• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Prediction of Extremist Behaviour and Suicide Bombing from Terrorism Contents Using Supervised Learning

    2022-03-14 09:22:20NasirMahmoodandMuhammadUsmanGhaniKhan
    Computers Materials&Continua 2022年3期

    Nasir Mahmoodand Muhammad Usman Ghani Khan

    Department of Computer Science,University of Engineering and Technology,54890,Lahore

    Abstract: This study proposes an architecture for the prediction of extremist human behaviour from projected suicide bombings.By linking ‘dots’of police data comprising scattered information of people, groups, logistics,locations,communication,and spatiotemporal characters on different social media groups, the proposed architecture will spawn beneficial information.This useful information will,in turn,help the police both in predicting potential terrorist events and in investigating previous events.Furthermore, this architecture will aid in the identification of criminals and their associates and handlers.Terrorism is psychological warfare, which, in the broadest sense,can be defined as the utilisation of deliberate violence for economic,political or religious purposes.In this study, a supervised learning-based approach was adopted to develop the proposed architecture.The dataset was prepared from the suicide bomb blast data of Pakistan obtained from the South Asia Terrorism Portal (SATP).As the proposed architecture was simulated, the supervised learning-based classifiers na?ve Bayes and Hoeffding Tree reached 72.17%accuracy.One of the additional benefits this study offers is the ability to predict the target audience of potential suicide bomb blasts,which may be used to eliminate future threats or,at least,minimise the number of casualties and other property losses.

    Keywords: Extremism; terrorism; suicide bombing; crime prediction;pattern recognition; machine learning; supervised learning

    1 Introduction

    Crime is a politico-socio-economic problem that adversely affects people worldwide, marring the social welfare and progress of the masses.Law enforcement agencies need to formulate crime policies and strategic plans to prevent crimes and reduce crime rates.However, they face the challenge of effectively extracting relevant knowledge from a large volume of criminal data and reports [1].Knowledge discovery (KD) and data mining from this mass of data require sophisticated analytical processing.This KD is ultimately used to provide practical decision-making support to law enforcement agencies.Nevertheless, the analytical processing of large amounts of data is complicated for humans [2].Therefore, scholars have proposed numerous techniques to automate a significant part of or the entire analytical process.Crime data mining is a well-known set of measures to automatically extract hidden knowledge from dimensional databases [3].

    In comparison to other crimes, terrorism—an aggregate of brutality—is a more complex and versatile framework that directly affects harmony, the daily schedule of nations, and social orders.It is utilised to produce widespread, global dread among nations’citizenry [4].Acts of terrorism encompass a broad range of activities, including criminal communication, planning,transportation, logistics, reconnaissance of targets, harbouring, providing materials and items such as weapons, and supporting other relevant materials and finances.Acts of terrorism by extremist or terrorist organisations create psychological pressure amongst civilians and governments; the military, due to the casualties; and property losses, social unrest, and economic disruption [5].There is no universal consensus on the cause and roots of terrorism [6].According to the Global Terrorism Database (GTD) maintained by the University of Maryland, more than 61,000 incidents occurred between 2000 and 2014, resulting in 140,000 casualties.Meanwhile, the Global Terrorism Index (GTI) reported an increase in terrorism from 65 countries in 2015 to 77 countries in 2016,indicating more devastation than over the last 17 years [7].

    After the terrorist attacks on the World Trade Centre and the Pentagon on 11 September 2001, the former President of the United States, George Walker Bush, introduced the phrase ‘war against terror’.The campaign was launched with the US and UK invasion of Afghanistan.The attack engendered mass displacement in Afghanistan and compelled the country’s people to take refuge in the religiously, ethnically, linguistically and culturally associated tribal areas of Pakistan.This cross-border displacement of people from Afghanistan to Pakistan caused social, political and economic upheaval, leading to a rise in militancy and extremism, drone attacks, internally displaced persons (IDPs) and suicide bombing attacks [1].

    Pakistan has been an active target of terrorist activities for the past 18 years.Between 2001 and 2010, the country’s anti-terrorist activities incurred a total of $68 billion.Moreover,in 2009, 300,000 IDPs were recorded in the wake of different forms of terrorist acts, including target killings, military operations, planted bombs and suicide attacks [2].Suicide bombing is a terrorist practice targeting military personnel, famous personalities, religious sites and civilians.These attacks are usually carried out using vehicles or by individuals wearing vests and carrying explosives [1].Tab.1 illustrates the data regarding suicide attacks in Pakistan from 8 May 2002 to 17 June 2018.

    Crime and terrorism are common problems in almost every society because they affect the quality of life and economic growth.They bring fear and disrupt the population’s unity by breaking social associations.The discipline of criminology involves the study of crime and criminal behaviour and a process that aims to identify a crime’s characteristics, motives and hidden patterns.The emergence of modern techniques, such as machine learning (ML) and data mining, and the availability of a high volume of crime and terrorist datasets, have enabled the identification and prediction of crimes [8].The predictive capability of crime, facilitated by the effective implementation of security policies, can assist crime prevention [9].

    There is substantial statistical proof that crime and terrorism are predictable not because criminals and terrorists operate in their comfort zone; rather, a frequency of variables make their methods work well.The most significant theories supporting this hypothesis include criminal behaviour theory, routine activity theory, rational choice theory, and crime pattern theory.These theories are consolidated to form a blended theory.The proposed research is based on the crime pattern theory [8].

    Table 1: Suicide bomb blast incidences in Pakistan.Source: South Asia terrorism portal (SATP)

    Data is characterised as an assortment of facts and figures, statistics, and measurements that can be utilised for references and examinations to reach determinations.Information assortment is a pivotal and deliberate way to deal with data from various sources to obtain an exact image of a region of intrigue.It assists in answering research questions, formulating a hypothesis and drawing conclusions.The objective of information assortment is to collect high-quality evidence that will then be converted to allow for an information-rich investigation, permitting the structure of persuasive and tenable responses to explore questions.Accurate data collection is key to ensuring the morality of the study.Information assortment is of particular significance in the domain of terrorism and related fear-based oppressive exercises.Exact and reliable information can help to stop psychological warfare exercises and execute security approaches that can forestall the development of fear-based oppressor gatherings [10].

