• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Time sequential influence maximization algorithm based on neighbor node influence①

    2022-07-06 03:23:14CHENJingQIZiyiLIUMingxin
    High Technology Letters 2022年2期

    CHEN Jing (陳 晶), QI Ziyi?, LIU Mingxin

    (?School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, P.R.China)(??Hebei Key Laboratory of Virtual Technology and System Integration, Qinhuangdao 066004, P.R.China)

    (???Hebei Key Laboratory of Software Engineering, Qinhuangdao 066004, P.R.China)

    (????College of Electronic and Information Engineering,Guangdong Ocean University, Zhanjiang 524088, P.R.China)

    Abstract In view of the forwarding microblogging, secondhand smoke, happiness, and many other phenomena in real life, the spread characteristic of the secondary neighbor nodes in this kind of phenomenon and network scheduling is extracted, and sequence influence maximization problem based on the influence of neighbor nodes is proposed in this paper. That is, in the time sequential social network, the propagation characteristics of the second-level neighbor nodes are considered emphatically, and k nodes are found to maximize the information propagation. Firstly, the propagation probability between nodes is calculated by the improved degree estimation algorithm. Secondly, the weighted cascade model (WCM) based on static social network is not suitable for temporal social network. Therefore, an improved weighted cascade model (IWCM) is proposed, and a second-level neighbors time sequential maximizing influence algorithm (STIM) is put forward based on node degree. It combines the consideration of neighbor nodes and the problem of overlap of influence scope between nodes,and makes it chronological. Finally,the experiment verifies that STIM algorithm has stronger practicability, superiority in influence range and running time compared with similar algorithms, and is able to solve the problem of maximizing the timing influence based on the influence of neighbor nodes.

    Key words: neighbor node influence, time sequential social network, influence maximization(IM), information propagation model

    0 Introduction

    With the rapid development of Internet, more and more people like to spread their ideas and information through social media to influence other users on the platform. How to make the shared information spread quickly and influence the widest range has become a hot issue in the field of social network analysis.For this kind of problem,Ref.[1] proposed the influence maximization problem for the first time. At present, the widely used problem of influence maximization based on static social network is to findkusers in the social network as seed nodes, so that the information can influence other users in the network as much as possible throughkusers under a specific propagation model.

    At present, most studies usually abstract social network as static graph, which simplifies the study of influence maximization problem, while neglecting some important characteristics existing in the actual network,thus causing the problem of inaccurate scope of influence. To solve this problem, in view of the timing of network and the propagation characteristics of neighbor nodes, taking the timing social network and secondlevel neighbor nodes as the research objects, and a timing influence maximization algorithm based on the influence of neighbor nodes and the improved weighted cascade model (IWCM) is proposed in this paper.This algorithm has strong pertinence and practicability,and can efficiently solve the problem of maximizing the time sequential influence based on the influence of neighbor nodes.

    Because time sequential effect maximization research based on the influence of the neighbor node is very few, and most studies focused on only considering the temporal characteristics of the network or only considering the influence of the neighbor nodes, without considering a variety of characteristics of network, so the timing effect maximization problem based on the influence of the neighbor node challenges are as follows.(1) The traditional information dissemination model does not consider the timing characteristics of the network, it cannot be applied to the timing social network; (2) In the process of seed node selection, it is necessary to comprehensively consider the propagation characteristics of the second-level neighbor nodes and the timing of the network.

    In order to solve the above problems, taking the time sequential social network as the research object,timing the traditional information transmission model,the time sequential influence maximization algorithm is designed based on the influence of neighbor nodes.Firstly, the influence measurement method of secondlevel neighbor nodes and the selection method of seed nodes are given. Secondly, the second-level neighbor node influence measurement method is time-serialized so that it can be applied to time-series social networks.Second-level neighbors time sequential maximizing influence algorithm (STIM) takes full account of various characteristics of the network, and is able to efficiently solve the problem of maximizing the time sequential influence based on the influence of neighbor nodes, and provides a foundation for the modeling of related problems, the selection of seed nodes and how to reduce the time complexity.

    The major contributions of this paper are as follows.

    (1) On the basis of the traditional weighted cascade propagation model, a new method of transmission probability between computing nodes is introduced,and an improved weighted cascade model is proposed.It enables information to be transmitted in the social network graph based on time sequential relationship.

    (2) In view of the propagation characteristics of secondary neighbor nodes in the network, the influence measurement method of secondary neighbor nodes is designed, and the timing characteristics of the network are integrated into the selection process of seed nodes.

    (3) It is verified that STIM algorithm can efficiently solve the problem of time sequential influence maximization based on the influence of neighbor nodes,and guarantee a high influence range under the premise of short running time.

    The structure of this paper is as follows. In Section 1, the related work is introduced. In Section 2,the main definition and propagation model of the time sequential influence maximization problem based on the influence of neighbor nodes are discussed. In Section 3, the correlation algorithm of the time sequential influence maximization problem based on the influence of neighbor nodes is described. In Section 4, the experiment results on different data sets are analyzed and compared. In Section 5, the work of this paper is summarized and prospected.

    1 Related work

    In recent years, researchers at home and abroad have done a lot of research work on impact maximization. Kempe et al.[2]proposed the greedy algorithm for the problem of influence maximization (IM) and proved that its operation result could reach an approximate optimal of 63%. However, the greedy algorithm still has a high time complexity and is not suitable for large-scale social networks. Leskovec et al.[3]optimized the traditional greedy algorithm for the submodularity and monotonicity of the influence maximization problem, and proposed a cost-effective lazy-forward(CELF) algorithm, which is about hundreds of times faster than the greedy algorithm. Goyal et al.[4]proposed CELF ++ by optimizing CELF algorithm, and proved that it was 35% -55% faster than CELF.

    All the above algorithms are greedy algorithms or improved greedy algorithms. In recent years, many researchers have studied heuristic algorithms with lower time complexity. Chen et al.[5]proposed the DegreeDiscount algorithm to solve the overlap problem of influence range of traditional degree estimation algorithms. The node with the highest degree is selected as the seed node, and then the degree of the neighbors of the selected node is discounted untilknodes are selected. Zhou and Gao[6]used PageRank algorithm to estimate the influence of nodes, and selected nodes with greater influence as alternative nodes to calculate the combined collision probability of alternative nodes. Li et al.[7]proposed an influence maximization algorithm based on k-kernel filtering in combination with the heuristic algorithm. It has been verified that the algorithm has a wider scope of influence compared with the existing heuristic algorithm.

