• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An extended improved global structure model for influential node identification in complex networks

    2022-06-29 08:57:06JingChengZhu朱敬成andLunWenWang王倫文
    Chinese Physics B 2022年6期

    Jing-Cheng Zhu(朱敬成) and Lun-Wen Wang(王倫文)

    College of Electronic Engineering,National University of Defense Technology,Hefei 230037,China

    Keywords: complex network,influential nodes,extended improved global structure model,SIR model

    1. Introduction

    Complex networks have attracted the wide attention of researchers in recent years. One important research direction is to rank the nodes in the network,which is of great significance for clarifying network structure and maintaining network operation. In fact,various complex systems that accompany human daily life can be expressed as complex networks,such as scientific cooperation networks,[1]transportation networks,[2]social networks[3]and protein–protein interaction networks.[4]Research shows that a small number of nodes in the network play a supporting role in the whole network. Finding these nodes has become a research hotspot. Studying the structure information of these nodes can give a deeper understanding of the information propagation between nodes,which is of great significance to the study of node influence.

    Many classical identification methods have been proposed for node influence, such as degree centrality,[5]betweenness centrality,[6]closeness centrality,[7]eigenvector centrality,[8]K-shell decomposition,[9]H-index,[10]etc.Among these methods, degree centrality is the simplest and most intuitive method, and it reflects the most local information of nodes,which can be expressed by the number of nearest neighbor nodes. However, the degree centrality method does not distinguish well among the influence of each node, and it is easy to define some nodes with the same value, which eventually leads to the low accuracy of the ranking results.To solve the problem of discrimination and accuracy,Zengetal.[11]proposed a mixed degree decomposition method,which can be converted into degree centrality and K-shell decomposition method by adjusting parameters. Sheikhahmadi and Nematbakhsh[12]proposed a method of mixing core, degree and entropy information, considering the low discrimination between K-shell and degree centrality.Compared with K-shell and degree centrality,this method has a certain distinction,but some nodes have not been fully considered. Ibnoulouafiand Haziti[13]defined a new node influence identification method based on the density formula,which takes the degree centrality of the node itself as the mass and the path length from the node as the radius. This method improves the discrimination and accuracy, but does not fully consider the information of the surrounding nodes. Liet al.[14]proposed clustering localdegree (CLD) centrality by combining the clustering coefficient of nodes with the degree value of the nearest neighbor nodes. This method considers the information of the nearest neighbor nodes, but ignores the influence of other neighbor nodes. According to the gravity model, Liet al.[15]regarded the degree centrality of their own and neighbor layer nodes as the mass of mutually attractive celestial bodies in the gravity model, and regarded the path length between the nodes as the distance between celestial bodies. Yanet al.[16]proposed a node ranking method that integrated node information of itself, the neighbor layer and location information. This method first obtained a mixed multi-index method by using the entropy weight method, and then applied it to the gravitational law formula, and analyzed multiple combinations in the datasets, indicating that the new method is more accurate than the classical method. Yanget al.[17]first proposed an improved K-shell decomposition method, and then combined it with degree centrality. At the same time,the influence of path length was introduced,and the performance of discrimination and accuracy was improved. Ullahet al.[18]proposed a global structure model to rank nodes. The model takes the K-shell value as its own influence,and combines the K-shell value of neighbor layer nodes with the path length as a global influence. Although the path length is introduced,the influence of path length is not fully considered.

    The above methods solve the problems of the poor identification effect and low accuracy in the process of node identification from different perspectives,but do not fully consider the impact of the location information of nodes.In order to further explore the influence of location information between neighbor layer nodes and measured nodes, this paper proposes an extended improved global structure model to identify influential nodes in the network. This method first calculates the degree centrality of each node, and uses the degree information of the node itself to represent the influence of the node itself.Regarding the influence of the neighbor layer nodes, this paper introduces the power of the path length to show the attenuation effect in the information transmission process caused by the distance. Finally, the sum operation of the nearest neighbor node information is carried out to rank the influence of the node. To verify the effectiveness of the proposed method,1000 independent simulation experiments are carried out on 11 real networks using the SIR propagation model[19]to obtain the propagation influence of nodes,and the results of each method are compared with the node influence obtained by the SIR model. The experiments show that the proposed EIGSM method in this paper performs better than DC,[5]BC,[6]Kshell,[9]MCDE,[12]and GSM.[18]

    This section describes the research background and research status, the next sections describe the content as follows. Section 2 describes benchmark methods and the proposed EIGSM method. Section 3 describes the datasets used in this paper and the corresponding evaluation criteria. Section 4 shows the relevant experiments for discrimination and accuracy. Conclusions are given in Section 5.

    2. Related work

    An unweighted and undirected network can be represented byG=(V,E),whereVdenotes the set of nodes of the network andErefers to the set of connected edge information.Meanwhile, we can represent the node and edge information of the whole network by the adjacency matrixA={aij},and use the size of the matrix to represent the number of nodes,and the matrix elementai jto represent the edge connection. Ifaij=1,it means that the nodeiandjare directly connected,otherwise they are not directly connected.

    2.1. Benchmark methods

    2.1.1. Degree centrality

    Degree centrality[5]reflects the most local information of nodes, which is simple and intuitive, and can be directly expressed by the number of connected nodes. The larger the degree is,the greater the node influence is. The degree centrality formula of nodeican be expressed as

    2.1.3. K-shell decomposition method

    The K-shell decomposition method[9]separates the nodes into different layers, and the later the node is separated, the more important the node is. The specific steps of K-shell decomposition are as follows.