    ML is a sub-domain of artificial intelligence that uses the computational statistical model.It is widely used to design intelligent algorithms that can learn from previous data or knowledge to make future predictions or decisions.ML answers two fundamental questions related to artificial intelligence: namely, how can computer systems automatically improve themselves through experience, and what are the basic statistical, computational information laws that govern all the learning systems? Learning problems can be defined as problems surrounding the improvement of performance measures through training experience.Applications of ML include computer vision,email filtering, predictive analytics, natural language processing, optical character recognition and pattern recognition [11].

    Supervised learning (SL) techniques require a sufficient amount of labelled training data for classification or to label unseen test data.In contrast, deep learning (DL) techniques emerged recently from artificial neural networks (ANNs), requiring minimal engineering by hand.Thus,the latter methods can benefit from an increase in the amount of available computation and data compared with classical ML techniques and external neural networks.Supervised ML algorithms are frequently used to recognise, understand and translate human languages to extract meaningful information [11], and ML and analytics have contributed to the development of many medical,financial, technological, and business-and science-related applications.ML has also proven to be a vital means of understanding, analysing and predicting criminal and terrorist behaviour [12].Previous studies have concentrated on theoretical models to develop a hypothesis about causes and consequent effects.ML algorithms are innovative and have predictive capabilities: ML can add robustness to the variables of a sample by validating actual predictive capabilities.Furthermore,ML can rank variables by the influence of predictive accuracy, giving a sense of the importance of a particular variable [6].

    Understanding crime is the objective of many types of research and studies.While numerous benchmark datasets are available, it is difficult to extract some attributes, such as the number of casualties and expected injuries, from the crime and terrorism data.Some non-linear models have been proposed to find a correlation between crime data and urban matrices.However,because of non-Gaussian distributions and multi-correlation in urban indicators, it is common to find controversial conclusions about the influence of some urban indicators on crime [13].ML methods frequently rely on supervised classification learning, which includes support vector machines (SVMs), ANNs, the na?ve Bayes classifier (NB), and maximum entropy [14].The knowledge gained from the ML and data mining approaches and techniques can help law enforcement agencies prevent or decrease criminal and terrorist activities in society [8].

    This study adopts and recommends the SL-based approach to predict the target audience(target class) of suicide bombers using the suicide bomb blast data of Pakistan available on the SATP.The study has the following objectives:

    ? Analysing Pakistan’s suicide bombing data to understand and extract valid attacker behavioural variables available in the data.

    ? Designing an accurate dataset to train and test the system efficiently (useful for future studies).

    ? Finding the maximum results through the twin operations of training and testing by applying simple SL algorithms.

    2 Literature Review

    The literature review for this study covers three significant dimensions of terrorist events and data: suicide bombing, previously proposed suicide bombing and crime prediction techniques, and the use of ML for crime prediction.

    The primary aim of qualitative research by Abbasi et al.[1] was to analyse the social,economic and physiological implications and repercussions for Pakistan after 9/11 and the ensuing war against terror.This study’s major findings included a relationship between religious extremist behaviour and suicide bombing, external invasion, and internal displacement.The study provided a better understanding of suicide bombing culture and other useful statistical details of terrorist events.

    Rasheed et al.[10] discussed the existing sources of suicide bombing data and datasets,presenting a vital case study of a data collection related to suicide bombings in Pakistan.Important contributions made by the study included new variables, such as explosion types, explosives,perpetrators, motives, etc.These variables, of course, explain the phenomena of suicide attacks.Agarwal et al.[7] provided useful insights by tracking patterns and trends [10] in their analysis of a historical dataset of the GTD.They predicted the factors that can potentially correlate with the menace of terrorism.Different data mining and ML techniques, including SVMs, random forest(RF), and logistic regression (LR), were employed to analyse the dataset and predict the wouldbe terrorist groups, the success or failure of the attacks, and their effects on external factors.In the implementation, k-means clustering and dummy classifiers showed an improvement, while RF with the GTD and dummy classifiers with the GTD peaked to the marks of 0.82 and 0.56,respectively [7].

    Gao et al.[5] also used the GTD to compare five classification ML algorithms: the decision tree (DT), LR, a Gaussian Bayesian Network (GBN), RF and AdaBoost.The experiment results showed that classification based on the DT had the highest precision at 94.8%.Moreover, the GBN could list all the possibilities according to the probabilities and showed 94.7% of the results [5].In another study, Mehmood et al.[2] acquired data concerning terrorism in Pakistan between 1998 and 2012 from the SATP.The methodology included a cluster analysis based on statistical correlation, followed by data pre-processing.The clusters were discovered over event and target; event and method were used in terrorism, and a more significant clustering grouped the distinct combination into separate clusters.The clusters were analysed according to three dimensions: the period, geography and type of terrorist events.The authors found that some critical terrorist activities, including suicide bomb attacks after 2012, reshaped the architecture of terrorism networks and events in Pakistan.

    Soliman et al.[4] proposed a hybrid computational intelligent algorithm as a decision support tool for the phenomenon of terrorism.The algorithm was based on different decision support tools and data mining techniques and aimed to improve the previously proposed algorithms inspired by meta-heuristics.The algorithm could predict the terrorist groups responsible for terrorist attacks on different regions of Egypt from 1996 to 2017.The accuracy of the prediction model with the neural network (NN) decision-maker was recorded at 74.77% with a mean square error(MSE) = 0.018 at iteration 10 = 0.0860.Although the proposed algorithm provided a marked accuracy, it involved complex implementation details [4].

