• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Safest Route Detection via Danger Index Calculation and K-Means Clustering

    2021-12-15 08:14:46IshaPuthigeKartikayBansalChahatBindraMahekkKapurDilbagSinghVipulKumarMishraApekshaAggarwalJinheeLeeByeongGwonKangYunyoungNamandRehamMostafa
    Computers Materials&Continua 2021年11期

    Isha Puthige,Kartikay Bansal,Chahat Bindra,Mahekk Kapur,Dilbag Singh,Vipul Kumar Mishra,Apeksha Aggarwal,Jinhee Lee,Byeong-Gwon Kang,Yunyoung Nam,*and Reham R.Mostafa

    1School of Engineering and Applied Sciences,Bennett University,Greater Noida,India

    2Department of ICT Convergence,Soonchunhyang University,Asan,Korea

    3Department of Information Systems,Faculty of Computers and Information Sciences,Mansoura University,Mansoura,Egypt

    Abstract:The study aims to formulatea solution for identifyingthe safest route between any two inputted Geographical locations.Using the New York City dataset,which provides us with location tagged crime statistics;we are implementing different clustering algorithms and analysed the results comparatively to discover the best-suited one.The results unveil the fact that the K-Means algorithm best suits for our needs and delivered the best results.Moreover,a comparative analysis has been performed among various clustering techniques to obtain best results.we compared all the achieved results and using the conclusions we have developed a user-friendly application to provide safe route to users.The successful implementation would hopefully aid us to curb the ever-increasing crime rates;as it aims to provide the user with a beforehand knowledge of the route they are about to take.A warning that the path is marked high on danger index would convey the basic hint for the user to decide which path to prefer.Thus,addressing a social problem which needs to be eradicated from our modern era.

    Keywords:Agglomerative;clustering;crime rate;danger index;DBSCAN

    1 Introduction

    Safe route detection remains a problem which needs to be investigated.An initial approach was implementing video surveillance,which is an important research area in computer vision [1,2].The most important applications of video surveillance are gait recognition [3,4],action recognition [5,6],object detection [7,8]route safety and name a few more [9,10].In video surveillance,live reports could be generated,but what if we want our user to get prior knowledge? The need for the solution is well demanded.Though we are in an era where modernization has gained pace,but there is no denial of the fact that heinous crimes as rape exist [11].All the news and publications stating the statistics and events about the crime activity which shake the very bottom of the heart.The government and police forces are putting in their best,but by far could not reduce this rate.Here,we are making an attempt in the same direction by working on “Safest Route Detection.”Two destinations consist of multiple routes,but a person with no or less knowledge of a place goes for the shortest path,even if it varies just by some kilometers [12].But what if that path has been consistently registered for crimes? What if by just travelling a few kilometers more,it could prevent a mishap? Even on the public forums as “Crowd form” [13]a demand for such a solution is registered.Google too has taken notice of the problem and has initiated extensive work in a feature called lightning layer [14]which aims at preventing the not so secure routes by pin-pointing the location of the streetlights.The severe need of a counter to this problem has provoked us to investigate further to solve this challenging problem.The primary objective of this work is to develop a system which shows the user that the path they intend to take has been previously reported with crimes and whether it is the safest route between two points or not.The proposed solution gives the users a basic intuition by marking these routes with different danger index so that the user could at least have a hint that the path they intend to choose has been reported with several crimes in the past.Hence allowing them to execute a more rational decision on a route earlier unexplored by them.

    To achieve the same,various approaches are explored which align with the proposed problem statement.The problem is relatively much less explored,and the availability of linked resources is constrained.To counter this issue,we have tried to document the results achieved from as many variations as possible and built the primary stage with the best results achieved which not only proves the feasibility of the approach but also instills the idea that a lot more could be done and to counter the steadily increasing problem of crime.

    Further,in Section 2 of this article discusses related work;Section 3 gives the details about the Data and method used.In Section 4,the experiment of the proposed schemes is carried out with the results achieved with them.It also discusses the calculation of the Danger Index.Section 5 yields the results of proposed schemes.Ultimately,Section 6 presents the conclusion of the scheme.

    2 Related Work

    The study of crime prevention has been explored at different areas in several community environments [15].Many researchers have focused on a centralized analysis and research of crime,and these acted as a base and motivated us to work in this domain [16].However,the calculation of danger index has been too constrained,and the approaches were limited to a single layer of clustering which should not have been the case since both geo-location and the danger index directly affect the clusters built such as Be-safe travel [17].It uses Google API since that is easily accessible for anyone who would like to drive in a particular region but falls short in knowledge of the routes,which are relatively safer than others from crime.It has prevented three types of crimes such as violence,motor vehicle theft,and theft by weighting.Since this application only focuses on three crimes,one cannot trust it completely as the safe route [18]solution provided by this application might have some dangerous crime records that this application is not considering.

    Communities have not let the topic fade away.A research [19]by Washington State Department of Transportation and Mexico City Survey [20],which not only lists the data but also segregates them using Bayes algorithm provides the re-confirmation.A semantically processed dataset with multiple algorithms tested and documented,provides even more insights on the usecase.In SafetiPin [21],a crowd-sourced application,marks the areas as safe and unsafe using pins as the pointers.SafeCity [22],another initiative in the domain is also a crowd-sourced application,which goes a step further and allows users to share the safety tips and self-defense techniques.Even though these applications have been able to achieve excellent results,one major drawback of their application is that of only using the crowd sourced data and not using the criminal data collected by the government.Another approach to tag the danger index is using forecasting [23],i.e.,instead of calculation,prediction of the crime stats [24].“Cluster Boosting Algorithm” [25],which tried to incorporate the factor that dark areas and certain spots are more prone to crime,provides a further direction appreciated by criminologists who understand the importance of local geography.Though documented and appraised,these approaches are far from implementation.Urban navigation [26]an application of the first proposition using crime data from Chicago and Philadelphia,probabilistically estimates the crime but fails to deliver any safe path to the user.

