• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Binary Fruit Fly Swarm Algorithms for the Set Covering Problem

    2022-08-23 02:15:30BroderickCrawfordRicardoSotoHannsdelaFuenteMellaClaudioElorteguiWenceslaoPalmaClaudioTorresRojasClaudiaVasconcellosGaeteMarceloBecerraJavierPeandSanjayMisra
    Computers Materials&Continua 2022年6期

    Broderick Crawford,Ricardo SotoHanns de la Fuente MellaClaudio ElorteguiWenceslao PalmaClaudio Torres-RojasClaudia Vasconcellos-Gaete,Marcelo BecerraJavier Pe?a and Sanjay Misra

    1Pontificia Universidad Católica de Valparaíso,Valparaíso,2362807,Chile

    2LERIA,Université d’Angers,Angers,49000,France

    3Department of Computer Science and Communication,Ostfold University College,Halden,Norway

    Abstract: Currently, the industry is experiencing an exponential increase in dealing with binary-based combinatorial problems.In this sense,metaheuristics have been a common trend in the field in order to design approaches to solve them successfully.Thus, a well-known strategy consists in the use of algorithms based on discrete swarms transformed to perform in binary environments.Following the No Free Lunch theorem, we are interested in testing the performance of the Fruit Fly Algorithm, this is a bio-inspired metaheuristic for deducing global optimization in continuous spaces, based on the foraging behavior of the fruit fly, which usually has much better sensory perception of smell and vision than any other species.On the other hand,the Set Coverage Problem is a well-known NP-hard problem with many practical applications,including production line balancing,utility installation,and crew scheduling in railroad and mass transit companies.In this paper,we propose different binarization methods for the Fruit Fly Algorithm,using Sshaped and V-shaped transfer functions and various discretization methods to make the algorithm work in a binary search space.We are motivated with this approach, because in this way we can deliver to future researchers interested in this area,a way to be able to work with continuous metaheuristics in binary domains.This new approach was tested on benchmark instances of the Set Coverage Problem and the computational results show that the proposed algorithm is robust enough to produce good results with low computational cost.

    Keywords: Set covering problem; fruit fly swarm algorithm; metaheuristics;binarization methods;combinatorial optimization problem

    1 Introduction

    The Set Covering Problem (SCP) is a well-known NP-hard class covering problem, which consists of finding a subset of columns in a zero-one matrix such that it covers all rows of the matrix at minimum cost.It has important practical applications, such as: localization of emergency services[1],scheduling of crews in mass transit companies[2],routing of vehicles[3],reconstruction of sibling relationships[4].

    Considering the complex nature of SCP,the huge size of the real data sets and the variety of methods designed to approach similar problems,SCP has been solved by exact methods,metaheuristics and other techniques,such as hyperheuristics[5]or with Machine Learning techniques[6–8].Solving by exact methods is mainly based on Branch-and-Bound,Branch-and-Cut and Lagrangean heuristics[9].

    Resolution by metaheuristics includes Genetic Algorithms [10], Tabu Search [11], Ant Colony Optimization [12], Artificial Bee Colonies [13], Firefly Algorithms [14], Cat Swarm Optimization[15], Cuckoo Search [16], Teaching-learning Based Optimization [17] and Shuffled Frog Jumping Algorithm[18],Binary Black Hole Algorithms[19].Previous work[20]propose the use of binarization techniques in order to improve the solutions of combinatorial problems like the SCP, but they lack explanation on how the binarization affects the metaheuristics,also the previous work don’t propose a pre-processing phase to reduce the computational cost of the instances of the SCP.

    In this paper,we present a new approach to solving the SCP based on Wen Tsao-Pan’s Fruit Fly Swarm Algorithm (FFSA) [21].This metaheuristic is based on the foraging behavior of fruit flies,which use the senses of smell and vision to find their food;in terms of the algorithm,these senses are represented by a combination of local (smell) and global (vision) searches to improve the quality of solutions.Since FFSA was developed for continuous spaces and SCP is a binary problem,our work contributes to propose several binarization methods for a continuous algorithm in order to promote a better distribution between exploration/exploitation.In order to achieve this balance, we present eight different transfer functions and five discretization methods,generating a total of 39 variations to the original BFFSA.The results of this work suggests that BFFSA(the binary version of FFSA)is a robust algorithm,capable to produce good results at a low computational cost.

    This article is organized as follows: A brief description of the Set Coverage Problem in Section 2,the presentation of Pan’s Fruit Fly Algorithm in Section 3,an adaptation of Pan’s metaheuristic to work in a binary search space in Section 4.Our proposal with the description of the functions and methods used to allow the algorithm to run in discrete spaces in Section 5.Finally, we present our results,conclusions,and possible future lines of research in Sections 6 and 7.

    2 Set Covering Problem

    The SCP is a classical covering problem and is defined as a binary matrixAwhereai,j∈{0,1}is the value of each cell in the matrix andi,jare the size of m-rows and n-columns,respectively:

    Defining the columnjsatisfies a rowiifaijis equal to 1 and this will be the contrary case if this is 0.In addition, it has an associated costc∈C, whereC= {c1,c2,...,cn} together withi∈{1,2,...,m} andj∈{1,2,...,n} are the sets of rows and columns, respectively.The problem results in the following objective:to minimize the cost of the subsetS?J,with the constraint that all rowsi∈Iare covered by at least one columnj∈J.It is taken into consideration that when the columnjis in the subset of solutionS,this is equal to 1 and 0 otherwise.The SCP can be defined as the following:

    Subject to Eqs.(3)and(4):

    One of the many practical applications of this problem is the location of fire stations.Lets consider a city divided in a finite number of areas which need to locate and build fire stations.Each one of these areas need to be covered by at least one station,but a single fire station can only bring coverage to its own area and the adjacent ones;also,the problem requires that the number of stations to build needs to be the minimum.