    Basuchoudhary et al.[6] argued that ML could explain the phenomenon of terrorism since it can replace the missing data in scientifically validated ways.ML can help to reduce the multidimensionality of the most commonly used variables with no causal effect, explaining why it can identify causal variables.In another study, Basuchoudhary et al.[6] outlined how ML could be a vital part of the iterative knowledge-building process.Greitzer et al.[15] asserted that insider attacks could be detected based on psychological, behavioural, physical and sociotechnical indicators and factors mapped into a domain ontology.The proposed solution incorporated the technical indicators from the previous work.The ontology was derived from the taxonomy of the domain knowledge [15].

    Moreover, Nguyen et al.[12] put forward a crime forecasting method that predicted crimes based on location and time.The techniques comprised data acquisition, pre-processing, linking data with demographic data, and prediction using ML techniques including SVMs, RF, gradient boosting machines (GBMs), and NNs.The results obtained by the classifiers SVMs, RF, GBMs and NNs using scaled conjugate back-propagation and resilient back-propagation were 79.39%,65.79%, 61.67%, 74.02%, and 74.24%, respectively.The data was provided by the Portland Police Bureau and the public government source American Factfinder [12].

    Kang [9] proposed a feature-level data fusion technique with the environmental context based on a deep neural network (DNN).The dataset consisted of online databases of crime statistics,demographics, meteorological data and images in Chicago, Illinois.Experimental performance results showed that this DNN model was more accurate in predicting crime than other prediction models [9].Meanwhile, a study by Ahishakiye et al.[8] considered developing a crime prediction prototype model using the DT (J48) algorithm since the related literature has argued that it is the most efficient ML algorithm for predicting crime data.From the experimental results, the J48 algorithm predicted the unknown category of crime data at an accuracy of 94.25%, a rate high enough for the system to be relied upon to predict future crimes.The dataset, entitled ‘Crime and Communities’, was acquired from the UCI Machine Learning Repository.

    Azizan et al.[14] developed a terrorism detection technique using ML through sentiment analysis on the microblogging social website Twitter.Terrorists and people who support terrorism demonstrate patterns in these sentiments, which run through the very fabric of the comments,tweets, or messages they post.This study built upon the current sentimental analysis methods and techniques by using ML for crime prediction.The NB accuracy was recorded at between 85% to 96% [14].Alves et al.[13] obtained accurate predictions through statistical learning, suggesting that crime prediction depends on urban matrices and indicators.The proposed model provided a better solution to predicting crime with good accuracy and identifying the importance of the feature.It also held, even under small perturbation, on the training dataset [15].This approach showed up to 97% accuracy using RF classifiers.Furthermore, the importance of urban indicators was ranked and clustered in groups of equal influence in the data sample analysed [13].

    Using ML, Singh et al.[16] were able to predict terrorist attacks by country and region.This study was carried out upon the GTD.Six ML algorithms were applied to the selected dataset to achieve 82% accuracy using NB and LR.Gerber [17] argued that the importance of GPS-tagged tweets for crime prediction has been ignored in the literature; fewer types of crime have been discussed, and the performance comparison of previously proposed and currently used hot-spot models on Twitter have not been addressed.Finally, Lim et al.[18] conducted experiments to demonstrate that a criminal network link prediction model based on deep reinforcement learning(DRL) outperformed the GBM model with a relatively smaller dataset.AUC scores were 0.85,0.82, and 0.76 for the DRL criminal network link prediction model, compared with the GBM model scores of JUANES, MAMBO, and JAKE, respectively.The experiments indicated that the DRL method was capable of a better predictive performance than conventional SL under the same hyper-parameter setting.Further research should focus on confirming whether the SL technique’s predictive precision would be stronger over a larger dataset and number of training iterations [18].

    3 System Modelling

    Fig.1 shows the steps involved in the current study.Its details are discussed below.

    Figure 1: Proposed model

    3.1 Data Collection

    3.1.1 Multilayer Perceptron

    The data were collected from the SATP, which launched in March of 2000.The SATP is the largest comprehensive, searchable and continually updated database on terrorism, low-intensity warfare, and ethnic/communal/sectarian strife in South Asia.The project is the initiative of the Institute for conflict management (ICM).The ICM provides consultancy services on terrorism and internal security to various governments.It was established in 1997 in New Delhi, India, and was registered as a non-profit, non-governmental organisation supported by voluntary contributions and project aid [10].SATP has data of 479 suicide bomb blast incidents from 2002 to 2018.Tab.2 contains sample data of the first five suicide bomb blasts in 2017.

    Table 2: Suicide bomb blast incidences in Pakistan.Source: SATP

    3.2 Dataset Preparation

    There were four steps to the dataset preparation phase, all of which are shown in Fig.2 and explained in further detail below.

    3.2.1 Multilayer Perceptron

    The data’s initial investigation revealed that 479 suicide bombing incidents took place in Pakistan from 2002 to 2018.These incidents claimed the lives of more than 7,291 people, while 15,428 people were injured.The preliminary analysis indicated five attributes to the data: the year and date, the location (district), incident detail, number of people killed, and the number of people injured.

    3.2.2 Data Preprocessing

    The dataset preparation was accomplished in four steps.The phases involved in the data preparation are illustrated in Fig.2.

    Figure 2: Steps involved in dataset preparation

    3.2.3 Knowledge Discovery and Extracted Variables

    After pre-processing, important behavioural information and attributes were identified and extracted from the available data.For example, the ‘selected date’attribute provided a further valuable discovery: that the attacker chose specific days of the week for the attacks.Similarly,the chosen incident filed (alpha-numeric text) presented some novel and critical attributes, such as blast type, target type, and attack space, as illustrated in Fig.3.