    (i)Firstly,the degree of each node is obtained according to the adjacency matrix of the network.

    (ii)Delete the node whose degree value is 1 and recalculate the degree value of the network. If there is a node whose degree value is 1, then continue to delete the node until the degree value is greater than 1 and divide all deleted nodes into the first layer.

    (iii)Strip nodes of other degrees step by step according to(ii)until no node can be stripped.

    2.1.4. Mixed core, degree, and entropy

    Mixed core, degree and entropy (MCDE)[12]takes the node’s own core and degree values into account as well as the effects of the node’s friends, as shown in the following equation:

    where Ks(i)refers to the K-shell decomposition value of nodei,anddi jrefers to the path length between nodeiand nodej.

    2.2. Proposed extended improved global structure model

    In current research on node influence,researchers mostly focus on the K-shell decomposition method and the DC method. The main reason is that these two methods are very simple. Researchers can simply obtain the corresponding values of nodes in the network,which also allows these two methods to be widely used in large-scale networks and have a wider range of applications. However, both the K-shell decomposition method and the DC method are faced with a problem:they cannot well distinguish the importance of each node in a network. The K-shell decomposition method is characterized by a small number of levels, and it is easy to divide multiple nodes into the same level.The disadvantage of the DC method is that it only reflects the edge information of nodes,and there must be a large number of nodes with the same number of edges in a large-scale network. It is worth noting that nodes with the same value in the network also have different influences due to the influence of location information. Based on the GSM method,this paper makes improvements.First of all,considering that the DC method is better than the K-shell decomposition method in distinguishing the influence of nodes,this paper uses the DC method instead of the K-shell decomposition method,and uses the degree centrality information of nodes and the total number of network nodes to represent their own influence.At the same time,in addition to the node’s own information, the location information of the node will have a certain impact on information dissemination. In this paper,the neighbor layer information is used to represent the influence of the location information on the measured node. A node with a distance of 1 is divided into neighbor layer 1, and a node with a distance of 2 is divided into neighbor layer 2. On account of information loss, the farther the distance from the measured node is, the weaker the ability to receive information is. This paper sets a path loss related to the shortest path length between nodes and the average degree. The formula is as follows:

    Fig.1. Example network.

    Table 1. DC,IGSM,and EIGSM values for each node in the sample network.

    where a refers to the nearest neighbor set of nodesi.In order to show the effect of distinguishing the influence of each node, Table 2 shows the ranking of each node. From the table, DC divides nodes into 4 levels, BC divides into 11 levels,K-shell decomposition divides into 3 levels,MCDE divides into 9 levels, GSM divides into 13 levels, IGSM and EIGSM divides into 14 levels. Node 1 and node 2 cannot be distinguished because the two nodes are locally symmetric and have the same information about themselves and their neighbors, so it can be considered that the influence of the nodes is the same. From the degree of distinction, DC can distinguish more levels than the K-shell decomposition method.The IGSM and EIGSM methods are better than the GSM method in node influence ranking. In terms of differentiation effects,DC can distinguish more layers than the K-shell decomposition method, and the IGSM and EIGSM methods distinguish better than the GSM method in terms of node influence ranking.

    Table 2. Ranking results of different methods for each node in the example network.

    3. Datasets and evaluation criteria

    3.1. Datasets

    This paper selects several real network datasets with different structures to verify the effectiveness of the algorithm. The real networks are the Contiguous network,[20]Dolphin network,[21]Polbooks network,[22]Word network,[23]Jazz network,[24]Slavko network,[22]USAir network,[25]Netscience network,[23]Infectious network,[26]Elegans network,[27]and Email network.[28]Some basic parameters of the networks are shown in Table 3. The parameters shown in the table include the total number of nodesn, the total number of connected edges between nodesm, the propagation thresholdβth=〈k〉/〈k2〉,〈k〉is the average degree,〈k2〉is the second-order average degree,βrefers to the propagation probability,kmaxrefers the maximum degree,Drefers to the network diameter,Cis the average clustering coefficient andris the assortativity coefficient.[29]

    Table 3. Basic parameters of real networks.

    3.2. SIR model

    The SIR model[19]is widely used to simulate the process of information dissemination and disease infection. In this paper, the SIR model is used to simulate the real influence of nodes. In the SIR propagation model,nodes can exist in three states: Susceptible(S)state,the nodes are in normal state and have the risk of being infected; infected (I) state, the nodes are infected with disease and will infect the surrounding nodes with a certain probability; recovery (R) state, the nodes recover from the infected state and will not be infected again.The specific step of simulating node influence is to set the initial state as an infected node; then the infected node infects the nearest neighbor node with a certain probability and the infected node recovers with the probability ofλ=1 until the whole process is stable. In this paper,the probability near the propagation threshold[30]is adopted for the experiment. The total number of infected nodes is used as the propagation influence of the nodes,and 1000 independent simulation experiments are carried out to obtain the average value. The results of the SIR model will be used for comparative analysis with various methods to test the excellence of the proposed method.

