• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Advanced Analysis of Cloud Computing Concepts Based on the Computer Science Ontology

    2021-12-16 06:38:28PaweLulaOctavianDospinescuDanielHomocianuandNapoleonAlexandruSireteanu
    Computers Materials&Continua 2021年3期

    Pawe? Lula,Octavian Dospinescu, Daniel Homocianu and Napoleon-Alexandru Sireteanu

    1Krakow University of Economics, Krakow, Poland

    2Alexandru Ioan Cuza University, Iasi, 700706,Romania

    Abstract:Our primary research hypothesis stands on a simple idea:The evolution of top-rated publications on a particular theme depends heavily on the progress and maturity of related topics.And this even when there are no clear relations or some concepts appear to cease to exist and leave place for newer ones starting many years ago.We implemented our model based on Computer Science Ontology (CSO) and analyzed 44 years of publications.Then we derived the most important concepts related to Cloud Computing (CC) from the scientific collection offered by Clarivate Analytics.Our methodology includes data extraction using advanced web crawling techniques, data preparation, statistical data analysis,and graphical representations.We obtained related concepts after aggregating the scores using the Jaccard coefficient and CSO Ontology.Our article reveals the contribution of Cloud Computing topics in research papers in leading scientific journals and the relationships between the field of Cloud Computing and the interdependent subdivisions identified in the broader framework of Computer Science.

    Keywords: Cloud computing scientific literature; cloud related concepts; CSO ontology

    1 Introduction

    In-depth scientific studies of cloud computing have a relatively recent history.Thus,the research carried out by Chiregi et al.[1]and Ibrahim et al.[2]highlights that journals published by Elsevier,Springer,IEEE,Emerald, Taylor, and Wiley have been concerned with this field since 2010.

    Cloud Computing has developed as a critical innovation in the field of ICT that can revolutionize the way information resources are consumed and delivered.Thus, according to Yu et al.[3], in developing economies, this innovation is considered a new way that can generate a new information infrastructure with a real potential for future economic growth.The authors pointed out that, in the case of China, the development of the cloud computing industry was achieved from an early stage (2008) through the coevolution of technological and institutional infrastructures, leading to a preliminary cloud ecosystem.This process involved a wide range of different actors, from the government to business.The interaction between these actors influenced the development of the cloud computing industry based on each participant’s interests.It was the case of the period between 2008 and 2016.This study concludes that the development of cloud computing technology can contribute to economic progress only through partnerships between the government and the business environment in order to identify market requirements and manage related risks.

    Regarding the expansion of cloud computing players nationally and globally,Kshetri et al.[4]analyzes the determinants of such an evolution.The conclusion reached is that the modeling of the cloud computing industry and market was possible through the action of contradictory, conflicting, and paradoxical forces.Therefore, the following facilitators and inhibitors resulted: Standards and standardization institutions,regulatory ones,and legal regulations on cyber-control.

    Ali et al.[5] shows that in developing countries, there is a tendency to reform e-Government in an attempt to provide easily accessible and high-quality services to citizens.Although the intention is commendable, there are still many challenges as the cost growth rate that is difficult to estimate and control.Managing the data, information, knowledge, and hardware infrastructure is an expensive component and creates other difficulties.The main obstacles and challenges regarding the e-Government cloud are lack of data control [6], security,and privacy [7], access authorization, data leakage, and system failure [8].These challenges can lead to e-government project failures.Therefore, a solution is needed to overcome them,and Cloud Computing plays a vital role in solving these problems.

    Nowadays, the cloud computing sector is a growing field of many providers engaged in a “digital revolution” that will make classic IT models obsolete in the next ten years.Although still evolving, many circumstances can generate anti-competitive or monopolistic behavior in the cloud industry market [9].Vendors may arrange peculiar or exclusive negotiations and may refuse to share technical information on compatible products.Innovation can also be restricted by pricing and monopolistic behavior, ultimately leading to a reduction in competition.In addition to competition law, other rules have a powerful impact when competing in the cloud computing services industry.Concentration regulations can have a direct influence on the process of controlling market concentration in the CC industry.In terms of mergers and competition law, one of the main issues to be considered concerns the concept of interoperability.This concept is particularly important in the field of cloud computing, as it has an immediate impact on openness and competition, with an instant effect on standardization and intellectual property rights.Taking into account the studies carried out by Song [9] and Walden et al.[10], it appears that, although the legislative framework somehow lags behind the technological progress, competition law still plays an important role so that dominant market players cannot abuse of their position.The ongoing use of competition law usually means the number of analyses and investigations related to software and hardware platform monopolies.These laws may extend to points of sale in cloud computing infrastructures.

    Novais et al.[11]have studied the impact that Cloud Computing and its technologies have on the supply chain.The analysis of specialized literature shows that there was a relationship of influence between the adoption of cloud computing and the technological integration of partners and business processes in the supply chain.Also, the use of Cloud Computing in the supply chain has positive effects on the integration of information and financial flows.Topics and lines of research that have crystallized in recent times include the relationship between cloud computing and logistics, commercial integration, and manufacturing process integration.Research results [12-16] show that Cloud Computing supports the integration of supply chain processes and activities because it considerably improves scalability,flexibility, agility, adaptation to change, and supply chain planning.D’Arcy et al.[17-19] show that commercial aspects and trends go beyond the classic limits of the supply chain by switching to mobile cloud computing.

    Cloud Computing is also to consider from the perspective of intra-organizational and interorganizational integration.Thus, in terms of intra-organizational integration, Cloud Computing can be connected with technologies and systems such as ERP (Enterprise Resource Planning) [20,21], and Radio Frequency Identification [22,23].Research results show that Cloud Computing, together with intraorganizational technologies, can reduce information distortions within organizations and increase the efficiency of internal procurement processes.Regarding the inter-organizational integration, Chen et al.[24] and Singh et al.[25] have focused mainly on the relationship between Cloud Computing and web technologies.The results of the studies show that the efficiency and competitiveness of the supply chain can meliorate by integrating web 2.0 technologies with Cloud Computing.In the same direction, Camara et al.[26] show that Cloud Computing can improve the way resources are shared and distributed among members of the supply chain,leading to an increase in the dynamics of collaborative systems.

    Battleson et al.[27]and Liu et al.[28]indicate that the flexibility of Cloud Infrastructure can improve the ability of a company to adapt and its skill to quickly integrate new IT applications, which fundamentally changes an organization’s IT framework and the way IT resources are installed and used.In many industries,scalability is a fundamental factor for a company to respond quickly to market changes.

