• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Efficient Scheme for Interference Mitigation in 6G-IoT Wireless Networks

    2021-12-15 07:10:16FahdAlWesabiImranKhanNadhemNemriMohammedAlHageryHudaIskanderQuangNgocNguyenBabarShahandKiIlKim
    Computers Materials&Continua 2021年12期

    Fahd N.Al-Wesabi,Imran Khan,Nadhem Nemri,Mohammed A.Al-Hagery,Huda G.Iskander,Quang Ngoc Nguyen,Babar Shah and Ki-Il Kim

    1Department of Computer Science,King Khalid University,Muhayel Aseer,KSA

    2Department of Electrical Engineering,University of Engineering and Technology,Peshawar,Pakistan

    3Department of Information Systems,King Khalid University,Mayahel Aseer,KSA

    4Department of Computer Science,College of Computer,Qassim University,Saudi Arabia

    5Faculty of Computer and IT,Sana’a University,Sana’a,Yemen

    6Department of Communications and Computer Engineering,Faculty of Science and Engineering,Waseda University,Shinjuku-ku,Tokyo,169-0051,Japan

    7College of Technological Innovation,Zayed University,Abu Dhabi,UAE

    8Department of Computer Science and Engineering,Chungnam National University,Daejeon,34134,Korea

    Abstract:The Internet of Things(IoT)is the fourth technological revolution in the global information industry after computers,the Internet, and mobile communication networks.It combines radio-frequency identification devices,infrared sensors, global positioning systems, and various other technologies.Information sensing equipment is connected via the Internet, thus forming a vast network.When these physical devices are connected to the Internet,the user terminal can be extended and expanded to exchange information,communicate with anything,and carry out identification,positioning,tracking, monitoring, and triggering of corresponding events on each device in the network.In real life, the IoT has a wide range of applications, covering many fields,such as smart homes,smart logistics,fine agriculture and animal husbandry,national defense,and military.One of the most significant factors in wireless channels is interference, which degrades the system performance.Although the existing QR decomposition-based signal detection method is an emerging topic because of its low complexity, it does not solve the problem of poor detection performance.Therefore, this study proposes a maximumlikelihood-based QR decomposition algorithm.The main idea is to estimate the initial level of detection using the maximum likelihood principle,and then the other layer is detected using a reliable decision.The optimal candidate is selected from the feedback by deploying the candidate points in an unreliable scenario.Simulation results show that the proposed algorithm effectively reduces the interference and propagation error compared with the algorithms reported in the literature.

    Keywords: 6G networks; internet of things; resource allocation; optimization

    1 Introduction

    The sixth generation (6G) aims to provide a 1000× factor of transmission capacity increase,at least 100 billion Internet-of-Things (IoT) device connections, a transmission rate of up to 10 Gbit/s, and an ultra-low latency user experience in the range of ms [1–5].In addition to human-to-human communication, the next-generation mobile Internet will establish zero-distance connections between humans and machines, and between machines and machines.Wireless technology will promote future economic and social development in a new way.Therefore, ultra-low latency transmission is regarded as one of the main technical features of 6G systems [6–8].Its goal is to achieve an end-to-end transmission delay below 1 ms, thereby supporting human-to-machine and machine-to-machine real-time communication and remote control applications.In addition to addressing higher requirements in terms of transmission delay, reliability, and throughput,6G has also been developed to introduce major changes in the next-generation mobile Internet architecture.Software-defined networking and network function virtualization (NFV) technologies,as emerging technologies from the 5G/B5G network architecture, enable the infrastructure network to be divided into several logical networks, allowing multiple differentiated applications to share the same physical network and resources; this is the so-called network slicing technology [9–12].Each independent slice can call a virtual network function running on the public network infrastructure, and configure and adjust its communication and computing resources as needed to meet the specific business needs of specific network slice applications [13,14].For instance, a notable recent study proposed an integrated content delivery service using information-centric networking and content delivery network slices employing NFV technology; their design and testbed implementation results were reported in [15,16].In addition, each tenant usually signs a service level agreement with the infrastructure provider.Therefore, through custom slicing applications and functions, and dynamic allocation of resources of custom slicing, public mobile networks can support specific emergency IoT slicing and ensure the coexistence and safe isolation of slicing and another mobile network slicing [17].