    3.3. Comprehensive cumulative distribution function

    Comprehensive cumulative distribution function(CCDF)[31]can fully describe the probability distribution of the values obtained by each method. The CCDF function value corresponding to the coordinates rankedrin the ranking list is the sum of probabilities greater thanr, and the CCDF formula can be expressed as

    3.4. Kendall coefficient

    The Kendell coefficient[32]is used to evaluate the correlation between the ranking results obtained by the SIR model and the ranking results obtained by specific methods. It is assumed that (xi,yi) and (xj,yj) are two elements in the twodimensional array(X,Y). Ifxi >xjandyi >yjorxi <xjandyi <yj,the pair of elements is said to be concordant. Ifxi >xjandyi <yjorxi <xjandyi >yj,the pair of elements is said to be discordant. Ifxi=xjoryi=yj,then these two elements are neither concordant pairs nor discordant pairs. The formula is defined as

    whereCandDare the numbers of concordant pairs and discordant pairs,respectively.

    3.5. Jaccard similarity coefficient

    The Jaccard similarity coefficient[33]is used to compare the similarity between the ranking results obtained by each method and the SIR model. The Jaccard similarityJrcan be expressed by the intersection and union of two arrays,and the specific formula is

    X(r)andY(r)denote the firstrelements in the two listsXandY,respectively.The value range ofJris[0,1],and the closer to 1 this value is,the higher the similarity between the two lists.

    4. Experiment and analysis

    In this section, the distinction and accuracy of the identification method are experimentally and analytically studied.The distinction is used to avoid a large number of nodes being defined as the same value, and the accuracy is used to verify the rationality of the sorting results.

    4.1. Discrimination experiments

    In the network,there is a problem that some nodes are defined as the same value because the surrounding information of the nodes are fully considered.In this case,it is difficult to give the node influence ranking results of the same value nodes. In order to avoid this situation of the ranking results,it is necessary that the proposed method can distinguish the influence of each node as much as possible. Figure 2 shows the probability distribution of the ranking results of each method with six networks: Contiguous,Polbooks,USAir,Infectious,Elegans and Email. From the results of the figure, the probability distribution of the K-shell decomposition method and DC method is only concentrated in the front part, which shows that these two methods define many nodes as the same value. At the same time,we can also see that the DC method has better discrimination effect than the K-shell method. MCDE combines DC, K-shell and entropy information. It can be seen that the MCDE method can already distinguish the top-ranking nodes,but the effect of distinguishing the bottom-ranking nodes is not obvious. This is because the entropy information only considers the node’s own degree value and the nearest neighbor’s K-shell information,and there will be many similar structures for the nodes with small degree values,leading to the weakening of the distinguishing ability. BC aims to find nodes in the hub position of the network,so BC has a good distinction effect in the early stage. We will find that BC has a high point in the later period because there are also a large number of nodes not in the hub position in the network. These nodes will also show different influences due to the influence of the surrounding environment,which is not considered by BC. With regard to GSM, IGSM, and EIGSM, we can see that the influence of each node can be basically identified,and even if the same value node appears,it also remains at a very low point. In the Elegans network,it can be seen that the EIGSM method shows a better distinction effect than other methods.

    Figure 3 shows the CCDF curves of each method. We can intuitively understand the discrimination of each method by observing the declining trend of the curves. When the curve has no inflection points as a straight line, it indicates that each node is defined as different values,and the faster the curve drops, the greater the number of nodes assigned to the same ranking. In Fig. 3, the DC, K-shell, and MCDE methods show an obvious downward trend. BC effectively distinguished nodes in the early stage,and there was a sudden drop point in the later stage. GSM, IGSM, and EIGSM fell more slowly than other methods. In the Contiguous and Polbooks networks, EIGSM completely distinguishes the influence of all nodes. In the Infectious and Email networks,the three approaches tend to decline approximately in a straight line. In the USAir and Elegans networks,the EIGSM method also obviously shows a slower decline rate than other methods. From the results, it can be seen that the EIGSM method can well distinguish the influence of each node.

    Fig.2. Probability distribution in the ranking list obtained by each method.

    Fig.3. CCDF diagram of ranking results of each method.

    4.2. Accuracy experiment

    The accuracy experiment mainly focuses on three aspects:the Kendell coefficient, the scatter plot of influence consistency and the Jaccard similarity coefficient.

    4.2.1. Selection of the power of the average path length

    Figure 4 shows the influence of power selection in each network on the accuracy of node recognition. Thex-axis is the value of the power,and they-axis is the Kendall coefficient between the EIGSM and the SIR model. From the figure,we can see that different networks have different power values.At this time, we begin to think about how to choose the appropriate power value. Then, we think of the parameter of the average degree. The main reason for selecting the average degree is because this paper focuses on the degree of nodes,and the average degree is the average of all node degrees,so that we do not need to recalculate other things,which is simple and convenient. Figure 5 shows the relationship between the optimalkvalue of each network power in Fig.4 and ceil(log2(k)). Because the coordinates are repeated,the size of the five-pointed star represents the number of repetitions. From Fig. 5, it can be obtained that the five-pointed stars are approximately distributed around the straight liney=xby using the proportional function. So we finally determine thatkoptimal≈ceil(log2(k)).

    Fig.4. Influence of power of the shortest path on each network.

    Fig.5. The relationship between the optimal k value and the average degree.

    4.2.2. Influence consistency experiment

    Figure 6 shows the scatterplot of the influence consistency between the node influence values obtained by each method on the Dolphin, Word and Slavko networks and the values obtained by SIR model simulation. Each scatter in the figure represents a node. The better the monotonicity of the curve trend shown in the scatter plot is,the higher the correlation is, and the closer the scatter is, the better the effect is. It can be seen from the figure that the scatter plot distribution of BC is very divergent.At the same time,it can also be observed that the K-shell decomposition method has a weak distinguishing ability, and the same K-shell value corresponds to many nodes. The DC, MCDE, GSM, IGSM, and EIGSM results are positively correlated with node influence. It can be seen that DC and MCDE are not very concentrated in the three networks, and GSM is also dispersed in the Dolphin and Slavko networks. Relatively speaking, the node number obtained by the proposed EIGSM method has the highest correlation with the node influence,and the nodes are relatively concentrated.