    Liu et al.[28] centralized the literature and concluded that the main features/dimensions of the IT infrastructure fall into two types: flexibility and integration.Most studies highlight the flexibility of IT infrastructure and its importance for business.Thus, flexibility [29-31] refers to concrete issues such as rapid development and development of significant applications, hardware and software modularity,scalability, and compatibility of infrastructure components, connectivity, and standardization of networks and platforms in organizations.On the other hand, integration refers to issues such as the exchange of information between different locations, products, or services, exploiting synergistic opportunities between the components of a business, data consistency, functional integration of applications,adaptability,and connectivity.

    Jeyaraj [32] define Cloud Computing as an archetype that allows access to a usual pool of cloud computing resources in an on-demand or pay-per-use model.Cloud computing offers more benefits to users and organizations in terms of capital expenditures and operating expenses savings.According to Noor et al.[19], mobile cloud computing promises several benefits, such as increased battery life,scalability, and reliability.However, there are still challenges to face to enable ubiquitous deployment and adoption of cloud computing.Some of these challenges include security, confidentiality and trust,bandwidth and data transfer, data management and synchronization, energy efficiency, and heterogeneity.Despite the benefits, some barriers restrict the use of cloud computing.Security is an important issue that always matters.The lack of this vital feature leads to the negative impact of computational archetype,leading to personal, ethical, and financial damage.Security challenges are analyzed on three levels:Computational [33], communication, and data [34].The security of cloud computing environments is becoming increasingly important in the context of the Internet of Things and the need for integration[35].With the evolution of ubiquitous computing, everything connects everywhere, so these concepts have been studied extensively in the literature [36].However, intrusions and vulnerabilities will be more frequent due to the complexity of the systems and the difficulty of controlling each access attempt.

    Specialized studies [37] show that human society is facing an unprecedented technological evolution that will powerfully change the way we interact with the world around us and the way we program applications.Mobile computers and related applications have had a significant impact.Another potential area of research is the Internet of Things (IoT) that aims to develop a smart network of interconnected devices.There have been numerous emerging research paradigms regarding their respective fields of research and their intersections.These include Mobile Cloud Computing (MCC), cloud computing, fog computing, IoT cloud computing, Mobile Edge Computing (MEC), WoT, and SWoT (Semantic WoT).It happens quite often that a concept refers to several paradigms or to a single paradigm that is defined by several terms.As a result, we can say that these paradigms’definitions are not standardized.

    According to a systematic study conducted by Androcec et al.[38], there are four major categories of interest for cloud computing ontologies, which have emerged in connection with the literature.Thus, the proportions are as follows: Cloud resource and service description—25%, Cloud security, and privacy—8%, Cloud interoperability—13%, and Cloud service discovery—54%.On the other hand, Al-Sayed et al.[39] consider that a standardized ontology is still missing today.

    From a technological point of view,the cloud computing approach branches in several directions.In this regard, Boukerche et al.[40] distinguishes between concepts such as Infrastructure as a Service (IaaS),Platform as a Service (PaaS), and Software as a Service (SaaS).These concepts serve to develop new areas as cloud networks and services.There are already computing implementations for automotive industry services.Some examples are network as a service, storage as a service, and cooperation as a service.The implications are straightforward in terms of vehicle management in cloud computing: data centers,traffic management,internet vehicles, urban surveillance, security,and infotainment.

    Cloud computing applications also tend to develop for the chemical industry [41], contributing decisively to the professional interpretation of data and information.Other applications and areas of the Internet of Things category, on which Cloud Computing has a particular impact, are the following [35]:Smart transportation solutions, remote patient monitoring, home sensors and sensors in airports, sensors to monitor the problems that may occur in engine operation, and smart grids.Applications of interest are also in areas such as storage over the internet,internet overhead,internet applications,and energy efficiency.

    Du et al.[42]believe that cloud computing is shaping the world of cyber technologies while evolving as the principal computing infrastructure for sharing resources like services,applications,and platforms.This approach is called“X as a service”and brings important functionalities and current economic benefits.But in cyberspace,cloud computing is limited because its services can only be accessed remotely.Still,it may be necessary to access them closer to the physical location of the actual activity.However, there are many situations related to service requests, in which cloud computing only helps to a small extent due to“cyber-limitation”.Since SOA has become more and more popular, this new architecture has served in the development of applications in the field of robotics.Chen [43] specified the use of SOA concepts to generate new composite embedded systems and robotic applications; they mentioned that they even built a prototype system.The SOA robotic architecture relies on the expansion of cloud computing—RaaS(Robot as a Service).In a RaaS system, many robotics units provide various services to consumers,playing the roles of the service provider,service broker,and service client [44].

    As Cloud Computing developed,so did the issue of CC governance.Thus,according to Bounagui et al.[45], through CC governance, organizations can have real control over the services provided by the CC infrastructure.Currently, there are several different approaches to CC governance.Thus, the He [46]model supports organizations that want to manage all their IT services using cloud computing.The model takes into account the business objectives and aligns the CC governance with them and the need to manage CC assets and services.The model’s purpose is to provide a benchmark for cloud service providers that best meet the needs of end-users.The author divided CC governance into five main areas:strategic planning, organizational alignment, service lifecycle management, policy management, and service level management.For each of these, the processes and activities needed to ensure effective governance of the CC are very clearly detailed.

    In terms of future directions and trends in cloud computing, Varghese et al.[47] identifies several directions for cloud computing research on information ecosystem management strategies, the development of distributed architectures, improving the reliability of cloud systems, the impact of system development on sustainability, and advanced security.The new architectures and facilities will have to serve the stated requirements of the Internet of Things philosophy, in line with the challenges of processing large volumes of data.At the same time, it is becoming increasingly clear that current systems developed by human programmers will evolve into a new generation of self-learning systems.

    Hakak et al.[48]shows that gamification has gained considerable interest in educational circles due to its ability to enhance learning among students.In the future,they expect gamification to go beyond traditional learning,resulting in issues such as scalability and modernization of learning modules.A viable solution to these problems would be to combine gamification and cloud computing.However, the capacity of cloud computing is still in the early stages of development.Potential applications for cloud gamification are:courses related to Natural Language Processing, virtual reality, distributed learning system, mobile learning, and real-time learning skills.