    Intentionally, we have selected an instance of SCP withm= 11 andn= 11 to represent it graphically in Fig.1 and by Eqs.(5)–(16).When a SCP formulation has a constant cost (a value of 1 in this case),we will refer to it as anUnicostSCP instance.

    Figure 1:Solution to the practical example of SCP

    Subject to:

    As the SCP is a NP-hard class problem,one of the many difficulties that benchmarks arise is their size and the computational time associated.To solve this,many authors propose to do a pre-processing of the problem before apply any exact method or metaheuristic in order to obtain instances that are equivalent to original but smaller in terms of rows and columns.In the next section,we describe the methods used in this research.

    2.1 Pre-Processing

    To accelerate the problem solving,we introduce a preprocessing phase before run the metaheuristic to reduce the size of instances and improve the performance of the algorithm.In this article, we use two methods that have proven to be more effective: Column Domination [22] and Column Inclusion[23].

    Column Domination:It consists into deleting the redundant columns without affecting the final solution.In other words,if the rows belonging to the columnjcan be covered by another column with a cost lower thancj,then the columnjisdominatedand it can be removed.This method is detailed in the Algorithm 1.

    Algorithm 1:Column Domination 1:Order all columns by cost,ascending.2:if Two or more columns have the same cost then 3: Order those columns by the amount of rows Ij covered by column j,descending 4: Check if rows Ij can be covered by a set of other columns with a cost lower than c j(Continued)

    Algorithm 1:Continued 5: if Cost is lower then 6: The column j is dominated and it can be removed.7: end if 8:end if

    Column Inclusion:If a row is covered by only one column after the above domination,that column must be included in the optimal solution,and there is no need to evaluate its feasibility.

    3 Fruit Fly Swarm Algorithm

    The FFSA is a bio-inspired metaheuristic [21] based on the foraging behavior of fruit flies or vinegar flies for finding food, considering that their smell(osphresis)and vision senses are much better than in any other specie.The foraging behavior processes consider smell the food source,fly to it and then visualize the same food source to determine a better direction.

    In Fig.2, there is a graphical representation of these foraging search processes.ConsiderS1,S2andS3as fruit flies from our population.During the smell-based search,the flies will randomly move across the search space,so their new positions will be(X1,Y1),(X2,Y2)and(X3,Y3)respectively;then,in the next phase, flies will be evaluated in their smell concentration (fitness function) to determine which one is the best in the group;for our example,we are using the reciprocal of distance to the origin(1/Disti)as fitness function.Finally,and knowing which one is the best fruit fly,the population will move into its direction to get closer to the food source.

    Figure 2:Food searching of a group of fruit flies

    The traditional FFSA consists of 4 phases.These are:initialization,smell-based search,population evaluation,and vision-based search.In the initialization phase,parameters are set and the fruit flies (solutions) are created randomly with a very sensitive osphresis and vision organs.During the smell-based search phase,flies use their senses to feel all kinds of smells in the air and fly towards the corresponding locations.Then,the flies are evaluated to find the best concentration of smell.When they are near to food, in the vision-based search phase, they fly toward the food source using their vision organ.The pseudocode of these phases is detailed in Algorithm 2.

    Algorithm 2:Fruit Fly Swarm 1:Initialization 2:Initialize population size(N)3:Initialize generation max(gen)4:for i=1 to N do 5: Create randomly Fi,the i-th fruit fly 6:end for 7:for t=1 to gen do 8: Smell-based search 9: Emulate the smell sense by modifying population with random values 10: Fi=Fi+random_value 11: Population evaluation 12: Evaluate solutions fitness using the objective function.13: Vision-based search.14: BF=Best fruit fly 15: for i=1 to N do 16: Fi=(Fi+BF)/2 17: end for 18:end for

    The FFSA has been successfully used to solve continuous problems such as: the financial distress [21], web auction logistics service [24], power load forecasting [25], design of key control characteristics for automobile parts[26]and distribution of pollution particles[27].

    4 Binary-Fruit Fly Swarm Algorithm

    In contrast with traditional FFSA, the BFFSA [28] uses a discrete binary string (Fig.3) to represent a solution and a probability vector to generates the population(Fig.4);then,the value of each bit of the fruit flies goes from zero to one(and vice versa)to exploit the neighborhood in the smellbased search process and perform a global vision-based search to improve the exploration ability.This new algorithm,detailed later in pseudocode(Algorithm 3),preserves the four phases but adds three search methods:Smell-based,Local-Vision-based and Global-Vision-based.Also,these methods will add new parameters to perform searches;all of them are detailed in Tab.1.

    Figure 3:Representation of a fruit fly(solution)in BFFSA

    Figure 4:Representation of the probability vector in BFFSA

    Algorithm 3:Binary Fruit Fly Swarm Algorithms 1:Initialization Phase 2:Initialize parameter values of N,gen,S,L and b 3:Initialize probability vector p(t=0)(Continued)

    Algorithm 3:Continued 4:for i=1 to N do 5: for d=1 to n do 6: Create randomly the Fd bit 7: end for 8:end for 9:for t=1 to gen do 10: Smell-based Search 11: for i=1 to N do 12: for s=1 to S do 13: Create the Fi,s neighbor,flipping L bits around Fi 14: end for 15: end for 16: Apply the repair operator 17: Population Evaluation Phase 18: Evaluate solution fitness using the objective function 19: Local-Vision-based Search 20: for i=1 to N do 21: Find the best neighbor Fi,best for Fi 22: Make the neighborhood fly towards Fi,best 23: end for 24: Global-Vision-based Search 25: Find the best fruit fly in the population,Fbest 26: Select randomly two flies F1 and F2 27: Update probability vector p(t)28: for i=1 to N do 29: Create Fi according to p(t)30: end for 31:end for

    Table 1: BFFSA parameters

    This article proposes and evaluates new instances for BFFSA,created from the combination of the original binary algorithm,eight transfer functions and two discrete methods,in order to improve solutions.