    At present, more and more researchers begin to study the extension deformation with maximum effect.Qiu et al.[8]proposed the influence maximization algorithm of overlapping communities, which could increase the running time by up to 90% and could be applied to large social networks. Ren et al.[9]proposed the problem of influence maximization under multi-topic consciousness. Across-social network model of influence maximization for topic perception is designed by improving the linear threshold model, and seed nodes are selected by means of heuristic algorithm. Li et al.[10]took price and other factors into consideration, and studied how to price a product under multiple conditions to maximize income. Zhao et al.[11]took into account the situation that there are multiple relationships among users in social networks and that multiple relationships affect information transmission together, MRRRSET algorithm was proposed to solve the problem of influence maximization of multi-relationship social networks.

    Kim et al.[12]transferred the research object of maximum impact to the dynamic graph and designed an algorithm to deal with the update operation on the dynamic graph. Wang et al.[13]defined novel influence maximization (IM) queries in social networks and used a window sliding model to solve the problem of realtime impact maximization on dynamic graphs.Zhang et al.[14]studied the problem of influence maximization when there are different relationships in the network that mutually promote communication and inhibit communication. Guo and Lu[15]improved the sketch-based design influence maximization algorithm and applied it to the influence maximization problem of dynamic graphs, then recalculated the seed node set by calculating the influence of the deletion or addition of nodes on the current sampling set. Cao et al.[16]set a time window and regarded the connection between nodes as an action. The window slides down with time, and then the new action enters the window while the old action exits. According to the entry and exit of nodes, it is judged whether it is necessary to recalculate the seed nodes in the window obtained in the previous period to solve the problem of maximizing the influence in the dynamic graph. Wu et al.[17]studied the problem of influence maximization with the object of time sequence diagram, improved the traditional independent cascade model, and proposed two algorithms AIMT and IMIT to solve the problem of influence maximization of time sequence diagram. Wei et al.[18]studied the influence maximization problem of dynamic social networks with time change as the main feature, and proposed the influence maximization algorithm of dynamic social networks based on the feature. Yang et al.[19]proposed a method to measure the influence of complex network nodes with three levels of neighbors according to the propagation characteristics of neighbor nodes. This method regarded the neighbors of node level 2 and 3 with propagation attenuation characteristics as a whole to measure the influence ability of nodes.

    2 Problem definition

    2.1 Basic definition

    Definition 1 (time sequential social network)Given networkGT(V,E,TE) based on the time sequential relationship between social network diagram,Vrepresents node set,Erepresents the edge of the collection, including |V| =n, |E| =m,TErepresents the set of moments with connection between nodes in the network, andT(u,v)represents the set of moments with connection between nodesuandv.

    Take Fig.1 as an example to illustrate the social network graph based on time sequential relationship.Compared with static social network graphG(edge weights for the node transmission probability), time sequential social network graphGTare given the concept of timeline, each node only at specific time points, the weight on the edge represents the moment when there is a connection between the two nodes. For example, in Fig.1(b), nodeaand nodebare only connected at two moments 3 and 6, there is no connection at other moments. Now calculate the influence range of nodeain Fig.1(a) and Fig.1(b) respectively. The calculation process is as follows.

    For convenience of calculation, it can be supposed that the propagation probability between nodes in Fig.1(a) and Fig.1(b) is the same, and is the weight values of each edge in Fig.1(a). Therefore, in Fig.1(a), nodeaactivates nodeband nodecwith probabilities of 0.1 and 0.03, respectively. If nodecis activated at this time, then nodecactivates nodeewithaprobability of 0.1. If nodeeis activated at this time, then nodeasuccessfully activates nodecande,with an influence range of 2. In Fig.1(b), nodeaactivates nodeband nodecat moments 3 and 2 with probabilities of 0.1 and 0.03, respectively. If nodecis activated, then nodecwill be activated after time 2.Since nodecand nodeeare only connected at time 1,and nodecis not activated at time 1, nodecwill no longer be able to activate nodee.Therefore, nodeawill only successfully activate nodecand its influence range is 1.

    Therefore, it can be seen that if only the static graph-based influence maximization algorithm is applied to the time sequential social network graph, the correct result cannot be obtained. Therefore, it is necessary to study the time sequential relations based social network influence maximization problem.

    2.2 Calculation of propagation probability

    Definition 2 (propagation probability) The probability that the active nodeusuccessfully activates its neighbor nodevthrough the edge (u,v) is the propagation probability, expressed asPu,v∈[0,1].

    Fig.1 Static graph and time sequential social network graph

    In the traditional research of influence maximization algorithm, the degree estimation method is usually used to calculate the probability of inter-node propagation, that is, the reciprocal of in-degree of the node is used to estimate the probability of the node being activated by the upper node, as shown in Eq.(1).

    Pu,v=1/InDegree(v) (1)

    In Eq.(1), InDegree(v) represents the in-degree of nodev.

    This method has been well proved and applied in the traditional research of influence maximization algorithm. However, the method does not take into account the problem of different contact times between nodes in the social network graph based on time sequential relationship. Now, an example is given to illustrate this problem, as shown in Fig.2. In the static graphG,the in-degree of nodecis 2, the probability that nodecis affected by both nodesaanddis 1/2. But in figureGT, when considering the number of connections, it can be found that the contact number of nodescandais less than the contact number of nodescandd, and the more times a node is contacted, the greater the probability that it will be affected. Therefore, in Fig.2(b), the probability of nodecbeing affected by nodeashould be less than the probability of nodecbeing affected by noded.The calculation result is inconsistent with that in Fig.2(a), that is, it is inaccurate to use traditional degree estimation methods to calculate the probability of node influence in a time sequential social network graph.Therefore,the traditional calculation method needs to be improved.

    In the Eq.(2),|T(u,v)| represents the number of connections between nodeuand nodev,andvkrepresents all in-degree nodes of nodev.

    Fig.2 Schematic diagram of propagation probability calculation

    2.3 Improvement of weighted cascading model

    2.3.1 Traditional weighted cascading model

    In the traditional weighted cascade model(WCM),each directed edge(u,v) is given a real valuePu,v=1/InDegree(v) andPu,v∈[0,1], wherePu,vrepresents the probability that nodeusuccessfully influences nodevthrough the directed edge (u,v).The propagation process of WCM model is as follows: at the initial timet,the active nodeuhas only one chance to activate each of its inactive neighbor nodesv,and the activation probability isPu,v.If nodevhas multiple active parents at timet,then the active parent node activates nodevin any order at timet.Ifvis successfully activated, it becomes active node at timet+ 1 and tries to activate its next level of inactive neighbor node in the same way. This cycle continues until no new nodes in the network are activated.