    One of the challenges is scientifically explained by Alles[49].Thus,this author concludes about Cloud Computing stating that AIS(Association for Information Systems)is unable to establish a distinct role in the clear separation between cloud computing and other fields.The AIS community fails to make a clear distinction between cloud computing as a subject of proprietary research and cloud computing as a method of information sharing.An approach that extends this topic may add value to the research, but at the same time, there are risks associated with dissipating the original concept.This conclusion can be extended even beyond the area of interest of the AIS.

    The main objective of this paper is to implement a methodology for identifying the most relevant concepts related to a particular key topic of interest, considering mainly academic writings as a source of evaluation and determination.In our study, we started with the Cloud Computing topic.Then, we applied the Computer Science Ontology on ISI Web of Science (WOS) data (https://apps.webofknowledge.com)in the form of high-quality publications, as well as the evolution over time of the frequency of publications both on the topic of interest and on the related ones.

    2 Research Methodology

    2.1 Goals

    The authors decided to perform the analysis of:

    ●The contribution of Cloud Computing topics from research papers in top scientific journals;

    ●The relationships between the Cloud Computing domain and the correlated fields defined in Computer Science.

    2.2 Main Assumptions

    The authors formulated the following research hypotheses:

    ●The general analysis should stand on the exploratory text analysis of the abstracts of the papers published in the Web of Science database.The latter contains only peer-reviewed articles of exceptional academic quality;

    ●The in-depth analysis should rely on ontologies; the authors decided to use the Computer Science Ontology1https://cso.kmi.open.ac.uk/hometo support the analysis process.

    2.3 Analysis Process

    The analysis process included the following steps:

    1.Data retrieval using a web scraping technique;

    2.Building a model for representing the Computer Science Ontology;

    3.The ontology-based annotation of abstracts;

    4.The analysis of the importance of topics related to the concept of Cloud Computing;

    5.The ontology-based analysis of the relationships between the concepts identified in the abstracts.

    2.3.1 Data Retrieval

    With the development of Big Data computing technology, most documents in several fields became digital, and we now have new methods and approaches to obtain quantitative research results.According to Kim et al.[50], text mining is the technology used to classify, group, extract, search, and analyze data to find patterns or features in a set of unstructured or structured documents written in natural language.We propose a method for extracting information on the subject of Cloud Computing using text mining through web scraping from the ISI WOS website and analyze concepts extracted using the Computer Science Ontology.

    As a synthesis of the methodological stages, we highlight:

    ●The download from ISI WOS of almost 10,000 complete records with abstracts,titles,and keywords;

    ●The development of a custom Node.Js crawler to use this data in our research and obtain up to eight key concepts and corresponding scores for each record;

    ●The aggregation of all scores and identification of those concepts being the most strongly related in terms of the score using the SQL language;

    ●The download from ISI WOS of the frequency time-series for topics corresponding to all the relevant concepts identified previously.

    Puppeteer is a Node library API that allows us to control Chrome heedlessly.Headless Chrome is a way to run the Chrome/Chromium browser without actually running Chrome/Chromium, and we can automate anything we do on these browsers, such as emulating a keypress, a click, and so on.With the Puppeteer library, we can crawl Clarivate Analytics and extract the relevant articles we need for our analysis.Access to Clarivate was due to the E-information portal(Fig.1).

    Figure 1: Custom crawler to access the E-information portal

    To retrieve the content of each item from the article page,we used the$eval()method from the Cherrio library and the page.evaluate()method.The latter allows us to extract the desired results and catch errors,as seen in Fig.2.

    Figure 2: Method for retrieving the abstracts

    Finally, we scraped all the details of the articles on each page and returned them in .csv format, as seen in Fig.3.

    Figure 3: Scraping details of articles in .csv format

    We queried WOS for the exact phrase of “Cloud Computing” (search by topic).Then we filtered the SCIE and SSCI WOS categories meaning publication only in journals that currently have IF and AIS >0(see Fig.4), according to the results of journal-focused searches provided by the Journal Citation Reports—JCR online application at https://jcr.incites.thomsonreuters.com.

    Figure 4: Manually filtering(ISI WOS)for the most relevant articles published in journals with IF and AIS>0 to verify the results obtained automatically, using the API

    In the next step, we filtered only consistent contributions (see Fig.5—without reprints, retractions,editorial materials, etc.).We finally exported almost 9500 records from the ISI WOS online platform (full record format as Windows tab-delimited) in a .txt file, which can be read by any spreadsheet program.These records were extracted in 19 volumes of 500 lines each (almost 50 MB of text data) using the same online platform above.

    Figure 5: Additional filters for article type

    Then we concatenated for each record four parts consisting of title,authors’keywords,additional journal keywords,and abstract and then we removed the copyright texts from the results using a combination of textoriented functions in Excel for each resulting text block.We took the copyright texts out because they generated false results.Such raw blocks served for analysis with the Computer Science Ontology.

    2.3.2 Building a Model Representation of the Computer Science Ontology

    The Computer Science Ontology[51]is an automatically built ontology that covers the field of computer science with about 14 thousand topics related to 163 thousand semantic relationships.The license of the CSO ontology is Creative Commons Attribution 4.0 International License (CC BY 4.0).

    For the project described here,we considered two types of semantic relationships:

    ●The superTopicOf relationship that connects two different topics and indicates that the first is a parent(direct ancestor) of the other;

    ●The preferentialEquivalent relationship that defines alternative concepts and uses one of them as the primary label;this relationship allows the unification of different terms that refer to the same notion.

    For describing the relationships between concepts corresponding to the superTopicOf connection, we used graph models with:

    ●Vertexes corresponding to all those concepts that appear in the superTopicOf relationships in the CSO ontology(the names of the latter used as vertexes’identifiers);

    ●Edges that correspond to the superTopicOf relations (these connections lead from ancestors to descendants defined by the superTopicOf predicate).

    For building the graph model,we used the igraph package in the R language[52].Then,for every vertex in the graph above, a list of alternatives was defined.A list of alternative concepts for a given vertex was created by identifying all those concepts related to a given one using the preferentialEquivalent relationship.

    In the third step of the analysis,for each vertex,a list of patterns was created.These patterns were in the form of phrases(word sequences).We generated them to facilitate the identification of concepts.In the CSO ontology,we constructed the concept names by combining words that describe a particular term using a“_”sign as a separator(for example,a“software engineering”concept represented by a“software_engineering”).Non-alphabetic characters were decoded in the names using hexadecimal codes.To build patterns,the name of a given such concept and the names of alternative ones were transformed by replacing all appearances of the“_” signs with spaces and replacing the hexadecimal values with the corresponding characters.

