• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Drones Optimal Path Planning Based on Swarm Intelligence Algorithms

    2022-08-24 12:57:48MahmoudRagabAliAltalbeAbdullahSaadAlMalaiseALGhamdiAbdelkhalekandRashidSaeed
    Computers Materials&Continua 2022年7期

    Mahmoud Ragab, Ali Altalbe, Abdullah Saad Al-Malaise ALGhamdi, S.Abdel-khalekand Rashid A.Saeed

    1Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University,Jeddah 21589, Saudi Arabia

    2Center of Artificial Intelligence for Precision Medicines, King Abdulaziz University, Jeddah 21589, Saudi Arabia

    3Information Systems Department, Faculty of Computing and Information Technology, King Abdulaziz University,Jeddah 21589, Saudi Arabia

    4Department of Mathematics, Faculty of Science, Al-Azhar University, Naser City 11884, Cairo, Egypt

    5Department of Mathematics, Faculty of Science, Taif University, Taif, Saudi Arabia

    6Department of Mathematics, Faculty of Science, Sohag University, Sohag, Egypt

    7Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif,Saudi Arabia

    Abstract: The smart city comprises various interlinked elements which communicate data and offers urban life to citizen.Unmanned Aerial Vehicles(UAV) or drones were commonly employed in different application areas like agriculture, logistics, and surveillance.For improving the drone flying safety and quality of services, a significant solution is for designing the Internet of Drones (IoD) where the drones are utilized to gather data and people communicate to the drones of a specific flying region using the mobile devices is for constructing the Internet-of-Drones, where the drones were utilized for collecting the data, and communicate with others.In addition,the SIRSS-CIoD technique derives a tuna swarm algorithm-based clustering(TSA-C) technique to choose cluster heads (CHs) and organize clusters in IoV networks.Besides, the SIRSS-CIoD technique involves the design of a biogeography-based optimization (BBO) technique to an optimum route selection (RS) process.The design of clustering and routing techniques for IoD networks in smart cities shows the novelty of the study.A wide range of experimental analyses is carried out and the comparative study highlighted the improved performance of the SIRSS-CIoD technique over the other approaches.

    Keywords: Drones; smart city; swarm intelligence; route selection; internet of drones; networking

    1 Introduction

    Recently, Smart cities have attracted growing interest in the field of institutions, transportation,home energy management, also providing facilities for the citizens, safety and security, and businesses in healthcare management.The smart city technology presented by National Institute of Standards and Technology (NIST) consists of 6 major elements that is smart people, smart mobility, smart environment, smart economy, smart governance, and smart living, with cloud computing as the environment for storing information, and the Internet-of-Things (IoT) as an enabling technique [1].Furthermore, it is predicted that in 2020, the amount of smaller-scale drones attained 2.7 million,smartphone undertakes an important role in extending the use of smart city applications, since it allows the citizen to send and receive information as well as logging on to the application [2,3].Unmanned Aerial vehicles (UAV), is also called drones, are considered smart city components which provide surveillance and smart mobility for the citizen.UAV includes various kinds of sensor nodes that assist many applications using cooperative form among themselves [4].

    Especially, a drone has smart devices, like time-of-flight (ToF) sensor, magnetic-field change sensor, light-pulse distance sensor, thermal and chemical sensor orientation sensor, radio range, and detection sensor.It is remotely controlled and often moves autonomously with no human interference.Now, drones were utilized in a large number of civilian applications, namely package delivery, air traffic control, remote sensing, monitoring, firefighting, and an inspection of infrastructure.This drone would provide various services and occupy lower airspace.The concept of“Internet-of-Drones(IoD)”relates to technique where multiple drones, each containing flying zones, procedure an aerial mesh network for gathering data and communicate via sensors, i.e., subsequently transmitted to a control server.The sample structure of IoD in the smart city is shown in Fig.1.External mobile users could access and monitor any drones via their mobile phones in a certain flying zone over a control server providing that she/he is allowed to access the drone.The communication could take place inbetween the trusted control server, the user and the drone, and amongst the user or drones [5].

    Figure 1: Structure of IoD in a smart city environment

    Drones have limited computational power scarce and battery resources that could affect the entire transmission efficacy in IoD.To effectively employ this scarce resource, a transmission technique has been developed that yields higher throughput, guarantees lower computational complexity, and lower routing overhead could be a tedious process.The routing mechanism for an effective transmission is needed for the data transmission amongst drones.The ever-growing mobility and topology of the drones in IoD create the transmission amongst drones a challenging process [6].The solution to this problem is hierarchal routing which is also called clustering.In clustering, the network forms into subgroups, a cluster includes cluster member (CM) and cluster head (CH).A CH is selected between each member in the cluster and it controls the performances of the cluster by handling it effectively and efficiently [7,8].Therefore, the selection of CH is the most significant task of clustering and all the CMs could be a candidate for the selection of CH.Rather than a single-hop transmission network, a multihop cluster-based network leads to scalability and better performance.

    In clustering algorithms, CH election and cluster formation are essential tasks to effectively preserve cluster topology.Successive modifications in the relative location of CM change the entire cluster topology.Hence, it is necessary to design an effective clustering method for the effective use of energy resources and better scalability of rapidly developing topology [9].The swarm intelligence (SI)based models are utilized to a near-optimum solution.In an Adhoc technique, there is no centralized control that leads to growing complexities in management and configuration [10].Therefore, it is necessary to develop this network architecture which contains self-organizing abilities like selfoptimization, self-configuring, self-healing, and adaptive to environments.