    2.3.2 Improve the weighted cascade model

    Definition 3 (node active initial time) The time when nodevis successfully activated by its active parent nodeuis its active initial time, which is expressed asActvandActv=min{t|(t∈T(u,v) andt≥Actu)}.

    Take Fig.2(b) as an example, the set nodedis the seed node (the initial active time of the seed node is 0),and if it successfully activates nodec,Actc=min{4,5} =4.

    The traditional influence maximization algorithm does not consider the initial time when nodes are activated,while the initial time when nodes are successfully activated in the time sequential social network graph needs to be considered. Therefore, the traditional weighted cascade model is improved, and a new propagation model is obtained based on time sequential social network graph—improved weighted cascade model in this paper.

    Take Fig.1(b) as an example, let nodedbe the seed node and successfully activate its neighbor nodec,then the initial active time of nodec,Actc=2, that is, nodecis active after time 2. And because nodecand nodeeare only connected at time 1, at this timecis still in an inactive state, so nodecmust not activate nodee.

    The IWCM propagation model is proposed based on the WCM propagation model, so that information can be transmitted in the social network graph based on the time sequential relationship. The propagation process of information in the time sequential social network diagram through the IWCM model is described as follows.

    (1) In the initial network, the initial active time of all nodes is set toActv= - 1, indicating that all nodes are in an inactive state. Set the initial active time of seed nodeu,Actu=0, indicating that the seed node is in active state at the time of 0. At this point,seed nodeuactivates its neighbor nodevwith a certain probability, and nodeuhas only one chance to try to activate nodev.

    (3) No matter whether the node can activate nodevor not,uwill not try to activate nodevin the future propagation process.

    (4) If nodevis successfully activated, its initial active timeActvis recorded, whereActv∈T(u,v),Actu≦Actv≦max(T(u,v)).

    (5) In the whole network, information is transmitted from new active nodes to inactive neighbor nodes until no new nodes in the network are activated.

    2.4 Problem definition

    This section defines and explains the problem of time sequential influence maximizing based on the description of the above discussions. And the concept of node influence and marginal benefit in time sequential social network is introduced.

    Definition 4 (node influence) Node influence refers to the set of all nodes that can be successfully activated by nodevin the network, expressed asσ(v).

    Definition 5 (marginal benefit) The marginal benefit of nodevrefers to the increase in revenue that can be brought by adding a nodevto the seed setS.The calculation formula is shown in Eq.(3).

    Problem definition (time sequential influence maximization problem based on neighbor node influence) Given time sequential social network graphGT= (V,E,TE), and specific propagation model, in the time sequential social network to find a node setS,the number of nodes in the setS|S|=k, make the effect of the setSmost widely, setSis the seed node set ofGT.

    3 Time sequential influence maximization algorithm based on neighbor node influence

    3.1 Influence measurement method of second-level neighbor nodes

    The influence of nodes on second-order neighbor nodes can be explained by independent probability events in probability statistics. Independent probabilistic events are defined as:if eventAand eventBare independent,thenP(AB)=P(A)×P(B),that is,the probability of eventAand eventBoccurring at the same time is the probability of eventAmultiplied by the probability of eventBoccurring.

    Similarly, in the time sequential social network as shown in Fig.3, the probability that node 1 activates node 4 through node 2 is the probability that node 1 activates node 2 multiplied the probability that node 2 activates node 4 , that is,P(node1activatesnode4throughnode2)=0.2 ×0.3 =0.06.

    Fig.3 Social network diagram (second-level neighbor)

    Given the time sequential social networkGT(V,E,TE),VandErepresent network node set and edge set respectively, andTErepresents the set at the time when there is a connection between nodes.According to the improved weighted cascading model, the probability that nodeuactivates its neighbor nodevisPu,v,and the probability that nodevactivates its next-level nodev1isPv,v1,then the probability that nodeuactivates its neighbor node and second-level neighbor node along the path (u,v,v1) is shown in Eq.(4).

    P=Pu,v+Pu,v×Pv,v1(4)wherein,Prepresents the sum of the probability that nodeuactivates its neighbor nodes and second-level neighbor nodes on the path (u,v,v1).

    Therefore, nodeuis the sum of activation probabilities of all its neighbor nodes and second-level neighbor nodes in the whole network, as shown in Eq.(5).

    Since the influence range of nodes is directly affected by the activation probability between nodes,Eq.(5) can be used to estimate the influence range of nodes. However, when information is transmitted in the actual social network as shown in Fig.3, node 3 is set as the seed node, and the information transmission process is as follows.

    Time step 0 Activate node 3.

    Time step 1 Node 3 tries to activate node 2 and node 1 with probabilities of 0.15 and 0.2 respectively,assuming that both node 2 and node 1 are successfully activated.

    Time step 2 Since node 2 is already active at this time, node 1 will not try to activate node 2 again.However, when calculating the influenceP1of node 1,the influence probability of node 1 on node 2 has been included, which is inconsistent with the actual transmission process.

    Considering the influence range overlap between the nodes, when nodeiis selected as seed nodes, all parent nodesuand ancestor nodesv(the relationship between nodei, nodeu, and nodevare shown in Fig.4) are treated with influence discount. In its estimate, subtract the overlapping part of influence, as shown in Eqs(6) and (7).

    wherein, nodevis the ancestor node of nodei, and nodeuis the parent node of nodei.

    Fig.4 Schematic diagram of node relationship

    3.2 Timing of influence

    Due to the addition of time sequential relationship in time sequential social network, Eqs(6) and (7)need to be time-serialized.As shown in Fig.5, assuming that the initial active time of node 4 is 2, node 4 is already active when node 4 contacts node 2 and node 5. Therefore, node 2 and node 5 have a chance to be activated by node 4 respectively. However, if the initial active time of node 4 is assumed to be 5, node 4 is inactive in the two moments (2 and 3) when node 2 and node 4 are connected, so node 4 has no opportunity to activate node 2. But, node 4 is already active at the time 6 when node 4 is in contact with node 5.Therefore, node 5 has a chance to be activated by node 4 once. It can be seen that, since the initial active time of all nodes in the network is in an unknown state, the larger the maximum value of the contact time between two nodes, the greater the chance that the node has to be tried to activate.From the above examples, it can be seen that the maximum value of the contact time between two nodes max(T(u,v)) will have an impact on the influence range of nodes, and the larger the maximum value of the contact time between two nodes, the wider the influence range of nodes. Therefore, consideration of max(T(u,v)) is added into the estimation formula of the influence range of nodes, and the time-serialized formula is

    Fig.5 Time sequential social network (second-level neighbor)

    where,Pv′is the estimated value of influence of nodeuafter discount.