    In the next stage of the process described here,each word in each pattern received the“#”symbol on the front of it.The purpose was to indicate that these words are mandatory(meaning that all words in a pattern must appear in a given part of an abstract to annotate it with the name of the corresponding concept).Details of the notation used to identify the patterns are available in Section 2.3.3.

    Finally,the concepts together with the corresponding patterns were transformed into a text file in yaml format and saved to a file on disk.

    All the knowledge used in the consecutive stages of analysis was stored in the graph describing the CSO ontology and in the yaml file containing all the concepts taken from the CSO ontology and the patterns that allow their identification in the textual documents.

    2.3.3 Abstracts’Annotation

    We used an annotation technique proposed in Lula et al.[53].The data stored in the yaml file served for performing the annotation process.The content of the yaml file acts as an associated table in which the concept name serves as the key, and a list of patterns forms a value connected to a given key.For example, for an“ontology_alignment”concept, a list of patterns has the following form:

    [“#ontology#alignment”,“#ontology #matching”, “#ontology#mapping”]

    Next, for each pattern,we built its alternative version.In it, we used all the words in their elementary form.This lemmatization process relied on the use of the Apache OpenOffice dictionaries and the hunspell package for the R language [54].Then, we performed an analysis of abstracts.During this step,we executed the following sequence of operations for each abstract:

    1.The division of the text of a given abstract into phrases considering the positions of the punctuation marks.

    2.For similarity calculation considering each pattern, for each phrase obtained in step 1, we used the following algorithm: First, we checked the presence of all mandatory words.In the absence of such a word or words, the measure of similarity was zero.If all required words were present, then a Jaccard coefficient between a set of words in a phrase (T) and another one in a pattern (P) was calculated using Eq.(1):

    3.Then,we transformed all the words in a phrase taken from an abstract into their primary form(T′).Next,we used Eq.(2)to calculate a Jaccard coefficient between the set T′and a lemmatized version of a pattern (P′):

    4.As a final version of a similarity measure, a maximum calculated for the values defined in the two steps presented above was defined using Eq.(3):

    As a result of the above process for each abstract,we identified a set of patterns for which the s measure was more than 0.

    Having all the patterns identified for a given abstract,the last stage of the annotation process will take place.At this stage, we assigned them to the appropriate concepts.And for each one, a measure of its contribution to a given abstract was calculated using Eq.(4):

    where:

    ci,j—contribution of the jth concept in the ith abstract;

    si,j,k—contribution on the kth pattern assigned to the jth concept in the ith abstract;

    nj—number of patterns we allot to the jth concept.

    Elements ci,jform a contribution matrix (Eq.(5)).

    This matrix reveals the contribution of each concept (column of the matrix) in each abstract (row of the matrix).

    2.3.4 Analysis of the Importance of Topics Related to the Concept of Cloud Computing

    In the CSO ontology, the representation of the cloud computing area uses the concept of“cloud_computing”and its descendants.

    First,we found all the direct descendants(children)of the“cloud_computing”concept.According to the CSO ontology,the latter has 34 direct descendants.They form a list L (Eq.(6)).

    where liis the ith direct descendant(child) of the“cloud_computing”concept.

    For each element of the L list,we built a set that contains a given concept and all its descendants.Let’s assume that Diis a set containing the liconcept and all its descendants.Also,we considered that,for the kth abstract,the contribution of the liconcept results from Eq.(7).

    where C [k,Di]is a vector composed of elements located in the matrix C,from row k and columns identified by elements of the Diset.

    Elements pk,iform a matrix P in which rows represent abstracts,and columns represent concepts from the L list.

    Next, a vector v(Eq.(8)) was defined.

    The value vk>0 means that the kth abstract contains references to topics related to the cloud computing area.Finally,the contribution of each concept from the L list in the whole corpus was defined(Eq.(9)).

    where sgn(.)is the signum function defined as indicated in Eq.(10).

    This measure Piinforms about the significance of the liconcept in the whole corpus.

    2.3.5 Analysis of Relationships between Concepts Appearing in Abstracts

    Within the project’s framework,we also proposed a method for analyzing the relationship between two concepts in the CSO ontology.

    Let’s assume that for a given kth abstract, a relationship between two concepts, liand lj, should be calculated.To achieve this goal,we used the following algorithm:

    1.For the concept li,we created a set Dicontaining the concept liand all its descendants.By analogy,a set Djfor the concept lj.

    2.Two vectors(Eqs.(11) and(12))

    resulted, where C [k,Di] is a vector composed of elements located in the matrix C, from row k and columns identified by elements of the Diset.

    3.The set D is defined as indicated in Eq.(13).

    4.Then,the vector wk,iwith | D|elements is defined(Eq.(14)).In this vector,we identified successive components considering the structure of the D set.We copied the elements from the vk,ivector to the wk,ione at positions resulting from the same parts of the D set.The remaining ones, identified by labels appearing in the D set and not appearing in Di, are completed by values equal to 0 (Eq.(15)).Formally it may be expressed as:

    Similarly,the vector wk,jwith |D |elements is defined (Eqs.(16) and(17)).

    5.Then,we calculated the Jaccard coefficient for the vectors wk,iand wk,j.The latter served as a measure of similarity between the liand ljconcepts as observed in the kth abstract(Eq.(18)):

    Having the similarity measurescalculated for every abstract, the aggregated one, for the whole corpus, can be defined(Eq.(19)):

    where K represents the number of abstracts in the given corpus and means the ratio of abstracts in which concepts related to liand ljones,were identified simultaneously.

    3 Results

    3.1 Analysis of the Importance of Topics Related to the Cloud Computing Concept

    We used the method presented in Section 2.3.4.

    In the CSO ontology,the“cloud_computing”concept has 34 direct descendants.They form the L list:

    L=[application_execution,autonomic_computing,cloud_service_providers,security_and_privacy_issues,mobile_cloud_computing, high_availability, cloud_data, multi-tier_applications, cloud_storage,storage_services, storage_resources, map-reduce, virtual_machines, virtualizations, resource_provisioning, service_level_agreements, security_challenges, cluster_computing, job_execution,cloud_infrastructures, utility_computing, computing_paradigm, distributed_computing_environment,data-intensive_application, computing_resource, computing_environments, cloud_computing_environments, cloud_environments, computing_services, computing_technology, cloud_computing_services,software_as_a_service,it_infrastructures,cloud_security]

    For the set of abstracts studied during the analysis, we presented the contribution of the direct descendants of the Cloud Computing concept in Fig.6.