    4.1 Initialization

    In the BFFSA, each fruit fly is a solution represented by a n-bit binary vector, where n is the number of columns in the instance to solve.Thus, in a fruit flyFi, the valueFdrepresents thedthbinary decision bit,d∈[1,n].All fruit flies are generated by an n-dimensional probability vectorp(t),wheretrepresents generation(or iteration)witht∈[1,gen].Then,theis the probability in thedthdimension of the fruit flyFito be 1 during generationt.The pseudocode for this phase is detailed in Algorithm 4.

    Algorithm 4:Initial population in BFFSA 1:for i=1 to N do 2: for d=1 to n do 3: if rand()<pd(0)then 4: Fd=1 5: else 6: Fd=0 7: end if 8: end for 9:end for

    To generate a uniformly distributed population in the search space, the probability vector must bep(0)=[0.5,0.5,...,0.5],so all columns have fifty percent probability of being selected.In the next generation,a new population with N fruit flies will be generated using this probability vector.

    4.2 Smell-Based Search

    In this phase, we createSneighbors randomly around each fruit flyFiusing the smell-based search.Each one of these neighbors are generated using the following method:first,we select randomly L-bits,and then we flip theseLcolumns values to the opposite binary value.For example,if we have a 9-bit fruit fly andL= 3,the smell-based search may produce a neighbor like the one represented in Fig.5.

    At this point,a population with(N·S)-fruit flies is evaluated using the objective function.In case to get unfeasible solutions, we apply a repair operator.This additional phase will be explained later(SubSection 4.5).

    4.3 Local-Vision-Based Search

    Once all solutions in the neighborhood are feasible, the fruit flies are evaluated with the vision sense(the objective function)to find the best local neighbor and fly towards it.If a better neighbor is found,then the whole neighborhood will fly towards it and this recently discovered“l(fā)ocal best”fruit fly will replace the previous solution;otherwise,solution will remain the same.

    4.4 Global-Vision-Based Search

    This search works on the exploration ability(Eqs.(17)and(18)),considering that previous phases are more focused into the exploitation ability.To update the next fruit flies generation, this phase updates the probability vector with the differential information between the best fruit flyFbestand two random fruit flies(F1 and F2)to set a coefficient for the vision sensitivity b to enhance the exploration.

    As we can see in the Eq.(17),the algorithm have a high probability of exploration in the first steps of the search,because the two random fruit flies tend to be far away one of the other,but always with the guide of the best fruit flyFbest.Once the flies are stuck on close positions, they tend to perform more exploitation with the smell-based search and the local-vision-based search.

    4.5 Repair Operator

    A common issue with metaheuristics is the generation of unfeasible solutions during an iteration.For the SCP,this means that some individuals will not cover all rows and a subset of constraints may be violated.To solve this issue, the algorithm implements a repair operator to make all individuals feasible and eliminate redundancy.The method described in[29]calculates a ratio between the cost of an uncovered column(cj)and the number of uncovered rows covered by that column;once all rows are covered and the solution is feasible, the operator includes an optimization step to eliminate any redundant column(Algorithm 5).

    Algorithm 5:Repair Operator 1:I =The set of all rows;2:J =The set of all columns;3:αi =The set of columns that cover row i,i ∈I;4:βj =The set of rows covered by column j, j ∈J;5:K =The set of columns in a solution;6:wi =The number of columns that cover row i, i ∈I.For this,wi =|S ∩αi|,?i ∈I;7:U =The set of uncovered rows.For this,U ={i|wi =0,?i ∈I};8:for row i ∈U (in increasing order of i)do 9: Find the first column j in increasing order of j ∈αi that minimizes cj|U∩bj|;10: Add j to K and set wi =wi+1,?i ∈bj;11: Set U =U -bj;12:end for 13:for column j ∈K (in decreasing order of j)do 14: if wi ≥2 then 15: K =K j;16: wi =wi-1, ?i ∈βj;17: end if 18:end for(Continued)

    Algorithm 5:Continued 19:K is now a feasible solution for the SCP that contains no redundant columns;18:end for 19:K is now a feasible solution for the SCP that contains no redundant columns;

    5 Proposed Binarization Methods for the BFFSA

    In this article,we propose to modify the original BFFSA with a two-step binarization technique(Fig.6),which will transform the solution from ? to an“InterSpace”(in Z)and then to the binary space.Following a procedure similar to the one proposed in[30,31],we will replace the equation for global searching (Eq.(18)) with one of the eight transfer functions (Eqs.(19)–(26)) showed in the Tab.2.Specifically,our idea is to replace the calculation for the differential information-0.5),with one of these eight transfer functions in order to define the probability to move an element of the solution from 1 to 0(or vice versa),forcing the fruit flies to be in the interval[0,1].With this change,we force to have a controlled balance between exploration and exploitation in all the search steps of the algorithm.Thus,we promote the search of new areas meanwhile we search better solution in known promising areas.