    This study designs a novel Swarm Intelligence-based Route Selection Strategy for Clustered Internet of Drones Enabled Smart City Applications, called SIRSS-CIoD.In addition, the SIRSSCIoD technique derives a tuna swarm algorithm-based clustering(TSA-C)technique to choose cluster heads (CHs) and organize clusters in IoV networks.Besides, the SIRSS-CIoD technique involves the design of a biogeography-based optimization (BBO) technique to a better route selection (RS)process.The design of clustering and routing techniques for IoD networks in smart cities shows the novelty of the study.A wide range of experimental analyses is carried out and the comparative study highlighted the improved performance of the SIRSS-CIoD technique over the other approaches.

    The rest of the paper is organized as follows.Section 2 offers the related works, Section 3 provides the proposed method, Section 4 discusses the results, and Section 5 concludes the work.

    2 Related Works

    In[11],the function of UAVs in the Adhoc network and their cooperation with vehicles in VANET is examined for assisting the method of detection and routing of malicious vehicles.The routing protocol called VRU is presented which consists of 2 distinctive methods of routing of data: (1)routing packets of information among UAVs with a protocol called VRU_u, and (2) delivering a packet of information among vehicles through UAVs with a protocol termed VRU_vu.In [12], a tight plane-based architecture is presented that uses the current public transportation like city trains, public buses, and their paths to offer time-sensitive monitoring.Then, proposed a loose hierarchical-based architecture.To assist seamless monitoring over wide-ranging, they utilize 2 kinds of UAVs, that enable replenishment amongst heterogeneous UAVs at distinct layers via airborne docking.

    In [13], a UAV heterogeneous fleet routing problem is addressed, handling vehicles constrained autonomy with the consideration of respecting operational requirements and multiple charging stations.A green routing problem is developed to overcome problems that are present because of constrained vehicle driving range.As a result of the massive number of emerging drones in society,UAV efficacy and use need to be enhanced.In [14], a lower complex architecture is designed for determining the time plans shortest and trajectories for all the members of the fleet when considering the various limitations.A collision can be prevented by forcing several drones to statically hover to permit its peers to securely permit the path segments.Some scenarios were examined to display the efficacy of the scheduling and routing architecture.

    The performances of UAVs flight (single/group flight) for the decision of distinct target tasks in the city using data air navigation methods [15] and technique of arithmetical modeling in artificial intelligence (AI) (methods of deciding risk graph theory, fuzzy logic (FL) model, dynamic programming, Expert Judgment Method and so on.).The optimization and configuration group flight paths for UAVs are based on the kinds of“target tasks”.The limitations of emergency response and traffic policing handling schemes are addressed in [16].Besides, the authors presented a smart, independent UAV-assisted solution; and describes the structure in simulated setting.Some scenarios of policing system and traffic monitoring are taken into account in the simulation: mobile speeding trap and automatic notifications, accident detection and traffic light violation, vehicle tracing using UAV, traffic rerouting and congestion detection, autonomous emergency response handling system, and pending arrest warrants or flagged stolen vehicles [17].

    A spatiotemporal scheduling architecture is developed for autonomous UAVs with the RL method.This architecture allows UAV to separately define their schedule to cover the maximal prescheduled event temporally and spatially dispersed over a pre-defined time horizon and provided geographical region.The proposed method can upgrade the planned schedule in the event of an unpredicted emergency.Huang et al.[18] proposed the Active Trust Verification Data Collection(ATVDC) system to the secure, efficient, and cheap gathering of information.In this system, a UAV is adapted for collecting basic information from the sensor to estimate the trust of mobile vehicle (MV),and a high-trust MV priority recruitment (HTMPR) approach is presented for recruiting credible MV at a lower cost.Additionally, a genetic-algorithm-based trajectory planning (GATP) strategy was developed for permitting the UAV for collecting further basic information at minimal flight costs.

    3 The Proposed Model

    In this study, an efficient SIRSS-CIoD technique is derived for grouping the drones in the cluster and enabling optimal data transmission in smart cities via shortest routes.The proposed SIRSS-CIoD technique involves the TSA-C technique to choose CHs and BBO algorithm for optimal RS.The detailed working of these modules is discussed in the following sections.

    3.1 Phase I: Algorithmic Steps Involved in TSA-C Technique

    Primarily, the TSA-C technique gets executed to pick an optimal set of CHs from the available drones in the network [19].Tuna, scientifically called Thunnini, is a marine carnivorous fish.They utilize their intelligence to attack and find their prey.This creature has changed a huge amount of intelligent and effective foraging behaviors.The initial behavior was spiral foraging.Once tuna are feeding, it swim by making a spiral procedure for acquiring the prey as to shallow water where they are attacked more easily.The next behavior is parabolic foraging.Every tuna swim afterward the prior individuals, which form a parabolic formation for enclosing their prey.Tuna effectively forages by the above mentioned 2 strategies.In this work, a novel swarm based meta-heuristic optimized method, such as tuna swarm optimization, is presented dependent upon modeling this natural foraging behavior.

    Initiation

    Like other swarm-based metaheuristics method, TSA begin the procedure of optimization by making the first population at random uniformly in the searching space,

    whereasrepresent theithfirst individual, ub & lb indicate the upper as well as lower bounds of the searching space,NPindicates the amount of tuna’s population, and rand represents a uniform distribution arbitrary vector range in zero to one

    Spiral Foraging

    Once sardines, herring, also other smaller school fish encounters predator, the whole schooling of fish forming a dense structure continuously changes the swimming direction, which makes it complex for the predator for locking the target.Now, the tuna group chases the prey by creating a tight spiral form.Even though many school fishes have a small sense of direction, as soon as a smaller group of fish swims firmly in specific direction, the neighboring fish would alter its direction consecutively and lastly create a larger group with similar goals and starts to hunt.Besides spiraling afterward their prey, the school of tuna exchanges data with one another.All the tuna following the prior fish, hence enabling data sharing between adjacent tuna.As mentioned above, the arithmetical equation for the spiral foraging behavior can be expressed in the following:

    Parabolic Foraging

    Besides feeding by making a spiral form tuna forms a parabolic cooperative feeding.Tunas form a parabolic shape using food as a reference point.Additionally, tuna hunts to food by seeking everywhere.Both strategies are carried out concurrently, with the assumption that chosen probability is 50% for both.The arithmetical expression can be determined in the following:

    In whichTFrepresents an arbitrary value within [-1,1].Fig.2 shows the flowchart of the TSA algorithm.