    Trippin,which seemed a probable solution,giving the user a danger index insight,to provide the same for all the possible routes,but fails to provid the alternatives to the user.Geographical Information System Based Safe Path Recommender [27],which is a step further and provides the danger index for up to 5 routes,did not take into consideration the fact that each crime is unique and needs to be weighted uniquely.Further,extensive use of API’s made this approach underperform.Another parameter “l(fā)iveliness index,” i.e.,the crowd present,the public amenities,etc.is evaluated by Safely-Reached.A solution totally based on sexual-crime assault [28],which marked the hotspots [29]in the regions,seemed effective but extremely constrained.HumSafar [30],instead of countering the problem,suggested the pooling system in the transport system for more security which at some scope,further increases the crime possibilities.Thus,these models gave us some benchmarks but no workable solution to counter the problem.

    3 Data and Methods

    3.1 Dataset Used

    While working with geo-location and crime dataset,the data-crunch is a big issue.The dataset used for the proposed work is of New York City taken from online resources NYC Open-Data.It is a well built and updated resource with detailed information revealing no personal data and open for public use.Two datasets,NYPD Arrest Data [31]comprising 1,03,000 rows and 19 columns and Motor Vehicle Collisions-Crashes (https://data.cityofnewyork.us/Public-Safety/Motor-Vehicle-Collisions-Crashes/h9gi-nx95) comprising 1.73 M rows and 29 columns,were studied thoroughly and combined,keeping only the columns that were desired attributes like latitude,longitude,accidents occurred,number of cyclist/motorist/pedestrians injured and killed,crime type comprising categories like dowry deaths,honor killings,exploitation by husband/relatives etc.and dropped columns like arrest key,jurisdiction code,law code and many more which were describing the points directly not linked to the danger index and insignificant in its calculation.The final processed dataset comprised 17,97,784 rows and 16 columns.These rows are down to 80,000 data points,keeping in the consideration the distribution over the New-York city.

    3.2 Calculation of Danger Index

    Calculation of Danger Index for each Data Point:For each latitude and longitude value,the datasets provided us with the parameters like “Number of Deaths of Cyclists”,“Number of Injured Pedestrians” related to the death and injury of motorcyclists,pedestrians and cyclists in the read accidents.The data additionally provided us with the field,giving the crime description committed at the spot.Though the fields were present,we wanted to club all these fields and complete a column which could present them for a justified representation,the danger index for that geo-coordinate.To achieve this aim,we heeled the approach suggested in [16],where each of the reported deaths was given a value 2 and it marked each of the reported injuries as one.Like so,calculation of the Accident Score for each coordinate utilizing the information from the datasets can be estimated as:

    where,Pk=Pedestrians Killed,Ck=Cyclists Killed,Mk=Motorcyclists Killed,Pi=Pedestrians Injured,Ci=Cyclists Injured and Mi=Motorcyclists Injured.

    Likewise,for the crime data,we have given each crime a rating to consider its weightage.The reasoning behind doing this is that rape,a far more severe and heinous crime,cannot be considered in the same bucket as chain snatching.Hence,giving the crime score with consideration to severity and passing the weightage to the final danger index.The weightage is presented in Tab.1.

    Table 1:Crime scores assigned to different crimes for the calculation of danger index

    Tab.1 gives us the crime score (Cs).The Tab.1 can be further extended depending on the crime category and giving it the appropriate rating.We calculate the resultant danger score using the above two scores.Next we calculate such scores for each of the geo-location lying on the computed route.Conclusively,we normalize this score using the route length (in kilometers),giving us a general score for each path.

    For calculation of Crime Score:-

    For calculation of Accident Score:-

    Here,d=path distance (in kilometer).For calculation of the final danger index,using the danger score and taking in consideration the distance of the respective routes.The research work comprises several algorithms.The explanation and results achieved from the algorithms used and we discuss the use of the danger index in Section 4.The corresponding graph for the implementation of the danger index is given in the Fig.1 below:-

    Figure 1:The implementation of danger index and the components involved in the calculation

    4 Experiments and Results

    4.1 Choosing the Optimal Algorithm

    Several approaches are available for clustering the data points,but these chiefly depend on the type of dataset we are working upon.The Geo-location dataset does not yield us good results with all the algorithms [32].From normalization to choosing best optimal technique,such datasets require some prior work to get to know what fits it best.We analyzed the approaches which have shown some optimistic results over these datasets [33].

    4.1.1 Hierarchical Clustering(Agglomerate)

    This clustering technique,we initially consider all the points in the dataset to be individual clusters.Following each iteration clusters like each other are grouped together until only the required number of K clusters are formed [34].

    For a dataset d1,d2,d3...dn having n elements,we have calculated a distance matrix represented by “dis_mat” using:

    wherei,j=1:n.

    Initially,each data point in the dataset is a “singleton cluster.”We repeat the following process again and again until it leaves us with a single cluster:(1) The clusters gaining the minimum distance to each other are merged.(2) The distance matrix is updated.We demonstrate an example of which in Tab.2.

    Table 2:Agglomerative clustering analysis along with the respective mean and standard deviation

    4.1.2 Spectral Clustering

    It shifts the attention to graph theory where each of the data points is treated as the graph node,making this problem a graph-partitioning problem.The algorithm tries to identify the clusters as the group of nodes judging them based on the edge connecting them.