    In IoT communications, anti-interference of the wireless channel is still affected by various factors [18,19].Multi-antenna systems have been widely used for improving the quality of wireless channels in recent years.In practical applications, owing to the high complexity of the maximumlikelihood detection algorithm, when the number of antennas increases, the complexity grows exponentially.Therefore, the application of multiple-antenna systems is difficult to achieve [20];consequently, the application of wireless communication for the Internet is impacted.To solve this practical application problem, researchers from various countries have made many achievements in recent years [21].The QR decomposition detection algorithm has attracted the attention of researchers owing to its low complexity and the use of serial interference cancellation characteristics.The authors in [22] introduced an improved SQRD algorithm that maximizes the diversity gain based on the serial interference cancellation SQRD, ensuring that the signal power of the first detection layer is the largest in each detection; thus, the maximum detection layer can be obtained.Diversity gain, while using serial interference cancellation, reduces the complexity of the algorithm, but improving the performance is not ensured.The authors in [23] introduced a detection algorithm based on MMSE-SQRD, using a sort-free QRD-M algorithm to avoid the delay caused by sorting the detection phase, reduce the sorting complexity of the path search process, and improve the system performance.The researchers also found that the accuracy of the first detection layer of the QR algorithm is critical.The authors in [24] introduced a simplified QRM-MLD algorithm that uses QR decomposition with the M algorithm to reduce the system complexity while maintaining the system performance.It was proposed to use the estimated noise variance threshold method to reduce the complexity of the QRM-MLD.It can be concluded from the simulation results that, in contrast with adding MLD, the proposed method achieved a 10× reduction in the complexity.The authors in [25] introduced an adaptive candidate scheme in the QRM-MLD algorithm for multi-antenna detection.QRM-MLD is a near-ML detection algorithm that can achieve a trade-off between BER performance and computational complexity in a multi-antenna system.Using adaptive candidate schemes to enter QRM-MLD, similar to the traditional QRM-MLD, the proposed detection application with multi-branch optimization can achieve near-ML performance.The study in [26] introduced a signal selection scheme suitable for the QRM-MLD algorithm.The numerical results obtained by computer simulation showed that even if the number of candidates in QRM-MLD is relatively small, the proposed scheme can provide a diversity performance equal to N signal candidate points.In addition, owing to the low computational complexity, the proposed scheme is feasible for implementation.

    Aiming at solving the problem of poor detection of the conventional QR method in multiantenna systems, this study proposes a QR decomposition scheme based on ML criteria and a candidate mechanism.This algorithm greatly improves the performance while featuring low complexity.

    2 Antenna System Model

    A multi-antenna system is shown in Fig.1; it is assumed that the system hasMtransmitting antennas andNreceiving antennas, andN≥Mis satisfied.The wireless propagation channel experiences quasi-static flat fading and is in a strong scattering environment, that is, the channel fading experienced between each transmitting antenna and receiving antenna can be regarded as mutually independent [27].

    Figure 1:Proposed system model

    The received signal can be expressed as follows:

    The vector form can be expressed as follows:

    wherer(i)is anN×1 dimensional vector that represents the received signal;s(i)represents theM×1 dimensional vector, i.e., the transmitted signal; and thekthelementsk(i)represents the signal transmitted by thekthantenna.Each element ofs(i)is independently and identically distributed (i.i.d.), and the mean value of the transmitted signal is zero.The covariance is expressed as follows:

    whereE[·] represents the signal digital expectation; (·)Hrepresents the Hermitian operation;represents the signal power;Irepresents the identity matrix;hkrepresents theN×1 dimensional channel coefficient; andHrepresents theN×Mdimensional matrix.This is a matrix of all channel vectors and represents the channel fading coefficient from each transmitting antenna to each receiving antenna.Note also thatn(i)is anN×1 dimensional vector representing Gaussian white noise whose power isand mean is zero; it has independent and imaginary parts with equal variances.The covariance matrix is expressed as follows:

    3 Basic Principle of the Proposed Algorithm

    3.1 Traditional QR Decomposition Algorithm

    The core idea of the QR decomposition algorithm is to decompose the channel matrix to obtain an upper triangular matrix and an orthogonal matrix, and then use the correlation properties of the matrix to detect the received signal.Compared with the MMSE and ZF algorithms, the QR decomposition algorithm avoids the calculation of the channel matrix inversion and effectively reduces the computational complexity of the detection algorithm [28,29].

    When the number of antennas at the receiving end is not less than the number of antennas at the transmitting end, QR decomposition is performed on channelHto obtain the following expression:

    whereQis a unitary matrix,Ris an upper triangular matrix, and the received signalris left-multiplied by the conjugate transpose of the matrixQto obtain sufficient statistics of the transmitted vectors:

    Simplifying, we obtain:

    whereurepresents the noise vector after orthogonal transformation of the noise vector.Eq.(8)expands as follows:

    Note that the received signal of the last antenna is not interfered by other signals.Thus, the signal of this layer can be s elected to be detected first, and then the transmitted signal can be estimated in sequence:

    The QR decomposition algorithm detects layer by layer, and inevitably there is error propagation between two adjacent detection layers, leading to system performance degradation.If there is an error in the signal estimation of the first detection layer, it will affect the signal estimation of all subsequent layers.Therefore, the order of detection is critical for the QR algorithm, and the performance of the entire system largely depends on the first detection layer [30].

    3.2 Proposed Algorithm

    For QR decomposition detection algorithms, the correctness of the initial detection layer directly affects the signals of other detection layers.Ensuring the correctness of the first detection layer can effectively reduce the error propagation.The framework of the proposed ML-QR algorithm implementation is shown in Fig.2.

    Figure 2:Implementation framework of the proposed ML-QR algorithm

    The ML criterion is applied to the initial detection layer of the QR detection algorithm, that is, the modulation constellation points are sequentially used as the estimated model of the first layer, and then the QR detection algorithm is performed on the remaining layers.The optimal constellation point among the constellation points is selected for feedback as the initial detection layer estimation signal.After the initial layer signal is determined, the reliability of the soft estimation of the remaining layers is judged, and if the judgment is reliable, the candidate point is selected for optimal feedback [31].