    Table 4. Kendall correlation coefficients of different methods in the real network.

    Figure 7 shows the correlation scatter diagram of EIGSM and DC,MCDE,GSM,IGSM. Thex-axis is the value calculated by EIGSM for nodes in the network,and they-axis is the value of the other methods. It can be seen from the figure that the scatter plot is positively correlated. EIGSM and DC show a linear trend from the trend of the scatter plot curve,but due to the discrimination of DC, the scatter distribution is more dispersed. From the density point of view, the scatter plots of EIGSM and IGSM are most concentrated,while the scatter plots of DC, MCDE, and GSM are more dispersed. Overall,EIGSM has the highest correlation with IGSM.

    Table 4 gives the Kendall coefficient of various methods in the real network,and it can be seen that EIGSM has the best effect. This shows that providing neighbor layer nodes information attenuation and considering the nearest neighbor nodes information can improve the accuracy of identifying influential nodes. This shows that the proposed method has more advantages in identifying node influence than DC, BC, K-shell,MCDE,and GSM.

    Fig.6. Relationship between each method and node influence.

    Fig.7. Correlation between the proposed method and other methods.

    4.2.3. Identification effect under certain propagation probability

    In order to explore the influence of different propagation probabilities on the accuracy of the method proposed in this paper,the values around the propagation thresholdβthare selected as the propagation probability for the experiments,and the Kendall coefficient was used as the evaluation criterion. The experimental results are shown in Fig. 8. From the figure, it can be seen that BC is always low in several networks,which shows that it is not good at evaluating the propagation influence of the nodes in the network compared to other methods. In the Word, Slavko, Infectious and Email networks, we can see that the Kendall coefficients of the DC and MCDE methods in the early stage are higher. This is because when the propagation probability is small, the information dissemination of the node is easily limited to a small part of the surrounding nodes. At this time, the directly connected nodes are the easiest to receive information from,and the DC and MCDE methods have the closest relationship with the directly connected nodes. If the propagation probability is too small,it is easy to spread only over a local area,and if the propagation probability is too large,it will spread over a large area. From Fig.8,it can be seen that EIGSM always maintains an advantage near the propagation threshold,and the identification accuracy is higher.

    Fig.8. Kendall coefficients between different propagation probabilities and the SIR model.

    Fig.9. The Jaccard similarity coefficients between each method and the SIR model.

    4.2.4. Jaccard similarity coefficient

    The most influential nodes form a small part, so we should not only judge the accuracy from the overall perspective but also consider the accuracy of the top nodes. Because the network scale is getting larger and larger, we selected the last six networks with a large number of nodes to do the following Jaccard similarity experiment,as shown in Fig.9. Figure 9 studies the similarity between the simulation results of the SIR model of the forward node obtained by each method through the Jaccard similarity coefficient. The higher the similarity is,the more accurate the result is. Thex-axis represents the number of front nodes, and they-axis represents the Jaccard similarity coefficient. In Fig. 9, with an increase of the number of front nodes, the results tend to be stable. From the results of Fig. 9, we see that BC is located below other methods in most parts, while IGSM and EIGSM are located above other methods. In Slavko, USAir, Infectious, Elegans,and Email networks, we can observe that the similarity coefficient of the K-shell decomposition method is very small at the beginning. With the increase of the abscissa, the similarity coefficient increases. This is because K-shell divides many nodes into the same layer,and the accuracy is limited by the discrimination. Moreover,the larger the network scale is,the closer the connection between the nodes and the surrounding nodes is. Therefore, the problem cannot be considered only from the node itself. In the Netscience network,K-shell has a high point at first because the top-ranking nodes are not only in the core position but also have a relatively large degree value. Then it will begin to decline with the discrimination problem. In the Infectious and Email networks, we can also see that EIGSM is significantly more similar than other methods. Overall, EIGSM can be considered to be more accurate in identifying node influence.

    5. Conclusion

    This paper studies the problem of identifying influential nodes in complex networks, which is crucial to the study of disease infection and information dissemination. This paper proposes an extended improved global structure model to identify influential nodes in the network.This method first uses the degree centrality information to represent its self-influence and then uses the neighbor layer information to represent the influence of the surrounding information. When considering the neighbor layer information, a path attenuation related to the path length and the average degree is introduced. Finally,the propagation influence of the node is characterized by accumulating the information of the nearest neighbor node. To evaluate the effectiveness of the proposed method, we use the SIR model to simulate the propagation process,and conduct experiments on two main aspects of discrimination and accuracy in multiple real networks. Firstly, we can see that the proposed method avoids the phenomenon that most nodes are defined as the same importance,and it effectively separates the importance of each node. Secondly, in terms of accuracy, it can be seen that the method proposed in this paper has been improved to a certain extent,especially near the curve;it is always better than other methods. About the computational complexity of the proposed method,because the IGSM method is similar to the GSM method,we think that the computational complexity of IGSM is the same as that of GSM,which is O(n2). In addition,EIGSM adds a nearest neighbor information overlay from 1 tonon the basis of IGSM,so we believe the computational complexity of this method can be regarded as O(n2+n);whennis infinite,the computational complexity of this method can also be regarded as O(n2). Overall, the experimental results show that the proposed method in this paper has more advantages than other methods in identifying influential nodes.