    The Spectral algorithm can be abstracted into the following steps:(1) The data points(x1,x2,x3...xk)form the proposed dataset are represented using the similarity graph(G=(V,E))where V is a set of vertices and E is a set of edges.It can be represented using any of the methods like “k-nearest neighbor graph” or “ε-neighborhood graph”.(2) We convert the computed matrix into its Laplacian format and calculate the first k eigenvectors associated with it.(3) Now,on these features,use K-means to get the final k-clusters for the dataset.The method can be represented as:(1) For a matrix U ∈R(N*K)with vectors(u1,u2,u3...uk)as columns,where U and R represent our matrix,K is the number of vectors present and N is the number of rows.(2) For=1,2,3n,let(yi∈Rk) be the vector corresponding to the letith row of U.(3)Cluster the points(yi)i=1,2,3...ninRkwith the K-means [35]algorithm into clustersC1,C2CK.

    The evaluated results are shown in Tab.3.

    Table 3:Analysis of spectral clustering along with mean and deviation

    We can discard the spectral clustering on the go as the results on the first sight are not at all representing all the data points.These points vary minimally but drop the high values and show variation in the lower values,which have a more significant number of data-points as compared to high values and should be well segregated.But,seeing Agglomerative Clustering,we cannot directly believe the same.The deviation is not so significant,but it was overruled by the K-means because,as the dataset increases the approach gets more time taking and resource bound,i.e.,very high computational complexity and the results are also very poor than the K-means.

    An approach,“Density Based Spatial Clustering of Applications with Noise”(DBSCAN),was tried and implemented by determining the clusters [27].The deviation was not exceptionally high,but the clusters overlapped,making it difficult for the final algorithm to assign a particular cluster to the input geo-coordinate.We can abstract the DBSCAN algorithm into the following steps:(a) Find every point (x1,x2,x3...xk) present in the dataset;we find the points in theε(eps)neighborhood of respective points.(2) We identify the core points provided;they possess more points than the minimum number of points which are required to specify a dense region.(3) The non-core points are dropped.On the neighborhood graph,determine all the components of core points.(4) For the non-core points,we consider two options:(a) If it lies in the neighborhood of some cluster,that point is assigned to the particular mesh and (b) If no such cluster exists,we assign it to noise.The obtained results achieved from the DBSCAN are shown in Figs.2a and 2b.Fig.2a shows overlapping in the resultant clusters which were obtained by using DBSCAN.Fig.2b shows scattered clusters for the danger indexes of more considerable value as plotted after using DBSCAN for clustering.

    Figure 2:(a) Left-overlapping shown in the resultant clusters which were obtained by using the algorithm:DBSCAN.(b) Right-scattered clusters for the danger indexes of higher value as plotted after using DBSCAN for clustering

    4.1.3 Birch Clustering

    It basically deals with enormous datasets by creating first a compact synopsis comprising as must distribution information which is possible to keep,and then finally it is this summary of data which will be clustered instead of the entire dataset itself.This procedure saves a lot of computation.For Birch clustering [36],we first convert the input of N data points into a tree structure called a “clustering feature (CF)”.It is defined as the set of triplets=(N,,SS),where Linear Sum=and Square sum of data points=SS=

    The result is a height balanced tree.The further steps include scanning through all the nodes of the CF,building some smaller CF trees for removing any of the outliers present and grouping the nearby sub-clusters into large ones.The distance calculation for two clustersandis:

    Another algorithm which showed similar deviation results was birch clustering.The results looked promising at first sight as seen in Tab.4.But,as we went into the distribution,we found out that the algorithm resulted in a skewed scattering,where the data points were unevenly distributed.With some danger index,the number of data points spiked to 38,361 but for some it was as little as 3.This extreme bias led us to drop this approach for the proposed problem statement.

    Table 4:Birch clustering and the respective mean and standard deviation observed in the clusters formed

    4.1.4 K-Means Clustering

    The algorithm uses distance as the criteria for the grouping of the data points.It originated from signal processing and uses vector quantization which divides the n points into k-clusters and then calculating the distance,assigning the point to the cluster with the nearest mean.The idea behind the K-means clustering is as follows:(1) Choosing the best value for k that fits the proposed work.(2) Initially working with some random centroid here,c1,c2,c3...ck.(3) The proceeding steps,(4) and (5) are repeated until we have converged the results or have reached the maximum number of iterations as specified by us.(4) Take a data point each timexi:using the distance formula,calculate the nearest centroid for the data point in consideration(c1,c2,c3...ck).The data point is assigned to the respective cluster.(5) Now,for the clusters,say j=1,2,3...k,each cluster gives us a new centroid=new centroid is calculated by taking the mean of each of the points assigned to the cluster in (4).The computed results are shown in Tab.5.The results show standard deviation is minimal as compared to other approaches with apt segmentation in mean range.

    Table 5:K-means clustering analysis

    It is concluded that the K-means shows the least deviation for the data points.The variation in the minimum and maximum values is also least,and it gives the representation to the data points very well.

    4.2 Choosing the Initial Number of Clusters for the Dataset

    After the calculation of danger index,we achieved 19 unique values for this column.We needed to group these values in a way that neither the standard deviation goes too high,nor we have a lot of clusters to deal with.Through experimentation,10 was the optimal value for the approach.Some results achieved while we list experimentation below in Tabs.6-8 and the pictorial representation of cluster with k=10 is shown in Fig.3.

    Table 6:The table represents the results for mean and standard deviation achieved using the K-means clustering when we have attempted clustering taking into account the 8 clusters

    Table 7:Results for mean and Standard deviation achieved using the K-means clustering with the number of clusters taken as 10

    Table 8:The mean and Standard deviation achieved using the K-means clustering when we are taking the number of clusters as 12

    Figure 3:The image represents the clusters achieved as the result of applying K-means on the given coordinates.Each color segment represents a cluster on the basis of the danger index.The number of clusters taken here is 10

    The analysis of such results headed us to the conclusion that many clusters set below 10 is not giving the dataset a justified representation and the standard deviation is spiking high.Significantly,if we try to choose a number above 10,we are failing to reduce the standard deviation by any significant term.A greater number of clusters is leading us to having some sets which have very minimum points in them,and this increase in the amount of segmentation is just increasing the computation time with no benefits.Hence,we stick to taking 10 clusters,which is the optimal approach for the proposed work.With an increase in data points or an increase in the number of danger indexes,it is possible that this procedure needs to be repeated to once more find the optimal value for the number of clusters.