    Figure 6:Classic binarization scheme

    Table 2: First step-transfer functions

    Table 2:Continued

    It is important to note that of theS-shaped(left-hand in Fig.7) andV-shaped(right-hand in Fig.7)functions presented here,the original BFFSA uses the transfer functionPS2with a standard discretization method.In this paper,we test a universe of 40 different instances of the algorithm,where 39 of the 40 are new variations realized by our research.

    Figure 7:(a)S and(b)V transfer functions

    After updating the probability vector with one of these S-shaped or V-shaped transfer functions,an element of a fruit fly will be updated using one of the following discretization methods:Standard,Complement,Static Probability,ElitistandElitist Roulette,detailed in Tab.3 with the Eqs.(27)–(31),respectively.In all of them,Fdrepresents thedthposition of the fruit flyFi,Fbestis the best fruit fly in the current generation andαis the static probability.

    6 Experiment Results

    The modified BFFSA with the transfer functions proposed has been implemented in Java in a Common KVM processor of 2.66 GHz with 4 GB RAM computer, running Microsoft Windows 7.The parameter tuning for the algorithm is detailed in Tab.4.

    Table 3: Second step-techniques of binarization

    Table 4: Parameter tuning for BFFSA experiments

    All the datasets tested are from Beasley’s OR Library 3.In total,we solved 65 data files;instances 4,5,6 are from[36],instances A,B,C,D are from[22]and instances NRE,NRF,NRG,NRH are the unknown-solution problem set from[37].Details of datasets are described in Tab.5.

    For each instance,we report the average values obtained after run 30 times each algorithm.

    Table 5: Set covering instances

    6.1 Comparison of Proposed BFFSA with Other Metaheuristics

    The Tabs.6–13 show the detailed results obtained by different instances of our modified BFFSA.In all of them, the results are presented along with the transfer function (TF) and discretization method(DM)used in each case,and compared with other metaheuristics in terms of minimum and maximum number of optimal founded (ZMIN,ZMAX) and the relative percentage deviation (RPD),which represents the deviation of the objective value Z(fitness)fromZOPT(Eq.(32)).

    Table 6: Computational results for instance set 4

    Table 6:Continued

    Table 7: Computational results for instance set 5

    Table 7:Continued

    Table 8: Computational results for instance set 6 and A

    Table 8:Continued

    Table 9: Computational results for instance set B and C

    Table 9:Continued

    Table 10: Computational results for instance set D

    Table 10:Continued

    Table 11: Computational results for instance set NRE and NRF

    Table 11:Continued

    Table 12: Computational results for instance set NRG

    For comparison purposes,we consider the values reported in[16]for Binary Cuckoo Search(BCS)and Binary Black Hole(BBH);also,we have taken results for Binary Cat Swarm Optimization(BCSO)[15], Binary Firefly Optimization (BFO) [13], Binary Shuffled Frog Leap Algorithm (BSFLA) [18],Binary Electromagnetism-like Algorithm(BELA)[38]and Binary Artificial Bee Colony(BABC)[39].

    Table 13: Computational results for instance set NRH

    Tab.6 presents the results obtained from instance set 4.in this case our algorithm was better to all others in comparison,as it reached optimal values in all instances;BCSO,BSFLA,BELA and BABC are unable to achieve optimal values and BFO reached only two.The closest methods in comparison were BCS with eight optimal and BBH with five.

    Tab.7 describes the results from instance set 5.Once again, our algorithm got the best results along with BCS and BBH.Algorithms BCSO and BELA are unable to solve optimally any instance,BABC found only two optimal values,BFO reached three and BSFLA got four.

    Tab.8 illustrates the results from instance sets 6 and A.Our algorithm performed well,reaching eight optimal values(the whole set 6 and 3 from set A).BBH was slightly better than BCS this time,BCSO and BELA are unable to optimally solve any instance,BABC is capable to find only two optimal values(one in each set),BFO reached three and BSFLA got four.

    Tab.9 shows the results from instance set B and C.In case of set B,our algorithm had a very good performance,reaching all the optimal values,just like BCS and BBH.For instance set C,situation is similar,as BFFSA reached four out of five optimal values,outperforming all other methods.

    Tab.10 shows the results from instance set D.Here,the BFFSA and BBH(3 optimal values each one)could not reach results of BCS.However,we can still say this is an acceptable result,considering that all other approaches got less than 30%of optimal values.

    For the NRE and NRF sets described in Tab.11, only two RPD=0 per set are reached by the BFFSA algorithm.Other approaches fail in general to find optimum values as the instance set becomes harder.Only BCS and BBH are closer to our results.BSFLA and BABC achieve one optimum for the instances belonging to set NRF,while BBH and BCS reach three.

    Finally, for the hardest instance sets NRG and NRH(see Tabs.12 and 13),we observe that the RPD obtained by the proposed BBFOA is good enough to compete with the approaches like BCS and BBH,as in the three cases,they could only reached one optimal value.

    7 Conclusion

    This article proposes several variations to BFFSA (39 to be precise), created by adding to the original BFFSA different transfer functions and discrete methods in order to improve the solutions obtained.All of these BBFOA-variations were tested into 65 SCP instances and the values reported correspond to the algorithm with the best performance.From our results,we conclude that variations presented are robust enough to compete with other algorithms as we were able to find many optimal solutions with a little parameter tuning.

    We observed that best combinations of transfer functions and discretization methods depend on the instance size.For small instances (4, 5, 6, A, B, C, D) best results were achieved with transfer functions pS3 and pS4 plus the Standard discretization,whereas for huge instances(NRE,NRF,NRG,NRH)the best combinations are the same transfer functions pS3 and pS4,but with the Elitist method.A point to remark is that the use of the Elitist discretization is not exclusive for this algorithm and problem;other articles like[40]report good results with it.

