二区三区| 日韩av不卡免费在线播放| 2021少妇久久久久久久久久久| 成人免费观看视频高清| 午夜免费鲁丝| 国产精品不卡视频一区二区| 国产精品欧美亚洲77777| 亚洲欧美色中文字幕在线| 国产一区二区在线观看av| 如何舔出高潮| 欧美精品一区二区免费开放| 51国产日韩欧美| 亚洲第一区二区三区不卡| 亚洲高清免费不卡视频| 岛国毛片在线播放| 黄色怎么调成土黄色| 久久久欧美国产精品| 国产国拍精品亚洲av在线观看| 在线观看人妻少妇| 亚洲欧美成人综合另类久久久| 最近的中文字幕免费完整| 国产免费一级a男人的天堂| 日韩免费高清中文字幕av| 人人妻人人澡人人爽人人夜夜| 欧美日韩视频高清一区二区三区二| 另类亚洲欧美激情| 色哟哟·www| 国产免费又黄又爽又色| 18禁裸乳无遮挡动漫免费视频| 亚洲图色成人| 人人妻人人澡人人看| 欧美 日韩 精品 国产| 成人手机av| 熟女人妻精品中文字幕| 亚洲国产精品一区二区三区在线| 中文字幕精品免费在线观看视频 | 极品人妻少妇av视频| 狠狠精品人妻久久久久久综合| 国产精品成人在线| 少妇 在线观看| 伊人亚洲综合成人网| 99久国产av精品国产电影| 欧美日韩综合久久久久久| 一二三四中文在线观看免费高清| 久久久久国产网址| 亚洲精品久久午夜乱码| 麻豆成人av视频| 国产日韩一区二区三区精品不卡 | 免费不卡的大黄色大毛片视频在线观看| 久久久久久久久久久丰满| 日韩不卡一区二区三区视频在线| 成年av动漫网址| 久久精品久久久久久噜噜老黄| 欧美成人精品欧美一级黄| 制服诱惑二区| 91精品国产九色| 亚洲精品日韩av片在线观看| 欧美丝袜亚洲另类| 国产一区二区三区av在线| 国产亚洲一区二区精品| 超色免费av| 一级黄片播放器| 日韩av在线免费看完整版不卡| 九色亚洲精品在线播放| 国产精品 国内视频| 国产成人aa在线观看| 美女大奶头黄色视频| 国产片特级美女逼逼视频| 亚洲欧美一区二区三区黑人 | av国产精品久久久久影院| 久久久久久久久久成人| xxxhd国产人妻xxx| www.av在线官网国产| av在线播放精品| 岛国毛片在线播放| 毛片一级片免费看久久久久| 女人久久www免费人成看片| 久久国产亚洲av麻豆专区| 免费大片黄手机在线观看| 亚洲欧美日韩卡通动漫| videosex国产| av国产久精品久网站免费入址| 人人妻人人澡人人爽人人夜夜| 亚洲高清免费不卡视频| 精品国产一区二区三区久久久樱花| 国产免费一区二区三区四区乱码| 精品国产一区二区三区久久久樱花| 午夜老司机福利剧场| 最近中文字幕2019免费版| 日韩欧美精品免费久久| 夜夜看夜夜爽夜夜摸| 国产亚洲精品久久久com| 国产成人精品久久久久久| 高清欧美精品videossex| 午夜福利在线观看免费完整高清在| 大香蕉97超碰在线| 寂寞人妻少妇视频99o| 亚洲四区av| 边亲边吃奶的免费视频| 免费黄色在线免费观看| 久久99蜜桃精品久久| 国产精品久久久久久精品古装| 日本色播在线视频| 熟妇人妻不卡中文字幕| 桃花免费在线播放| 欧美一级a爱片免费观看看| 2018国产大陆天天弄谢| 午夜免费观看性视频| 日韩强制内射视频| 亚洲,欧美,日韩| 久久99热这里只频精品6学生| www.av在线官网国产| av卡一久久| 欧美最新免费一区二区三区| 我要看黄色一级片免费的| 成人毛片60女人毛片免费| 九色亚洲精品在线播放| 日本与韩国留学比较| 91精品国产九色| 亚洲欧洲国产日韩| 国产精品一国产av| 久久精品久久久久久久性| 婷婷色综合大香蕉| 精品亚洲乱码少妇综合久久| 日日啪夜夜爽| 菩萨蛮人人尽说江南好唐韦庄| 国产日韩欧美亚洲二区| 日韩中文字幕视频在线看片| 少妇被粗大的猛进出69影院 | 91精品伊人久久大香线蕉| 最近中文字幕2019免费版| 亚洲av免费高清在线观看| 日韩人妻高清精品专区| 另类精品久久| 搡女人真爽免费视频火全软件| 精品人妻一区二区三区麻豆| 国产亚洲欧美精品永久| 国产精品不卡视频一区二区| 国产成人免费无遮挡视频| 美女脱内裤让男人舔精品视频| 色婷婷久久久亚洲欧美| 蜜臀久久99精品久久宅男| 国产精品蜜桃在线观看| 我的女老师完整版在线观看| 日韩欧美一区视频在线观看| 午夜免费鲁丝| 99国产综合亚洲精品| 