    At the same time, the influence of its ancestor nodevis updated, and the influence range of the updated node is shown in Eq.(10).

    3.3 Description of STIM algorithm

    The main research strategy of STIM algorithm proposed is heuristic strategy, that is, the influence of non-seed nodes is estimated in each seed node selection process, and the nodeuwith the largest estimated value is selected as the seed node.

    The idea of STIM algorithm is as follows: the problem of time sequential social network influence maximization is solved in two steps. Firstly, the node influence of the second-level neighbor is estimated according to the measurement method in subsection 3.1.Then, according to the influence estimation results,the nodeuwith the largest estimated value is selected as the next seed node, until allkseed nodes are found out. The specific description process of STIM algorithm is Algorithm 1.

    Algorithm 1 STIM Input: social network GT(V,E,TE), k;Output: seed set S;(1) Calculate propagation probability between nodes in time sequential social network according to the calculation method of propagation probability between nodes in subsection 3.2;(2) Use Eq.(5) to calculate the influence of all nodes in the network, and make it time sequenced;(3) Select the node v with the greatest influence as the first seed node, mark node v as active state and add it to S;(4) Update the influence estimate of parent node of S and its grandfather node according to Eqs(9) and (10);(5) Select the node u with the largest influence estimation after updating as the second seed node and add it to S;(6) Repeat Steps (3) to (5) until k nodes are selected.

    3.4 Pseudo code

    GT(V,E,TE) is used to represent a social network based on time sequential relationship, whereVrepresents the set of nodes,Erepresents the set of edges,TErepresents the set of contact moments between nodes,krepresents the number of seed nodes required, andSrepresents the set of seed nodes. The pseudo code of the STIM algorithm is Algorithm 2.

    Algorithm 2 Time sequential influence maximization algorithm based on neighbor node influence Input: social network GT(V,E,TE),k;Output: seed set S;(1) Initialize S =?;(2) For any node u in graph GT do;(3) Calculate Pu,v; //v indicates the next-level neighbor node of node u;(4) End for;(5) For any node u in graph GT do;(6) Pu′ = Pu - Pu,i × max(T(u,i) - ∑i1∈O(i)Pu,iPi,i1 ×min(max(T(u,i), max(T(i, i1)));(7) End for;(8) For i = 1 to k do;(9) v = argmaxu{Pu′| u ∈V/S};(10) S = S ∪{v};(11) End for.

    In Algorithm 2,Step (1) initializes the seed setSto an empty set; In Steps (2) -(4), the propagation probability between nodes in time sequential social network is obtained based on in subsection 2. 2; Steps(5) -(7) estimate the influence range of all nodes;Steps (8) -(11) find the firstknodes with a larger estimated influence range and incorporate them into the seed set.

    The time complexity analysis of STIM algorithm is as follows: let the number of nodes of networkGT(V,E,TE) ben, the number of edges bem, the size of seed set bek,and the number of contact moments between nodes in the network bet.In Algorithm 1, Steps(2) -(4), the time complexity generated when calculating the propagation probability between nodes isO(m);Steps (5) -(7) estimate the influence scope of each node in the time sequential social network, and the time complexity generated isO(n); Steps (8) -(11) selectknodes with the greatest influence and iteratekrounds, so the time complexity isO(k); To sum up, the time complexity of STIM algorithm isO(n+m+k).Since the value ofkis generally less than or equal to 50, that is, far less thannandm, soO(k)can be ignored, then the time complexity of the STIM algorithm isO(n+m).

    4 Experiment and result analysis

    Three real datasets of different scales are selected as input data to realize seed node selection and seed influence calculation in time sequential social network graph based on neighbor node influencein.

    4.1 Experimental data and parameter setting

    Dataset 1 used in the experiment is derived from the online social network of University of California,composed of private messages. Edges (u,v,t) indicate that userusends a private message to uservat timet[20].Dataset 2 is the E-mail data of a large European research institution, and the directed edges (u,v,t)indicate that userucommunicates with uservthrough E-mail at timet[21].Dataset 3 is a time sequential network that edits each other’s ‘conversation’ pages on behalf of Wikipedia users. Edges (u,v,t) indicate that useruhas edited the conversation page of uservat timet[22].The number of experimental datasets is shown in Table 1.

    Table 1 Adoption number of experimental datasets

    In this paper, the STIM algorithm is divided into two steps. The first step is to calculate the propagation probability between all nodes. The second step is to estimate the influence range of all nodes and selectknodes with the largest influence range as the seed node set. While realizing the algorithm, some classical algorithms and new algorithms in recent years with better running effect are reproduced. The advantages and disadvantages of each algorithm are compared and analyzed from two aspects of the influence range and running time of the algorithm.

    Coverage threshold maximum influence (CTMD)is a degree maximum heuristic algorithm based on coverage threshold. This algorithm uses the improved kshell algorithm to calculate the influence of nodes in the network and select the initial seed node set. Meanwhile, the activation probability of nodes within two degrees is considered.

    Influence estimation influence ranking (IEIR) is an algorithm based on influence estimation and influence ranking, and it has good comprehensive ability among traditional influence maximization algorithms at present.

    DegreeDiscount is the representative of the heuristic algorithm. The node with the highest degree is selected as the seed node, and then the degree of the neighbors of the selected node is discounted untilknodes are selected.

    Random, as a benchmark comparison method,simply randomly selectsknon-repeating nodes from the time sequential social network graph as seed nodes.

    In the stage of seed node selection, CTMD algorithm, IEIR algorithm, DegreeDiscount algorithm,Random algorithm and STIM algorithm select the size of seed node setkas 5,10,15,20,25,30,35,40,45, and 50 respectively.

    4.2 Influence of seed nodes in different algorithms

    The correlation algorithm is tested on three different datasets. Scope of influence refers to the number of nodes ultimately affected by calculating the seed set through the algorithm in the initial stage of the network to spread the seed set in the network. The wider the influence range of the seed set,the higher the accuracy of the algorithm.

    Fig.6 shows the seed nodes impact on the Wiki-Talk dataset.As can be seen from Fig.6, among many comparison algorithms, IEIR algorithm and STIM algorithm have a wide influence range, while the influence range of other algorithms is at a low level. When selecting different number of seed nodes, with the increase of the number of seed nodes,the influence range of IEIR algorithm is always in a stable state. As the number of selected seed nodes increases,the influence range of STIM algorithm expands. That is, when the number of seed nodes is less than 25, the influence range of IEIR algorithm is higher than that of STIM algorithm; but when the number of seed nodes is greater than 25, the influence range of STIM algorithm is higher than that of IEIR algorithm.