    4.3 Choosing the Initial Number of Clusters for the Dataset

    On calculating the danger index,we receive 10 numbers of unique values of danger index.As the first step,we will cluster the data points based on the danger index.The lesser the number of clusters,the better it will be for the proposed software,but decreasing the number of clusters brings with it the risk of increased standard deviation.Since the problem of finding the safest route has been utmost sensitive to even minor changes in standard deviations,we have needed to find an optimal number.The best way to discover an optimal value is through experimentation.

    So,now we have clustered it into 10 clusters.After conducting the first round of clustering we primarily have 10 cluster groups which have a similar danger index value.Presently,in order to make these points useful for us,we have to again cluster them based on the geo coordinates.Each of 10 clusters is separately re-clustered again.Now the number of subclusters in each of the original clusters depends on the number of points in that cluster.Therefore,to generalize it,we choose (number of points in the original cluster) * 0.6 as the number of sub clusters in each of the original clusters.The general approach is (number of points in the original cluster) *0.5 but the same has not been used because the square root did not generate enough clusters to represent the data distributed over the unified city.Now,the entire sub cluster is associated with 2 feature points-one the geo coordinates of the centroid and second the mean danger index of the subcluster.We create 10 separate lists each for one value of the danger index.Then store all the cluster centroids in them and then dump it to json format.Fig.4 shows the steps performed before feeding the resultant data to the live deployment.

    When the user inputs the origin and end destination,using the google maps API,we get all the workable routes between those two points.For each route we calculate its total danger index separately.Let us consider Route 1 that we have got.Now we store all the intermediate latitude and longitude of the routes in a separate list.For each route we consider each latitude longitude pair separately.Promptly for one pair,we compute the closest sub cluster from each of the 10 main clusters.To such a degree,we get several geo-points along with their danger index for each latitude longitude pair from the computed route.Since the danger influence of one point on another point will decrease with increasing distance,we divide the danger index by the distance between the cluster centroid and the original route point.Therefore,each route point now has its own cumulative danger index of these points.Currently,this is performed to all the route points,and they are all added to calculate the final danger index of the route.Now we can return the route,which provides the least danger index.

    Figure 4:The steps performed before feeding the resultant data to the live deployment

    4.4 Results Achieved

    In our approach,we have implemented clustering at two layers,first based on the Danger Index and the second based on the coordinates to further increase our accuracy and allow routes to be marked more accurately with the danger index.To increase the data,we have taken into far more crime types as compared to any other implementation which gives us an upper hand on the danger index and its presentation of the possibility of occurrence of crime on the route.To grant the user all options,we have tried to show and mark all the routes between any coordinates.Finally,the comparative study helped us prove that our direction for our problem statement is correct.

    Thus,through this paper,we are suggesting a probable approach which could work as a base for further development of the full-fledged product which has potentially huge application in the social domain.Through this analysis and research in alternative methods and parameters,we have been able to develop a basic website which uses the Google API to fetch the path coordinates between the inputs of location and individually calculate the danger index for each one giving the user an overview of how safe the path is.The approach employs the data provided by “The NYC Open-Data” consisting of NYPD Arrest Data and Motor Vehicle Collisions-Crashes consisting of highly reliable information with no particulars of individuals.The data is maintained and updated by the City government providing us consistently updated and exhaustive information.The diagram represents the flow of our application is shown in Fig.5:

    Figure 5:The flow chart for the functioning of the application from the user input until the map is displayed with plotted routes and related information

    Fig.6 shows the multiple paths between the two points,A (here,Central Park,New York,NY,USA) and B (New York State,USA) in the city of New York.These results have been achieved by first clustering the data points in 10 sets regarding the danger index and then according to the latitudes and longitude,resulting in an optimal result for the map of New York city.We focused on K-means as the clusters achieved had a well-defined boundary with least biased distribution and minimal deviation.Each of the routes is represented by a respective colour in the map and has a description related to it,displayed in the tabular format on the live site as represented in Tab.9.

    Figure 6:Routes displayed to the user on the web application between the two input locations

    Table 9:Description of each of the possible routes between the input locations with their danger index individually calculated with distance and time taken to cover the respective path

    The result displayed comprises the distance,the time duration required to traverse that route and the danger index calculated by the proposed algorithm.Thus,giving the user an overview of the safety on the path,they are about to travel.

    5 Conclusion and Future Scope

    We have performed a comparative study between various clustering algorithms and have found out K-means with 10 cluster centres as the most optimal approach,with an average standard deviation of only 0.41232.The number of clusters were varied and compared for getting the best out of them.Also,the different clustering algorithms like Agglomerative Clustering,DBSCAN,Spectral Clustering and so on were taken into consideration and their respective results were listed and compared.A mathematical notation was designed to compute the danger indexed.Extensive experiments reveal that the proposed model can be used for real-time safe route detection.