精品一区二区三区视频在线| 中文欧美无线码| 久久久久久人妻| 一本—道久久a久久精品蜜桃钙片| 国产69精品久久久久777片| 精品国产乱码久久久久久小说| 国产日韩欧美亚洲二区| 夫妻午夜视频| 十八禁网站网址无遮挡| 一级毛片我不卡| 我的老师免费观看完整版| 一级黄片播放器| 3wmmmm亚洲av在线观看| 久久久a久久爽久久v久久| 欧美国产精品一级二级三级| 久久鲁丝午夜福利片| 午夜福利影视在线免费观看| 男女边摸边吃奶| 日韩一区二区三区影片| 欧美bdsm另类| 一个人免费看片子| 91久久精品国产一区二区三区| 欧美激情国产日韩精品一区| 国产av国产精品国产| 国产有黄有色有爽视频| 亚洲五月色婷婷综合| 如日韩欧美国产精品一区二区三区 | 精品少妇黑人巨大在线播放| 丰满少妇做爰视频| 91午夜精品亚洲一区二区三区| 婷婷色av中文字幕| 精品一区二区免费观看| 国产淫语在线视频| 亚洲精品久久午夜乱码| 国产精品久久久久久久电影| 久久精品国产亚洲网站| 一区二区av电影网| 日韩一区二区视频免费看| 国产成人av激情在线播放 | 黄片播放在线免费| 99视频精品全部免费 在线| 最近2019中文字幕mv第一页| 国产一区二区在线观看日韩| 久久国产精品男人的天堂亚洲 | 国产视频内射| 菩萨蛮人人尽说江南好唐韦庄| 亚洲丝袜综合中文字幕| 国产高清有码在线观看视频| 永久网站在线| 亚洲av综合色区一区| 菩萨蛮人人尽说江南好唐韦庄| 在线观看免费视频网站a站| 日本爱情动作片www.在线观看| 全区人妻精品视频| 天堂俺去俺来也www色官网| 精品久久久久久电影网| 日韩欧美一区视频在线观看| 一二三四中文在线观看免费高清| 成人毛片60女人毛片免费| 婷婷色av中文字幕| 亚洲精品乱久久久久久| 高清视频免费观看一区二区| 亚洲精品国产av成人精品| 国产极品天堂在线| 97在线人人人人妻| 国产高清国产精品国产三级| 国产高清不卡午夜福利| 少妇熟女欧美另类| 日日撸夜夜添| 91精品一卡2卡3卡4卡| 国产免费一区二区三区四区乱码| 91午夜精品亚洲一区二区三区| 在线免费观看不下载黄p国产| 久久久午夜欧美精品| 韩国av在线不卡| 黄片无遮挡物在线观看| 欧美日韩亚洲高清精品| 少妇人妻 视频| 97在线人人人人妻| 日韩中文字幕视频在线看片| 免费人成在线观看视频色| 国国产精品蜜臀av免费| 日韩在线高清观看一区二区三区| 9色porny在线观看| 不卡视频在线观看欧美| 毛片一级片免费看久久久久| 99视频精品全部免费 在线| 2021少妇久久久久久久久久久| 我的老师免费观看完整版| 亚洲欧美一区二区三区国产| 汤姆久久久久久久影院中文字幕| 久久99热6这里只有精品| 男人操女人黄网站| 黑人巨大精品欧美一区二区蜜桃 | 一级片'在线观看视频| 亚洲精品久久成人aⅴ小说 | 在线观看www视频免费| 欧美日韩精品成人综合77777| 黑人巨大精品欧美一区二区蜜桃 | 精品久久国产蜜桃| 亚洲精品一二三| xxxhd国产人妻xxx| 波野结衣二区三区在线| 国产亚洲精品久久久com| 成人毛片a级毛片在线播放| 少妇人妻精品综合一区二区| 国产一区二区三区av在线| 纯流量卡能插随身wifi吗| 极品人妻少妇av视频| 一级爰片在线观看| 欧美少妇被猛烈插入视频| 国产毛片在线视频| 久久国产亚洲av麻豆专区| 插逼视频在线观看| 黄色视频在线播放观看不卡| 日本与韩国留学比较| 国产爽快片一区二区三区| 色吧在线观看| av专区在线播放| 人人澡人人妻人| 国产免费现黄频在线看| 国内精品宾馆在线| 亚洲精品日韩在线中文字幕| 丝袜在线中文字幕| 久久久久久伊人网av| 久久婷婷青草| 黑人欧美特级aaaaaa片| 在线天堂最新版资源| 欧美亚洲日本最大视频资源| 免费久久久久久久精品成人欧美视频 | 亚洲三级黄色毛片| 在线观看免费高清a一片| 久久久午夜欧美精品| 亚洲国产毛片av蜜桃av| 亚洲欧美日韩卡通动漫| 男女啪啪激烈高潮av片| 精品亚洲成国产av| 久久精品久久精品一区二区三区| 边亲边吃奶的免费视频| 久久久久久久久久久丰满| 青青草视频在线视频观看| 永久免费av网站大全| 国产在线一区二区三区精| 久久影院123| 国产免费一级a男人的天堂| 亚洲图色成人|