    Fig.6 Effect of seed nodes on Wiki-Talk dataset

    Fig.7 is an effect diagram of seed nodes on CollegeMsg dataset. It can be seen from Fig.7 that the influence range of STIM algorithm is much higher than that of other algorithms regardless of the size of the seed node set. Atk= 50,the influence range of STIM algorithm is 7.82 times,4.56 times,2.25 times, and 6.92 times that of IEIR algorithm, CTMD algorithm,DegreeeDiscount algorithm, and Random algorithm respectively. Among other algorithms, DegreeeDiscount algorithm has better effect, while IEIR algorithm, CTMD algorithm, and Random algorithm have worse effect.

    Fig.7 Effect of seed nodes on CollegeMsg dataset

    Fig.8 is an effect diagram of seed nodes on Email-Eu-Core dataset. As can be seen from Fig.8, STIM algorithm has the widest influence range, followed by IEIR algorithm and DegreeDiscount algorithm, and CTIM algorithm and Random algorithm have the smallest influence range. Whenk <15, the influence range of IEIR algorithm is higher than DegreeDiscount algorithm, while whenk >15,IEIR algorithm is overtaken by DegreeDiscount algorithm. Whenk= 15,the influence ranges of CTMD algorithm and Random algorithm reach the same level.

    Fig.8 Effect of seed nodes on Email-Eu-Core dataset

    4.3 Selection time of seed nodes in different algorithms

    In this subsection, under the IWCM propagation model, the running time of CTMD algorithm, IEIR algorithm, DedegreeDiscount algorithm, Random algorithm, and STIM algorithm are respectively counted.The calculated time is the running time of 50 seed nodes selected from three datasets of different scales,as shown in Table 2.

    Table 2 Running time of STIM algorithm

    As can be seen from Table 2, the running time of STIM algorithm, CTMD algorithm, DedegreeDiscount algorithm, IEIR algorithm, and Random algorithm grows gradually with the gradual increase of the scale of time sequential social network. IEIR algorithm has the longest running time, followed by STIM algorithm, and other algorithms have relatively short running time.

    The analysis of the experimental results shows that the Random algorithm has the shortest running time because of the randomness of seed node selection, but its influence range is much smaller than other algorithms.IEIR algorithm is a traditional influence maximization algorithm with better comprehensive ability. Although its influence range is relatively large, its running time is also the longest. CTMD algorithm is a relatively new influence maximization algorithm in the past two years.Although its running time is short, it does not consider the factors of time sequential and second-level neighbor nodes, which leads to the shrinkage of the influence range. DegreeDiscount algorithm is a heuristic algorithm that only considers first-level neighbor nodes.Compared with STIM algorithm, the running time of DegreeDiscount algorithm is smaller than that of STIM algorithm because the scope of neighbors it considers is smaller, but its influence scope is also much smaller than that of STIM algorithm.

    5 Conclusion

    In recent years, social phenomena such as secondhand smoke, happiness transmission and microblog forwarding have two main characteristics: (1) Time sequential change. As time goes on, the topology of such networks also changes constantly; (2) Secondary dissemination of information. Information is spread widely in the category of secondary neighbors in such networks. In view of the two characteristics of the network, the STIM algorithm is proposed in this paper.Firstly, the propagation probability between nodes is calculated by the improved degree estimation algorithm;Secondly,the traditional weighted cascade model is improved so that it can be applied to social networks based on time sequential relationships; Finally,STIM algorithm is proposed based on the improved weighted cascade model. Experimental results show that STIM algorithm is more targeted than CTMD, DedegreeDiscount, IEIR, Random and other influential maximization algorithms with universal characteristics.In the three networks selected in this section with time sequential characteristics and next-level transmission characteristics of information, STIM algorithm shows its advantages in terms of influence scope and running time, and can better solve the problem of maximizing the influence of next-level neighbor’s time sequential social network.

    The following in-depth studies will be carried out in the future work: (1) Research the actual factors of the time sequential influence maximization problem based on the influence of neighbor nodes, such as the different information types, cost, time; (2) Expand the algorithm so that it can be applied to time sequential social networks targeting multi-level neighbor nodes.