    The approach is not final and can be further extended.The considered factors in our approach are the Crime rate and the accident statistics which could be stretched to the factors like the liveliness of the router,the availability of the streetlights,the availability of the communal facilities as hospitals and so on.If we alter the data set,it will require us to re-verify whether the approach still suits the dataset.Many modifications like the number of clusters,the algorithm used and so on,can be changed and fitted as per the problem statement.An instance could expand our dataset to a unified country instead of merely focusing on a particular city.This would require us to manage a whole current scope of variation in datasets,with the data-points exponentially increased.Hence,we see that there is an immense scope of improvement as the problem directly tries to affect the day-to-day life of the masses.The results presented in the paper help not only one to perceive why K-Means works best but also summarize what other approaches might cause.The K-means additionally allows a scope of improvement,as it has many variations present in the market.More isolated exploration of these variations could yield some more outstanding results.Thus,the variations which are expected and possible are too being assisted and might help in assembling a full-fledged,robust system.

    The solution achieved therefore does have its own shortcomings.It is highly based on the input data and if it is altered,a difference in results is expected.More parameters for the calculation of Danger index need to be included in order to make it a fail-proof system.A significant amount of preprocessing is required and the complexity could be further reduced by the use of advanced data structures.Concluding,it is not the ultimate solution but rather a base to construct up a solution which could counter the problem.In near future,the exploration of the used approaches could give some better results.Hence,the variations which are expected and possible are too being assisted and might help in designing a full-fledged,robust system.

