• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Machine Learning Enabled e-Learner Non-Verbal Behavior Detection in IoT Environment

    2022-08-24 12:57:58AbdelzahirAbdelmaboudFahdAlWesabiMesferAlDuhayyimTaiseerAbdallaElfadilEisaManarAhmedHamzaMohammedRizwanullahAbuSerwarZamaniandRadwaMarzouk
    Computers Materials&Continua 2022年7期

    Abdelzahir Abdelmaboud, Fahd N.Al-Wesabi,2,3, Mesfer Al Duhayyim,Taiseer Abdalla Elfadil Eisa, Manar Ahmed Hamza, Mohammed Rizwanullah,Abu Serwar Zamaniand Radwa Marzouk

    1Department of Information Systems, College of Science and Arts, King Khalid University, Mahayil Asir, Saudi Arabia

    2Department of Computer Science, College of Science & Art at Mahayil, King Khalid University, Saudi Arabia

    3Faculty of Computer and IT, Sana’a University, Sana’a, Yemen

    4Department of Natural and Applied Sciences, College of Community-Aflaj, Prince Sattam bin Abdulaziz University,Saudi Arabia

    5Department of Information Systems, College of Science and Arts-Girls Section, King Khalid University, Mahayil Asir,Saudi Arabia

    6Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University,AlKharj, Saudi Arabia

    7Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Saudi Arabia & Department of Mathematics, Faculty of Science, Cairo University, Giza, 12613, Egypt

    Abstract: Internet of Things (IoT) with e-learning is widely employed to collect data from various smart devices and share it with other ones for efficient e-learning applications.At the same time, machine learning (ML)and data mining approaches are presented for accomplishing prediction and classification processes.With this motivation, this study focuses on the design of intelligent machine learning enabled e-learner non-verbal behaviour detection (IML-ELNVBD) in IoT environment.The proposed IML-ELNVBD technique allows the IoT devices such as audio sensors, cameras, etc.which are then connected to the cloud server for further processing.In addition,the modelling and extraction of behaviour take place.Moreover, extreme learning machine sparse autoencoder (ELM-SAE) model is employed for the detection and classification of non-verbal behaviour.Finally, the Ant Colony Optimization (ACO) algorithm is utilized to properly tune the weight and bias parameters involved in the ELM-SAE model.In order to ensure the improved performance of the IML-ELNVBD model, a comprehensive simulation analysis is carried out and the results highlighted the betterment compared to the recent models.

    Keywords: Internet of things; e-learning; machine learning; non-verbal behavior; extreme learning machine; classification; parameter tuning

    1 Introduction

    Over the past decades, e-learning has shown significant growth and gained considerable interest.Current web-based courses make use of internet abilities to improve and support the efficient methods of conventional education and simultaneously provide great innovative possibilities [1].Besides,supporting individual learners to obtain knowledge in an effective way, without any obstacles of being present in a classroom, this novel way of education also advantages institutions which currently have the possibility to offer more students with their educational services, at the same time reducing their expenditure[2].Also,this kind of e-learning course has received considerable amount of adult learners who search for combining technical level training and higher-level education with challenging work responsibilities [3].

    Internet of things (IoT) using e-learning is aimed to assist in gathering information from the device and share it with another device for an efficient e-learning application from Smart Campus [4].Hence,this study presents a comprehensive review to design these systems with IoT.The IoT envisions a near future, where the object of day to day lives would be armed with microcontroller, transceiver for digital transmission, and appropriate protocol stacks would enable us to interact with the user [5], it becomes an essential part of the Internet”[6].In this aspect, communication access and with the distinct kinds of devices and gadgets such as audio recorder, camera, Google Glass, smartwatches, sensors, Digital board displays, and so on, the IoT would increase the growth of learning circumstances which utilize the data created using this object to offer dynamic service to the learners, content developers and teachers in an innovative campus [7].