    In the future,we are interested in the hybridization of BFFSA with other meta-heuristics or apply an hyper-heuristics version.In the short term,we expect to test our algorithms on other SCP libraries,such like the Unicost (available at OR-Library website) or Italian railways [41] benchmarks.Due to the good results and the simplicity of this algorithm, it could be used to solve other combinatorial problems.

    Acknowledgement:Marcelo Becerra-Rozas and Javier Pe?a are supported by Grant DI Interdisciplinary Undergraduate Research/VRIEA/PUCV/039.421/2021.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产激情久久老熟女| 欧美另类亚洲清纯唯美| 欧美乱码精品一区二区三区| 老汉色∧v一级毛片| 精品一区二区三卡| 国产成人精品久久二区二区91| 别揉我奶头~嗯~啊~动态视频| 搡老乐熟女国产| 色婷婷久久久亚洲欧美| 一区福利在线观看| 久久久久国内视频| 久久人人爽av亚洲精品天堂| 亚洲精品中文字幕在线视频| 日韩三级视频一区二区三区| 一进一出抽搐动态| 在线观看免费高清a一片| 亚洲成人免费电影在线观看| a级片在线免费高清观看视频| 欧美在线一区亚洲| 国产精品永久免费网站| 国产精品免费视频内射| 日韩欧美三级三区| 两性夫妻黄色片| 国产av一区在线观看免费| 亚洲自偷自拍图片 自拍| 亚洲伊人色综图| 亚洲aⅴ乱码一区二区在线播放 | 成人av一区二区三区在线看| 88av欧美| 如日韩欧美国产精品一区二区三区| 夫妻午夜视频| 日韩中文字幕欧美一区二区| 亚洲av美国av| 99在线视频只有这里精品首页| 黑人猛操日本美女一级片| 久久精品亚洲熟妇少妇任你| 久久精品aⅴ一区二区三区四区| 国产伦人伦偷精品视频| 国产激情久久老熟女| 欧美激情久久久久久爽电影 | 精品久久久久久久毛片微露脸| 麻豆国产av国片精品| 久久久久国产一级毛片高清牌| 91成年电影在线观看| 99精国产麻豆久久婷婷| 俄罗斯特黄特色一大片| 国产精华一区二区三区| 婷婷丁香在线五月| 亚洲精品av麻豆狂野| 精品少妇一区二区三区视频日本电影| 12—13女人毛片做爰片一| 久久久国产欧美日韩av| 中文字幕人妻丝袜一区二区| 亚洲五月天丁香| 性少妇av在线| 国产精品野战在线观看 | 日韩视频一区二区在线观看| 69精品国产乱码久久久| 精品欧美一区二区三区在线| 在线国产一区二区在线| www日本在线高清视频| 在线十欧美十亚洲十日本专区| 午夜影院日韩av| av在线天堂中文字幕 | 日本黄色视频三级网站网址| 亚洲精品美女久久久久99蜜臀| 成年人黄色毛片网站| 久久人人爽av亚洲精品天堂| 神马国产精品三级电影在线观看 | 国产精品99久久99久久久不卡| 亚洲片人在线观看| 亚洲一区二区三区欧美精品| 欧美久久黑人一区二区| 9热在线视频观看99| 亚洲精品国产区一区二| 女人被躁到高潮嗷嗷叫费观| 国产欧美日韩一区二区三区在线| 日韩欧美一区二区三区在线观看| 天堂中文最新版在线下载| 国产成人av教育| www.熟女人妻精品国产| 看黄色毛片网站| 成人av一区二区三区在线看| 欧美午夜高清在线| 久久久久久久久久久久大奶| 国产精品秋霞免费鲁丝片| 久久久国产一区二区| 91九色精品人成在线观看| 一级毛片精品| 一级毛片高清免费大全| 男男h啪啪无遮挡| 又黄又爽又免费观看的视频| 国产精品1区2区在线观看.