    久久人人爽av亚洲精品天堂| 精品久久久久久久人妻蜜臀av | 99re在线观看精品视频| 丝袜美腿诱惑在线| 性少妇av在线| 香蕉久久夜色| 亚洲自拍偷在线| 成人亚洲精品一区在线观看| 好男人在线观看高清免费视频 | 国产视频一区二区在线看| 中文字幕人成人乱码亚洲影| 久久亚洲真实| 亚洲欧洲精品一区二区精品久久久| 国产伦一二天堂av在线观看| 国产精品久久久久久亚洲av鲁大| 黄色视频,在线免费观看| 大香蕉久久成人网| svipshipincom国产片| 欧美激情久久久久久爽电影 | 日韩欧美在线二视频| 国产精品电影一区二区三区| 一区二区三区高清视频在线| 老汉色av国产亚洲站长工具| 亚洲成av人片免费观看| www国产在线视频色| 正在播放国产对白刺激| 国产av一区在线观看免费| av天堂久久9| 久久青草综合色| 波多野结衣巨乳人妻| 91精品国产国语对白视频| 亚洲自偷自拍图片 自拍| a在线观看视频网站| 别揉我奶头~嗯~啊~动态视频| 真人一进一出gif抽搐免费| 欧美黄色淫秽网站| 自拍欧美九色日韩亚洲蝌蚪91| 日本三级黄在线观看| 欧美一级a爱片免费观看看 | 亚洲国产毛片av蜜桃av| 69精品国产乱码久久久| aaaaa片日本免费| 欧美色欧美亚洲另类二区 | 亚洲精品一卡2卡三卡4卡5卡| 亚洲专区国产一区二区| 97人妻天天添夜夜摸| 亚洲精品在线美女| 老汉色∧v一级毛片| 亚洲伊人色综图| 国产精品久久久人人做人人爽| 日韩三级视频一区二区三区| 国产精品av久久久久免费| 一个人观看的视频www高清免费观看 | 欧美丝袜亚洲另类 | 国产激情久久老熟女| 一级毛片精品| 欧美不卡视频在线免费观看 | 久久久久国产精品人妻aⅴ院| 12—13女人毛片做爰片一| 日韩 欧美 亚洲 中文字幕| 女生性感内裤真人,穿戴方法视频| 淫秽高清视频在线观看| 精品少妇一区二区三区视频日本电影| 国产成人av教育| 色综合欧美亚洲国产小说| 精品久久久精品久久久| 纯流量卡能插随身wifi吗| 国产高清激情床上av| 嫩草影院精品99| 午夜精品久久久久久毛片777| 欧洲精品卡2卡3卡4卡5卡区| 国产成人精品久久二区二区免费| 成人三级黄色视频| 男女下面进入的视频免费午夜 | 国产精品一区二区精品视频观看| 亚洲电影在线观看av| 麻豆久久精品国产亚洲av| 久久国产乱子伦精品免费另类| 国产蜜桃级精品一区二区三区| 极品教师在线免费播放| 香蕉国产在线看| 熟女少妇亚洲综合色aaa.| 成人18禁在线播放| 一级毛片高清免费大全| 国产精品亚洲一级av第二区| 男女午夜视频在线观看| 黄片小视频在线播放| 久久中文字幕一级| 嫁个100分男人电影在线观看| 久久精品国产99精品国产亚洲性色 | 自拍欧美九色日韩亚洲蝌蚪91| 国产精品野战在线观看| 国产精品99久久99久久久不卡| 亚洲少妇的诱惑av| 久久中文看片网| 视频在线观看一区二区三区| 国产精品亚洲av一区麻豆| 很黄的视频免费| 91麻豆av在线| 国产成人啪精品午夜网站| 免费观看精品视频网站| 欧美绝顶高潮抽搐喷水| 亚洲电影在线观看av| 18禁观看日本| 午夜福利欧美成人| 天堂动漫精品| 搡老妇女老女人老熟妇| 日韩有码中文字幕| 国产精品 欧美亚洲| 亚洲国产欧美网| 国产一级毛片七仙女欲春2 | 午夜免费观看网址| 久久人妻熟女aⅴ| 精品一区二区三区四区五区乱码| 亚洲av电影不卡..在线观看| 老熟妇乱子伦视频在线观看| 亚洲熟妇中文字幕五十中出| 在线观看免费午夜福利视频| 日韩精品中文字幕看吧| 亚洲,欧美精品.| 亚洲伊人色综图| 狠狠狠狠99中文字幕| 十八禁人妻一区二区| 黄色丝袜av网址大全| 精品国产超薄肉色丝袜足j| 亚洲精品美女久久av网站| bbb黄色大片| 久久精品国产综合久久久| 99re在线观看精品视频| 人成视频在线观看免费观看| 男人操女人黄网站| 又黄又粗又硬又大视频| 亚洲片人在线观看| 午夜精品在线福利| 亚洲自偷自拍图片 自拍| 午夜福利一区二区在线看| 一级片免费观看大全| 久久人妻av系列| 纯流量卡能插随身wifi吗| 欧美日韩亚洲综合一区二区三区_| 色综合欧美亚洲国产小说| 在线观看66精品国产| 亚洲无线在线观看| 多毛熟女@视频| 激情视频va一区二区三区| 1024香蕉在线观看| 欧美色欧美亚洲另类二区 | 波多野结衣一区麻豆| 丁香六月欧美| 亚洲自拍偷在线| 午夜福利在线观看吧| 亚洲 欧美一区二区三区| 日本五十路高清| 欧美在线一区亚洲| 9色porny在线观看| 日韩精品青青久久久久久| 一a级毛片在线观看| 免费人成视频x8x8入口观看| 黄色a级毛片大全视频| 午夜免费成人在线视频| 国产精华一区二区三区| 一级毛片精品| 美女免费视频网站| 欧美人与性动交α欧美精品济南到| 亚洲一区二区三区不卡视频| 美女高潮喷水抽搐中文字幕| 老司机午夜福利在线观看视频| 亚洲欧美日韩另类电影网站| 嫩草影院精品99| √禁漫天堂资源中文www| 国产一级毛片七仙女欲春2 | 国内久久婷婷六月综合欲色啪| 国产一区二区三区视频了| 亚洲狠狠婷婷综合久久图片| 黑人欧美特级aaaaaa片| 91成人精品电影| 这个男人来自地球电影免费观看| 精品久久久久久久人妻蜜臀av | 久久久精品国产亚洲av高清涩受| 久久国产精品影院| 亚洲九九香蕉| 亚洲欧美日韩高清在线视频| 一边摸一边抽搐一进一出视频| 免费在线观看完整版高清| 18禁黄网站禁片午夜丰满| 日韩精品中文字幕看吧| 欧美日韩中文字幕国产精品一区二区三区 | netflix在线观看网站| 日本 av在线| 99精品久久久久人妻精品| 久久精品亚洲熟妇少妇任你| 女性生殖器流出的白浆| 午夜久久久久精精品| 久久人人97超碰香蕉20202| 国产成人精品久久二区二区91| 精品久久久久久久久久免费视频| 亚洲国产看品久久| 久久久精品国产亚洲av高清涩受| 久久精品91蜜桃| 久久中文字幕一级| 久久人妻av系列| 欧美日本亚洲视频在线播放| 中文字幕人妻熟女乱码| 亚洲色图av天堂| 国产三级黄色录像| 国产精品一区二区在线不卡| 