    Acknowledgment

    Project supported by the National Natural Science Foundation of China(Grant No.11975307).

    国产精品 国内视频| 男人舔女人下体高潮全视频| 亚洲国产精品999在线| 97人妻精品一区二区三区麻豆 | 在线观看日韩欧美| 久99久视频精品免费| 国产国语露脸激情在线看| 日本 欧美在线| 亚洲一区高清亚洲精品| 黄片播放在线免费| 91在线观看av| 亚洲av成人不卡在线观看播放网| 宅男免费午夜| 大陆偷拍与自拍| 叶爱在线成人免费视频播放| 日韩高清综合在线| 精品无人区乱码1区二区| 国产区一区二久久| 久久人妻av系列| √禁漫天堂资源中文www| 在线播放国产精品三级| 丝袜美足系列| 久热爱精品视频在线9| 麻豆成人av在线观看| 亚洲精品在线美女| 在线视频色国产色| 美女高潮喷水抽搐中文字幕| 国产精品精品国产色婷婷| 国产精品精品国产色婷婷| а√天堂www在线а√下载| 免费人成视频x8x8入口观看| 欧美日韩福利视频一区二区| 国产精品亚洲av一区麻豆| 国产精品久久电影中文字幕| 精品久久久久久久人妻蜜臀av | 亚洲三区欧美一区| 国产又爽黄色视频| 亚洲第一av免费看| 国产欧美日韩精品亚洲av| 久久精品人人爽人人爽视色| 又大又爽又粗| 在线av久久热| av天堂久久9| 一级毛片精品| 国产精品一区二区精品视频观看| 一进一出抽搐gif免费好疼| 自线自在国产av| 国产在线观看jvid| 19禁男女啪啪无遮挡网站| 极品教师在线免费播放| 黑丝袜美女国产一区| 啦啦啦 在线观看视频| 亚洲性夜色夜夜综合| 日韩av在线大香蕉| 三级毛片av免费| 国产亚洲av高清不卡| 欧美日韩黄片免| av中文乱码字幕在线| 亚洲精品中文字幕在线视频| 丁香欧美五月| 在线天堂中文资源库| 国产一区二区三区在线臀色熟女| 亚洲人成电影观看| 狂野欧美激情性xxxx| 午夜福利成人在线免费观看| 精品日产1卡2卡| 欧美久久黑人一区二区| 在线十欧美十亚洲十日本专区| 成年版毛片免费区| 国产成人欧美| 亚洲片人在线观看| videosex国产| 18美女黄网站色大片免费观看| 麻豆国产av国片精品| 国产欧美日韩综合在线一区二区| 成人18禁高潮啪啪吃奶动态图| 午夜日韩欧美国产| 成人特级黄色片久久久久久久| 精品电影一区二区在线| 国产欧美日韩一区二区三| 成人亚洲精品一区在线观看| 日韩大码丰满熟妇| 少妇的丰满在线观看| 亚洲精品国产色婷婷电影| 丁香六月欧美| 久久国产精品影院| 午夜福利18| 精品国产美女av久久久久小说| 国产一区二区三区综合在线观看| 51午夜福利影视在线观看| 嫁个100分男人电影在线观看| bbb黄色大片| 法律面前人人平等表现在哪些方面| 99久久精品国产亚洲精品| 亚洲国产中文字幕在线视频| 国产成人免费无遮挡视频| 欧美日韩精品网址| 国产精品久久久久久亚洲av鲁大| 亚洲成人国产一区在线观看| 久久人妻熟女aⅴ| 黄片大片在线免费观看| 午夜福利成人在线免费观看| 中文字幕高清在线视频| 亚洲欧美日韩另类电影网站| 亚洲 国产 在线| 男人舔女人下体高潮全视频| 搡老妇女老女人老熟妇| 亚洲一卡2卡3卡4卡5卡精品中文| 国产精品一区二区在线不卡| 免费在线观看视频国产中文字幕亚洲| 麻豆一二三区av精品| 丁香六月欧美| 国产精品1区2区在线观看.| 每晚都被弄得嗷嗷叫到高潮| 国产精品免费一区二区三区在线| 中亚洲国语对白在线视频| 久久香蕉激情| 久久久久久久久免费视频了| 黑人巨大精品欧美一区二区mp4| 欧美日本亚洲视频在线播放| 亚洲精品美女久久久久99蜜臀| 国产成人精品久久二区二区91| 国产麻豆成人av免费视频| 日本在线视频免费播放| 熟妇人妻久久中文字幕3abv| 久久人人97超碰香蕉20202| 色哟哟哟哟哟哟| 99re在线观看精品视频| 搡老妇女老女人老熟妇| 老司机午夜十八禁免费视频| 精品一区二区三区av网在线观看| 好看av亚洲va欧美ⅴa在| 夜夜看夜夜爽夜夜摸| 自线自在国产av| 国产精品98久久久久久宅男小说| 日本免费a在线| 又黄又爽又免费观看的视频| 欧美国产精品va在线观看不卡| 久久青草综合色| 一卡2卡三卡四卡精品乱码亚洲| 国产精品秋霞免费鲁丝片| 一进一出抽搐gif免费好疼| 欧美激情久久久久久爽电影 | 中文亚洲av片在线观看爽| 一区二区三区激情视频| 