| 久久婷婷成人综合色麻豆| 成人av一区二区三区在线看| 日本欧美视频一区| 免费在线观看完整版高清| 国产三级黄色录像| 日本a在线网址| 亚洲色图 男人天堂 中文字幕| 国产单亲对白刺激| 亚洲在线自拍视频| 人人妻人人添人人爽欧美一区卜| 久久香蕉国产精品| 丝袜美腿诱惑在线| 国产精品自产拍在线观看55亚洲| 亚洲欧美一区二区三区黑人| 两性夫妻黄色片| 女人被狂操c到高潮| 国产片内射在线| 日日爽夜夜爽网站| 亚洲一区中文字幕在线| 日韩免费av在线播放| 男人舔女人下体高潮全视频| 亚洲熟妇熟女久久| 久久久久久久久久久久大奶| 日韩一卡2卡3卡4卡2021年| 久久人人爽av亚洲精品天堂| 少妇 在线观看| 在线免费观看的www视频| 99精品久久久久人妻精品| 在线国产一区二区在线| 日韩精品免费视频一区二区三区| 一区在线观看完整版| 色综合婷婷激情| 无遮挡黄片免费观看| 啪啪无遮挡十八禁网站| 最新美女视频免费是黄的| 欧美日韩亚洲高清精品| 高清黄色对白视频在线免费看| 国产av一区在线观看免费| 身体一侧抽搐| 亚洲一码二码三码区别大吗| 欧美最黄视频在线播放免费 | 黄频高清免费视频| 我的亚洲天堂| 丁香欧美五月| 欧美成狂野欧美在线观看| 丁香六月欧美| 啦啦啦免费观看视频1| 这个男人来自地球电影免费观看| 色综合婷婷激情| 黑人猛操日本美女一级片| 亚洲成人免费电影在线观看| 欧美激情高清一区二区三区| xxx96com| 色在线成人网| 国产精品偷伦视频观看了| 人妻丰满熟妇av一区二区三区| 97碰自拍视频| av网站免费在线观看视频| 我的亚洲天堂| 美女午夜性视频免费| 十八禁人妻一区二区| 亚洲精品av麻豆狂野| 亚洲自拍偷在线| 电影成人av| 精品国内亚洲2022精品成人| 国产亚洲精品第一综合不卡| 国产精华一区二区三区| 午夜福利影视在线免费观看| 久久久国产欧美日韩av| 男女床上黄色一级片免费看| 精品一区二区三区视频在线观看免费 | 亚洲五月天丁香| 制服诱惑二区| 男女高潮啪啪啪动态图| 天天躁夜夜躁狠狠躁躁| av超薄肉色丝袜交足视频| 午夜免费鲁丝| 日韩成人在线观看一区二区三区| 午夜精品在线福利| 色婷婷久久久亚洲欧美| 亚洲自拍偷在线| 99国产综合亚洲精品| 在线观看免费日韩欧美大片| 99久久精品国产亚洲精品| 亚洲色图av天堂| 十八禁网站免费在线| 久久久久久亚洲精品国产蜜桃av| 国产无遮挡羞羞视频在线观看| 99精国产麻豆久久婷婷| 欧美一级毛片孕妇| 真人做人爱边吃奶动态| 亚洲午夜精品一区,二区,三区| 12—13女人毛片做爰片一| 国产三级黄色录像| 国产伦人伦偷精品视频| 可以免费在线观看a视频的电影网站| 国产精品99久久99久久久不卡| 十八禁网站免费在线| 欧美丝袜亚洲另类 | 黄色女人牲交| www国产在线视频色| 亚洲欧美激情在线| 亚洲性夜色夜夜综合| 国产高清videossex| 亚洲全国av大片| 国产成人精品久久二区二区91| 我的亚洲天堂| 日韩欧美一区视频在线观看| 女人精品久久久久毛片| 老汉色∧v一级毛片| 亚洲av第一区精品v没综合| 成人18禁高潮啪啪吃奶动态图| 国产无遮挡羞羞视频在线观看| 国产精品国产av在线观看| 欧美日韩福利视频一区二区| 精品久久久精品久久久| 男人舔女人下体高潮全视频| 两人在一起打扑克的视频| 亚洲欧美日韩另类电影网站| 99国产综合亚洲精品| 久久影院123| 亚洲精品一区av在线观看| 日韩高清综合在线| 美女国产高潮福利片在线看| 久久久久久大精品| 高清av免费在线| 国产高清视频在线播放一区| 日韩大码丰满熟妇| 国产伦一二天堂av在线观看| 亚洲精品粉嫩美女一区| 丰满迷人的少妇在线观看| 色在线成人网| 久久久精品国产亚洲av高清涩受| 亚洲精品中文字幕在线视频| 久久久久国内视频| 亚洲午夜精品一区,二区,三区| 亚洲中文av在线| 日本三级黄在线观看| 日韩欧美国产一区二区入口| 午夜精品久久久久久毛片777| 在线十欧美十亚洲十日本专区| 亚洲熟妇熟女久久| 久久人妻av系列| 久久久国产欧美日韩av| 亚洲国产欧美一区二区综合| 国产精品美女特级片免费视频播放器 | 后天国语完整版免费观看| 看片在线看免费视频| 日韩中文字幕欧美一区二区| 国产精品国产av在线观看| 久久久精品国产亚洲av高清涩受| 黄色 视频免费看| 母亲3免费完整高清在线观看| 丝袜美足系列| 亚洲,欧美精品.| 色婷婷av一区二区三区视频| 成人av一区二区三区在线看| 久久精品亚洲av国产电影网| 变态另类成人亚洲欧美熟女 | 久久久久久亚洲精品国产蜜桃av| www.自偷自拍.com| 男人操女人黄网站| 激情视频va一区二区三区| 亚洲欧美一区二区三区黑人| 女人爽到高潮嗷嗷叫在线视频| 在线免费观看的www视频| 色综合欧美亚洲国产小说| www.自偷自拍.com| 麻豆国产av国片精品| av免费在线观看网站| 99国产综合亚洲精品| 一级毛片女人18水好多| 免费在线观看完整版高清| 熟女少妇亚洲综合色aaa.