国产xxxxx性猛交| 给我免费播放毛片高清在线观看| 又黄又爽又免费观看的视频| 色综合站精品国产| 欧美中文综合在线视频| 村上凉子中文字幕在线| 日韩av在线大香蕉| 亚洲国产日韩欧美精品在线观看 | 亚洲精品久久国产高清桃花| 女人爽到高潮嗷嗷叫在线视频| 国产精品久久久人人做人人爽| 久久这里只有精品19| 久久久久国产精品人妻aⅴ院| 久久久水蜜桃国产精品网| 欧美另类亚洲清纯唯美| 99国产极品粉嫩在线观看| 免费搜索国产男女视频| 久久精品国产综合久久久| 国产91精品成人一区二区三区| 两人在一起打扑克的视频| 亚洲三区欧美一区| 国产精品久久久久久人妻精品电影| 啦啦啦韩国在线观看视频| 久久狼人影院| 夜夜夜夜夜久久久久| 亚洲熟女毛片儿| 91av网站免费观看| 在线播放国产精品三级| 女同久久另类99精品国产91| 丁香欧美五月| 露出奶头的视频| 桃色一区二区三区在线观看| 91精品国产国语对白视频| 久热爱精品视频在线9| 天天躁夜夜躁狠狠躁躁| 嫩草影院精品99| 极品教师在线免费播放| av网站免费在线观看视频| 中文字幕色久视频| 少妇 在线观看| 精品一品国产午夜福利视频| 久久久久九九精品影院| 亚洲精品av麻豆狂野| 99国产极品粉嫩在线观看| 一个人观看的视频www高清免费观看 | 男人舔女人下体高潮全视频| 国产精品一区二区三区四区久久 | 日韩精品免费视频一区二区三区| 亚洲黑人精品在线| 久久久久久久午夜电影| 无人区码免费观看不卡| 欧美乱色亚洲激情| 村上凉子中文字幕在线| 18禁裸乳无遮挡免费网站照片 | 国产精品一区二区免费欧美| 亚洲少妇的诱惑av| 一级片免费观看大全| 中文字幕高清在线视频| 一级a爱片免费观看的视频| www.www免费av| 真人做人爱边吃奶动态| 国产又色又爽无遮挡免费看| 如日韩欧美国产精品一区二区三区| 亚洲国产欧美网| 他把我摸到了高潮在线观看| 免费在线观看亚洲国产| 女同久久另类99精品国产91| 久久精品人人爽人人爽视色| 午夜久久久在线观看| 每晚都被弄得嗷嗷叫到高潮| or卡值多少钱| 国产精品 欧美亚洲| 亚洲国产欧美日韩在线播放| av在线播放免费不卡| 黑丝袜美女国产一区| 色尼玛亚洲综合影院| 欧美激情久久久久久爽电影 | 免费看美女性在线毛片视频| www国产在线视频色| 免费无遮挡裸体视频| 男女做爰动态图高潮gif福利片 | 99久久99久久久精品蜜桃| 97人妻精品一区二区三区麻豆 | 午夜福利一区二区在线看| 国产熟女午夜一区二区三区| 91九色精品人成在线观看| av欧美777| 女警被强在线播放| 欧美国产精品va在线观看不卡| 久久精品国产清高在天天线| 99在线视频只有这里精品首页| 在线观看舔阴道视频| 国产精品香港三级国产av潘金莲| 在线观看午夜福利视频| 国产激情欧美一区二区| 日韩成人在线观看一区二区三区| av网站免费在线观看视频| 我的亚洲天堂| 91成人精品电影| 久久精品成人免费网站| 国产aⅴ精品一区二区三区波| 麻豆成人av在线观看| 琪琪午夜伦伦电影理论片6080| 国产单亲对白刺激| 精品福利观看| 男女床上黄色一级片免费看| 日韩有码中文字幕| 国产免费男女视频| 久久亚洲精品不卡| 波多野结衣一区麻豆| 美国免费a级毛片| 一区福利在线观看| 国产av又大| 黄色毛片三级朝国网站| 国产三级在线视频| 色精品久久人妻99蜜桃| 高潮久久久久久久久久久不卡| 97碰自拍视频| 亚洲av熟女| 久久久久久久久免费视频了| 在线观看免费视频网站a站| 女人被狂操c到高潮| 99国产极品粉嫩在线观看| 国产欧美日韩综合在线一区二区| 男人舔女人的私密视频| 国产麻豆成人av免费视频| 每晚都被弄得嗷嗷叫到高潮| 欧美日韩福利视频一区二区| 999久久久国产精品视频| 一级作爱视频免费观看| 男人舔女人的私密视频| 老司机午夜十八禁免费视频| 午夜免费成人在线视频| 首页视频小说图片口味搜索| 国产精品久久久av美女十八| 99精品久久久久人妻精品| 97人妻天天添夜夜摸| 中文字幕精品免费在线观看视频| 91成人精品电影| 国产精品美女特级片免费视频播放器 | 19禁男女啪啪无遮挡网站| 中出人妻视频一区二区| 国产高清视频在线播放一区| 日韩av在线大香蕉| 我的亚洲天堂| 少妇被粗大的猛进出69影院| 欧美中文日本在线观看视频| 国产成人欧美| 午夜福利在线观看吧| 国产伦一二天堂av在线观看| 免费高清视频大片| 国产成人啪精品午夜网站| 日韩欧美国产一区二区入口| 亚洲精品中文字幕一二三四区| 两个人看的免费小视频| 最好的美女福利视频网| 嫁个100分男人电影在线观看| 真人做人爱边吃奶动态| 日本欧美视频一区| 一区在线观看完整版| 激情在线观看视频在线高清| АⅤ资源中文在线天堂| 色综合欧美亚洲国产小说| 国产99白浆流出| 香蕉丝袜av| 夜夜躁狠狠躁天天躁| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲人成电影观看| 咕卡用的链子| 国产精品,欧美在线| 国产97色在线日韩免费| 国产亚洲精品久久久久久毛片| 搡老妇女老女人老熟妇| 99国产精品99久久久久| 精品乱码久久久久久99久播| 精品午夜福利视频在线观看一区| 99久久久亚洲精品蜜臀av| 亚洲精华国产精华精| 电影成人av| 99久久精品国产亚洲精品| 又紧又爽又黄一区二区| 成人亚洲精品一区在线观看| 国产日韩一区二区三区精品不卡| 亚洲精品一区av在线观看| 亚洲精华国产精华精| 香蕉久久夜色| 欧美黑人欧美精品刺激| 精品午夜福利视频在线观看一区| 色哟哟哟哟哟哟| 视频在线观看一区二区三区| 国产亚洲精品av在线| 婷婷六月久久综合丁香| 国产精品秋霞免费鲁丝片| 亚洲国产高清在线一区二区三 | 亚洲精品在线观看二区| 午夜福利视频1000在线观看 | 亚洲av第一区精品v没综合| 免费观看精品视频网站| 精品一品国产午夜福利视频| 99久久精品国产亚洲精品| 精品一区二区三区视频在线观看免费| 丝袜人妻中文字幕| 9热在线视频观看99| 天天添夜夜摸| 亚洲情色 