在线十欧美十亚洲十日本专区| 侵犯人妻中文字幕一二三四区| 窝窝影院91人妻| 亚洲免费av在线视频| 亚洲国产精品成人综合色| 少妇 在线观看| 欧美国产日韩亚洲一区| 国产精品久久电影中文字幕| 制服诱惑二区| 男女做爰动态图高潮gif福利片 | av福利片在线| 亚洲一码二码三码区别大吗| 一级a爱片免费观看的视频| 欧美在线黄色| 午夜激情av网站| 丰满人妻熟妇乱又伦精品不卡| 精品久久蜜臀av无| 夜夜夜夜夜久久久久| 精品乱码久久久久久99久播| 久久欧美精品欧美久久欧美| 免费在线观看日本一区| 欧美色欧美亚洲另类二区 | 亚洲国产精品sss在线观看| 亚洲在线自拍视频| 免费观看人在逋| 国产在线观看jvid| 欧美不卡视频在线免费观看 | 黄色a级毛片大全视频| 美女 人体艺术 gogo| 久久久久久久精品吃奶| 人人妻人人澡欧美一区二区 | 精品一品国产午夜福利视频| 精品乱码久久久久久99久播| 亚洲国产毛片av蜜桃av| 悠悠久久av| 亚洲av五月六月丁香网| 久久国产精品人妻蜜桃| 精品一区二区三区av网在线观看| 成人精品一区二区免费| 黑人操中国人逼视频| 国内久久婷婷六月综合欲色啪| 午夜久久久久精精品| 黄片播放在线免费| 国产单亲对白刺激| 国产精品久久电影中文字幕| 成人18禁在线播放| 一本大道久久a久久精品| 精品国产超薄肉色丝袜足j| 悠悠久久av| 岛国视频午夜一区免费看| 日本 欧美在线| 熟女少妇亚洲综合色aaa.| 午夜福利影视在线免费观看| 国产真人三级小视频在线观看| 极品教师在线免费播放| 欧美中文日本在线观看视频| 韩国av一区二区三区四区| 夜夜看夜夜爽夜夜摸| 久久精品国产亚洲av香蕉五月| 欧美日本中文国产一区发布| 狠狠狠狠99中文字幕| 一区二区三区精品91| 黄色片一级片一级黄色片| 精品久久久久久久久久免费视频| 色哟哟哟哟哟哟| 午夜免费观看网址| 美女高潮到喷水免费观看| 精品欧美国产一区二区三| svipshipincom国产片| 久久久久国产精品人妻aⅴ院| 亚洲 欧美 日韩 在线 免费| 一二三四社区在线视频社区8| 制服诱惑二区| 久久久久久久久中文| 韩国精品一区二区三区| 老汉色av国产亚洲站长工具| 午夜福利在线观看吧| √禁漫天堂资源中文www| 亚洲色图av天堂| 亚洲国产看品久久| 国产成人精品无人区| 桃色一区二区三区在线观看| 91在线观看av| 亚洲欧美日韩无卡精品| 露出奶头的视频| 男人操女人黄网站| 久久青草综合色| 成人av一区二区三区在线看| 露出奶头的视频| 国产97色在线日韩免费| av电影中文网址| 亚洲精品在线观看二区| 国产精品精品国产色婷婷| aaaaa片日本免费| av天堂久久9| 亚洲成人免费电影在线观看| 19禁男女啪啪无遮挡网站| 麻豆国产av国片精品| 亚洲色图综合在线观看| 99久久久亚洲精品蜜臀av| 久久精品影院6| 国产精华一区二区三区| 免费观看精品视频网站| 大陆偷拍与自拍| 亚洲精华国产精华精| 亚洲一区高清亚洲精品| 又黄又爽又免费观看的视频| 88av欧美| 亚洲欧美激情综合另类| 亚洲最大成人中文| 国产欧美日韩一区二区三| 在线观看午夜福利视频| 黄色丝袜av网址大全| 一级黄色大片毛片| 99热只有精品国产| 久久这里只有精品19| 亚洲av成人一区二区三| 久久久国产欧美日韩av| 久久人妻熟女aⅴ| 好男人在线观看高清免费视频 | 国产xxxxx性猛交| 日本免费a在线| 天堂√8在线中文| 国产精品美女特级片免费视频播放器 | 久久狼人影院| 男女下面插进去视频免费观看| 色av中文字幕| 亚洲三区欧美一区| 俄罗斯特黄特色一大片| 波多野结衣一区麻豆| 黄色a级毛片大全视频| 国产成人精品久久二区二区免费| 日日夜夜操网爽| 久久国产亚洲av麻豆专区| 免费在线观看视频国产中文字幕亚洲| 精品国产亚洲在线| 精品一品国产午夜福利视频| 日韩欧美免费精品| 黄色片一级片一级黄色片| 精品国内亚洲2022精品成人| 国产乱人伦免费视频| 悠悠久久av| 在线免费观看的www视频| 亚洲一码二码三码区别大吗| 制服诱惑二区| 久久九九热精品免费| 一区在线观看完整版| 人妻久久中文字幕网| 我的亚洲天堂| 看黄色毛片网站| 一级黄色大片毛片| 国产av在哪里看| 国产成年人精品一区二区| 亚洲精品中文字幕一二三四区| 精品熟女少妇八av免费久了| 欧美国产日韩亚洲一区| 亚洲专区字幕在线| 乱人伦中国视频| 亚洲精品美女久久av网站| 