    Funding Statement:This research was supported by X-mind Corps program of National Research Foundation of Korea (NRF) funded by the Ministry of Science,ICT (No.2019H1D8A1105622)and the Soonchunhyang University Research Fund.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    侵犯人妻中文字幕一二三四区| 国产野战对白在线观看| 亚洲精品美女久久久久99蜜臀| 亚洲黑人精品在线| 婷婷丁香在线五月| a级毛片黄视频| 久久久久久久国产电影| 一二三四社区在线视频社区8| a级毛片在线看网站| 99香蕉大伊视频| 老司机午夜福利在线观看视频 | 亚洲精品av麻豆狂野| 亚洲专区国产一区二区| 在线永久观看黄色视频| 久久99一区二区三区| 国产精品秋霞免费鲁丝片| 50天的宝宝边吃奶边哭怎么回事| 欧美日韩黄片免| 日韩精品免费视频一区二区三区| 中文字幕另类日韩欧美亚洲嫩草| 国产精品秋霞免费鲁丝片| 精品国内亚洲2022精品成人 | √禁漫天堂资源中文www| 中文字幕高清在线视频| 国产精品影院久久| 最近中文字幕2019免费版| 香蕉国产在线看| 国产激情久久老熟女| 99久久综合免费| 韩国高清视频一区二区三区| 亚洲久久久国产精品| 人成视频在线观看免费观看| 日韩大片免费观看网站| 少妇猛男粗大的猛烈进出视频| 亚洲欧美激情在线| 午夜福利,免费看| 伊人亚洲综合成人网| 日韩大片免费观看网站| 曰老女人黄片| 日本欧美视频一区| 99国产精品一区二区蜜桃av | 亚洲天堂av无毛| 久久人人爽av亚洲精品天堂| 国产亚洲av高清不卡| 精品人妻在线不人妻| 90打野战视频偷拍视频| 麻豆国产av国片精品| 久久人人爽av亚洲精品天堂| 国产一级毛片在线| 精品少妇一区二区三区视频日本电影| kizo精华| 久久精品成人免费网站| 久久综合国产亚洲精品| 女性被躁到高潮视频| 午夜免费成人在线视频| 免费女性裸体啪啪无遮挡网站| 一进一出抽搐动态| 国产免费一区二区三区四区乱码| 亚洲国产毛片av蜜桃av| 精品国产乱码久久久久久男人| 精品久久久久久电影网| 久久精品亚洲熟妇少妇任你| 亚洲欧美色中文字幕在线| 俄罗斯特黄特色一大片| 欧美日韩亚洲国产一区二区在线观看 | 在线观看免费视频网站a站| 大陆偷拍与自拍| 人人妻人人澡人人看| 91老司机精品| 欧美 日韩 精品 国产| 欧美日本中文国产一区发布| 嫁个100分男人电影在线观看| 中文字幕最新亚洲高清| 999久久久精品免费观看国产| 国产伦理片在线播放av一区| 视频在线观看一区二区三区| 男女国产视频网站| 亚洲精品国产区一区二| videosex国产| 一区二区av电影网| 精品国产国语对白av| 久久久久久久大尺度免费视频| www.999成人在线观看| 亚洲精品久久久久久婷婷小说| 国产片内射在线| 欧美日韩av久久| 免费少妇av软件| 高清黄色对白视频在线免费看| 99热网站在线观看| 免费日韩欧美在线观看| 欧美变态另类bdsm刘玥| 国产一区二区三区av在线| 日本av手机在线免费观看| 悠悠久久av| 国产在线免费精品| 日本一区二区免费在线视频| 一本大道久久a久久精品| videos熟女内射| 少妇裸体淫交视频免费看高清 | 狂野欧美激情性bbbbbb| 国产欧美亚洲国产| 久久久久国产一级毛片高清牌| 岛国在线观看网站| 亚洲精品一二三| 亚洲人成电影观看| 国产免费视频播放在线视频| 国产深夜福利视频在线观看| 国产亚洲精品久久久久5区| 欧美日韩亚洲国产一区二区在线观看 | 久久天躁狠狠躁夜夜2o2o| 久久ye,这里只有精品| 国产亚洲一区二区精品| 亚洲av电影在线进入| 热99re8久久精品国产| 黑人操中国人逼视频| 91成人精品电影| 免费女性裸体啪啪无遮挡网站| 中文字幕色久视频| 国产精品久久久久久精品电影小说| 搡老岳熟女国产| 久久免费观看电影| 久久久久精品国产欧美久久久 | 国产精品 国内视频| 熟女少妇亚洲综合色aaa.| 精品福利观看| 久久久水蜜桃国产精品网| 国产国语露脸激情在线看| 美女福利国产在线| 精品一区二区三卡| 免费人妻精品一区二区三区视频| 啦啦啦视频在线资源免费观看| 亚洲专区中文字幕在线| 人成视频在线观看免费观看| 50天的宝宝边吃奶边哭怎么回事| 亚洲国产毛片av蜜桃av| 欧美日韩成人在线一区二区| 久久国产亚洲av麻豆专区| 午夜精品国产一区二区电影| 精品久久久久久久毛片微露脸 | 999久久久国产精品视频| 大陆偷拍与自拍| 美女扒开内裤让男人捅视频| 黄色 视频免费看| 国产一区二区三区综合在线观看| 亚洲国产欧美在线一区| 亚洲精品国产区一区二| 亚洲七黄色美女视频| 成人影院久久| 另类精品久久| 国产精品自产拍在线观看55亚洲 | 制服诱惑二区| 啦啦啦视频在线资源免费观看| 国产精品影院久久| a在线观看视频网站| 久久99热这里只频精品6学生| 丝瓜视频免费看黄片| 欧美激情高清一区二区三区| 丰满人妻熟妇乱又伦精品不卡| 热re99久久精品国产66热6| 国产精品一区二区在线观看99| 老司机午夜福利在线观看视频 | 午夜精品国产一区二区电影| 黄色视频,在线免费观看| 777米奇影视久久| 国产视频一区二区在线看| 欧美激情极品国产一区二区三区| 欧美日韩亚洲国产一区二区在线观看 | 男人操女人黄网站| 一区二区三区乱码不卡18| 久久精品熟女亚洲av麻豆精品| 在线观看免费日韩欧美大片| 精品国产国语对白av| 午夜影院在线不卡| 久久久久国内视频| 女人爽到高潮嗷嗷叫在线视频| 男人添女人高潮全过程视频| 色综合欧美亚洲国产小说| 久久久久国产精品人妻一区二区| 黑丝袜美女国产一区| 色综合欧美亚洲国产小说| 韩国高清视频一区二区三区| av有码第一页| 熟女少妇亚洲综合色aaa.