    Figure 2: Flowchart of TSA

    Usually, there are 4 objective functions in which it encompasses all the considerable factors essential for energy effective clusterings such as identifying present energy ratio, preserving the energy using the constrained number of CH,mitigation of intracluster distance, improved intercluster distance from CH, balancing the load between CHs, and reducing the distance among base station (BS) and CH.The newly developed TSA-C technique makes an optimal solution by acquiring a fitness function(FF) with distance to BS, distance to neighbors, network load, and energy.Consequently, FF is determined in the currently utilized technique by:

    In whichm1,m2,m3, and m4signifies the weight constant determined by the user, andFFspecifies the FF.Furthermore,y1,y2,y3, andy4, represents the objective function.The presented TSA-C technique was applied to recognize the finest solution according to FF.Currently, the solution has obtained using an agent.So, the enhanced solution to above mentioned FF includes the minimal amount of clusters with the highest link<quality and vigorously defined CH with maximum residual energy (RE).The main purpose is for preserving the energy, and energy ratio as described in the following.Once there areRclusters, existing CH energy,Mnodes, and the ratio of node energy.

    The subsequent function determines the distance to neighbors that are determined as a Euclidean distance between the sensor nodes (SNs).

    The 3rd function decreases the distance among CH & BS.In this technique was deliberated asA×A; the entire cluster representsRthat is demonstrated in Eq.(14).

    The ultimate operation is employed to accomplish the load in CH.Eq.(15)restraint the maximum load amongst CHs.|CNq| means the quantity of nodes inqcluster.Subsequently, a range is regarded asA×A; whole cluster representsR.

    3.2 Phase II: Algorithmic Steps Involved in BBO-RS Technique

    At this stage, the BBO-RS technique is employed to derive an optimal set of routes to the destination in the IoD network [20].

    In BBO, every problem solution is regarded as a“habitat”with habitat survival index (HSI), i.e.,the same as a fitness of EAto estimate an individual.Higher HSI habitat shares their feature with lower HSI habitat.The procedure of sharing better features amongst solutions are represented as migration.BBO adapts the migration behavior for sharing data between solutions.Better individuals’data could be preserved at the time of the evolutionary procedure to guarantee population convergence.Mutation.Mutation operators are utilized for generating various solutions to help the variety of the population.The complete processes are given in the following.Assume that the specific amount of all the individualsirepresentSi, and its immigration rate λiiand emigration rate μiis estimated by

    where asSmaxrepresent the specific amount of each habitat.I&Erepresents the maximized of immigration rate as well as emigration rate, correspondingly.During the migration operator, the individual emigration rate and immigration rate are utilized for deciding either a solution must share its feature values using another solution.The best solution consists of a high immigration rate and a low emigration rate.Using migration, the solution with higher emigration rate tend for sharing its data with those with a higher immigration rate.Solution with higher immigration rate accepts several features from solution with higher emigration rate.Using migration, BBO demonstrates better exploitation capacity in the searching space.

    Assume that species amount changes with species migrating;Psthe probability that habitat comprises accuratelySspecies as follows:

    Next, the mutation ratemiis determined by

    where asPmutedenotes a predetermined variable,Piis estimated, andPmax= max1≤i≤N{Pi}.The mutation operator is performed according tomi.A solution with a lower probabilityPiis possible to mutate another solution.On the other hand, few solutions with higherPihave a smaller possibility of mutating.With the mutation operators, different solutions are generated.

    For detecting an optimum set of paths, the dimension of all the BBO-RS techniques can be determined to be equal to CH and the additional locations are situated in the BS.Consider,θi=signifies aithfish,denotes a real value within [0,1].Consequently, the provided function is utilized to define the following hops to BS as

    The objective is for defining an optimum set of paths from CH to BS with an FF with 2 variables like distance and energy.At first, the RE of the following hop nodes can be determined and the nodes using the highest energy are processed as a relay node.For transmitting the information, the source node is transferred to the relay node which further moves to BS utilizing inter CH.So, the nodes using high RE are processed as the following hop nodes.The primary sub-objectivesf1 have been shown below:

    As well, Euclidean distance is utilized to define the distance from CH to BSs.The minimalization of energy dissipation is dependent largely on the broadcast distance.If a lower distance occurs, the energy could be stored considerably.As soon as the distance gets increased, a massive quantity of energy could be expended.Henceforth, a node with less distance is chosen for relay nodes.Hence, the subsequent sub-objectives using distance isf2 can be represented as:

    As mentioned, sub-objective can be briefly described to FF as follows, while α1and α2signifies the weights assigned to all the sub-objectives.

    4 Performance Validation

    This section investigates the performance validation of the proposed model under the distinct number of drones.Primarily, an extensive Network Lifetime (NLT) analysis of the SIRSS-CIoD technique is provided in Tab.1 and Fig.3.A comparative results analysis is made with glowworm swarm optimization based clustering with routing (GSOCR), grey wolf optimization based clustering with routing (GWOCR), improved particle swarm optimization based clustering with routing (IPSOCR),and particle swarm optimization based clustering with routing (PSOCR).