一级,二级,三级黄色视频| 欧美丝袜亚洲另类 | 国产精品99久久99久久久不卡| 88av欧美| 狂野欧美激情性xxxx| 中文亚洲av片在线观看爽| 中文字幕人妻丝袜一区二区| 日本 欧美在线| 窝窝影院91人妻| 日本欧美视频一区| 两性夫妻黄色片| 夜夜躁狠狠躁天天躁| 亚洲精品中文字幕在线视频| 国内毛片毛片毛片毛片毛片| 久久久久久久久免费视频了| 国产在线观看jvid| 久久久久久久精品吃奶| 欧美乱码精品一区二区三区| 欧美在线黄色| 久久性视频一级片| av电影中文网址| 在线免费观看的www视频| 成年人黄色毛片网站| 欧美国产日韩亚洲一区| 少妇粗大呻吟视频| 国产成人精品久久二区二区91| 日韩一卡2卡3卡4卡2021年| 一边摸一边抽搐一进一出视频| 亚洲av美国av| 非洲黑人性xxxx精品又粗又长| 色婷婷久久久亚洲欧美| 男女床上黄色一级片免费看| x7x7x7水蜜桃| 国产精品免费视频内射| 成人免费观看视频高清| 国内久久婷婷六月综合欲色啪| 亚洲成人免费电影在线观看| 亚洲精品中文字幕一二三四区| 人人澡人人妻人| 亚洲少妇的诱惑av| 日本精品一区二区三区蜜桃| 黄色丝袜av网址大全| 国产男靠女视频免费网站| 国产精品 国内视频| 久久 成人 亚洲| 国产一区在线观看成人免费| 亚洲精品国产精品久久久不卡| 国产亚洲欧美精品永久| 国产精品综合久久久久久久免费 | 亚洲avbb在线观看| 亚洲成人久久性| 大型av网站在线播放| 最新美女视频免费是黄的| 日韩精品青青久久久久久| 欧美在线一区亚洲| 国产成人免费无遮挡视频| 日本欧美视频一区| 久久人妻福利社区极品人妻图片| 一级毛片精品| 宅男免费午夜| 久久影院123| 男女做爰动态图高潮gif福利片 | 午夜福利高清视频| 人人妻人人澡人人看| 麻豆久久精品国产亚洲av| 高清毛片免费观看视频网站| 亚洲国产高清在线一区二区三 | 非洲黑人性xxxx精品又粗又长| 午夜精品国产一区二区电影| 国产成人一区二区三区免费视频网站| 久久久久亚洲av毛片大全| 无人区码免费观看不卡| 国产av在哪里看| 最新在线观看一区二区三区| 亚洲伊人色综图| 精品一区二区三区四区五区乱码| 久久人人97超碰香蕉20202| 精品熟女少妇八av免费久了| 欧美+亚洲+日韩+国产| 18禁黄网站禁片午夜丰满| 自线自在国产av| bbb黄色大片| 亚洲专区中文字幕在线| 极品人妻少妇av视频| 久久久久亚洲av毛片大全| 精品一区二区三区四区五区乱码| 免费看a级黄色片| 亚洲欧美激情综合另类| 天天躁狠狠躁夜夜躁狠狠躁| 老司机福利观看| 久久狼人影院| 国产片内射在线| 婷婷六月久久综合丁香| 国产精品一区二区免费欧美| 变态另类丝袜制服| 午夜日韩欧美国产| 欧美日韩乱码在线| 亚洲欧美精品综合一区二区三区| 午夜免费激情av| 国产视频一区二区在线看| 久久久久国内视频| 日本黄色视频三级网站网址| 久9热在线精品视频| 成人av一区二区三区在线看| 美女 人体艺术 gogo| 神马国产精品三级电影在线观看 | 成年人黄色毛片网站| 身体一侧抽搐| 在线观看日韩欧美| 人人妻,人人澡人人爽秒播| 免费不卡黄色视频| 涩涩av久久男人的天堂| 给我免费播放毛片高清在线观看| 国产精品98久久久久久宅男小说| 欧美激情高清一区二区三区| 可以在线观看毛片的网站| 亚洲片人在线观看| 国产麻豆成人av免费视频| 侵犯人妻中文字幕一二三四区| 香蕉丝袜av| 精品第一国产精品| 国产高清激情床上av| 极品人妻少妇av视频| 老汉色∧v一级毛片| 日韩av在线大香蕉| 国产精品永久免费网站| 色综合亚洲欧美另类图片| 亚洲第一欧美日韩一区二区三区| av中文乱码字幕在线| 两性夫妻黄色片| 亚洲精品一卡2卡三卡4卡5卡| АⅤ资源中文在线天堂| 日本vs欧美在线观看视频| 久久精品91蜜桃| 琪琪午夜伦伦电影理论片6080| 欧美丝袜亚洲另类 | 亚洲人成电影观看| 久久精品亚洲精品国产色婷小说| 高清黄色对白视频在线免费看| 精品国产国语对白av| 天堂√8在线中文| 亚洲国产精品久久男人天堂| 亚洲专区中文字幕在线| 禁无遮挡网站| 老熟妇乱子伦视频在线观看| 黄色女人牲交| 女性生殖器流出的白浆| 很黄的视频免费| 岛国在线观看网站| 久久久久久大精品| 夜夜躁狠狠躁天天躁| 国产精品久久久久久精品电影 | 国产国语露脸激情在线看| 亚洲欧美精品综合一区二区三区| 51午夜福利影视在线观看| 亚洲成国产人片在线观看| 亚洲少妇的诱惑av| 