    Figure 6: The contribution of the direct descendants of the cloud computing concept

    3.2 Analysis of the Relationships between the Concept of Cloud Computing and Others Related to Computer Science

    We performed the analysis using the method presented in Section 2.3.5.First,the relations between the Cloud Computing concept and the main fields within Computer Science were analyzed.The values obtained during the analysis indicate a proportion of papers that have simultaneous references to Cloud Computing or its descendants and the selected fields of computer science.We have shown the results in Fig.7.

    Figure 7: The Significance of relationships between cloud computing and main fields of the computer science concept

    In the next part,we present relevant relationships between Cloud Computing and the first five concepts with the highest rates (Fig.7).

    The first category of emphasized relationships refers to Cloud Computing and the main areas under the umbrella of the Computer Network concept.We emphasize the proportion of papers with simultaneous references to Cloud Computing and the subfields of the Computer Network in Fig.8.

    Figure 8: The significance of relationships between cloud computing and central subfields of the computer network concept

    The second category of emphasized relationships focuses on Cloud Computing and the main areas within the Internet concept.We indicated the proportion of papers with simultaneous references to Cloud Computing and Internet subfields in Fig.9.

    Figure 9: The significance of relationships between cloud computing and the principal subfields of the internet concept

    The third category of emphasized relationships refers to Cloud Computing and the main areas under the umbrella of the concept of Information Technology.We synthesized the proportion of papers with simultaneous references to Cloud Computing and Information Technology subfields in Fig.10.

    Figure 10: The significance of relationships between cloud computing and the foremost subfields of the information technology concept

    The 4thcategory of emphasized relationships is about Cloud Computing and the main areas within the Computer Systems concept.We indicated the proportion of papers with simultaneous references to Cloud Computing and the subfields of the Computer System in Fig.11.

    Figure 11: The Significance of Relationships between cloud computing and central subfields of the computer system concept

    The last category of emphasized relationships focuses on Cloud Computing and the main areas under the umbrella of the Computer Security concept.We showed the proportion of papers with simultaneous references to Cloud Computing and Computer Security subfields in Fig.12.

    Figure 12: The significance of relationships between cloud computing and the principal subfields of the computer security concept

    From all the five categories of suggestive relationships above (Figs.8-12) we selected practically the most significant relationships, namely between Cloud Computing and: Telecommunication Systems and Network Protocols (under the umbrella of the Computer Network concept), Network Protocols, and Virtual Networks (for the more general notion of the Internet), Information Management and IT Infrastructures (for the one of Information Technology), Distributed Computer Systems, Data Communication Systems, Database Systems and Telecommunication Systems (for the Computer System concept) and finally Security of Data (under the umbrella of Computer Security).

    4 Conclusions

    In this paper,we studied the topic of Cloud Computing based on related ISI Web of Science data,mainly as abstracts of high-quality publications(SCIE and SSCI categories)for scientific papers published in the last 44 years.

    We started with a custom data retrieval tool based on web scraping techniques.We relied on many other approaches: preparing data using custom filters, splits, joins, and text extraction functions, a score aggregation based on the Jaccard-coefficient, the analysis of the frequency of time-series of results using statistical tools and, a peculiar Computer Science Ontology model representation together with the construction of relationships between graph-based concepts, ontology-based annotations of abstracts,analysis of the importance of related topics, and also suggestive graphical representations.

    In this way, we were able to identify robust relationships supported by high scores between Cloud Computing and two not necessarily exhaustive lists of primary and related concepts.The first includes Computer Networks, Internet, Information Technology, Computer Systems; and Computer Security, in this particular order of importance.Regarding the afore-mentioned order of parent concepts, the second related list includes Telecommunication Systems, Network Protocols, Virtual Networks, Information Management, IT Infrastructures, Distributed Computer Systems, Data Communication Systems, Database Systems and Security of Data.

    In addition to the discovery of patterns hidden behind a chosen topic of interest considered in this article,namely Cloud Computing and many others related with Computer Science, the importance of the study is mainly a methodological one that allows the objective identification of relationships and limits when dealing with concepts and related scientific domains,fields,and subfields.

    Acknowledgement:We would like to recognize the online support of our data providers:E-information[dot]ro, Clarivate Analytics, and ISI Web of Science Thomson Reuters.Finally, we would like to thank our provider of office applications, development environments, and data storage and analysis solutions,Microsoft, for the consistent support, through the Imagine (formerly Dream Spark) academic software licensing program.

    Funding Statement:Pawel Lula’s participation in the research has been carried out as part of a research initiative financed by Ministry of Science and Higher Education within “Regional Initiative of Excellence” Programme for 2019-2022.Project no.: 021/RID/2018/19.Total financing 11 897 131.40 PLN.The other authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding this study.