| 国产精品久久久久久精品古装| 亚洲av电影在线进入| 亚洲国产欧美在线一区| 韩国精品一区二区三区| 免费人妻精品一区二区三区视频| 精品少妇内射三级| 另类亚洲欧美激情| 国产精品秋霞免费鲁丝片| 国产老妇伦熟女老妇高清| 亚洲第一青青草原| 可以免费在线观看a视频的电影网站| 亚洲专区国产一区二区| 精品国产一区二区三区久久久樱花| 自拍欧美九色日韩亚洲蝌蚪91| 一边摸一边做爽爽视频免费| 久久女婷五月综合色啪小说| 高清在线国产一区| 亚洲成人免费av在线播放| 中国美女看黄片| 热re99久久国产66热| 美女午夜性视频免费| 青草久久国产| 色老头精品视频在线观看| 久久久久精品人妻al黑| 午夜激情久久久久久久| 97在线人人人人妻| 制服诱惑二区| 岛国在线观看网站| 老司机影院毛片| 伦理电影免费视频| 亚洲少妇的诱惑av| 欧美成狂野欧美在线观看| 亚洲自偷自拍图片 自拍| 日本精品一区二区三区蜜桃| 2018国产大陆天天弄谢| 欧美日韩亚洲高清精品| 一级,二级,三级黄色视频| xxxhd国产人妻xxx| 国产精品香港三级国产av潘金莲| 久久久精品国产亚洲av高清涩受| 亚洲精品中文字幕在线视频| 亚洲七黄色美女视频| 脱女人内裤的视频| 国产又爽黄色视频| 亚洲人成电影免费在线| 丰满饥渴人妻一区二区三| 视频区欧美日本亚洲| av一本久久久久| 99国产极品粉嫩在线观看| 亚洲激情五月婷婷啪啪| 久久精品亚洲熟妇少妇任你| 老司机影院毛片| 91大片在线观看| 在线观看人妻少妇| 在线观看免费午夜福利视频| 在线观看www视频免费| 午夜福利免费观看在线| 黑人欧美特级aaaaaa片| 午夜影院在线不卡| 男人操女人黄网站| av免费在线观看网站| 日韩视频一区二区在线观看| 看免费av毛片| 美女午夜性视频免费| 99热国产这里只有精品6| 老熟妇乱子伦视频在线观看 | 成人影院久久| 在线观看一区二区三区激情| 亚洲欧美成人综合另类久久久| 侵犯人妻中文字幕一二三四区| 成人免费观看视频高清| 50天的宝宝边吃奶边哭怎么回事| 日韩欧美一区二区三区在线观看 | 黄色视频,在线免费观看| 青青草视频在线视频观看| 亚洲国产看品久久| 精品国产一区二区久久| 国产精品1区2区在线观看. | 丝袜喷水一区| 亚洲国产av新网站| 亚洲国产成人一精品久久久| 青草久久国产| 黑人巨大精品欧美一区二区mp4| 99国产综合亚洲精品| 亚洲国产精品一区三区| 欧美在线黄色| 99热网站在线观看| 伊人久久大香线蕉亚洲五| 免费人妻精品一区二区三区视频| www日本在线高清视频| 亚洲久久久国产精品| 91麻豆av在线| 男人舔女人的私密视频| 亚洲精华国产精华精| 亚洲av成人一区二区三| 男女床上黄色一级片免费看| 亚洲第一欧美日韩一区二区三区 | 国产成人系列免费观看| 亚洲熟女精品中文字幕| 亚洲精品一卡2卡三卡4卡5卡 | 一区二区三区四区激情视频| 天天影视国产精品| 99精品久久久久人妻精品| 亚洲欧美日韩另类电影网站| 色94色欧美一区二区| 正在播放国产对白刺激| 日本欧美视频一区| av福利片在线| 777久久人妻少妇嫩草av网站| 国产男女超爽视频在线观看| 人人妻人人添人人爽欧美一区卜| 国产一区有黄有色的免费视频| 99久久国产精品久久久| 亚洲中文字幕日韩| 亚洲黑人精品在线| 一本综合久久免费| 女性生殖器流出的白浆| 国产片内射在线| 国产亚洲精品第一综合不卡| 成人黄色视频免费在线看| 97精品久久久久久久久久精品| 亚洲欧美一区二区三区黑人| 在线观看免费高清a一片| 欧美黑人欧美精品刺激| 免费av中文字幕在线| 99国产极品粉嫩在线观看| 免费观看a级毛片全部| 一级黄色大片毛片| 男女下面插进去视频免费观看| 亚洲国产欧美网| 黄色视频不卡| 搡老乐熟女国产| 成年动漫av网址| 日本vs欧美在线观看视频| 韩国高清视频一区二区三区| 久久免费观看电影| 午夜福利影视在线免费观看| 欧美黑人欧美精品刺激| 伦理电影免费视频| 国产日韩欧美在线精品| 日本撒尿小便嘘嘘汇集6| 18禁观看日本| 超色免费av| 国产精品久久久久成人av| 国产三级黄色录像| 国产精品一区二区免费欧美 | 国产成人免费无遮挡视频| 亚洲第一青青草原| 国产片内射在线| 午夜影院在线不卡| 国产成人一区二区三区免费视频网站| 妹子高潮喷水视频| 69av精品久久久久久 | 亚洲欧美色中文字幕在线| 日本一区二区免费在线视频| 亚洲 欧美一区二区三区| 成年动漫av网址| 桃花免费在线播放| 在线亚洲精品国产二区图片欧美| 汤姆久久久久久久影院中文字幕| 搡老熟女国产l中国老女人| 性高湖久久久久久久久免费观看| 制服人妻中文乱码| 日本欧美视频一区| 免费不卡黄色视频| 天天躁夜夜躁狠狠躁躁| 中文欧美无线码| 一边摸一边做爽爽视频免费| 男女下面插进去视频免费观看| 老司机深夜福利视频在线观看 | 侵犯人妻中文字幕一二三四区| 性色av乱码一区二区三区2| 亚洲 欧美一区二区三区| 18禁国产床啪视频网站| 欧美一级毛片孕妇| 亚洲欧美色中文字幕在线| 老司机午夜十八禁免费视频| 狠狠精品人妻久久久久久综合| 亚洲美女黄色视频免费看| 亚洲欧美日韩另类电影网站| 天天操日日干夜夜撸| 丰满少妇做爰视频| 老司机影院毛片| 中文字幕高清在线视频| 欧美日韩中文字幕国产精品一区二区三区 | 少妇人妻久久综合中文| 精品亚洲乱码少妇综合久久| 国产麻豆69| 午夜精品国产一区二区电影| 制服诱惑二区| 亚洲中文字幕日韩| 亚洲精品久久久久久婷婷小说| 精品少妇一区二区三区视频日本电影| 1024视频免费在线观看| 男人爽女人下面视频在线观看| 国产免费福利视频在线观看| 欧美国产精品va在线观看不卡| 99精国产麻豆久久婷婷| 久久精品国产综合久久久| 久久精品人人爽人人爽视色| av在线播放精品| www.av在线官网国产| 啦啦啦中文免费视频观看日本| 高清视频免费观看一区二区| 久久人人爽av亚洲精品天堂| 宅男免费午夜| 亚洲精品国产色婷婷电影| 热99久久久久精品小说推荐| 欧美另类亚洲清纯唯美| 在线观看免费视频网站a站| 中文精品一卡2卡3卡4更新| 国产一区有黄有色的免费视频| 精品久久蜜臀av无| tube8黄色片| av又黄又爽大尺度在线免费看| 国产xxxxx性猛交| 爱豆传媒免费全集在线观看| 波多野结衣av一区二区av| 一本色道久久久久久精品综合| 亚洲成人免费av在线播放| 老司机午夜福利在线观看视频 | 亚洲精品一二三| 丰满迷人的少妇在线观看| 欧美老熟妇乱子伦牲交| 淫妇啪啪啪对白视频 | 伦理电影免费视频| av视频免费观看在线观看| 免费av中文字幕在线| 国产主播在线观看一区二区| 男女国产视频网站| 国产伦理片在线播放av一区| 精品国产乱子伦一区二区三区 | 欧美国产精品va在线观看不卡| 免费女性裸体啪啪无遮挡网站| 两个人看的免费小视频| 另类亚洲欧美激情| 久久综合国产亚洲精品| 国产精品.