    Figure 3: Novel attributes discovered in collected data

    The behavioural attributes of the attacker were extracted from the dataset, as shown in Tab.3.

    Table 3: Behavioural attributes of the attacker along dataset

    3.3 Obtained Dataset

    The data obtained via the SATP recorded 479 suicide bomb blasts.There were, however, missing values and duplication in the available data; thus, the obtained dataset includes 454 instances.The dataset’s most important attributes include the month, day, state/province, district/city, and blast type.Tab.4 presents the preliminary analysis and complete detail of the obtained dataset.

    Tab.4 demonstrates some of the fundamental and most notable patterns from the dataset.The most critical days of the week in Pakistan are Friday, with weight 93, followed by Monday and Thursday with weights 81 and 78.November, December, February, and March are the most critical months, with weights of 47, 45, 51, and 45, respectively.KPK (Khyber Pakhtunkhwa),the third most populated province of Pakistan, is the most affected province, with 224 incidences recorded.This is followed by FATA (the territory that has now been merged with KPK), with 79 incidences recorded, and Punjab (the most populated province of Pakistan), with 63 incidences reported.The most affected city is Peshawar (capital of the province KPK) with 69 blasts,followed by Quetta (capital of the province Baluchistan) with 40 blasts, and Karachi (the most populated city and economic hub of Pakistan with a seaport; the capital of the province Sindh)with 27 blasts.Variable blast type represents the main agenda or motive (for instance, political or religious) of the attack.The most recorded blast type is ‘Law_Enf’, the forces that maintain law and order in the country.These forces were the prime targets of the suicide bomb blasts, with a count of 219.These blasts also claimed a further 165 and 43 lives by targeting the general public and religious ceremonies.

    Table 4: Dataset patterns

    (Continued)

    Table 4: Continued

    The dataset contains nine labelled classes.Each class represents a particular target audience of a suicide blast in which an instance belongs.These nine labelled classes are ARMY (Pakistan Armed Forces), POL (police), FC (Frontier Core, which is the core of the Pakistan Army), CVL(civilians), PER (personalities), FOR (armed forces, such as Khasadar Force and the Military Police, which is appointed to protect Pakistan’s borders and primarily tribal areas), SHIA (the second biggest religious sect in Pakistan), MINO (minorities, such as Christians, Sikhs, etc.) and SUNI (the most prominent religious sect in Pakistan).The most recorded class is civilians with a count of 155, followed by police and the Pakistan Armed Forces with the counts of 90 and 87, respectively.For this study, the dataset has been divided into 75% of the training set (339 instances) and 25% of the testing set (115 instances).

    3.4 Supervised Learning

    Supervised and unsupervised learning are the two main branches of ML.SL is still the most esteemed branch of pattern recognition in the ML field [19].Supervised machine learning, also called the classification learning approach, is used for analysing training or labelled data to map unseen instances of data for future classification.Features extracted from recognition units train a classifier that learns to differentiate between different pattern classes [20].SL techniques require a sufficient amount of labelled training data for classification or to label unseen test data [21].

    Conversely, DL, which recently emerged from ANNs, requires minimal engineering by hand and can thus take advantage of an increase in the amount of available computation and data compared with classical ML techniques and external neural networks [22].The results generated by the SL approach are discussed in the next section.

    4 Results

    WEKA?(the Waikato Environment for Knowledge Analysis) version 3.8.4, considered one of the most efficient ML and data mining tools, was used to determine the overall efficiency of the proposed method and dataset.Different algorithms are available for SL, including Bayes,Function, Lazy, Meta, Rules, Tree, etc.In this study, the proposed technique and dataset’s efficiency was demonstrated using different, widely used algorithms; nevertheless, results could also be generated using other SL algorithms.

    4.1 Training Results

    The Bayesian network consists of a structural model and a set of conditional probabilities.Bayesian-based algorithms are often used for classification problems in which learning is done by constructing a classifier from a set of training instances with labelled classes [23,24].Bayes algorithms are simple, supervised probabilistic classifier algorithms [21] used for binary or multiclass classification based on Bayes’theorem.

    The NB algorithm is a simple supervised probabilistic classifier algorithm used for binary or multiclass classification.This algorithm is highly scalable.

    In Bayes’theorem, the probability of a hypothesis (h) given data (D) can be expressed as:

    From Eqs.(1) and (2), we get:

    Bayes’theorem can be defined as:

    Using Eq.(3),

    Table 5: Obtained training results generated by different SL algorithms

    NB algorithms, alongside other SL algorithms, generated the training results, as shown in Tab.5.This study’s primary objective is to train the system to classify different alphabets and characters and their different writing styles into accurate classes.It is suitable to use information retrieval measures to evaluate the overall accuracy of the proposed system.The two main information retrieval measures are break-even points and the F-score.The F-score measures the effect of a system’s performance on a particular class, whereas the break-even point is a value where precision and recall become equal: it is not, therefore, a good indicator of classification performance.However, accuracy is a valid parameter to measure the system’s overall performance [19].The measures of F-score and accuracy are illustrated below:

    True positive (Tp) = No.of characters correctly classified to the class

    True negative (Tn) = No.of characters correctly rejected to the class

    False positive (Fp) = No.of characters incorrectly rejected to the class

    False negative (Fn) = No.of characters incorrectly classified to the class

    By using the terms mentioned above, we can generate measurement factors as:

    Table 6: Test results generated by different SL algorithms

    Some classes are not shown in Tabs.6 and 7, such as F1-1 and F8-2, depicting that the instances belonging to these classes are part of the test set (i.e., the training set and test set are not overlapping).The precise accuracy by level using the NB algorithm is illustrated in Tab.6.

    4.2 Testing Results

    The training results generated by the NB algorithm are shown in Fig.4 as a sample.Tab.6 presents the comparison of results obtained using the different supervised algorithms, and Tab.7 demonstrates the detailed accuracy by class using the NB algorithm.