    The reliability decision scheme is shown in Fig.3.Judging the reliability of the soft decision based on the location of the soft decision point can improve the performance of the algorithm,avoid the redundant tree process, and greatly reduce the computational complexity.In the scheme,the inner circle area represents the reliable area, the center of the circle is the constellation point coordinates, and the unreliable area is represented by the shaded region.The QR decomposition algorithm calculates the soft estimation signal of the transmitted signal hierarchically.If the soft estimation point is located in the shadow area, then it will result in an unreliable soft decision.Conversely, if the soft estimation is located in the white area of the constellation diagram, then the soft estimation is reliable.The candidate mechanism uses the m minimum distances estimated by the near soft estimation as candidate points, and then select the best candidate point from those m candidate points [32].

    Figure 3:Reliability decision method using QPSK

    First, the modulation constellation points,?= [c1,c2,...,cL], are successively used as the estimated points of the first detection layer of the QR method.Then, the conventional QR decomposition algorithm is carried out separately, that is,clis respectively taken from Eq.(10) to obtain the estimated signalpl(i)of theLgroup, wherepl(i)=[cl,,...,].

    If Eq.(11) is satisfied, thenctis the optimal detection of the initial detection layer, and it is also selected as the best feedback symbol of the next layer:

    In addition to the initial detection layer, the subsequent detection layer usesOM-1=rM-1,M-1to obtain the soft estimate of theM-1 layer, and then detects layer by layer to obtaink=M-2,..., 1 through layer soft estimation.The reliability of soft estimation is judged bydk.The mathematical expressions fordkandOk(i)are as follows:

    whereafrepresents the constellation point closest to the soft estimateOk(i)of thekthlayer.

    If the constellation point is represented byA, thenafcan be described as follows:

    Ifdk≥d(drepresents the range of reliability), then the soft estimateOk(i)is present in the shadow region, resulting in an unreliable soft decision of thekthlayer.Conversely, ifdk≤d, then the soft estimateOk(i)is located in the reliable area of the constellation diagram, and the soft decision of thekthlayer is reliable [27].When the soft decision is reliable, the soft decisionOk(i)is the reliable point, and the conventional QR decomposition scheme is implemented.Thekthlayer symbol estimation(i)is obtained by the hard decision(i)=Q[Ok(i)].

    The soft decisionOk(i)is an unreliable point, and the candidate points?=[c1,c2,...,cn,...,cN] will be generated, whereNdenotes that the candidate-point distance of soft estimation rendersOk(i)as the nearest constellation point.The unreliable decisionQ[Ok(i)] is replaced by(i)=cmopt, wherecmoptis the best candidate from?=[c1,c2,...,cn,...,cN].

    The process of obtaining optimal feedback candidate points is described next.

    To determine the best candidate point, we define the selection vector [b1,b2,...,bn,...,bN],whereNis equal to the number of constellation candidates in?= [c1,c2,...,cn,...,cN]; the vectorbnis selected as anM×1 dimensional vector.When the soft estimation of thekthlayer is unreliable, theM-layer elements ofbnare composed as follows:

    ? The previously detected symbols [ct,?sM-1(i),..., ?sk+1(i)] range from theMthlayer to the(k+ 1)thlayer;

    ? Thekthlayer is an unreliable decisionQ[Ok(i)] candidatecnselected from the constellation points;

    ? The symbols from thek- 1 to the first layer belong to the traditional QR decomposition algorithm

    Thus, the following expression can be obtained:

    whereis a potential decision:

    whereqis the index of a certain layer, ranging fromk- 1 to 1.

    If the above conditions are met,cmoptis currently the best character for a more reliable user decision, and it is chosen as the best symbol for the next step.The pseudocode of the algorithm is shown in Algorithm 1.

    Algorithm 1:Proposed algorithm for interference mitigation Initialization: QR=H; ?r=QHr; ?=[c1, c2,..., cl,..., cL]1:for l=1:L 2:?slM=cl 3:for k=M-1 to do 4: biq(i)=?rq-Mimages/BZ_1044_575_1101_622_1146.pngt=q+1 rq,t?slt 5:end for 6:end for 7: t=arg min 1≤l≤L r-Hblk(i)2 8:?sM=cl 9:for k=M-1:1 10: Ok(i)=images/BZ_1044_497_1448_529_1493.png?rk-Mimages/BZ_1044_644_1491_692_1537.pngi=k+1 rk,i?sniimages/BZ_1044_820_1448_851_1493.png11:if unreliable in ?=[c1, c2,..., cm,..., cM]12:for n=1:N do 13:for q=k-1:1 do 14: bnq(i)=images/BZ_1044_483_1735_515_1781.png?rq-Mimages/BZ_1044_629_1779_677_1824.pngt=q+1 rq,t?sntimages/BZ_1044_804_1735_836_1781.png15:end for 16: bn(i)=[ct, ...,?sk-1, cn, bnk+1,...,bnq(i),..., bNM(i)]T 17:end for 18: mopt=arg min 1≤n≤N ‖r-Hbnk(i)‖2 19:?sk(i)=cmopt 20:Else 21:?sk(k)=Q[Ok(i)]22:end if 23:end

    4 Complexity Analysis

    4.1 Initial Layer Detection Signal Estimation

    The first inspection layer with constellation points is in turn replaced, and a QR decomposition algorithm is in turn performed.The complexity of QR decomposition is mainly based on the decomposition of Q and R, and its computational complexity is O(n3).The algorithm proposed in this study is performed after the decomposition algorithm of Q and R.Only Eq.(10)is calculated.The complexity isLO(n3), whereLis the number of modulation bits.