    Figure 3: Comparative NLT analysis of SIRSS-CIoD with recent approaches

    The results revealed that the SIRSS-CIoD technique has accomplished improved NLT over the other techniques.For instance, with 10 drones, the SIRSS-CIoD methodology has accomplished an increased NLT of 6010 rounds while the GSOCR method, GWOCR model, IPSOCR approach,and PSOCR algorithms have attained lower NLT of 5880, 5850, 5650, and 5100 rounds respectively.Concurrently, with 20 drones, the SIRSS-CIoD technique has offered enhanced NLT of 6220 rounds but the GSOCR method, GWOCR model, IPSOCR approach, and PSOCR algorithms have attained decreased NLT of 5830, 5620, 5500, and 5070 rounds respectively.In addition, with 30 drones, the SIRSS-CIoD methodology has accomplished a superior NLT of 6070 rounds although the GSOCR method, GWOCR model, IPSOCR approach, and PSOCR algorithms have attained decreased NLT of 5610, 5320, 5170, and 4900 rounds respectively.

    Table 1: NLT analysis of SIRSS-CIoD with recent approaches

    A comparative average delay (AD) analysis of the SIRSS-CIoD technique takes place in Tab.2 and Fig.4.The results showcased that the SIRSS-CIoD system has gained minimal AD over the other techniques.For instance, with 10 drones, the SIRSS-CIoD technique has obtained a lower AD of 1.59s whereas the GSOCR method, GWOCR model, IPSOCR approach, and PSOCR algorithms have gotten maximum AD of 2.02, 2.09, 2.21, and 2.75s respectively.Eventually, with 20 drones, the SIRSS-CIoD technique has reached the reduced AD of 2.36s whereas the GSOCR method, GWOCR model,IPSOCR approach,and PSOCR algorithms have resulted in higher AD of2.52, 2.82, 3.71, and 4.87 s respectively.Meanwhile,with30drones,the SIRSS-CIoD technique has provided decreased AD of 2.79s whereas the GSOCR method, GWOCR model, IPSOCR approach, and PSOCR algorithms have reached increased AD of 3.25, 3.51, 4.77, and 6.01s respectively.

    Figure 4: Comparative AD analysis of SIRSS-CIoD with recent approaches

    Table 2: AD analysis of SIRSS-CIoD with recent approaches

    A detailed energy consumption (ECM) analysis of the SIRSS-CIoD technique takes place in Tab.3 and Fig.5.The results showcased that the SIRSS-CIoD technique has offered reduced ECM over the other techniques.For instance, with 10 drones, the SIRSS-CIoD technique has attained a lower ECM of 42mJ whereas the GSOCR method, GWOCR model, IPSOCR approach, and PSOCR algorithms have obtained higher ECM of 0.19, 46, 51, 47, and 56mJ respectively.Likewise, with 20 drones, the SIRSS-CIoD technique has reached to reduced ECM of 60 mJ whereas the GSOCR method, GWOCR model, IPSOCR approach, and PSOCR algorithms have obtianed increased ECM of 66, 72, 79, and 82mJ respectively.Concurrently, with 30 drones, the SIRSS-CIoD technique has provided decreased ECM of 95mJ whereas the GSOCR method,GWOCR model,IPSOCR approach,and PSOCR algorithms have obtained raised ECM of 100, 102, 112, and 118mJ respectively.

    Table 3: ECM analysis of SIRSS-CIoD with recent approaches

    Figure 5: Comparative ECM analysis of SIRSS-CIoD with recent approaches

    AA comparative throughput (THR) analysis of the SIRSS-CIoD technique is provided in Tab.4 and Fig.6.The results exposed that the SIRSS-CIoD technique has accomplished improved THR over the other techniques.For instance, with 10 drones, the SIRSS-CIoD approach has accomplished a higher THR of 0.92Mbps but the GSOCR method,GWOCR model, IPSOCR approach, and PSOCR algorithms have attained lowerTHRof 0.81, 0.79, 0.74, and 0.72Mbps respectively.Concurrently,with 20 drones, the SIRSS-CIoD technique has offered enhanced THR of 0.86 Mbps although the GSOCR method, GWOCR model, IPSOCR approach, and PSOCR algorithms have attained decreased THR of 0.73, 0.75, 0.62, and 0.57 Mbps respectively.Simultaneously, with 30 drones, the SIRSS-CIoD technique has accomplished an increased THR of 0.83 Mbps while the GSOCR method, GWOCR model, IPSOCR approach, and PSOCR algorithms have attained decreased THR of 0.73, 0.59, 0.54,and 0.55 Mbps respectively.

    Table 4: THR analysis of SIRSS-CIoD with recent approaches

    Figure 6: Comparative THR analysis of SIRSS-CIoD with recent approaches

    Finally, a brief packet loss rate (PLR) analysis of the SIRSS-CIoD technique takes place in Tab.5 and Fig.7.The results reported that the SIRSS-CIoD technique has resulted in reduced PLR over the other techniques.

    For instance, with 10 drones, the SIRSS-CIoD technique has attained a lower PLR of 0.08 Mbps whereas the GSOCR method, GWOCR approach, IPSOCR algorithm, and PSOCR system have obtained higher PLR of 0.19, 0.21, 0.26, and 0.28 Mbps respectively.Likewise, with 20 drones, the SIRSS-CIoD technique has reached to reduced PLR of 0.14 Mbps whereas the GSOCR method,GWOCR approach, IPSOCR algorithm, and PSOCR technique have gained increased PLR of 0.27,0.25, 0.38, and 0.43 Mbps respectively.Concurrently, with 30 drones, the SIRSS-CIoD technique has provided decreased PLR of 0.17 Mbps whereas the GSOCR method, GWOCR approach, IPSOCR algorithm, and PSOCR technique have obtained raised PLR of 0.27, 0.41, 0.46, and 0.45 Mbps respectively.