    欧美亚洲 丝袜 人妻 在线| 能在线免费看毛片的网站| 亚洲欧美日韩另类电影网站| 国产淫语在线视频| 亚洲av欧美aⅴ国产| 菩萨蛮人人尽说江南好唐韦庄| 久久久久久久精品精品| 中文字幕制服av| 国产精品不卡视频一区二区| 18在线观看网站| 亚洲av福利一区| 精品卡一卡二卡四卡免费| 国产亚洲一区二区精品| 欧美老熟妇乱子伦牲交| 街头女战士在线观看网站| 黑人猛操日本美女一级片| 国产精品熟女久久久久浪| 精品人妻一区二区三区麻豆| 国产免费现黄频在线看| 亚洲av男天堂| 久久国内精品自在自线图片| 青春草视频在线免费观看| 99视频精品全部免费 在线| 99热国产这里只有精品6| 欧美日韩视频高清一区二区三区二| 狂野欧美激情性bbbbbb| 亚洲精品一二三| 国产精品 国内视频| 高清av免费在线| 一本一本综合久久| 一区二区日韩欧美中文字幕 | 女人久久www免费人成看片| 亚洲熟女精品中文字幕| 国产高清有码在线观看视频| 国产爽快片一区二区三区| 不卡视频在线观看欧美| 成人黄色视频免费在线看| 人人澡人人妻人| 人妻系列 视频| 日韩一区二区视频免费看| 久久久久久久久久久免费av| 亚洲无线观看免费| 日韩亚洲欧美综合| 老司机影院成人| 午夜91福利影院| 男男h啪啪无遮挡| 亚洲高清免费不卡视频| 国产老妇伦熟女老妇高清| 在线免费观看不下载黄p国产| 丝袜在线中文字幕| av黄色大香蕉| 亚洲精品久久成人aⅴ小说 | 国产精品一区二区三区四区免费观看| 99视频精品全部免费 在线| 亚洲欧美精品自产自拍| 国产黄色免费在线视频| 亚洲av男天堂| 校园人妻丝袜中文字幕| 国产片特级美女逼逼视频| 久久久久久久大尺度免费视频| 精品人妻熟女毛片av久久网站| 成人手机av| 黑人欧美特级aaaaaa片| 亚洲不卡免费看| 性高湖久久久久久久久免费观看| 久久久久久伊人网av| 能在线免费看毛片的网站| 精品亚洲成a人片在线观看| 两个人免费观看高清视频| 母亲3免费完整高清在线观看 | 久久久久久久久久久久大奶| 欧美日韩视频高清一区二区三区二| 天堂俺去俺来也www色官网| 亚洲国产精品999| 国产精品成人在线| 大片免费播放器 马上看| 久久久久久久久久久丰满| .国产精品久久| 极品人妻少妇av视频| 在线观看免费高清a一片| 亚洲人成网站在线播| 久久久国产精品麻豆| 九九久久精品国产亚洲av麻豆| 母亲3免费完整高清在线观看 | 精品国产一区二区三区久久久樱花| 日韩不卡一区二区三区视频在线| 99久久精品国产国产毛片| 国产亚洲av片在线观看秒播厂| 美女脱内裤让男人舔精品视频| 菩萨蛮人人尽说江南好唐韦庄| 好男人视频免费观看在线| 精品亚洲乱码少妇综合久久| 国产成人精品无人区| 少妇的逼好多水| a级毛片黄视频| 国产免费又黄又爽又色| 国产成人精品无人区| 亚洲国产欧美在线一区| 午夜激情福利司机影院| 性高湖久久久久久久久免费观看| 久久人人爽人人爽人人片va| 婷婷成人精品国产| 99视频精品全部免费 在线| xxx大片免费视频| 下体分泌物呈黄色| 久热这里只有精品99| 色94色欧美一区二区| 亚洲av国产av综合av卡| 伊人亚洲综合成人网| 日韩av在线免费看完整版不卡| 国产成人91sexporn| 人人妻人人添人人爽欧美一区卜| 国产亚洲精品久久久com| 中文字幕制服av| 亚洲久久久国产精品| 亚洲av二区三区四区| 永久网站在线| 69精品国产乱码久久久| 亚洲欧洲日产国产| 丝袜美足系列| 国产精品一二三区在线看| 精品人妻一区二区三区麻豆| 99国产精品免费福利视频| 我的老师免费观看完整版| 99热国产这里只有精品6| 国产高清国产精品国产三级| 日韩欧美精品免费久久| 亚洲精品456在线播放app| h视频一区二区三区| 亚洲精品日韩在线中文字幕| 丝袜美足系列| 精品一区二区三卡| 欧美人与性动交α欧美精品济南到 | 超碰97精品在线观看| www.av在线官网国产| 极品人妻少妇av视频| 亚洲精品日本国产第一区| 国产午夜精品一二区理论片| 亚洲美女视频黄频| 亚洲五月色婷婷综合| 99re6热这里在线精品视频| 国产极品粉嫩免费观看在线 | 黄色一级大片看看| 中国三级夫妇交换| 秋霞在线观看毛片| 男女无遮挡免费网站观看| 人妻夜夜爽99麻豆av| 色婷婷av一区二区三区视频| 久久午夜福利片| 欧美精品高潮呻吟av久久| 日韩一本色道免费dvd| 青青草视频在线视频观看| 高清毛片免费看| 国产成人精品无人区| 久久综合国产亚洲精品| 亚洲少妇的诱惑av| 人成视频在线观看免费观看| 91久久精品国产一区二区成人| 老女人水多毛片| 久久久亚洲精品成人影院| 色视频在线一区二区三区| 97在线人人人人妻| 中文天堂在线官网| 大片免费播放器 马上看| 男女无遮挡免费网站观看| 黄片无遮挡物在线观看| 国内精品宾馆在线| 欧美日本中文国产一区发布| 有码 亚洲区| 另类精品久久| 国产成人精品无人区| 午夜免费鲁丝| 中文字幕人妻熟人妻熟丝袜美| 成人毛片a级毛片在线播放| 亚洲国产精品一区三区| 少妇精品久久久久久久| 如日韩欧美国产精品一区二区三区 | 亚洲精品乱码久久久v下载方式| 久久女婷五月综合色啪小说| 菩萨蛮人人尽说江南好唐韦庄| 七月丁香在线播放| 国产精品99久久久久久久久| 日本-黄色视频高清免费观看| 国产精品无大码| 五月伊人婷婷丁香| 国产精品偷伦视频观看了| 各种免费的搞黄视频| 亚洲成人手机| 亚洲av综合色区一区| 久久久欧美国产精品| 制服丝袜香蕉在线| 99热网站在线观看| 大片免费播放器 马上看| 中文字幕制服av| 日韩,欧美,国产一区二区三区| 欧美亚洲 丝袜 人妻 在线| 丰满乱子伦码专区| 午夜激情福利司机影院| 成人午夜精彩视频在线观看| 欧美精品一区二区大全| 中文精品一卡2卡3卡4更新| 中文字幕精品免费在线观看视频 | 国产精品人妻久久久久久| 国产伦精品一区二区三区视频9| 欧美日韩av久久| 免费大片黄手机在线观看| 亚洲综合色网址| 久热久热在线精品观看| 婷婷色麻豆天堂久久| 精品卡一卡二卡四卡免费| 欧美变态另类bdsm刘玥| 人人妻人人澡人人爽人人夜夜| 日本wwww免费看| 国产精品99久久99久久久不卡 | 热99国产精品久久久久久7| 91精品一卡2卡3卡4卡| 极品人妻少妇av视频| 麻豆乱淫一区二区| 两个人的视频大全免费| 亚洲婷婷狠狠爱综合网| h视频一区二区三区| 久久久久精品久久久久真实原创| 亚洲国产色片| 人体艺术视频欧美日本| 久久久久人妻精品一区果冻| 成年女人在线观看亚洲视频| 桃花免费在线播放| 特大巨黑吊av在线直播| 两个人的视频大全免费| 久久午夜综合久久蜜桃| 亚洲精品成人av观看孕妇| av黄色大香蕉| 波野结衣二区三区在线| 99热网站在线观看| 亚洲成人手机| 一边摸一边做爽爽视频免费| 热99久久久久精品小说推荐| av免费观看日本| 日本猛色少妇xxxxx猛交久久| 老司机影院成人| 日韩视频在线欧美| 免费观看av网站的网址| 亚洲天堂av无毛| 日本爱情动作片www.在线观看| 国产精品久久久久久久久免| 亚洲久久久国产精品| 国产精品成人在线| 日韩成人av中文字幕在线观看| 如何舔出高潮| 亚洲中文av在线| 日韩三级伦理在线观看| 美女视频免费永久观看网站| 国产黄色免费在线视频| 我要看黄色一级片免费的| 亚洲久久久国产精品| 日韩av免费高清视频| 久久久久久久久久久丰满| 中文欧美无线码| 亚洲国产色片| 99国产综合亚洲精品| 国产精品女同一区二区软件| 国产精品国产av在线观看| 一本色道久久久久久精品综合| 香蕉精品网在线| 久久热精品热| 我要看黄色一级片免费的| 欧美激情极品国产一区二区三区 | 高清欧美精品videossex| 久久久久国产网址| 黄片播放在线免费| 亚洲人成网站在线观看播放| 色哟哟·www| 国产亚洲精品第一综合不卡 | 国产av国产精品国产| 80岁老熟妇乱子伦牲交| 国产成人精品婷婷| 午夜影院在线不卡| 国产精品秋霞免费鲁丝片| 天堂俺去俺来也www色官网| 国产免费一级a男人的天堂| 少妇猛男粗大的猛烈进出视频| 国产伦理片在线播放av一区| 中文字幕最新亚洲高清| 少妇的逼水好多| 国产精品人妻久久久影院| 亚洲精品国产av蜜桃| 免费高清在线观看视频在线观看| 国产成人aa在线观看| 狠狠婷婷综合久久久久久88av| av在线播放精品| 两个人免费观看高清视频| 黑人高潮一二区| 亚洲人成网站在线播| 日本与韩国留学比较| 熟女人妻精品中文字幕| 天堂中文最新版在线下载| 亚洲婷婷狠狠爱综合网| 亚洲av二区三区四区| 天美传媒精品一区二区| 97超碰精品成人国产| 有码 亚洲区| tube8黄色片| 亚洲国产av影院在线观看| 国产无遮挡羞羞视频在线观看| 亚洲激情五月婷婷啪啪| 久久精品夜色国产| 久久久久久久久久久久大奶| 精品人妻熟女av久视频| 亚洲第一区二区三区不卡| 在线观看免费高清a一片| 99re6热这里在线精品视频| 狂野欧美激情性xxxx在线观看| 久久久久久久亚洲中文字幕| 国产精品国产三级国产av玫瑰| 久久久久久人妻| 如日韩欧美国产精品一区二区三区 | 国产精品麻豆人妻色哟哟久久| 精品国产一区二区久久| 久久精品国产a三级三级三级| 哪个播放器可以免费观看大片| 最近的中文字幕免费完整| 天堂中文最新版在线下载| 王馨瑶露胸无遮挡在线观看| 亚洲成色77777| 9色porny在线观看| 伦精品一区二区三区| 成人影院久久| 80岁老熟妇乱子伦牲交| √禁漫天堂资源中文www| 在线观看人妻少妇| 99久久中文字幕三级久久日本| av线在线观看网站| 69精品国产乱码久久久| 亚洲精品456在线播放app| 大香蕉久久成人网| 韩国av在线不卡| 欧美精品人与动牲交sv欧美| 欧美日韩av久久| 国产成人精品久久久久久| 一区二区三区乱码不卡18| 国产成人精品福利久久| 免费观看无遮挡的男女| 成人亚洲精品一区在线观看| 美女福利国产在线| videosex国产| 精品国产国语对白av| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 嫩草影院入口| 热99久久久久精品小说推荐| 日本vs欧美在线观看视频| 日韩欧美精品免费久久| 国产精品麻豆人妻色哟哟久久| 边亲边吃奶的免费视频| 久久人人爽人人爽人人片va| 少妇熟女欧美另类| 亚洲人成77777在线视频| 国产精品一区二区在线不卡| 国产乱人偷精品视频| 欧美精品人与动牲交sv欧美| 亚洲色图综合在线观看| 亚洲第一av免费看| 成人手机av| 王馨瑶露胸无遮挡在线观看| 两个人免费观看高清视频| 搡女人真爽免费视频火全软件| 丝袜脚勾引网站| 亚洲中文av在线| 夫妻午夜视频| 亚洲国产成人一精品久久久| 91久久精品电影网| 另类亚洲欧美激情| 欧美国产精品一级二级三级| kizo精华| 久久久久久久精品精品| 五月开心婷婷网| 毛片一级片免费看久久久久| 国产av码专区亚洲av| 最后的刺客免费高清国语| 99国产综合亚洲精品| 午夜福利影视在线免费观看| 满18在线观看网站| 人妻少妇偷人精品九色| 婷婷色麻豆天堂久久| 国产乱来视频区| 在线观看免费日韩欧美大片 | 看非洲黑人一级黄片| 欧美 日韩 精品 国产| 哪个播放器可以免费观看大片| 飞空精品影院首页| 极品人妻少妇av视频| 丁香六月天网| 亚洲av福利一区| av专区在线播放| 亚洲欧洲日产国产| 久久av网站| 观看美女的网站| 亚洲国产日韩一区二区| 久久午夜福利片| 插逼视频在线观看| 在线 av 中文字幕| 日韩av在线免费看完整版不卡| 韩国av在线不卡| 中文欧美无线码| 特大巨黑吊av在线直播| 久久久久久伊人网av| 丝袜喷水一区| 多毛熟女@视频| 午夜免费男女啪啪视频观看| xxxhd国产人妻xxx| 亚洲经典国产精华液单| 插阴视频在线观看视频| 三级国产精品欧美在线观看| 九色亚洲精品在线播放| 国产精品无大码| 精品99又大又爽又粗少妇毛片| 草草在线视频免费看| 国产亚洲精品第一综合不卡 | 亚洲精品日本国产第一区| 久久久久久久久久久久大奶| 日本黄色片子视频| 国产一区二区在线观看日韩| 极品少妇高潮喷水抽搐| 国产精品免费大片| 亚洲,欧美,日韩| 中文字幕av电影在线播放| .