    Table 7: Detailed class accuracy using NB algorithms

    Figure 4: Training results using NB algorithm

    5 Conclusion

    Different algorithms, such as NB, SMO, and the Hoeffding Tree, gave accuracies of 72.17%,71.30%, and 72.17%, respectively.Other SL algorithms, such as LMT, Logit Boost and Iterative Classifier Optimiser, also show promising results.These results can help predict a specific class of people who may become victims of suicide bomb blasts.With the help of simple variables,including the day, month, province, and city, the target can be predicted, allowing for the prevention of these attacks altogether or, at least, minimising the casualty rates and damages.In the future, establishing more information about the impact of suicide bombing would be useful for developing proficient datasets and improving the exactness of results.

    Furthermore, more variables can be introduced for accurate predictions.Results can also be generated using different SL classifiers and algorithms and JRip, OneR, WAODE, etc.Criminal and suicide attacker profiling could be accomplished if the data are available, and an accurate target audience of a suicide bomb blast can be achieved using SL classifiers.Indeed, SL classifiers(e.g., NB and SMO) are generating significant results.The present study helps predict the target class of the suicide blast, which would aim to prevent or reduce the impact of damages, including casualties and loss of properties.

    6 Future Plan

    The ontology will be developed to explain concepts of behavioural aspects in the terrorism domain for machines, law enforcement personnel and researchers.An ontology is an explicit specification of a conceptualisation [25].The ontology of the terrorism domain will focus on concepts, relationships, and mapping by observing specific standards and principles.ML and data mining techniques will be used to predict and classify the incidents and groups’involvement on the basis of features extracted from the dataset using this domain ontology.