    Figure 7: Comparative PLR analysis of SIRSS-CIoD with recent approaches

    Table 5: PLR analysis of SIRSS-CIoD with recent approaches

    From the aforementioned tables and figures, it can be evident that the SIRSS-CIoD system is an effective tool for data collection and routing in the smart cities’environment.

    5 Conclusion

    In this study, an efficient SIRSS-CIoD technique is derived for grouping the drones in the cluster and enabling optimal data transmission in smart cities via shortest routes.The proposed SIRSS-CIoD technique involves the TSA-C technique to choose CHs and BBO algorithm for optimal RS.Primarily,the TSA-C technique gets executed to pick an optimum group of CHs from the available drones in the network.Followed by, the BBO-RS approach was employed for deriving an optimal group of routes to the destination in the IoD network.A wide range of experimental analyses is carried out and the comparative study highlighted the improved performance of the SIRSS-CIoD technique over the other approaches.Therefore, the proposed SIRSS-CIoD technique can be applied as a proficient approach for data collection and routing in IoD-enabled smart city applications.In future, data aggregation and scheduling methods are developed to improve the network performance.

    Acknowledgement:The authors extend their appreciation to the Deputyship for Research & Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IFPIP-1266-611-1442) and King Abdulaziz University, DSR, Jeddah, Saudi Arabia.