    Data Analytics (DA) and Machine Learning (ML) were introduced for performing this task.ML technique aims to‘teach’computers for completing a certain task without being explicitly trained with the gathered information [8].Also, this technique is crucial in several areas as such algorithms and techniques have many applications involving spam filtering, autonomous driving, and house pricing prediction [9].Conversely, DA’s aim is to draw and analyze decisions from the raw gathered information can make better decisions.Also, this technique is important as they are employed in distinct areas like marketing, education, and business [10].Therefore, DA and ML techniques could be an effective tool for the researcher to address the problems discovered in the e-learning fields.

    This study presents an intelligent machine learning enabled e-learner non-verbal behaviour detection (IML-ELNVBD) in IoT environment.The proposed IML-ELNVBD technique allows the IoT devices such as audio sensors, cameras, etc.which are then connected to the cloud server for further processing.Furthermore, the modelling and extraction of behaviour take place.Followed by, extreme learning machine sparse autoencoder (ELM-SAE) model is employed for the detection and classification of non-verbal behaviour.Finally, the Ant Colony Optimization (ACO) algorithm is utilized to properly tune the weight and bias parameters involved in the ELM-SAE model.For examining the enhanced outcomes of the proposed model, a comprehensive simulation analysis is carried out.

    2 Related Works

    In [11], the authors focuses on classifying questions according to the topics and subject categories.The aim of this work is to discover the appropriate mechanism in constructing ML methods in categorizing questions based on subtopics and topic categories quickly and accurately.Hence, the question in e-learning could be named back as required manually.Anantharaman et al.[12] developed an extensive approach according to the DL method by allowing the usage of RF and LSTM classifications,thus offering a verymuch customized e-learningmethod.The adaptive learning scheme will utilize bi-directed graph data model that will comprise of different phases and levels.The traversal and structure of the graph are defined by suitable ML and DL methods.The CNN and DL methods like LSTM assists in the recognition of the learner’s design based on the FSLSM model.

    In [13], the automated approach of satisfaction measurement has been proposed in order to process the information resulting from the communication of the learners with the scheme.In this manner, classification methods are utilized.This study is performed within this structure and comprises of introducing an automated system of satisfaction measurement for evaluating the efficacy of adoptive E Learning schemes.The presented method is depending on the analyses of the learner tracks,i.e.,the duration related to the distinct learning contents and the amount of visits of this content performed with the learners.Holmes et al.[14] proposed research where forty-four scholars have replied on-screen to multiple questions regarding computer programming.Utilizing a front facing USB web camera the activities of the learners are noted in appraisal and reading of on-screen data.The resulting datasets of question-answer scores and non-verbal behavior were utilized for training ANN method to categorize non-comprehension and comprehension states in near present.

    In [15], a relation among Extravert and Introvert characters and way of their learning is established.At first, altered VARK questionnaires are employed as a Chatbot for classifying persons as Extraverts/Introverts.Afterward, the classification with the Chatbot, 2 min of visual content and auditory content are provided to Extraverts and Introverts and learners Beta brain wave is noted and a database is generated at an interval of 1 s.The database is authenticated by ML approaches such as Canopy, NB, and N48.In [16], proposed an approach called Augmented Education (AugmentED).Especially, the understanding of the feature leads to poor/excellent performances, metrics measure the nonlinear and linear behavioural variations (for example stability and regularity) of campus lives are projected; moreover, feature demonstrating dynamic variations in temporal lifestyle pattern is extracted with LSTM model.Next, ML based classifications were introduced for predicting educational performances.

    Xie et al.[17] gather video-viewing information from a largescale e-learning technique and utilize Cox proportional hazard function for modelling the leaving time.The methods primarily consist of the communications among parameters, age segmentation non- and -linearity assumption.In [18],forecasting recent highlight of partly highlighted electronic learning document is analyzed.Du et al.[19] proposed an incorporated architecture (LVAEPre) depending on LVAE using DNN method for alleviating the imbalanced allocation of learning databases as well as offer earlier alerts of at-risk learners.