国产精品久久| 欧美 亚洲 国产 日韩一| 男的添女的下面高潮视频| 狂野欧美激情性bbbbbb| 哪个播放器可以免费观看大片| 蜜桃久久精品国产亚洲av| www.色视频.com| 精品久久久噜噜| 免费av中文字幕在线| 久久亚洲国产成人精品v| 久久久久久久精品精品| 国产av精品麻豆| av不卡在线播放| 日韩一本色道免费dvd| 日本黄色片子视频| 精品国产一区二区久久| 中文字幕久久专区| 亚洲情色 制服丝袜| 国产在线免费精品| 久久国内精品自在自线图片| 亚洲精品日韩在线中文字幕| 中文字幕制服av| 十分钟在线观看高清视频www| 亚洲三级黄色毛片| 成人漫画全彩无遮挡| 国产在线视频一区二区| 成人无遮挡网站| 制服丝袜香蕉在线| 建设人人有责人人尽责人人享有的| 最黄视频免费看| av黄色大香蕉| 欧美另类一区| 大香蕉久久网| 五月天丁香电影| av在线观看视频网站免费| 男女免费视频国产| 国产亚洲最大av| 天天影视国产精品| 99热国产这里只有精品6| 久久99热6这里只有精品| 欧美三级亚洲精品| 国产免费一区二区三区四区乱码| 99国产精品免费福利视频| 久久久久人妻精品一区果冻| 免费少妇av软件| 女人精品久久久久毛片| 亚洲av在线观看美女高潮| 国产一区二区在线观看日韩| 蜜桃国产av成人99| 久久99精品国语久久久| 午夜激情福利司机影院| 少妇丰满av| 久久久久久久亚洲中文字幕| 久久久久人妻精品一区果冻| 人人妻人人澡人人爽人人夜夜| 亚洲精品日本国产第一区| 国产黄频视频在线观看| 国产日韩欧美亚洲二区| 多毛熟女@视频| 亚洲国产日韩一区二区| 亚洲av免费高清在线观看| 国产精品国产三级专区第一集| 免费黄网站久久成人精品| 中文精品一卡2卡3卡4更新| 亚洲国产精品999| 18禁在线无遮挡免费观看视频| 满18在线观看网站| 婷婷色av中文字幕| 成人国产av品久久久| 97超视频在线观看视频| a级片在线免费高清观看视频| 日日爽夜夜爽网站| 两个人的视频大全免费| 亚洲国产欧美日韩在线播放| 99久久中文字幕三级久久日本| 久久毛片免费看一区二区三区| 日日摸夜夜添夜夜爱| 寂寞人妻少妇视频99o| 在线观看www视频免费| 亚洲怡红院男人天堂| 国产淫语在线视频| 亚洲色图综合在线观看| 国产成人精品无人区| 欧美亚洲日本最大视频资源| 五月玫瑰六月丁香| 精品少妇黑人巨大在线播放| 99久久精品国产国产毛片| 久久久午夜欧美精品| 老熟女久久久| 精品一区在线观看国产| 国产精品偷伦视频观看了| a级毛色黄片| 交换朋友夫妻互换小说| 日韩精品有码人妻一区| 国产片内射在线| 亚洲精品美女久久av网站| 国精品久久久久久国模美| 精品国产一区二区三区久久久樱花| 国产精品久久久久成人av| 91午夜精品亚洲一区二区三区| 韩国av在线不卡| 少妇丰满av| 在线观看人妻少妇| 色吧在线观看| 少妇精品久久久久久久| 精品久久久久久久久av| 午夜视频国产福利| 在线观看国产h片| 国产在线视频一区二区| 最后的刺客免费高清国语| 永久免费av网站大全| 国产精品国产三级国产专区5o| 少妇丰满av| 久久精品国产鲁丝片午夜精品| 黑人高潮一二区| 国产不卡av网站在线观看| 亚洲精品av麻豆狂野| 久久久久久久久久久免费av| 中文字幕精品免费在线观看视频 | 人妻夜夜爽99麻豆av| 亚洲精品成人av观看孕妇| 日本午夜av视频| 亚洲图色成人| 久久久国产一区二区| 久久婷婷青草| 丰满迷人的少妇在线观看| 亚洲在久久综合| 午夜91福利影院| 中文天堂在线官网| 欧美3d第一页| 精品一区二区免费观看| 一个人免费看片子| 少妇的逼好多水| 国产毛片在线视频| 一区二区三区四区激情视频| 大陆偷拍与自拍| 亚洲精品日本国产第一区| 交换朋友夫妻互换小说| 国产精品一二三区在线看| 3wmmmm亚洲av在线观看| 精品亚洲乱码少妇综合久久| 在线观看三级黄色| 在线播放无遮挡| 综合色丁香网| av有码第一页| 夜夜骑夜夜射夜夜干| 纵有疾风起免费观看全集完整版| 99热6这里只有精品| 69精品国产乱码久久久| 国产乱人偷精品视频| 自拍欧美九色日韩亚洲蝌蚪91| 考比视频在线观看| 18禁在线播放成人免费| 精品酒店卫生间| 高清欧美精品videossex| 国产精品 国内视频| 啦啦啦啦在线视频资源| 草草在线视频免费看| 欧美一级a爱片免费观看看| 国产片内射在线| 日本黄色日本黄色录像| 能在线免费看毛片的网站| 边亲边吃奶的免费视频| 性色av一级| 少妇人妻 视频| 国产色婷婷99| 成人影院久久| 五月开心婷婷网| 国产精品嫩草影院av在线观看| 婷婷色麻豆天堂久久| 特大巨黑吊av在线直播| 18禁裸乳无遮挡动漫免费视频| 成人午夜精彩视频在线观看| 久久99热这里只频精品6学生| 久久热精品热| 久久久a久久爽久久v久久| 一区二区三区四区激情视频| 亚洲激情五月婷婷啪啪| 国产一区有黄有色的免费视频| 91久久精品国产一区二区成人| 欧美亚洲 丝袜 人妻 在线| 夜夜爽夜夜爽视频| 丝袜美足系列| 欧美日韩视频精品一区| 人妻 亚洲 视频| 中文字幕精品免费在线观看视频 | xxxhd国产人妻xxx| 91午夜精品亚洲一区二区三区| tube8黄色片| 国产精品久久久久久av不卡|