    4.2 Other Detection Layers

    The soft judgment reliability judgment is denoted byp.A reliable decision occurs whenp=0, whereasp=1 denotes an unreliable decision.The computational complexity calculation is approximately 2M2+pNM2.Note from Figs.4 and 5 that at 25 dB and 30 dB, the reliability probability of the algorithm detection is very low.The complexity of the QR decomposition detection algorithm is the lowest in the current detection complexity, so it is compared with SIC (computational complexity).For some non-linear detection approaches such as o(O(n4)), the complexity of the algorithm proposed in this study does not increase significantly, and according to the simulations, the performance of the proposed QR detection algorithm based on the ML criterion is improved notably.

    Figure 4:Comparison of the SER vs. number of antennas at SNR=25 dB

    Figure 5:Comparison of the SER vs. number of antennas at SNR=30 dB

    5 Simulation Results and Discussion

    Let us assume that under flat Rayleigh fading channel in a multi-antenna system, the data sent by the transmitting antennas are mutually independent, the data frame length is 20,000,the unwoven system and QPSK modulation mode are used, and the algorithm performance is measured by the bit error rate [27].

    Fig.6 shows the performance curve of QR decomposition, the ML-QR algorithm, and the ML detection algorithm assuming an arrangement of 4×4 transceiver antennas.The reliable radiusdwas set to 0.4, and four candidate points were selected.As shown in Fig.6, the proposed algorithm shows better performance than the conventional QR method.When the BER is 10-2,the proposed method is 10 dB better than the conventional QR method.When the BER is 10-3,the proposed ML-QR algorithm is 15 dB better than the QR decomposition algorithm.Note from Fig.6 that with the continuous increase in SNR, the BER of the proposed ML-QR algorithm decreases linearly, becoming much lower than that of the traditional QR decomposition algorithm.This shows that for the QR algorithm, the detection sequence is critical, and the performance of the entire system largely depends on the first detection layer.In addition, it is clear from these results that the performance of the proposed algorithm is also close to the performance of the optimal detection algorithm.

    Figure 6:Comparison of the BER for three different algorithms with a 4×4 antenna arrangement and QPSK modulation

    In Fig.7 the BER of the proposed method is compared with different numbers of candidates points and thresholds.The Tx-Rx antennas were set in a 4×4 arrangement.Note that the BER of the proposed method is better for smaller thresholds.The BER is improved with increasing candidate points.The proposed algorithm mitigates the propagation of false judgments in the entire process of detection, and greatly improves the system performance.

    Fig.8 shows the traditional QR decomposition, the proposed algorithm, and optimal ML algorithm performance curves with the optimal threshold of 0.4, four candidate points, and 6×6 arrangement of Tx-Rx antennas.Note from Fig.8 that the proposed algorithm improves the BER by 9.5 dB over the conventional QR method.When the BER is 10-3, the proposed method improves the performance by 15 dBvs.the conventional QR method.

    Figure 7:Comparison of the BER under different parameters with a 4×4 antenna arrangement and QPSK modulation

    Figure 8:Comparison of the BER for three different algorithms with a 6×6 antenna arrangement and QPSK modulation

    Fig.9 shows the performance curves of different reliability radii and candidate points under the condition that the arrangement of transmitting and receiving antennas is 6×6.Note that when the candidate points coincide, the smaller the reliability threshold, the better the performance.Likewise, the greater the number of candidate points, the better the performance.Compared with Fig.5, when the antenna arrangement is 4×4, the system performance with a 6×6 antenna arrangement decreases, indicating that as the number of antennas increases, the error propagation between antennas increases, resulting in a decrease in system performance.

    Overall, the proposed detection algorithm can significantly improve the system performance with a certain degree of complexity.Simultaneously, it can effectively control the performance and complexity of the system through the threshold and the number of candidate points, thereby achieving a balanced compromise between the performance and complexity of the detection algorithm.The ideological response has a positive effect on reducing the cost of IoT communication and improving its reliability.

    Figure 9:Comparison of the BER under different parameters with a 6×6 antenna arrangement and QPSK modulation

    6 Conclusion

    An effective error detection algorithm can greatly improve the communication performance of the IoT.The proposed algorithm can accurately estimate the initial detection layer signal through the principle of the ML criterion algorithm.Specifically, the proposed system model uses the shadow area constraint to enhance the interference cancelation and effectively reduces the impact of error propagation.In addition, it can ensure that the complexity caused by unreliability is reduced, and the candidate mechanism can be used to suppress the propagation of false judgments in the entire detection process effectively and improve the system performance.According to MATLAB simulations of the system, it is shown that the algorithm can greatly improve the system performance and effectively save the signal-to-noise ratio.In addition, the proposed algorithm can control the computational complexity and improve the system performance according to the threshold and number of candidate points, thereby achieving a good balance between detection performance and complexity.A potential future study could consider the mean square error and throughput analysis.

    Acknowledgement:The author extends his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (RGP.2/23/42), Received by Fahd N.Al-Wesabi.www.kku.edu.sa.