    3 The Proposed Non-Verbal Behavior Detection Model

    In this study, a novel IML-ELNVBD technique is presented for the detection and classification of non-verbal behavior of the e-learner in the IoT environment.The proposed IML-ELNVBD technique involves different sub-processes namely data collection, behaviour modelling, behaviour extraction,ELM-SAE based classification, and ACO based parameter optimization.Fig.1 illustrates the overall block diagram of proposed IML-ELNVBD model.The detailed working of every process is offered in the following sections.

    3.1 Stage I: Data Collection

    Primarily, the IoT devices are used to collect data related to the e-learners which are then transmitted to the cloud platform for subsequent processes.A collection of recordings are carried out exhibiting the reading onscreen data (questions, diagram, maths, and coding) prior to answering the MCQ.The resulting dataset of behaviourally descriptive image data and objective ground truth MCQ answers are utilized for training and testing the ELM-SAE model.

    Figure 1: Overall block diagram of IML-ELNVBD model

    3.2 Stage II: Behavior Modeling

    Anew data model was developed for capturing a wide spectrum of non-verbal behaviour channels.This method is populated by analyzing the state of certain behavioural channels within all images of the web camera image streaming and integrating this with metadata regarding the learners.A behavioural channel is an individual observed behaviour, like‘head rotated left’or‘left eye gaze right’.All the behavioural channels are a false/true question, i.e., denoted as +1.0 or -1.0.When a complete behavioural feature set could not be extracted for the time period then the process ends and wait for the following time window.

    3.3 Stage III: Behavior Extraction

    To decrease the processing overhead, image is decreased to 360×240px and grey scaled before being decomposed to a region of interest (ROI) having features (E.g., left eye and right eye) with Haar cascade.The scale invariant property of Haar cascade allows for efficient feature position while the location of the learner relating to the camera isn’t closely monitored.Then, The ROI pixel information is additionally decreased by an LDA, before being categorized into a certain behavioural channel classifier Variable for geometries, state change, and pixel data are extracted from all the images.LDA has been presented by Fisher firstly.The fundamental idea is for selecting the vector φoptwhich maximize the Fisher condition function and proceeds φoptas the optimum projection way that is also named as optimum discriminant vector.Afterward, the ratio of interclass dispersion to intraclass dispersion gains the maximal than the instances predictable during this direction.The fisher discrimination condition function has been determined as:

    whereSwrepresents the within-class scatter matrix,Sbimplies the among class scatter matrix, and φ refers the non-zero column vector of some amount of dimensions.

    The Fisher condition function relates the amongst-class and within-class dispersion of instances skillfully and gives the perfect condition to define the optimum prediction way.

    The extraction method is repetitive for every image in the provided time window, generating a matrix of feature vector i.e., the summarized to a Cumulative Behavioural Feature Vector (CBFV).The +1/-1 class distribution for CBFV is closer to that of the source, indicates reliable behaviour extraction over comprehension classes.The CBFV generated for every second would be the input vector for comprehension classifier testing and training.

    3.4 Stage IV: ELM-SAE Based Classification

    After the extraction of behavioural features, they are passed into the ELM-SAE model for classification purposes [20].

    The common approximation ability of ELM has been exploited to the strategy of autoencoder(AE), and also, sparse restriction has been expanded the AE optimized, and so, it can term it as ELM sparse AE.It could be understood that unlike the AEs (for instance, BP-based NN) utilized from the classic DL techniques, the input weight of presented ELM sparse AE has been introduced as exploring the path back in an arbitrary space.Fig.2 depicts the framework of ELM model.The ELM system is outperformed that the trained of ELM with arbitrary mapped input weight has been effectual sufficient to estimate some input data.Specifically, when it can be training the AE succeeding the model of ELM, once the AE has been initialized, the fine-tuned is not needed.Besides, for generating further sparse and compact features of inputs,?1optimized has been carried out to the established of ELM AE, and it can be distinct in the ELM AE presented where ?2-norm singular values have been computed to feature representation.The optimize technique of presented ELM sparse AE has been represented as subsequent formula:

    Figure 2: ELM structure

    where X implies the input data,Hrefers the arbitrary mapping output, and β signifies the hidden layer weight that is achieved.During the predefine DL techniques, X has been generally the encoded outcomes of the bases β that require that used to the iterations of optimize.But, during the presented AE, since it could be employed arbitrary mapping to hidden layer feature illustration, X refers the original data andHindicates the arbitrary initialization output that requires not to be optimization.Thereafter, it will explain the optimized technique to the ?1optimized issue.For clear demonstration,the objective function can be defined as follows.

    where (β) = ||Hβ-X||2, andq(β) = ||β||?1refers the ?1penalty term of trained technicians.