    Funding Statement:This project was supported financially by Institution Fund projects under Grant No.(IFPIP-1266-611-1442).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久久久久久久久久久大奶| 麻豆精品久久久久久蜜桃| 亚洲精品一区蜜桃| 高清视频免费观看一区二区| av网站免费在线观看视频| 一级毛片 在线播放| 人人澡人人妻人| 中文乱码字字幕精品一区二区三区| 亚洲图色成人| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 成人免费观看视频高清| 只有这里有精品99| 久久久精品94久久精品| 热99国产精品久久久久久7| 亚洲av在线观看美女高潮| 日韩,欧美,国产一区二区三区| 2022亚洲国产成人精品| 亚洲内射少妇av| 一本大道久久a久久精品| 亚洲av综合色区一区| 国产精品国产av在线观看| 久久99一区二区三区| 七月丁香在线播放| 国产成人a∨麻豆精品| 丝袜在线中文字幕| 伦精品一区二区三区| 汤姆久久久久久久影院中文字幕| 日韩av免费高清视频| 国产精品熟女久久久久浪| 在线观看人妻少妇| 亚洲国产精品999| 日韩av在线免费看完整版不卡| 啦啦啦在线观看免费高清www| 美国免费a级毛片| 国产在线一区二区三区精| 久久久久久久久久久免费av| 日本午夜av视频| 久久人人爽av亚洲精品天堂| 一本大道久久a久久精品| 国产一级毛片在线| 精品少妇黑人巨大在线播放| 免费高清在线观看视频在线观看| 精品一区在线观看国产| 日韩 亚洲 欧美在线| 免费人成在线观看视频色| 最近最新中文字幕大全免费视频 | 国产淫语在线视频| 大话2 男鬼变身卡| 精品久久蜜臀av无| 老司机影院成人| 在线观看一区二区三区激情| 大陆偷拍与自拍| 国产一区二区在线观看av| 亚洲精品av麻豆狂野| 国产精品国产三级国产专区5o| 少妇被粗大的猛进出69影院 | 高清欧美精品videossex| 91成人精品电影| 人体艺术视频欧美日本| 少妇人妻久久综合中文| 热re99久久国产66热| av线在线观看网站| 夫妻性生交免费视频一级片| 国产麻豆69| 大片免费播放器 马上看| 18禁观看日本| 久久精品人人爽人人爽视色| 亚洲美女视频黄频| 99久久综合免费| av线在线观看网站| 国产男女超爽视频在线观看| 亚洲av男天堂| 一本久久精品| 国产精品久久久av美女十八| av.在线天堂| 亚洲精品乱久久久久久| 一本久久精品| 日本欧美视频一区| 男女免费视频国产| 国产亚洲欧美精品永久| 国产精品99久久99久久久不卡 | 欧美精品高潮呻吟av久久| 制服丝袜香蕉在线| 自拍欧美九色日韩亚洲蝌蚪91| 日本欧美国产在线视频| 国产免费又黄又爽又色| 亚洲精品aⅴ在线观看| 午夜久久久在线观看| 日韩 亚洲 欧美在线| 亚洲欧美成人精品一区二区| 欧美日韩成人在线一区二区| 欧美日韩视频高清一区二区三区二| 久久99热6这里只有精品| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 久久久久精品久久久久真实原创| 99久久综合免费| 在线观看人妻少妇| 国产女主播在线喷水免费视频网站| 午夜激情久久久久久久| 下体分泌物呈黄色| 国产av一区二区精品久久| 午夜日本视频在线| 黑人欧美特级aaaaaa片| 国产成人欧美| 五月开心婷婷网| 亚洲国产av影院在线观看| 咕卡用的链子| 久久久a久久爽久久v久久| 亚洲欧美精品自产自拍| 国产男女内射视频| 99热6这里只有精品| 99国产精品免费福利视频| 99热国产这里只有精品6| 久久午夜福利片| 免费黄频网站在线观看国产| 大话2 男鬼变身卡| www.熟女人妻精品国产 | 亚洲国产av新网站| 国产在视频线精品| 日韩电影二区| 2022亚洲国产成人精品| 亚洲精品久久午夜乱码| 成年av动漫网址| 久久久久久久久久人人人人人人| 成人国语在线视频| 国产片特级美女逼逼视频| 午夜视频国产福利| 亚洲天堂av无毛| 热re99久久国产66热| 久久久a久久爽久久v久久| 欧美精品一区二区大全| 国产精品欧美亚洲77777| 国产亚洲一区二区精品| 国产欧美亚洲国产| 亚洲av男天堂| 国产 精品1| 亚洲成av片中文字幕在线观看 | av又黄又爽大尺度在线免费看| 黄色视频在线播放观看不卡| 熟女av电影| 成人黄色视频免费在线看| 国产免费视频播放在线视频| tube8黄色片| 伊人亚洲综合成人网| 久久影院123| 欧美 日韩 精品 国产| 精品国产一区二区三区久久久樱花| av又黄又爽大尺度在线免费看| 免费黄色在线免费观看| 黄色配什么色好看| 十分钟在线观看高清视频www| 中文字幕精品免费在线观看视频 | 久久精品久久精品一区二区三区| 久久精品国产a三级三级三级| 免费观看在线日韩| 激情五月婷婷亚洲| 黄色 视频免费看| 亚洲成人av在线免费| 又粗又硬又长又爽又黄的视频| 亚洲欧美日韩另类电影网站| 日韩,欧美,国产一区二区三区| av免费在线看不卡| 国产精品一区www在线观看| 亚洲在久久综合| 国产一区二区在线观看av| 美女国产高潮福利片在线看| 国产色婷婷99| 欧美xxⅹ黑人| 女人精品久久久久毛片| 中文字幕av电影在线播放| 美女视频免费永久观看网站| 久久精品国产自在天天线| 午夜福利影视在线免费观看| 国产精品国产av在线观看| 国产极品粉嫩免费观看在线| 亚洲av免费高清在线观看| 另类亚洲欧美激情| 一区二区av电影网| 国产片特级美女逼逼视频| 99re6热这里在线精品视频| 亚洲综合色惰| 99热6这里只有精品| 日韩熟女老妇一区二区性免费视频| 精品一区二区免费观看| av女优亚洲男人天堂| 欧美+日韩+精品| 国产成人免费观看mmmm| 最近的中文字幕免费完整| 黄色配什么色好看| 国产成人精品婷婷| 久久精品久久久久久久性| 免费av不卡在线播放| 