| 神马国产精品三级电影在线观看 | 亚洲成人免费av在线播放| 久久性视频一级片| 午夜两性在线视频| 久久亚洲真实| 热99国产精品久久久久久7| 欧美激情极品国产一区二区三区| 日韩大尺度精品在线看网址 | 视频在线观看一区二区三区| 曰老女人黄片| 久久精品国产亚洲av高清一级| 精品高清国产在线一区| 美女高潮到喷水免费观看| 国产精品一区二区在线不卡| 国产一区在线观看成人免费| 精品久久蜜臀av无| 色在线成人网| 久久久精品国产亚洲av高清涩受| 日本黄色日本黄色录像| 精品久久蜜臀av无| 亚洲国产毛片av蜜桃av| 国产97色在线日韩免费| 午夜精品国产一区二区电影| 桃红色精品国产亚洲av| 精品国产国语对白av| 侵犯人妻中文字幕一二三四区| 亚洲 国产 在线| 男女下面插进去视频免费观看| 美女福利国产在线| 日韩欧美三级三区| av网站在线播放免费| 国产精品亚洲一级av第二区| 欧美黑人精品巨大| 久久久久久久精品吃奶| 黄色丝袜av网址大全| 身体一侧抽搐| 嫩草影院精品99| 少妇的丰满在线观看| 水蜜桃什么品种好| 一区二区日韩欧美中文字幕| 91国产中文字幕| 久久 成人 亚洲| 亚洲欧美日韩无卡精品| 交换朋友夫妻互换小说| 丰满迷人的少妇在线观看| 天天躁夜夜躁狠狠躁躁| 亚洲欧美一区二区三区黑人| 在线播放国产精品三级| 少妇粗大呻吟视频| 性色av乱码一区二区三区2| 国产成人啪精品午夜网站| 日韩免费av在线播放| 国产av又大| 中文亚洲av片在线观看爽| 日韩人妻精品一区2区三区| www日本在线高清视频| 久久中文字幕一级| 国产成+人综合+亚洲专区| 国产成人精品在线电影| netflix在线观看网站| 国产精品九九99| 人人澡人人妻人| 在线永久观看黄色视频| 天堂影院成人在线观看| 精品乱码久久久久久99久播| 91老司机精品| 日本黄色日本黄色录像| 一级毛片精品| 久久久国产精品麻豆| 国产99久久九九免费精品| 18禁国产床啪视频网站| 精品第一国产精品| 岛国视频午夜一区免费看| 搡老乐熟女国产| 另类亚洲欧美激情| 制服人妻中文乱码| 岛国视频午夜一区免费看| 久久午夜综合久久蜜桃| 亚洲男人天堂网一区| 久久人妻av系列| 亚洲激情在线av| 日韩欧美在线二视频| 日韩精品免费视频一区二区三区| 久99久视频精品免费| 成年人免费黄色播放视频| 欧美在线一区亚洲| 黑人欧美特级aaaaaa片| 美女大奶头视频| 中文字幕人妻熟女乱码| 丰满饥渴人妻一区二区三| 99国产综合亚洲精品| av国产精品久久久久影院| 日韩精品免费视频一区二区三区| 精品久久久久久电影网| 动漫黄色视频在线观看| 中国美女看黄片| 日韩国内少妇激情av| 亚洲精品美女久久av网站| 18禁黄网站禁片午夜丰满| 日本三级黄在线观看| 亚洲国产毛片av蜜桃av| av片东京热男人的天堂| 999精品在线视频| 久久亚洲真实| 亚洲熟女毛片儿| av超薄肉色丝袜交足视频| 777久久人妻少妇嫩草av网站| 一级片免费观看大全| 亚洲精品一卡2卡三卡4卡5卡| 一级片免费观看大全| 国产精品98久久久久久宅男小说| 午夜福利在线观看吧| 国产精品1区2区在线观看.| a级毛片在线看网站| 国产精品1区2区在线观看.| 一级,二级,三级黄色视频| 亚洲色图av天堂| 色精品久久人妻99蜜桃| 亚洲欧美激情在线| 久久香蕉激情| 人人妻,人人澡人人爽秒播| 日韩大码丰满熟妇| 搡老熟女国产l中国老女人| 亚洲av五月六月丁香网| 又黄又爽又免费观看的视频| 国产一区在线观看成人免费| 国产欧美日韩综合在线一区二区| 在线观看舔阴道视频| 婷婷六月久久综合丁香| aaaaa片日本免费| 最好的美女福利视频网| 少妇的丰满在线观看| 在线观看一区二区三区激情| 成人18禁在线播放| 天堂动漫精品| 一级毛片高清免费大全| 久久人妻熟女aⅴ| 热99国产精品久久久久久7| 免费人成视频x8x8入口观看| 成人特级黄色片久久久久久久| 成人黄色视频免费在线看| 三上悠亚av全集在线观看| 久久久精品国产亚洲av高清涩受| 亚洲国产精品sss在线观看 | 久久香蕉精品热| 久久午夜亚洲精品久久| 欧美一区二区精品小视频在线| 日本wwww免费看| 波多野结衣av一区二区av| 成人三级做爰电影| 午夜免费观看网址| 脱女人内裤的视频| 亚洲狠狠婷婷综合久久图片| 免费在线观看视频国产中文字幕亚洲| 亚洲aⅴ乱码一区二区在线播放 | 精品一区二区三区四区五区乱码| 亚洲成人精品中文字幕电影 | 亚洲自拍偷在线| 色综合欧美亚洲国产小说| 国产蜜桃级精品一区二区三区| 久久国产精品人妻蜜桃| 视频区欧美日本亚洲| 一本综合久久免费| 最近最新中文字幕大全免费视频| 少妇 在线观看| 欧美乱妇无乱码| 18禁观看日本| 少妇的丰满在线观看| 久久精品aⅴ一区二区三区四区| 成人18禁高潮啪啪吃奶动态图| 欧美日本中文国产一区发布| 一本综合久久免费| 中亚洲国语对白在线视频| 妹子高潮喷水视频| 国产麻豆69| 啦啦啦免费观看视频1| 伦理电影免费视频| 久久香蕉国产精品| 热99国产精品久久久久久7| 午夜福利在线观看吧| 欧美亚洲日本最大视频资源| 很黄的视频免费| 美女大奶头视频| 国产片内射在线| 国产一区二区三区综合在线观看| 一本综合久久免费| 亚洲一区二区三区欧美精品| 身体一侧抽搐| 99精品久久久久人妻精品| 一级a爱视频在线免费观看| 日韩高清综合在线| 伊人久久大香线蕉亚洲五| 最新在线观看一区二区三区| 男女做爰动态图高潮gif福利片 | 日韩国内少妇激情av| 久久精品成人免费网站| 国产欧美日韩一区二区三区在线| 亚洲第一欧美日韩一区二区三区| 亚洲,欧美精品.