    Funding Statement:This study is supported by Fujitsu-Waseda Digital Annealer FWDA Research Project and Fujitsu Co-Creation Research Laboratory at Waseda University (Joint Research between Waseda University and Fujitsu Lab).The study was also partly supported by the School of Fundamental Science and Engineering, Faculty of Science and Engineering, Waseda University,Japan.This study was supported by the Institute for Information & Communications Technology Planning & Evaluation (IITP) Grant funded by the Korean government (MSIT) (No.2019-0-01343,Training Key Talents in Industrial Convergence Security) and Research Cluster Project, R20143,by the Zayed University Research Office.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲精品自拍成人| 在线观看人妻少妇| 深爱激情五月婷婷| 听说在线观看完整版免费高清| 午夜免费鲁丝| 自拍欧美九色日韩亚洲蝌蚪91 | 精品一区二区免费观看| 午夜福利高清视频| 一个人看视频在线观看www免费| 直男gayav资源| 一区二区三区乱码不卡18| 欧美国产精品一级二级三级 | 亚洲成人久久爱视频| 噜噜噜噜噜久久久久久91| 黄片无遮挡物在线观看| av福利片在线观看| 欧美老熟妇乱子伦牲交| 九九爱精品视频在线观看| 高清欧美精品videossex| 97在线视频观看| 日韩伦理黄色片| 日韩欧美 国产精品| 精品酒店卫生间| 在线播放无遮挡| 欧美老熟妇乱子伦牲交| 久久久久国产网址| 在线a可以看的网站| 中文字幕av成人在线电影| 亚洲av中文字字幕乱码综合| 国产91av在线免费观看| 国产精品99久久99久久久不卡 | 中国美白少妇内射xxxbb| 精品一区二区三卡| 极品教师在线视频| 在线免费观看不下载黄p国产| 一本久久精品| av在线天堂中文字幕| 丰满人妻一区二区三区视频av| av播播在线观看一区| 精品国产一区二区三区久久久樱花 | 日本一本二区三区精品| 人妻系列 视频| 久久久久九九精品影院| 校园人妻丝袜中文字幕| 97超视频在线观看视频| 免费看a级黄色片| 免费av不卡在线播放| 亚洲无线观看免费| 免费人成在线观看视频色| 精品人妻一区二区三区麻豆| 亚洲成人久久爱视频| 国产亚洲av嫩草精品影院| 日日摸夜夜添夜夜爱| 一二三四中文在线观看免费高清| 亚洲av电影在线观看一区二区三区 | av国产精品久久久久影院| 听说在线观看完整版免费高清| 国产黄a三级三级三级人| 爱豆传媒免费全集在线观看| 搡女人真爽免费视频火全软件| 少妇人妻一区二区三区视频| 亚洲精品,欧美精品| 欧美日韩综合久久久久久| 国产老妇女一区| 白带黄色成豆腐渣| 内射极品少妇av片p| 人妻制服诱惑在线中文字幕| 国产精品不卡视频一区二区| 成人欧美大片| 久久精品熟女亚洲av麻豆精品| 国产一区有黄有色的免费视频| 内地一区二区视频在线| 一级av片app| 干丝袜人妻中文字幕| 国产 精品1| 久久精品夜色国产| 最近2019中文字幕mv第一页| 久久国内精品自在自线图片| 国产成人a∨麻豆精品| 久久人人爽av亚洲精品天堂 | 欧美bdsm另类| 成人黄色视频免费在线看| 亚洲精品亚洲一区二区| 日韩欧美 国产精品| 精品国产一区二区三区久久久樱花 | 欧美精品国产亚洲| 一区二区三区精品91| 日日啪夜夜撸| 欧美日韩一区二区视频在线观看视频在线 | 精品人妻一区二区三区麻豆| 久久精品久久久久久久性| 最近2019中文字幕mv第一页| 春色校园在线视频观看| 国产免费一区二区三区四区乱码| 亚洲精品久久午夜乱码| 国产精品国产三级国产av玫瑰| 亚洲怡红院男人天堂| 亚洲美女视频黄频| 中文欧美无线码| 男人舔奶头视频| 最新中文字幕久久久久| 久久99热这里只有精品18| 欧美精品国产亚洲| 在线观看免费高清a一片| 久久6这里有精品| 国产一区亚洲一区在线观看| 少妇猛男粗大的猛烈进出视频 | 久热久热在线精品观看| 亚洲欧美成人精品一区二区| 熟女电影av网| 日韩不卡一区二区三区视频在线| 欧美zozozo另类| 一级毛片我不卡| 欧美极品一区二区三区四区| 国产精品一区二区三区四区免费观看| 国产精品成人在线| 观看美女的网站| 又爽又黄无遮挡网站| 免费在线观看成人毛片| 国产色婷婷99| 看十八女毛片水多多多| 91午夜精品亚洲一区二区三区| 婷婷色综合大香蕉| 69人妻影院| 97精品久久久久久久久久精品| 乱码一卡2卡4卡精品| 成人高潮视频无遮挡免费网站| 日韩一本色道免费dvd| 亚洲av.av天堂| 69av精品久久久久久| 少妇熟女欧美另类| 精品一区二区三卡| 在线天堂最新版资源| 精品国产乱码久久久久久小说| 亚洲精品国产色婷婷电影| 色婷婷久久久亚洲欧美| 一个人观看的视频www高清免费观看| 久久99热6这里只有精品| 老师上课跳d突然被开到最大视频| 亚洲在线观看片| av天堂中文字幕网| 精华霜和精华液先用哪个| 成人欧美大片| 三级经典国产精品| 欧美亚洲 丝袜 人妻 在线| 久久久国产一区二区| 丰满人妻一区二区三区视频av| 国产毛片a区久久久久| 成人高潮视频无遮挡免费网站| 国产白丝娇喘喷水9色精品| 免费观看在线日韩| 男女边摸边吃奶| 精品国产乱码久久久久久小说| 丰满乱子伦码专区| 性插视频无遮挡在线免费观看| 能在线免费看毛片的网站| 国产亚洲精品久久久com| 青春草国产在线视频| 日本一本二区三区精品| 黄色欧美视频在线观看| 美女视频免费永久观看网站| 国产高清三级在线| 大陆偷拍与自拍| 国产精品无大码| 一级二级三级毛片免费看| 韩国av在线不卡| 日韩在线高清观看一区二区三区| 亚洲一区二区三区欧美精品 | 亚洲最大成人手机在线| 国产精品女同一区二区软件| 精品久久久久久久久亚洲| 97超视频在线观看视频| 97在线视频观看| 搡老乐熟女国产| 性插视频无遮挡在线免费观看| 国内精品宾馆在线| 久久久久久久大尺度免费视频| 在线亚洲精品国产二区图片欧美 | 嫩草影院入口| 日本欧美国产在线视频| 亚洲国产色片| 热re99久久精品国产66热6| 一级av片app| 99久久人妻综合| 国产一区有黄有色的免费视频| 乱码一卡2卡4卡精品| 精品一区二区三卡| 人人妻人人看人人澡| 伦精品一区二区三区| 亚洲,欧美,日韩| 最近中文字幕2019免费版| 婷婷色麻豆天堂久久| 国产精品av视频在线免费观看| 激情 狠狠 欧美| av国产久精品久网站免费入址| 国产精品一二三区在线看| 涩涩av久久男人的天堂| 可以在线观看毛片的网站| 亚洲成人av在线免费| 美女主播在线视频| 国产成人福利小说| 欧美性感艳星| 一本久久精品| 亚洲成人一二三区av| 国产乱人偷精品视频| 看黄色毛片网站| 亚洲色图av天堂| 午夜福利网站1000一区二区三区| 亚洲欧美日韩无卡精品| 亚洲av.av天堂| 大码成人一级视频| 亚洲精品久久午夜乱码| 男人爽女人下面视频在线观看| 丝袜喷水一区| 另类亚洲欧美激情| 亚洲色图av天堂| 在线观看av片永久免费下载| 国产成人免费观看mmmm| 狂野欧美激情性xxxx在线观看| 欧美一区二区亚洲| 午夜老司机福利剧场| 午夜爱爱视频在线播放| 国产亚洲av片在线观看秒播厂| 亚洲精华国产精华液的使用体验| 久久女婷五月综合色啪小说 | freevideosex欧美| 免费av毛片视频| 天美传媒精品一区二区| 国产黄色视频一区二区在线观看| 特大巨黑吊av在线直播| 天堂网av新在线| 久久女婷五月综合色啪小说 | 久久久久精品久久久久真实原创| 亚洲精品乱久久久久久| 久久久精品94久久精品| 久久6这里有精品| 五月天丁香电影| 一级爰片在线观看| 免费看光身美女| 亚洲精品久久久久久婷婷小说| 国产黄a三级三级三级人| 毛片女人毛片| 亚洲三级黄色毛片| 亚洲av二区三区四区| 内地一区二区视频在线| 精品少妇黑人巨大在线播放| 成人毛片60女人毛片免费| 国产亚洲91精品色在线| 婷婷色综合www| 亚洲av福利一区| 国产综合精华液| 亚洲欧美中文字幕日韩二区| 欧美成人午夜免费资源| 亚洲国产日韩一区二区| 亚洲精品视频女| 亚洲伊人久久精品综合| 精品久久国产蜜桃| 午夜老司机福利剧场| 亚洲不卡免费看| av福利片在线观看| 久久精品人妻少妇| 午夜激情久久久久久久| 在线观看美女被高潮喷水网站| 免费观看的影片在线观看| 亚洲人与动物交配视频| 亚洲av在线观看美女高潮| 亚洲,欧美,日韩| 亚洲av日韩在线播放| 欧美bdsm另类| 日韩av免费高清视频| 六月丁香七月| 天堂俺去俺来也www色官网| 老师上课跳d突然被开到最大视频| 国产午夜精品一二区理论片| 国产探花极品一区二区| 欧美三级亚洲精品| freevideosex欧美| 又粗又硬又长又爽又黄的视频| 