99精品久久久久人妻精品| 黑人巨大精品欧美一区二区mp4| 18禁美女被吸乳视频| 在线观看舔阴道视频| 国产精品久久久av美女十八| 国产高清有码在线观看视频 | 99久久综合精品五月天人人| 黄色 视频免费看| 91国产中文字幕| 色播在线永久视频| 国产精品一区二区三区四区久久 | 亚洲一码二码三码区别大吗| 天堂影院成人在线观看| 国产亚洲av高清不卡| 99热只有精品国产| 午夜老司机福利片| 欧美日韩瑟瑟在线播放| 国产成年人精品一区二区| 三级毛片av免费| 成年版毛片免费区| 亚洲成人国产一区在线观看| 99国产综合亚洲精品| 精品午夜福利视频在线观看一区| 欧美日韩精品网址| 91精品三级在线观看| 18禁黄网站禁片午夜丰满| 成人永久免费在线观看视频| 巨乳人妻的诱惑在线观看| 丝袜人妻中文字幕| 精品国产乱码久久久久久男人| 亚洲色图 男人天堂 中文字幕| 欧美久久黑人一区二区| 国产一区在线观看成人免费| 国产单亲对白刺激| av中文乱码字幕在线| 18禁黄网站禁片午夜丰满| 久久婷婷成人综合色麻豆| 18禁美女被吸乳视频| 真人做人爱边吃奶动态| 亚洲av成人av| 国产成人av激情在线播放| av视频免费观看在线观看| 成年女人毛片免费观看观看9| 丝袜在线中文字幕| 亚洲欧美一区二区三区黑人| 啦啦啦韩国在线观看视频| 久久天堂一区二区三区四区| 国产亚洲欧美精品永久| 亚洲国产看品久久| 美女扒开内裤让男人捅视频| 亚洲自拍偷在线| 女人精品久久久久毛片| 韩国精品一区二区三区| 在线观看免费午夜福利视频| 欧美亚洲日本最大视频资源| 后天国语完整版免费观看| 亚洲国产高清在线一区二区三 | 十八禁人妻一区二区| 超碰成人久久| 亚洲av第一区精品v没综合| 香蕉久久夜色| 国产成人精品在线电影| 高潮久久久久久久久久久不卡| 国产男靠女视频免费网站| 91成年电影在线观看| 亚洲中文日韩欧美视频| 国产真人三级小视频在线观看| 高清毛片免费观看视频网站| 一区二区三区激情视频| 国内毛片毛片毛片毛片毛片| 欧美成人免费av一区二区三区| 亚洲欧美日韩无卡精品| 亚洲第一欧美日韩一区二区三区| 两个人免费观看高清视频| 高潮久久久久久久久久久不卡| 免费女性裸体啪啪无遮挡网站| 久久久久久免费高清国产稀缺| 男人的好看免费观看在线视频 | 久久人人97超碰香蕉20202| 可以在线观看的亚洲视频| 亚洲一区二区三区色噜噜| 夜夜爽天天搞| 热re99久久国产66热| 一级a爱视频在线免费观看| 亚洲中文日韩欧美视频| 国产真人三级小视频在线观看| 18禁美女被吸乳视频| 成人免费观看视频高清| 欧美成人性av电影在线观看| 精品久久久久久久久久免费视频| 咕卡用的链子| 日本 av在线| 久久久国产精品麻豆| 欧美中文综合在线视频| 一级毛片精品| 久久亚洲精品不卡| 欧美激情 高清一区二区三区| 久久久久国内视频| 国产成人精品久久二区二区免费| 国产精品一区二区精品视频观看| 亚洲精品一区av在线观看| 可以在线观看的亚洲视频| 日韩 欧美 亚洲 中文字幕| 国产激情欧美一区二区| 日本 欧美在线| 国产av在哪里看| 很黄的视频免费| 久久中文看片网| 国产免费男女视频| 亚洲七黄色美女视频| ponron亚洲| 性色av乱码一区二区三区2| 国产一级毛片七仙女欲春2 | 99国产精品一区二区三区| 久久中文字幕人妻熟女| 午夜福利在线观看吧| 亚洲av五月六月丁香网| 色在线成人网| 性少妇av在线| 韩国精品一区二区三区| av片东京热男人的天堂| 亚洲美女黄片视频| 亚洲成av人片免费观看| 久久久久久人人人人人| 精品久久久久久久毛片微露脸| 色播在线永久视频| 黄片大片在线免费观看| 51午夜福利影视在线观看| 亚洲欧美日韩高清在线视频| 国产一级毛片七仙女欲春2 | 亚洲色图 男人天堂 中文字幕| ponron亚洲| 午夜久久久久精精品| 亚洲av电影在线进入| 亚洲一区中文字幕在线| 精品无人区乱码1区二区| 亚洲精品在线美女| 亚洲男人的天堂狠狠| 90打野战视频偷拍视频| 久久香蕉精品热| 99riav亚洲国产免费| 久久国产精品男人的天堂亚洲| 男男h啪啪无遮挡| 久久性视频一级片| 国产真人三级小视频在线观看| 最近最新中文字幕大全电影3 | 亚洲成人精品中文字幕电影| 女人被狂操c到高潮| 亚洲激情在线av| 可以免费在线观看a视频的电影网站| 国产精品久久久av美女十八| 精品高清国产在线一区| 成年人黄色毛片网站| 日韩欧美国产一区二区入口|