    The fast iterative shrinkage-thresholding algorithm (FISTA) has been implemented for solving the issue in (13).The FISTA minimization a smooth convex function with difficulty of (1/j2), wherejrefers the iteration times.The execution facts of FISTA are as follows.

    1) Compute the Lipschitz constant γ of gradient of smooth convex function?p.

    2) Create the iteration by takingy1=β0∈Rn,t1= 1 as primary points.Afterward, toj(j≥1)the subsequent holds.βj=sγ(yj), wheresγhas been provided as:

    By calculating the iterative steps above, it could accomplish perfectly recovering the information under the corrupted ones.Utilizing the resulting bases β as the weights of presented AE, the inner product of inputs and learned feature reproduces the compact illustrations of original data.

    3.5 Stage V: ACO Based Parameter Optimization

    At the final stage, the ACO algorithm is employed to properly adjust the weight and bias values involved in the ELM-SAE model.ACO is a population based Metaheuristic method i.e., utilized for finding relevant solutions for a complex optimization problem [21].In ACO, a collection of software agents named artificial ant search for better solutions to a provided optimization problems.In order to employ ACO, the optimization problems are converted to the problems of discovering the optimal route on a weight graph.The artificial ant (henceforth ant) gradually creates solution by shifting on the graph.The solutions building procedure is biased and stochastic with a pheromone method,i.e., a collection of parameters related to graph modules (edges nodes or) that value is altered at running time with the ant.The applications of ACO model in the parameter tuning method include Generation of rules, Structural schema, pruning of rules, Heuristic functions, Using determined rules,and Pheromone upgrade.

    The structural schema of the proposed classification method is given as follows.The artificial ant begins the traverse from initial nodes on the top i.e., consider as a virtual nest.The low-level node represents distinct characteristics and all features hold a quantity of values.A feature is determined asfmand Vmnrepresents the discrete values that belong to the features, whereasidenotes the sequence amount of features andjindicates the sequence amount of the values existing in the features.The ending of the feature is the classes and the class value is represented as Ck, in which k represents the series values in the class.As demonstrated in figure, the ants initiate their traverse from the beginning and pick values for the class, and consume the simulated food.Once the traversal procedure is accomplished, values would be selected for all the classes.In order to find the rules, enough ant follows similar paths as mentioned in the following.In such cases, the found paths are specified as solid lines: Start-Val1,2-Val2,1-Val3,3-C3-End.

    As above mentioned, the ant begins from the artificial nest and chooses values for all the features for making rules.This process can be executed by a likelihood function as given in Eq.(7).It offers probability (Pmn) which Vijis selected as values of fm(fm= Vmn) whereas fmrepresents mthfeatures and Vijdenotes nthvalues.

    In which ηmnrepresent the problem related heuristic functions for Vijand τmnimplies the amount of pheromones.

    In order to discover the classifier rule, a successive covering methodology is utilized.Firstly, the identified amount of rules is maintained as NULL and the training sets hold the recognized rule.On the finding of rules at all the iterations, the determined rules would be moved to the classification rules lists and eliminated from the trained sets.The rules detection procedure would be performed once the subsequent condition is fulfilled.

    i.The amount of cases must be smaller when compared to the certain values that could be located to the rules, called a minimal case for all the rules.

    ii.Afterward, the exploitation of each feature, the rule making tasks gets ended.The ant employs a likelihood function (Pmn) to select feature values for making rules.

    For every termmn, ACO method calculate the heuristic function ηmnof a which determines the quality of this term depending upon the capacity of enhancing the prediction outcomes of the rules.Especially, the values of ηmnfor termmnsuggests an amount of the entropy incorporated to that terms.The entropy would be defined for every termmnas shown in Eq.(8).