卡戴珊不雅视频在线播放| 国产亚洲一区二区精品| 国产成人精品一,二区| 人妻制服诱惑在线中文字幕| 寂寞人妻少妇视频99o| 一个人看的www免费观看视频| 国产有黄有色有爽视频| 在线天堂最新版资源| 亚洲精品成人久久久久久| 国产精品爽爽va在线观看网站| 毛片女人毛片| 日本三级黄在线观看| 亚洲无线观看免费| 中文字幕av成人在线电影| 国产亚洲91精品色在线| 美女内射精品一级片tv| 亚洲精品456在线播放app| 中文资源天堂在线| 午夜福利高清视频| 又粗又硬又长又爽又黄的视频| 男男h啪啪无遮挡| 国产精品伦人一区二区| 波多野结衣巨乳人妻| 永久免费av网站大全| 亚州av有码| 久久午夜福利片| 18禁动态无遮挡网站| 久久精品国产亚洲av涩爱| 日日啪夜夜撸| 99九九线精品视频在线观看视频| 少妇人妻精品综合一区二区| 成人欧美大片| 91久久精品电影网| 日韩三级伦理在线观看| 免费观看的影片在线观看| 九九爱精品视频在线观看| 成年版毛片免费区| 久久国产乱子免费精品| 国产综合精华液| 成人鲁丝片一二三区免费| 国产精品不卡视频一区二区| 男女边摸边吃奶| 亚洲内射少妇av| 婷婷色综合www| 国产在线一区二区三区精| 白带黄色成豆腐渣| 欧美bdsm另类| 亚洲aⅴ乱码一区二区在线播放| 女人被狂操c到高潮| 欧美+日韩+精品| 男人舔奶头视频| 一级毛片电影观看| 亚洲精品日本国产第一区| 最近最新中文字幕大全电影3| 国产精品一区二区三区四区免费观看| 日韩人妻高清精品专区| 大码成人一级视频| 一级毛片我不卡| 中文字幕免费在线视频6| 国产成人精品福利久久| 久久国产乱子免费精品| 亚洲最大成人av| 日韩一区二区三区影片| 不卡视频在线观看欧美| 国产精品秋霞免费鲁丝片| 大香蕉97超碰在线| 国产精品麻豆人妻色哟哟久久| 国产精品一区二区性色av| 精品久久国产蜜桃| 97精品久久久久久久久久精品| 精品久久久噜噜| 国产熟女欧美一区二区| 99久久精品热视频| 亚洲国产最新在线播放| 亚洲天堂国产精品一区在线| 亚洲经典国产精华液单| 亚洲精品乱久久久久久| 国产精品久久久久久av不卡| 色视频www国产| 国产伦理片在线播放av一区| 久久国产乱子免费精品| 精品少妇久久久久久888优播| 蜜桃亚洲精品一区二区三区| 免费大片黄手机在线观看| 亚洲熟女精品中文字幕| 观看美女的网站| 成人二区视频| 看黄色毛片网站| 精品人妻视频免费看| 欧美日韩国产mv在线观看视频 | 欧美性感艳星| 女人被狂操c到高潮| 成人高潮视频无遮挡免费网站| 亚洲av中文av极速乱| 亚洲欧洲国产日韩| 卡戴珊不雅视频在线播放| 男人舔女人的私密视频| 免费高清在线观看日韩| bbb黄色大片| 国产片特级美女逼逼视频| 国产又色又爽无遮挡免| 哪个播放器可以免费观看大片| 99九九在线精品视频| 少妇被粗大的猛进出69影院| 如日韩欧美国产精品一区二区三区| 毛片一级片免费看久久久久| av在线老鸭窝| 纵有疾风起免费观看全集完整版| 欧美少妇被猛烈插入视频| 免费在线观看视频国产中文字幕亚洲 | 黄网站色视频无遮挡免费观看| 午夜福利,免费看| 麻豆av在线久日| 搡老乐熟女国产| 国产一级毛片在线| 日韩,欧美,国产一区二区三区| 国产极品粉嫩免费观看在线| 日日摸夜夜添夜夜爱| 免费在线观看视频国产中文字幕亚洲 | 中文字幕亚洲精品专区| 国产高清不卡午夜福利| 可以免费在线观看a视频的电影网站 | 老司机靠b影院| 女人久久www免费人成看片| 日本wwww免费看| 日本欧美国产在线视频| 少妇被粗大的猛进出69影院| 国产精品一国产av| 午夜日韩欧美国产| 波多野结衣av一区二区av| 人成视频在线观看免费观看| 成人18禁高潮啪啪吃奶动态图| 18禁动态无遮挡网站| 在线天堂最新版资源| 在线观看三级黄色| 韩国av在线不卡| 黄色一级大片看看| 国产精品亚洲av一区麻豆 | 免费高清在线观看日韩| 久久久精品94久久精品| 老熟女久久久| 天天躁夜夜躁狠狠久久av| 女人爽到高潮嗷嗷叫在线视频| 国产精品二区激情视频| 中文精品一卡2卡3卡4更新| 蜜桃国产av成人99| 亚洲国产精品一区二区三区在线| 精品一区二区三区av网在线观看 | 高清欧美精品videossex| 国产精品国产av在线观看| 欧美日韩一级在线毛片| 国产黄色视频一区二区在线观看| 久久精品人人爽人人爽视色| 日本猛色少妇xxxxx猛交久久| 麻豆乱淫一区二区| 午夜福利在线免费观看网站| 啦啦啦在线观看免费高清www| 狠狠精品人妻久久久久久综合| 伊人亚洲综合成人网| av在线播放精品| 日韩视频在线欧美| 午夜av观看不卡| 久久久久网色| 亚洲成av片中文字幕在线观看| 中文字幕色久视频| 久久久久久久大尺度免费视频| 中文乱码字字幕精品一区二区三区| 天天操日日干夜夜撸| 精品亚洲成国产av| 精品国产露脸久久av麻豆| 视频区图区小说| 最近手机中文字幕大全| 精品一区二区三卡| 大话2 男鬼变身卡| 中国国产av一级| www.