    Acknowledgement:Thanks to our families and colleagues, who supported us morally.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    午夜久久久久精精品| av.在线天堂| 国产久久久一区二区三区| 精品99又大又爽又粗少妇毛片| 如何舔出高潮| 成人av在线播放网站| 一区二区三区四区激情视频 | 久久久久久九九精品二区国产| 91精品一卡2卡3卡4卡| 亚洲中文字幕日韩| 网址你懂的国产日韩在线| 不卡视频在线观看欧美| 日韩国内少妇激情av| 老熟妇乱子伦视频在线观看| 日韩av不卡免费在线播放| 三级国产精品欧美在线观看| 欧美日韩一区二区视频在线观看视频在线 | 日本-黄色视频高清免费观看| 欧美不卡视频在线免费观看| 亚洲成人久久性| 哪个播放器可以免费观看大片| 97在线视频观看| 少妇的逼好多水| 一级毛片电影观看 | 少妇高潮的动态图| 亚洲人成网站在线播放欧美日韩| 高清日韩中文字幕在线| 禁无遮挡网站| 久久久久久久久久久丰满| 亚洲最大成人中文| 国产亚洲精品久久久久久毛片| .国产精品久久| 亚洲人成网站在线播放欧美日韩| 国产成人精品久久久久久| 小说图片视频综合网站| 小说图片视频综合网站| 人妻夜夜爽99麻豆av| 天天躁夜夜躁狠狠久久av| 欧美日本亚洲视频在线播放| 亚洲成人精品中文字幕电影| 亚洲精品自拍成人| 亚洲av二区三区四区| 国产亚洲精品久久久久久毛片| 99久久精品热视频| 久久久久九九精品影院| 黄色欧美视频在线观看| 午夜福利高清视频| 我要看日韩黄色一级片| 成人鲁丝片一二三区免费| 人人妻人人看人人澡| 欧美三级亚洲精品| 久久久久久伊人网av| 最近中文字幕高清免费大全6| 亚洲av免费高清在线观看| 国产免费一级a男人的天堂| 97超碰精品成人国产| 伊人久久精品亚洲午夜| 一级黄色大片毛片| 国产爱豆传媒在线观看| 久久这里只有精品中国| 国产精品女同一区二区软件| 最近手机中文字幕大全| 晚上一个人看的免费电影| 国产又黄又爽又无遮挡在线| 欧美成人精品欧美一级黄| a级毛色黄片| 欧美成人精品欧美一级黄| 国产大屁股一区二区在线视频| 联通29元200g的流量卡| 亚洲在久久综合| 国产亚洲精品久久久久久毛片| av在线观看视频网站免费| 丰满的人妻完整版| 能在线免费看毛片的网站| 最近的中文字幕免费完整| 亚洲高清免费不卡视频| 亚洲精品自拍成人| 男的添女的下面高潮视频| 亚洲经典国产精华液单| 免费人成在线观看视频色| 大又大粗又爽又黄少妇毛片口| 黄色欧美视频在线观看| 亚洲三级黄色毛片| 校园人妻丝袜中文字幕| 国产精品免费一区二区三区在线| 99在线人妻在线中文字幕| 毛片一级片免费看久久久久| 麻豆成人午夜福利视频| 国产单亲对白刺激| 天堂影院成人在线观看| 日韩欧美在线乱码| 欧美区成人在线视频| 亚洲综合色惰| 麻豆国产av国片精品| 精品久久久久久久久久免费视频| 日日啪夜夜撸| 99国产精品一区二区蜜桃av| 国产精品永久免费网站| 精品一区二区三区人妻视频| 亚洲欧洲日产国产| 久久99热6这里只有精品| 不卡视频在线观看欧美| 免费不卡的大黄色大毛片视频在线观看 | 国产伦在线观看视频一区| 日本与韩国留学比较| 69人妻影院| 成熟少妇高潮喷水视频| 免费观看在线日韩| 国产一区二区激情短视频| 日韩 亚洲 欧美在线| 久久久久久久久中文| 亚洲真实伦在线观看| 免费大片18禁| 99久久成人亚洲精品观看| 免费观看在线日韩| 欧美日韩乱码在线| 九九爱精品视频在线观看| 小说图片视频综合网站| 激情 狠狠 欧美| 亚洲一区高清亚洲精品| 日本成人三级电影网站| 日韩欧美三级三区| 国产老妇伦熟女老妇高清| av专区在线播放| 国产精品久久久久久亚洲av鲁大| 99国产精品一区二区蜜桃av| 日本一本二区三区精品| 亚洲成人精品中文字幕电影| 毛片女人毛片| 国产精品电影一区二区三区| 欧美日韩精品成人综合77777| 亚洲七黄色美女视频| 国产精品久久电影中文字幕| 久久热精品热| 亚洲欧美日韩卡通动漫| 国产精品电影一区二区三区| 免费av毛片视频| 午夜老司机福利剧场| 国产精品麻豆人妻色哟哟久久 | 网址你懂的国产日韩在线| 久久中文看片网| 久久久久网色| 久久精品国产亚洲av涩爱 | 老女人水多毛片| 精品熟女少妇av免费看| 国产蜜桃级精品一区二区三区| 亚洲精品国产av成人精品| 亚洲国产精品国产精品| 免费看av在线观看网站| 日韩成人av中文字幕在线观看| 一本久久精品| 老师上课跳d突然被开到最大视频| 国产精品国产高清国产av| 不卡视频在线观看欧美| 国产三级中文精品| 亚洲成人中文字幕在线播放| 日日撸夜夜添| 亚洲av成人av| 女人十人毛片免费观看3o分钟| 中出人妻视频一区二区| 欧美日韩一区二区视频在线观看视频在线 | 久久久精品欧美日韩精品| 老司机福利观看| 成人亚洲欧美一区二区av| 精品午夜福利在线看| 狂野欧美白嫩少妇大欣赏| 国产伦一二天堂av在线观看| 久久久久久久久大av| 国产片特级美女逼逼视频| 看黄色毛片网站| av免费观看日本| 日本一二三区视频观看| 中国美白少妇内射xxxbb| 国产一区二区在线观看日韩| 好男人在线观看高清免费视频| 波多野结衣巨乳人妻| 国产 一区精品| 亚洲精品影视一区二区三区av| 免费观看精品视频网站| 亚洲欧美日韩无卡精品| 亚洲最大成人手机在线| 大香蕉久久网| 亚洲国产欧美人成| 老师上课跳d突然被开到最大视频| 久久热精品热| 亚洲aⅴ乱码一区二区在线播放| 中文在线观看免费www的网站| 91午夜精品亚洲一区二区三区| 久久6这里有精品| 真实男女啪啪啪动态图| 日韩欧美精品v在线| 天堂√8在线中文| 久久九九热精品免费| 直男gayav资源| 美女国产视频在线观看| 久久精品人妻少妇| 日本免费一区二区三区高清不卡| 亚洲一区二区三区色噜噜| www日本黄色视频网| 亚洲av男天堂| 国产精品女同一区二区软件| 