亚洲欧洲日产国产| 亚洲精品中文字幕在线视频| 你懂的网址亚洲精品在线观看| 中文字幕最新亚洲高清| 日韩制服丝袜自拍偷拍| 22中文网久久字幕| 亚洲,一卡二卡三卡| 免费少妇av软件| 国产 一区精品| 婷婷色综合www| 午夜福利,免费看| 我的女老师完整版在线观看| 99热6这里只有精品| 国产男女超爽视频在线观看| 成人影院久久| 亚洲少妇的诱惑av| 蜜臀久久99精品久久宅男| 99九九在线精品视频| 成人午夜精彩视频在线观看| 国产麻豆69| 侵犯人妻中文字幕一二三四区| 国产成人精品福利久久| 免费久久久久久久精品成人欧美视频 | 国产精品国产av在线观看| 精品国产一区二区久久| 99热6这里只有精品| 99精国产麻豆久久婷婷| 在线观看国产h片| 亚洲精品一区蜜桃| 免费高清在线观看视频在线观看| 亚洲精品国产av成人精品| 深夜精品福利| xxx大片免费视频| 久热久热在线精品观看| 成人毛片60女人毛片免费| 久久97久久精品| 久久精品熟女亚洲av麻豆精品| av福利片在线| 国产 精品1| 亚洲经典国产精华液单| 狂野欧美激情性xxxx在线观看| 日日啪夜夜爽| 中文欧美无线码| av天堂久久9| 国产精品一二三区在线看| 免费av不卡在线播放| 国产一区二区在线观看av| 国产精品久久久久久精品电影小说| 伦理电影大哥的女人| 国产激情久久老熟女| 男人舔女人的私密视频| 日韩av在线免费看完整版不卡| 午夜91福利影院| a级片在线免费高清观看视频| 久久精品久久久久久噜噜老黄| 9191精品国产免费久久| 久久久a久久爽久久v久久| 亚洲色图 男人天堂 中文字幕 | 90打野战视频偷拍视频| 搡老乐熟女国产| 一级爰片在线观看| 国产一区二区三区av在线| 免费日韩欧美在线观看| 国产成人精品福利久久| av天堂久久9| 国产精品久久久av美女十八| 日韩精品有码人妻一区| 欧美成人午夜精品| 亚洲国产精品一区二区三区在线| 卡戴珊不雅视频在线播放| 97超碰精品成人国产| 18禁裸乳无遮挡动漫免费视频| 999精品在线视频| 伊人亚洲综合成人网| 咕卡用的链子| 免费大片黄手机在线观看| 精品久久国产蜜桃| 十八禁高潮呻吟视频| 如日韩欧美国产精品一区二区三区| 老司机影院成人| 90打野战视频偷拍视频| 人人妻人人添人人爽欧美一区卜| 青春草视频在线免费观看| 亚洲欧洲国产日韩| 久久精品久久久久久久性| av网站免费在线观看视频| 日韩欧美精品免费久久| 精品人妻熟女毛片av久久网站| 黑人猛操日本美女一级片| 精品人妻一区二区三区麻豆| 国产熟女午夜一区二区三区| 一二三四在线观看免费中文在 | 毛片一级片免费看久久久久| 色5月婷婷丁香| 一级片'在线观看视频| 韩国精品一区二区三区 | 国产亚洲精品第一综合不卡 | 国产成人精品一,二区| 99热国产这里只有精品6| 99热这里只有是精品在线观看| 天天操日日干夜夜撸| 精品国产国语对白av| 亚洲成av片中文字幕在线观看 | 美女福利国产在线| 色5月婷婷丁香| 多毛熟女@视频| 十八禁高潮呻吟视频| 日韩中字成人| 国产精品一二三区在线看| 欧美精品人与动牲交sv欧美| 国产精品熟女久久久久浪| 久久久久久久久久人人人人人人| 高清不卡的av网站| 在线精品无人区一区二区三| 91久久精品国产一区二区三区| 成人综合一区亚洲| 国产成人免费观看mmmm| 丝瓜视频免费看黄片| 国产精品无大码| 亚洲欧美一区二区三区国产| 亚洲一码二码三码区别大吗| 一本久久精品| 国产高清不卡午夜福利| 黄色毛片三级朝国网站| 亚洲在久久综合| 久久影院123| 80岁老熟妇乱子伦牲交| 亚洲成国产人片在线观看| 久久人人97超碰香蕉20202| 如日韩欧美国产精品一区二区三区| 侵犯人妻中文字幕一二三四区| 国产免费一级a男人的天堂| 国产在视频线精品| 久久国产精品大桥未久av| 亚洲欧美日韩卡通动漫| 亚洲久久久国产精品| 制服人妻中文乱码| 国产成人午夜福利电影在线观看| 2018国产大陆天天弄谢| 午夜影院在线不卡| av片东京热男人的天堂| 亚洲国产精品国产精品| 人人澡人人妻人| 久久狼人影院| 黑人高潮一二区| 91成人精品电影| 久久久久久伊人网av| 精品99又大又爽又粗少妇毛片| 国产精品成人在线| a级毛片黄视频| 免费观看av网站的网址| 日韩免费高清中文字幕av| 99精国产麻豆久久婷婷| 18禁在线无遮挡免费观看视频| 久久鲁丝午夜福利片| 9色porny在线观看| 亚洲精华国产精华液的使用体验| 中文字幕最新亚洲高清| 亚洲精华国产精华液的使用体验| 91久久精品国产一区二区三区| 在线观看一区二区三区激情| 少妇的丰满在线观看| 精品亚洲成国产av| 亚洲伊人久久精品综合| av线在线观看网站| www.色视频.com| 内地一区二区视频在线| 久久精品久久久久久噜噜老黄| 中文字幕制服av| 日韩中字成人| 天天躁夜夜躁狠狠躁躁| 人人妻人人澡人人看| 成年av动漫网址| 免费播放大片免费观看视频在线观看| 18禁观看日本| 搡女人真爽免费视频火全软件| 狠狠精品人妻久久久久久综合| 成人黄色视频免费在线看| 蜜桃国产av成人99| 五月伊人婷婷丁香| 18禁观看日本| 亚洲国产av新网站| 丁香六月天网| 爱豆传媒免费全集在线观看| 国产又爽黄色视频| 免费久久久久久久精品成人欧美视频 | 在线看a的网站| 欧美国产精品va在线观看不卡| 肉色欧美久久久久久久蜜桃| 我要看黄色一级片免费的| 中文字幕人妻丝袜制服| av电影中文网址| 精品熟女少妇av免费看| 国产精品熟女久久久久浪| 国产免费一级a男人的天堂| 国产精品久久久久久精品电影小说| 人成视频在线观看免费观看| 人妻少妇偷人精品九色| 亚洲一区二区三区欧美精品| 久久99热6这里只有精品| 欧美精品一区二区免费开放| 亚洲av综合色区一区| 一区在线观看完整版| 国产欧美日韩一区二区三区在线| 亚洲天堂av无毛| 18禁观看日本| 美女国产视频在线观看| 久久久国产欧美日韩av| 大码成人一级视频| 日韩欧美一区视频在线观看| 中文字幕最新亚洲高清| 欧美激情国产日韩精品一区| 