| 黄色怎么调成土黄色| 亚洲狠狠婷婷综合久久图片| 精品福利观看| 99香蕉大伊视频| 国产野战对白在线观看| 正在播放国产对白刺激| 五月开心婷婷网| 在线十欧美十亚洲十日本专区| 日韩大码丰满熟妇| 99久久人妻综合| 欧美另类亚洲清纯唯美| 天堂√8在线中文| 91九色精品人成在线观看| 一级片免费观看大全| 悠悠久久av| 首页视频小说图片口味搜索| 久久天堂一区二区三区四区| 成人精品一区二区免费| 久久久久久久久久久久大奶| 三上悠亚av全集在线观看| 老司机午夜福利在线观看视频| 久久天堂一区二区三区四区| 亚洲av片天天在线观看| 最近最新免费中文字幕在线| 国产高清视频在线播放一区| 精品午夜福利视频在线观看一区| 99国产精品免费福利视频| 香蕉久久夜色| 高清毛片免费观看视频网站 | 亚洲一卡2卡3卡4卡5卡精品中文| 丁香欧美五月| 国产成人av激情在线播放| 免费高清在线观看日韩| 久热爱精品视频在线9| 99热国产这里只有精品6| 美女午夜性视频免费| 夜夜躁狠狠躁天天躁| 99国产综合亚洲精品| 女同久久另类99精品国产91| 日韩一卡2卡3卡4卡2021年| 久久精品国产亚洲av香蕉五月| 窝窝影院91人妻| 亚洲av熟女| 色哟哟哟哟哟哟| 亚洲一区高清亚洲精品| a级片在线免费高清观看视频| 色综合婷婷激情| 老鸭窝网址在线观看| 久久久久久人人人人人| 美女扒开内裤让男人捅视频| 美女高潮到喷水免费观看| 一边摸一边抽搐一进一出视频| 99在线视频只有这里精品首页| 搡老岳熟女国产| 高潮久久久久久久久久久不卡| 国产伦人伦偷精品视频| 欧美亚洲日本最大视频资源| 91麻豆av在线| 19禁男女啪啪无遮挡网站| a级毛片黄视频| 国产欧美日韩一区二区精品| 精品国产一区二区三区四区第35| 免费在线观看日本一区| 国产成人精品无人区| 国产高清视频在线播放一区| 精品久久久久久成人av| 国产亚洲欧美在线一区二区| 国产乱人伦免费视频| 人人妻人人澡人人看| 午夜福利一区二区在线看| 在线国产一区二区在线| 99riav亚洲国产免费| 欧美日本亚洲视频在线播放| 久久热在线av| 男女之事视频高清在线观看| 麻豆久久精品国产亚洲av | 十八禁网站免费在线| 久久精品亚洲熟妇少妇任你| 午夜精品久久久久久毛片777| 日韩 欧美 亚洲 中文字幕| 可以在线观看毛片的网站| 久久久久久久精品吃奶| 91字幕亚洲| 久久久久精品国产欧美久久久| 成人亚洲精品一区在线观看| 国产亚洲av高清不卡| 久久久久久亚洲精品国产蜜桃av| 日本精品一区二区三区蜜桃| 久久久久国产精品人妻aⅴ院| 亚洲人成电影免费在线| 在线观看免费视频网站a站| 91精品国产国语对白视频| 日韩人妻精品一区2区三区| 人人妻,人人澡人人爽秒播| 久久人妻av系列| 一夜夜www| 少妇粗大呻吟视频| 久久伊人香网站| 大陆偷拍与自拍| 动漫黄色视频在线观看| 人妻久久中文字幕网| 黄色视频不卡| 国产精品一区二区精品视频观看| 老司机午夜十八禁免费视频| 亚洲男人天堂网一区| 又黄又爽又免费观看的视频| 午夜老司机福利片| 黄片小视频在线播放| 国产精品乱码一区二三区的特点 | 可以在线观看毛片的网站| 色精品久久人妻99蜜桃| 久久人人精品亚洲av| 看免费av毛片| 日韩人妻精品一区2区三区| 男女午夜视频在线观看| 91老司机精品| 免费搜索国产男女视频| 亚洲少妇的诱惑av| 50天的宝宝边吃奶边哭怎么回事| 精品福利永久在线观看| 女人高潮潮喷娇喘18禁视频| 淫妇啪啪啪对白视频| 国产成人精品久久二区二区91| 国产深夜福利视频在线观看| 欧美久久黑人一区二区| 亚洲aⅴ乱码一区二区在线播放 | av天堂久久9| 日本a在线网址| 大型黄色视频在线免费观看| 久久久久精品国产欧美久久久| 欧美日韩乱码在线| 999久久久国产精品视频| 国产aⅴ精品一区二区三区波| 性色av乱码一区二区三区2| 男人舔女人的私密视频| 中文字幕最新亚洲高清| 欧美成人性av电影在线观看| 91字幕亚洲| 精品久久久久久久久久免费视频 | 美国免费a级毛片| 69精品国产乱码久久久| 欧美午夜高清在线| 欧美日韩瑟瑟在线播放| 老司机午夜十八禁免费视频| 亚洲av成人av| 在线观看66精品国产| 两人在一起打扑克的视频| 啦啦啦 在线观看视频| 亚洲熟女毛片儿|