久久久| 热re99久久国产66热| 亚洲av电影在线进入| 久久精品国产综合久久久| 免费观看人在逋| 欧美精品啪啪一区二区三区 | 一本综合久久免费| 久久久久久久久久久久大奶| 一二三四在线观看免费中文在| 免费高清在线观看视频在线观看| 亚洲国产成人一精品久久久| 十分钟在线观看高清视频www| 日本91视频免费播放| 亚洲av男天堂| 欧美黑人精品巨大| 高潮久久久久久久久久久不卡| 女人久久www免费人成看片| 91精品伊人久久大香线蕉| 国产有黄有色有爽视频| av免费在线观看网站| 大香蕉久久成人网| 美女视频免费永久观看网站| 99热网站在线观看| h视频一区二区三区| 黑人猛操日本美女一级片| 国产又色又爽无遮挡免| 中文字幕av电影在线播放| 欧美日韩中文字幕国产精品一区二区三区 | √禁漫天堂资源中文www| 80岁老熟妇乱子伦牲交| 久久青草综合色| 亚洲精品美女久久av网站| 国产免费视频播放在线视频| 欧美xxⅹ黑人| 亚洲成人免费电影在线观看| 99精品久久久久人妻精品| 男女午夜视频在线观看| 夫妻午夜视频| 国产一区二区三区综合在线观看| 女人爽到高潮嗷嗷叫在线视频| 久久99一区二区三区| 欧美日韩av久久| 免费看十八禁软件| 一二三四在线观看免费中文在| 如日韩欧美国产精品一区二区三区| 欧美 日韩 精品 国产| 操美女的视频在线观看| 日韩欧美一区视频在线观看| 亚洲av电影在线观看一区二区三区| a级片在线免费高清观看视频| 色视频在线一区二区三区| 亚洲av电影在线进入| 亚洲专区字幕在线| 又大又爽又粗| 老汉色∧v一级毛片| 日本vs欧美在线观看视频| 午夜影院在线不卡| 亚洲精品国产色婷婷电影| 啦啦啦 在线观看视频| 亚洲精品国产av成人精品| 久久免费观看电影| 婷婷色av中文字幕| 在线av久久热| 午夜福利一区二区在线看| 免费在线观看日本一区| 黄频高清免费视频| 丰满饥渴人妻一区二区三| 欧美日韩一级在线毛片| 欧美在线黄色| 91老司机精品| 精品国产乱码久久久久久男人| 亚洲专区国产一区二区| 18禁黄网站禁片午夜丰满| 亚洲欧美色中文字幕在线| 黑人猛操日本美女一级片| 深夜精品福利| 中文字幕高清在线视频| 老鸭窝网址在线观看| 免费在线观看影片大全网站| 一本色道久久久久久精品综合| 国产又色又爽无遮挡免| 热re99久久国产66热| 天堂中文最新版在线下载| 777久久人妻少妇嫩草av网站| 成人黄色视频免费在线看| 亚洲成人免费av在线播放| 亚洲欧洲精品一区二区精品久久久| 亚洲精品粉嫩美女一区| 久久久久网色| 69精品国产乱码久久久| 午夜免费成人在线视频| 久久久久精品国产欧美久久久 | 丰满迷人的少妇在线观看| 国产精品九九99| 热99国产精品久久久久久7| 桃红色精品国产亚洲av| 精品人妻1区二区| 欧美少妇被猛烈插入视频| 亚洲中文av在线| 美国免费a级毛片| 交换朋友夫妻互换小说| 9热在线视频观看99| 国产色视频综合| 午夜福利视频在线观看免费| 国产精品 欧美亚洲| 女性生殖器流出的白浆| 久久久久网色| 最黄视频免费看| 国产精品麻豆人妻色哟哟久久| 国产人伦9x9x在线观看| 成在线人永久免费视频| 亚洲va日本ⅴa欧美va伊人久久 | 水蜜桃什么品种好| 国产欧美日韩综合在线一区二区| 丝袜喷水一区| 色视频在线一区二区三区| 久久人妻熟女aⅴ| 一边摸一边做爽爽视频免费| 亚洲欧美成人综合另类久久久| 精品一品国产午夜福利视频| 人人妻人人添人人爽欧美一区卜| 叶爱在线成人免费视频播放| 亚洲精品成人av观看孕妇| 亚洲伊人久久精品综合| 国产一卡二卡三卡精品| 亚洲精品国产av成人精品| 国产色视频综合| 亚洲欧美色中文字幕在线| 日本猛色少妇xxxxx猛交久久| www.av在线官网国产| 9热在线视频观看99| 久久久国产成人免费| 精品一区二区三卡| 丁香六月欧美| 最近最新免费中文字幕在线| 人人妻,人人澡人人爽秒播| svipshipincom国产片| videosex国产| 欧美日韩精品网址| 后天国语完整版免费观看| 国产真人三级小视频在线观看| 亚洲色图综合在线观看| 老鸭窝网址在线观看| 老熟女久久久| 多毛熟女@视频| 亚洲中文av在线| 亚洲午夜精品一区,二区,三区| 波多野结衣一区麻豆| 涩涩av久久男人的天堂| 天堂8中文在线网| 91av网站免费观看| 飞空精品影院首页| 777米奇影视久久| 国产三级黄色录像| 亚洲精品成人av观看孕妇| 成人国产av品久久久| 女人久久www免费人成看片| 亚洲欧美精品综合一区二区三区| 国产一区二区在线观看av| av视频免费观看在线观看| 美女福利国产在线| 最近最新免费中文字幕在线| 午夜免费成人在线视频| 国产精品一区二区免费欧美 | 激情视频va一区二区三区| av片东京热男人的天堂| 久久中文看片网| 免费在线观看视频国产中文字幕亚洲 | 国产精品久久久久久精品电影小说| 久久香蕉激情| 男女无遮挡免费网站观看| 黄色毛片三级朝国网站| 人成视频在线观看免费观看| 国产无遮挡羞羞视频在线观看| 如日韩欧美国产精品一区二区三区| 每晚都被弄得嗷嗷叫到高潮| 免费久久久久久久精品成人欧美视频| 色94色欧美一区二区| 免费在线观看视频国产中文字幕亚洲 | 人人澡人人妻人| 亚洲九九香蕉| 亚洲精品国产区一区二| 欧美日韩亚洲国产一区二区在线观看 | 亚洲精品国产av成人精品| 午夜精品久久久久久毛片777| h视频一区二区三区| 99久久综合免费| 日韩大码丰满熟妇| 天天影视国产精品| 啦啦啦在线免费观看视频4| 久久久久国内视频| 波多野结衣av一区二区av| 日日摸夜夜添夜夜添小说| a在线观看视频网站| 久久狼人影院|