亚洲 欧美一区二区三区| 女人久久www免费人成看片| 卡戴珊不雅视频在线播放| 国产男女超爽视频在线观看| 久久国内精品自在自线图片| 亚洲av欧美aⅴ国产| 一级黄片播放器| 一区二区三区精品91| 亚洲精品中文字幕在线视频| 久久久久精品久久久久真实原创| 涩涩av久久男人的天堂| 欧美精品国产亚洲| 久久这里有精品视频免费| 亚洲精品国产色婷婷电影| 色5月婷婷丁香| 亚洲色图综合在线观看| 老司机影院毛片| 春色校园在线视频观看| 欧美精品一区二区大全| 麻豆精品久久久久久蜜桃| 亚洲天堂av无毛| 韩国精品一区二区三区 | 国产精品不卡视频一区二区| 天堂8中文在线网| 国产在线免费精品| 99九九在线精品视频| 成年美女黄网站色视频大全免费| 曰老女人黄片| 日产精品乱码卡一卡2卡三| 国产一级毛片在线| 少妇人妻久久综合中文| 男女无遮挡免费网站观看| 成人影院久久| 国产欧美亚洲国产| 午夜福利影视在线免费观看| 22中文网久久字幕| 成人二区视频| 色婷婷av一区二区三区视频| 在线观看一区二区三区激情| 国产亚洲最大av| 久久久久精品人妻al黑| 一级毛片我不卡| 狠狠婷婷综合久久久久久88av| 国产老妇伦熟女老妇高清| 一级,二级,三级黄色视频| 国产无遮挡羞羞视频在线观看| 看非洲黑人一级黄片| 精品亚洲成国产av| 免费av中文字幕在线| 99re6热这里在线精品视频| 热re99久久国产66热| 成年美女黄网站色视频大全免费| 侵犯人妻中文字幕一二三四区| 午夜av观看不卡| 欧美成人午夜免费资源| 一级片'在线观看视频| 久久久久久伊人网av| 国产精品麻豆人妻色哟哟久久| 男女边吃奶边做爰视频| 不卡视频在线观看欧美| 亚洲欧美清纯卡通| 亚洲av国产av综合av卡| 内地一区二区视频在线| 大片电影免费在线观看免费| 亚洲久久久国产精品| 王馨瑶露胸无遮挡在线观看| 成人毛片60女人毛片免费| 久久99热6这里只有精品| 人人妻人人澡人人看| 国产日韩欧美在线精品| 黑人欧美特级aaaaaa片| 色网站视频免费| 黄色视频在线播放观看不卡| 观看av在线不卡| 日本91视频免费播放| 午夜久久久在线观看| 欧美激情国产日韩精品一区| 国产在视频线精品| 亚洲精品久久久久久婷婷小说| 飞空精品影院首页| av又黄又爽大尺度在线免费看| 日韩在线高清观看一区二区三区| 丝袜美足系列| 边亲边吃奶的免费视频| 如何舔出高潮| 黑人高潮一二区| 日韩成人伦理影院| 午夜老司机福利剧场| 男女免费视频国产| 婷婷色av中文字幕| av免费在线看不卡| 欧美激情 高清一区二区三区| 热re99久久国产66热| 亚洲精品aⅴ在线观看| 超碰97精品在线观看| 亚洲国产av影院在线观看| 日韩一区二区视频免费看| 天美传媒精品一区二区| 永久网站在线| 丰满饥渴人妻一区二区三| www.色视频.com| 两个人免费观看高清视频| xxxhd国产人妻xxx| 国产精品久久久久久久电影| 少妇熟女欧美另类| 日本wwww免费看| 精品视频人人做人人爽| 亚洲 欧美一区二区三区| 成年美女黄网站色视频大全免费| 欧美丝袜亚洲另类| 成人国产麻豆网| 精品视频人人做人人爽| 久久 成人 亚洲| 天天操日日干夜夜撸| 晚上一个人看的免费电影| 精品午夜福利在线看| 精品少妇黑人巨大在线播放| 2021少妇久久久久久久久久久| 免费高清在线观看视频在线观看| 极品少妇高潮喷水抽搐| 久久午夜综合久久蜜桃| 国产熟女欧美一区二区| 欧美xxxx性猛交bbbb| 精品国产一区二区久久| 少妇的逼水好多| 18禁在线无遮挡免费观看视频| 一级,二级,三级黄色视频| 欧美成人午夜免费资源| www.熟女人妻精品国产 | 国产黄色视频一区二区在线观看| 国产极品粉嫩免费观看在线| 久久久精品免费免费高清| 在线观看免费高清a一片| 国产永久视频网站| 成年av动漫网址| 一级毛片电影观看| 大陆偷拍与自拍| 麻豆精品久久久久久蜜桃| 七月丁香在线播放| 亚洲成av片中文字幕在线观看 | 妹子高潮喷水视频| 五月玫瑰六月丁香| 亚洲精品美女久久av网站| 国产片特级美女逼逼视频| 中文字幕人妻熟女乱码| 午夜免费观看性视频| 在线观看免费高清a一片| 久久久亚洲精品成人影院| 久久精品熟女亚洲av麻豆精品| 免费观看无遮挡的男女| 久久久亚洲精品成人影院| 亚洲国产精品国产精品| 美女xxoo啪啪120秒动态图| 在线天堂最新版资源| 99热这里只有是精品在线观看| 成人国语在线视频| 精品人妻熟女毛片av久久网站| av电影中文网址| 亚洲精品,欧美精品| 欧美精品高潮呻吟av久久| 看免费av毛片| 国产女主播在线喷水免费视频网站| 天天躁夜夜躁狠狠躁躁| 伦理电影免费视频| 国产av精品麻豆| 妹子高潮喷水视频| 2018国产大陆天天弄谢| 人人妻人人澡人人爽人人夜夜| 韩国av在线不卡| 国产成人免费观看mmmm| 在线精品无人区一区二区三| av女优亚洲男人天堂| 国产麻豆69| 久久av网站| 在线 av 中文字幕| 亚洲av成人精品一二三区| 欧美老熟妇乱子伦牲交| 欧美日韩国产mv在线观看视频| 日本与韩国留学比较| 精品国产一区二区三区四区第35| 亚洲精品av麻豆狂野| 亚洲精品乱码久久久久久按摩| 91成人精品电影| 久久99热这里只频精品6学生| 午夜福利网站1000一区二区三区| 久久人人97超碰香蕉20202| 在线观看国产h片| 日本黄大片高清| 亚洲美女搞黄在线观看| 两个人看的免费小视频| 亚洲一码二码三码区别大吗| 黑人巨大精品欧美一区二区蜜桃 | 人人妻人人澡人人爽人人夜夜| 99热这里只有是精品在线观看| 自拍欧美九色日韩亚洲蝌蚪91| 女性生殖器流出的白浆| 黄网站色视频无遮挡免费观看| 777米奇影视久久| 久久女婷五月综合色啪小说| 建设人人有责人人尽责人人享有的| 日韩三级伦理在线观看| 亚洲中文av在线| 建设人人有责人人尽责人人享有的| 亚洲综合色网址| 久久久国产精品麻豆| 人妻系列 视频| 精品午夜福利在线看| 国产精品一区二区在线观看99| 韩国高清视频一区二区三区| 国产男女内射视频| 国产有黄有色有爽视频|