制服丝袜| 久久狼人影院| 97超级碰碰碰精品色视频在线观看| ponron亚洲| 免费在线观看亚洲国产| 中文字幕人成人乱码亚洲影| 久久影院123| 老汉色av国产亚洲站长工具| 国产亚洲精品av在线| 黄频高清免费视频| 麻豆成人av在线观看| 国产色视频综合| 午夜精品国产一区二区电影| aaaaa片日本免费| 美女免费视频网站| 日韩欧美国产在线观看| 99re在线观看精品视频| 97超级碰碰碰精品色视频在线观看| 一进一出抽搐动态| 久久久久久久久中文| 国产免费av片在线观看野外av| 久久这里只有精品19| 国产99白浆流出| 国产成人精品久久二区二区91| 一a级毛片在线观看| 成年人黄色毛片网站| 超碰成人久久| 99riav亚洲国产免费| 色哟哟哟哟哟哟| 国产精品秋霞免费鲁丝片| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲精品国产色婷婷电影| 亚洲av成人av| 91在线观看av| 母亲3免费完整高清在线观看| 午夜两性在线视频| 国产精品美女特级片免费视频播放器 | 亚洲第一青青草原| 麻豆一二三区av精品| 香蕉丝袜av| 精品福利观看| 午夜精品久久久久久毛片777| 久久久久亚洲av毛片大全| 大码成人一级视频| 亚洲,欧美精品.| 久久国产亚洲av麻豆专区| 欧美日韩亚洲综合一区二区三区_| 亚洲午夜精品一区,二区,三区| 午夜福利在线观看吧| 丝袜在线中文字幕| 女人精品久久久久毛片| 色综合亚洲欧美另类图片| 看免费av毛片| 搡老妇女老女人老熟妇| 亚洲中文字幕日韩| 久久久精品国产亚洲av高清涩受| 男人舔女人下体高潮全视频| 高潮久久久久久久久久久不卡| 国产一区二区三区在线臀色熟女| 老司机在亚洲福利影院| tocl精华| 男女午夜视频在线观看| 伦理电影免费视频| 视频区欧美日本亚洲| 欧美国产精品va在线观看不卡| 这个男人来自地球电影免费观看| 好男人电影高清在线观看| 可以免费在线观看a视频的电影网站| av视频免费观看在线观看| 99精品在免费线老司机午夜| 18禁美女被吸乳视频| 女同久久另类99精品国产91| 热99re8久久精品国产| 99re在线观看精品视频| 亚洲欧美日韩高清在线视频| 少妇裸体淫交视频免费看高清 | 黑人欧美特级aaaaaa片| 日韩视频一区二区在线观看| 亚洲精品一卡2卡三卡4卡5卡| 69精品国产乱码久久久| 免费少妇av软件| 精品第一国产精品| 久久中文字幕人妻熟女| 亚洲欧美日韩另类电影网站| 午夜老司机福利片| 久久精品国产亚洲av香蕉五月| 精品第一国产精品| 久久中文字幕一级| 亚洲中文字幕日韩| 国产区一区二久久| 欧美激情 高清一区二区三区| 色播在线永久视频| a级毛片在线看网站| 国产欧美日韩一区二区三区在线| 色av中文字幕| 日韩三级视频一区二区三区| 亚洲国产精品合色在线| 久久久国产成人免费| 丁香欧美五月| 精品国产乱子伦一区二区三区| 中文字幕另类日韩欧美亚洲嫩草| 午夜两性在线视频| 国产97色在线日韩免费| 日韩欧美三级三区| 无限看片的www在线观看| 桃红色精品国产亚洲av| 午夜福利18| 国产片内射在线| 久久久国产精品麻豆| 亚洲色图av天堂| 欧美日韩福利视频一区二区| 男女下面进入的视频免费午夜 | 亚洲国产精品合色在线| 亚洲一卡2卡3卡4卡5卡精品中文| 丁香欧美五月| 久久青草综合色| 国产伦人伦偷精品视频| 成人国产综合亚洲| 久久天躁狠狠躁夜夜2o2o| 国产亚洲精品一区二区www| 黑人巨大精品欧美一区二区mp4| 免费搜索国产男女视频| 激情在线观看视频在线高清| 老鸭窝网址在线观看| 在线观看66精品国产| 1024视频免费在线观看| 麻豆成人av在线观看| 国产精华一区二区三区| 亚洲国产欧美日韩在线播放| 无人区码免费观看不卡| 国产男靠女视频免费网站| 可以免费在线观看a视频的电影网站| 日韩 欧美 亚洲 中文字幕| 国内久久婷婷六月综合欲色啪| 亚洲,欧美精品.| 精品国内亚洲2022精品成人| 久久精品人人爽人人爽视色| 91九色精品人成在线观看| 18禁美女被吸乳视频| 国产乱人伦免费视频| 嫁个100分男人电影在线观看| 亚洲精品国产区一区二| 亚洲人成电影免费在线| 精品人妻1区二区| 婷婷丁香在线五月| 日韩欧美一区视频在线观看| 最近最新中文字幕大全电影3 | 99久久久亚洲精品蜜臀av| 三级毛片av免费| 久久国产乱子伦精品免费另类| 熟女少妇亚洲综合色aaa.| 日韩三级视频一区二区三区| 国产精品98久久久久久宅男小说| 国内精品久久久久久久电影| 99热只有精品国产| 欧美日韩瑟瑟在线播放| 人人妻人人澡人人看| 午夜免费观看网址| 亚洲自偷自拍图片 自拍| 极品人妻少妇av视频| 男女做爰动态图高潮gif福利片 | 国产黄a三级三级三级人| 免费无遮挡裸体视频| x7x7x7水蜜桃| 深夜精品福利| 亚洲午夜精品一区,二区,三区| 国产成人av教育| 国产精品免费一区二区三区在线| 欧美 亚洲 国产 日韩一| 欧美日韩福利视频一区二区| 他把我摸到了高潮在线观看| 中文字幕精品免费在线观看视频| 一级作爱视频免费观看| 少妇被粗大的猛进出69影院| 一本大道久久a久久精品| 午夜精品久久久久久毛片777| 午夜福利一区二区在线看| 国产亚洲精品一区二区www| 国产欧美日韩一区二区精品| 日韩欧美一区视频在线观看| 一级毛片精品| 这个男人来自地球电影免费观看| 欧美av亚洲av综合av国产av| 国产成人免费无遮挡视频| 18禁裸乳无遮挡免费网站照片 | 中文字幕人妻丝袜一区二区| 欧美不卡视频在线免费观看 | 久99久视频精品免费| 亚洲视频免费观看视频| 女人爽到高潮嗷嗷叫在线视频| 一区在线观看完整版| 午夜影院日韩av| 国产精品 欧美亚洲| 午夜福利欧美成人| 丝袜美腿诱惑在线| 色婷婷久久久亚洲欧美| 日韩av在线大香蕉| 亚洲三区欧美一区| 可以在线观看的亚洲视频| 亚洲美女黄片视频| 国产人伦9x9x在线观看| 久久香蕉国产精品| 在线十欧美十亚洲十日本专区| 免费看十八禁软件| 黑人巨大精品欧美一区二区蜜桃|