成人性生交大片免费视频hd| 老师上课跳d突然被开到最大视频| 国语自产精品视频在线第100页| 亚洲18禁久久av| 午夜激情福利司机影院| 全区人妻精品视频| 中国国产av一级| 色尼玛亚洲综合影院| 国产精品综合久久久久久久免费| 69av精品久久久久久| 啦啦啦韩国在线观看视频| 国产精品福利在线免费观看| 久久久久九九精品影院| 内射极品少妇av片p| 亚洲av免费在线观看| 欧美丝袜亚洲另类| 永久网站在线| 岛国在线免费视频观看| 亚洲av中文字字幕乱码综合| 久久久久久久久久黄片| 九九爱精品视频在线观看| 久久热精品热| 男插女下体视频免费在线播放| 色5月婷婷丁香| 久久久久久久久大av| 青春草国产在线视频 | 国产一区亚洲一区在线观看| 国产精品久久电影中文字幕| 中文欧美无线码| 国产亚洲精品久久久com| 搞女人的毛片| 亚洲国产欧美人成| 久久久久久久亚洲中文字幕| 日本色播在线视频| 国产真实乱freesex| 不卡视频在线观看欧美| 国产一区二区三区在线臀色熟女| 精品久久久久久久久久久久久| av在线蜜桃| 精品免费久久久久久久清纯| 精品久久久久久久人妻蜜臀av| 久久精品国产亚洲av香蕉五月| 久久午夜亚洲精品久久| 国产伦在线观看视频一区| 国产成年人精品一区二区| 日韩亚洲欧美综合| 男人狂女人下面高潮的视频| АⅤ资源中文在线天堂| 亚洲七黄色美女视频| 非洲黑人性xxxx精品又粗又长| 国产探花在线观看一区二区| 日韩,欧美,国产一区二区三区 | 中文字幕av成人在线电影| 亚洲av.av天堂| 狠狠狠狠99中文字幕| 亚洲av电影不卡..在线观看| 两性午夜刺激爽爽歪歪视频在线观看| 日本五十路高清| 亚洲最大成人av| 非洲黑人性xxxx精品又粗又长| 18+在线观看网站| 中文字幕av成人在线电影| 色哟哟·www| 国产片特级美女逼逼视频| 国产精品人妻久久久久久| 午夜a级毛片| 欧美日本亚洲视频在线播放| 男女做爰动态图高潮gif福利片| 变态另类丝袜制服| 丰满乱子伦码专区| 成人漫画全彩无遮挡| 免费看美女性在线毛片视频| 搡老妇女老女人老熟妇| 少妇裸体淫交视频免费看高清| videossex国产| 亚洲成人久久爱视频| 亚洲最大成人手机在线| 久久精品久久久久久久性| 国产精品麻豆人妻色哟哟久久 | 热99在线观看视频| 亚洲欧洲日产国产| videossex国产| 麻豆av噜噜一区二区三区| 成人美女网站在线观看视频| 黄色配什么色好看| av在线蜜桃| 久久精品国产亚洲av香蕉五月| 日韩强制内射视频| 97热精品久久久久久| 日本三级黄在线观看| 亚洲中文字幕一区二区三区有码在线看| 亚洲精品粉嫩美女一区| 女人被狂操c到高潮| 国产白丝娇喘喷水9色精品| 亚洲综合色惰| 熟女人妻精品中文字幕| 国产午夜精品论理片| 国产蜜桃级精品一区二区三区| 久久久国产成人免费| 中国美白少妇内射xxxbb| 久久亚洲精品不卡| 国产淫片久久久久久久久| 日日摸夜夜添夜夜添av毛片| 午夜a级毛片| 午夜福利视频1000在线观看| 尤物成人国产欧美一区二区三区| 在线天堂最新版资源| 国产一区二区激情短视频| 蜜桃亚洲精品一区二区三区| 三级男女做爰猛烈吃奶摸视频| 日韩欧美三级三区| 国产人妻一区二区三区在| 日日摸夜夜添夜夜添av毛片| 婷婷六月久久综合丁香| 国产精品嫩草影院av在线观看| 欧美高清成人免费视频www| 午夜a级毛片| 久久久国产成人免费| 久久精品国产亚洲av涩爱 | 高清在线视频一区二区三区 | 亚洲,欧美,日韩| 久久精品国产亚洲av香蕉五月| 成人性生交大片免费视频hd| 亚洲性久久影院| 日韩欧美一区二区三区在线观看| 乱系列少妇在线播放| 大香蕉久久网| 亚洲精品粉嫩美女一区| 晚上一个人看的免费电影| 亚洲欧美精品自产自拍| 亚洲av一区综合| 欧美极品一区二区三区四区| 精品不卡国产一区二区三区| 日韩强制内射视频| 99久久成人亚洲精品观看| 亚洲精品亚洲一区二区| 久久6这里有精品| 国产探花在线观看一区二区| 亚洲精品日韩av片在线观看| 久久久久九九精品影院| 国产伦理片在线播放av一区 | 国产精华一区二区三区| 亚洲无线观看免费| 久久久久久伊人网av| 日本撒尿小便嘘嘘汇集6| 国产老妇女一区| 激情 狠狠 欧美| 最近最新中文字幕大全电影3| 久久欧美精品欧美久久欧美| 免费搜索国产男女视频| 天堂av国产一区二区熟女人妻| 成人国产麻豆网| 麻豆成人午夜福利视频| 婷婷亚洲欧美| 亚洲精品粉嫩美女一区| 九九爱精品视频在线观看| 日韩人妻高清精品专区| 亚洲aⅴ乱码一区二区在线播放| 一级毛片aaaaaa免费看小| 久久精品久久久久久噜噜老黄 | 亚洲欧美精品综合久久99| 国产精品一区二区性色av| 国产黄色小视频在线观看| 午夜久久久久精精品| 国产极品精品免费视频能看的| 九九久久精品国产亚洲av麻豆| 综合色丁香网| 熟女人妻精品中文字幕| 日本一本二区三区精品| 亚洲国产精品合色在线| 神马国产精品三级电影在线观看| av又黄又爽大尺度在线免费看 | 中文字幕久久专区| 久久亚洲国产成人精品v| 色哟哟哟哟哟哟| 在线免费观看的www视频| 一进一出抽搐动态| 全区人妻精品视频| 女人十人毛片免费观看3o分钟| 精品久久久久久久久久免费视频| 男女下面进入的视频免费午夜| 人妻少妇偷人精品九色| 国产亚洲精品久久久久久毛片| 中国国产av一级| 国产色爽女视频免费观看| 亚洲自拍偷在线| 午夜精品在线福利| 国产精品一区二区在线观看99 | 久久久欧美国产精品| 国产精品爽爽va在线观看网站| 免费av观看视频| 国产精品精品国产色婷婷| 91狼人影院| 观看美女的网站| 国产成人freesex在线| 一个人免费在线观看电影| 如何舔出高潮| 男女下面进入的视频免费午夜| 欧美高清性xxxxhd video| 久久婷婷人人爽人人干人人爱| 国产av一区在线观看免费| 我的女老师完整版在线观看| 亚洲人成网站高清观看| 国产一区二区亚洲精品在线观看| 日日摸夜夜添夜夜添av毛片| 成人午夜高清在线视频| 久久久久久久久久久免费av| 在线观看午夜福利视频| 