自偷自拍.com| 亚洲欧美成人精品一区二区| 久久性视频一级片| 久久 成人 亚洲| 日本欧美视频一区| 欧美人与性动交α欧美精品济南到| 亚洲成人手机| 卡戴珊不雅视频在线播放| 999久久久国产精品视频| 黑丝袜美女国产一区| 日本猛色少妇xxxxx猛交久久| 欧美亚洲日本最大视频资源| 欧美日韩综合久久久久久| 国产精品一区二区在线不卡| 在线亚洲精品国产二区图片欧美| 黄频高清免费视频| 亚洲成人手机| 宅男免费午夜| 性少妇av在线| 麻豆乱淫一区二区| 香蕉丝袜av| 精品第一国产精品| 一个人免费看片子| 免费观看a级毛片全部| 色婷婷久久久亚洲欧美| 亚洲久久久国产精品| 久久久久视频综合| 在线观看www视频免费| 51午夜福利影视在线观看| 色视频在线一区二区三区| 无遮挡黄片免费观看| 国产精品一国产av| 国产老妇伦熟女老妇高清| 国产成人精品福利久久| 午夜激情久久久久久久| 天天躁夜夜躁狠狠躁躁| 成人毛片60女人毛片免费| 精品少妇久久久久久888优播| 日本91视频免费播放| 91aial.com中文字幕在线观看| 老司机亚洲免费影院| 90打野战视频偷拍视频| 久久午夜综合久久蜜桃| 女人高潮潮喷娇喘18禁视频| 婷婷色麻豆天堂久久| 欧美乱码精品一区二区三区| 在线精品无人区一区二区三| 日韩大片免费观看网站| 亚洲欧美激情在线| 香蕉丝袜av| 久久国产亚洲av麻豆专区| 人妻 亚洲 视频| 亚洲欧洲国产日韩| 欧美成人午夜精品| av.在线天堂| 国产成人免费无遮挡视频| 另类亚洲欧美激情| 亚洲精品乱久久久久久| 97精品久久久久久久久久精品| 国产精品av久久久久免费| 欧美久久黑人一区二区| 欧美在线黄色| 日韩精品有码人妻一区| 一级黄片播放器| 国产成人精品久久久久久| 久久97久久精品| 欧美黄色片欧美黄色片| 精品久久蜜臀av无| 午夜精品国产一区二区电影| 满18在线观看网站| 欧美乱码精品一区二区三区| 亚洲国产日韩一区二区| 中文字幕最新亚洲高清| 青春草视频在线免费观看| 亚洲精品,欧美精品| 777久久人妻少妇嫩草av网站| 国产免费现黄频在线看| 亚洲精品久久午夜乱码| 人人妻人人爽人人添夜夜欢视频| 一边亲一边摸免费视频| 丝袜喷水一区| 久久久精品国产亚洲av高清涩受| 国产乱来视频区| 欧美精品一区二区大全| 日韩欧美精品免费久久| 日韩,欧美,国产一区二区三区| 国产亚洲最大av| 精品一品国产午夜福利视频| 日本wwww免费看| 蜜桃国产av成人99| 亚洲人成电影观看| 亚洲欧美中文字幕日韩二区| 香蕉丝袜av| 一本久久精品| 国产精品一区二区在线观看99| 黑人欧美特级aaaaaa片| 国产不卡av网站在线观看| 国产亚洲欧美精品永久| 新久久久久国产一级毛片| 美女主播在线视频| 国产无遮挡羞羞视频在线观看| 母亲3免费完整高清在线观看| 老司机深夜福利视频在线观看 | 大陆偷拍与自拍| 啦啦啦中文免费视频观看日本| 国产毛片在线视频| 国产日韩一区二区三区精品不卡| 久热这里只有精品99| 一边亲一边摸免费视频| 久久国产精品男人的天堂亚洲| 菩萨蛮人人尽说江南好唐韦庄| 天天躁夜夜躁狠狠躁躁| 又大又爽又粗| 水蜜桃什么品种好| 成人毛片60女人毛片免费| 色婷婷久久久亚洲欧美| 男女之事视频高清在线观看 | 欧美人与性动交α欧美精品济南到| 精品国产超薄肉色丝袜足j| 久久天躁狠狠躁夜夜2o2o | 夜夜骑夜夜射夜夜干| 欧美最新免费一区二区三区| 色播在线永久视频| 国产成人精品在线电影| 91精品国产国语对白视频| 久久久久精品人妻al黑| 国产成人av激情在线播放| 十八禁网站网址无遮挡| 国产一区二区 视频在线| 午夜免费男女啪啪视频观看| 熟女少妇亚洲综合色aaa.| 亚洲第一av免费看| xxx大片免费视频| tube8黄色片| 亚洲一级一片aⅴ在线观看| 国产野战对白在线观看| 国产精品亚洲av一区麻豆 | 亚洲一卡2卡3卡4卡5卡精品中文| 青春草国产在线视频| 超色免费av| 另类精品久久| 别揉我奶头~嗯~啊~动态视频 | 国产黄色免费在线视频| 一二三四在线观看免费中文在| 男女边摸边吃奶| 亚洲五月色婷婷综合| 亚洲精品久久久久久婷婷小说| 亚洲精品第二区| 又大又爽又粗| 热re99久久精品国产66热6| 久久99精品国语久久久| 狂野欧美激情性bbbbbb| 日韩人妻精品一区2区三区| 老司机在亚洲福利影院| 国产精品久久久久久精品古装| 国产欧美日韩综合在线一区二区| 成年av动漫网址| 菩萨蛮人人尽说江南好唐韦庄| 新久久久久国产一级毛片| 亚洲综合色网址| 成年动漫av网址| 男女国产视频网站|