成人毛片60女人毛片免费| 精品欧美国产一区二区三| 12—13女人毛片做爰片一| 日韩 亚洲 欧美在线| 2022亚洲国产成人精品| 如何舔出高潮| 免费av毛片视频| 国产在线精品亚洲第一网站| АⅤ资源中文在线天堂| 日韩在线高清观看一区二区三区| 少妇裸体淫交视频免费看高清| 国产精品乱码一区二三区的特点| 一区二区三区免费毛片| 1000部很黄的大片| 日本撒尿小便嘘嘘汇集6| 成人三级黄色视频| 国产av一区在线观看免费| 日韩欧美三级三区| 看片在线看免费视频| 狂野欧美激情性xxxx在线观看| 国产午夜精品论理片| 两个人视频免费观看高清| 波野结衣二区三区在线| 免费观看的影片在线观看| 悠悠久久av| 韩国av在线不卡| 久久人人精品亚洲av| 91精品国产九色| 久久精品久久久久久噜噜老黄 | 99视频精品全部免费 在线| 春色校园在线视频观看| 22中文网久久字幕| 色视频www国产| 美女大奶头视频| 亚洲国产精品久久男人天堂| 中文精品一卡2卡3卡4更新| 亚洲av成人精品一区久久| 国产亚洲91精品色在线| 免费av观看视频| 69人妻影院| 婷婷精品国产亚洲av| 国产亚洲精品久久久com| 在线观看66精品国产| 国产成人a∨麻豆精品| 久久人妻av系列| 欧美变态另类bdsm刘玥| 丰满人妻一区二区三区视频av| 久久精品国产99精品国产亚洲性色| 不卡视频在线观看欧美| 99久久中文字幕三级久久日本| a级毛色黄片| 国产爱豆传媒在线观看| 日本一二三区视频观看| 国产成人freesex在线| 欧美性猛交╳xxx乱大交人| 国产激情偷乱视频一区二区| 99久久中文字幕三级久久日本| 国产精品久久电影中文字幕| 精品久久久久久久久亚洲| 干丝袜人妻中文字幕| 自拍偷自拍亚洲精品老妇| 一卡2卡三卡四卡精品乱码亚洲| 丰满人妻一区二区三区视频av| 国产欧美日韩精品一区二区| 嫩草影院新地址| 99视频精品全部免费 在线| 可以在线观看的亚洲视频| 少妇人妻一区二区三区视频| 国产综合懂色| 成人特级av手机在线观看| av在线亚洲专区| 卡戴珊不雅视频在线播放| 寂寞人妻少妇视频99o| 麻豆精品久久久久久蜜桃| 欧美日韩精品成人综合77777| 国产 一区 欧美 日韩| 九九热线精品视视频播放| 九草在线视频观看| 在现免费观看毛片| 国产一区二区三区av在线 | 只有这里有精品99| 亚洲成a人片在线一区二区| .国产精品久久| 不卡一级毛片| 国产成人a∨麻豆精品| 麻豆成人av视频| 国产黄a三级三级三级人| 国产亚洲av片在线观看秒播厂 | 性插视频无遮挡在线免费观看| 黄色一级大片看看| 偷拍熟女少妇极品色| 免费av观看视频| 欧美性猛交╳xxx乱大交人| 中文资源天堂在线| 嫩草影院精品99| 国语自产精品视频在线第100页| 久久久久网色| 欧美日韩精品成人综合77777| 国产精品麻豆人妻色哟哟久久 | 国产高清视频在线观看网站| 欧美高清成人免费视频www| 天天躁日日操中文字幕| 中文字幕av成人在线电影| 午夜精品国产一区二区电影 | 亚洲久久久久久中文字幕| 爱豆传媒免费全集在线观看| 亚洲性久久影院| 18禁裸乳无遮挡免费网站照片| 波多野结衣高清无吗| 亚洲av电影不卡..在线观看| 天堂√8在线中文| 亚洲欧美日韩东京热| 美女cb高潮喷水在线观看| 波多野结衣高清无吗| 亚洲图色成人| 99在线人妻在线中文字幕| 日本熟妇午夜| 久久久国产成人免费| av国产免费在线观看| 亚洲欧美日韩高清在线视频| 久久综合国产亚洲精品| 成年女人看的毛片在线观看| 一级av片app| 国产高清视频在线观看网站| 日本熟妇午夜| 在线免费十八禁| 3wmmmm亚洲av在线观看| 可以在线观看毛片的网站| 国产视频首页在线观看| 国产黄片美女视频| 久99久视频精品免费| 男女下面进入的视频免费午夜| 国产精品电影一区二区三区| 免费人成视频x8x8入口观看| 精品人妻偷拍中文字幕| 欧美另类亚洲清纯唯美| 久久精品综合一区二区三区| 白带黄色成豆腐渣| 51国产日韩欧美| 久久99热这里只有精品18| 日韩一区二区视频免费看| 一区二区三区四区激情视频 | 嘟嘟电影网在线观看| 国产亚洲91精品色在线| 国产精品一区二区三区四区免费观看| 国产精品美女特级片免费视频播放器| 国产高清激情床上av| 人人妻人人看人人澡| 午夜老司机福利剧场| 久久99蜜桃精品久久| 亚洲av成人精品一区久久| 嫩草影院新地址| 日韩欧美 国产精品| 亚洲久久久久久中文字幕| a级毛片免费高清观看在线播放| 国产精品1区2区在线观看.| 韩国av在线不卡| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 色噜噜av男人的天堂激情| 久久这里有精品视频免费| 美女内射精品一级片tv| 91午夜精品亚洲一区二区三区| 高清在线视频一区二区三区 | 中国美女看黄片| 只有这里有精品99| 欧美一级a爱片免费观看看| 日本爱情动作片www.在线观看| 国产高潮美女av| 色尼玛亚洲综合影院| 欧美性感艳星| 我的老师免费观看完整版| 精品久久久久久成人av| or卡值多少钱| 亚洲欧美精品自产自拍| 校园春色视频在线观看| 狂野欧美激情性xxxx在线观看| 国产熟女欧美一区二区| 91精品国产九色| 国产一区二区亚洲精品在线观看| 日本成人三级电影网站| 国产单亲对白刺激| 麻豆国产97在线/欧美| 网址你懂的国产日韩在线| 国产视频内射| 我的老师免费观看完整版| 日本三级黄在线观看| 人妻久久中文字幕网| 国产精品av视频在线免费观看| 久久亚洲国产成人精品v| 男人和女人高潮做爰伦理| 五月伊人婷婷丁香| 亚洲丝袜综合中文字幕| 一级毛片我不卡| 婷婷色综合大香蕉| 免费一级毛片在线播放高清视频| 亚洲国产精品成人综合色| 欧美一区二区精品小视频在线| 蜜桃久久精品国产亚洲av| 美女xxoo啪啪120秒动态图| 国产精品久久久久久久电影| 如何舔出高潮| 狂野欧美激情性xxxx在线观看| 国产午夜福利久久久久久| 高清毛片免费看| 免费观看人在逋| 日韩一本色道免费dvd|