    In which W represents the class features, k denotes the amount of classes andP(w|Am=Vmn)indicates the empirical likelihood of studying classwcondition on getting examinedAm=Vmn.

    It is a generally used method to eliminate unnecessary terms that appear in the rules.It drastically manages the categorizing capability of the rules and improves to solve the problems of overfitting the trained information.When the rule generation procedure has ended, the rule pruning process would start on.It removes the useless rules generated by ant in all the steps that enhance the rule quality.The values of rule quality (Q) exist in 0≤W≤1 as illustrated in Eq.(9).

    whereas TN-True Negative, TP-True Positive, FP-False Positive, and FN-False Negative.

    The pheromone upgrading method suggests the unpredictability of ant’s pheromone in the realworld.Due to the positive feedbacking process, the error in the heuristic measures can be altered and solutions to improved classification performances.The ant employs this method for determining improved classification rules.Firstly, each trail is given to equivalent volume of pheromone as shown in Eq.(10).

    In which airepresents amount of features and bmrepresents the possible value of am.The amount of pheromone on the node was used to the present rules get upgraded because of the pheromone deposition with the ant in the procedure of route finding.Later, the pheromone evaporation is required to be determined.Therefore, the iteration process is executed by Eq.(11).

    Whereas ρ represents the pheromone evaporation rate, Q denotes the quality as shown in Eq.(7)and t indicates the series amount of iterations.Conversely, the node that hasn’t been used with the existing rules would contain pheromone evaporation as provided in Eq.(12).

    Eq.(12) determines the amount of pheromone of unexplored nodes get reduced by an increase in time.

    In order to categorize novel instances, the recognized rule is employed since they are found, as they were kept in an arranged list.The main rules that conceal the novel instances represent that the cases are allotted through the class discovered by the resultant rule.Once the novel instances don’t get any of the rules in the lists, the novel instances undergo classifier with a default rule which recognizes the significant classes in the set of found trained cases.

    Then scheming the ELM-SAE, it can utilize a novel metric that permits us for comparing effectually the outcomes given as ELM-SAE created with presented technique.The MSE demonstrates the error amongst the ELM-SAE outcome and desire pattern.During this case,an optimum individual has one that creates the minimal MSE:

    whereyirefers the output of ELM-SAE.

    4 Performance Validation

    This section investigates the results analysis of the IML-ELNVBD technique on the applied training and testing MSE.

    The performance validation of the IML-ELNVBD technique takes place interms of training and testing MSE in Tab.1.

    Table 1: MSE analysis of IML-ELNVBD model with training and testing dataset

    Fig.3 investigates the training MSE analysis with all classes of the IML-ELNVBD technique on the applied dataset.The results have shown that the IML-ELNVBD technique has been validated with the low training and testing MSE.For instance,with fold-0, the IML-ELNVBD technique has attained training and testing MSE of 0.68 and 0.88 respectively.In addition, with fold-1, the IML-ELNVBD technique has attained training and testing MSE of 0.71 and 0.87 respectively.Moreover, with fold-2,the IML-ELNVBD technique has obtained training and testing MSE of 0.77 and 0.90 respectively.Furthermore, with fold-3, the IML-ELNVBD technique has obtained training and testing MSE of 0.60 and 1.00 respectively.Lastly, with fold-4, the IML-ELNVBD technique has obtained training and testing MSE of 0.71 and 0.93 respectively.Similarly, Fig.4 shows the results analysis of the IMLELNVBD technique with existing techniques under five classes respectively.

    Figure 3: MSE analysis of IML-ELNVBD model with all class

    Figure 4: MSE analysis of IML-ELNVBD model with five classes

    A brief comparative study of the IML-ELNVBD technique takes place with existing techniques interms of MSE in Tab.2 and Fig.5.The figure has shown that the existing CC-ANN techniques have obtained higher MSE values on the training and testing data.At the same time, the proposed IML-ELNVBD technique has obtained lower MSE values on the applied dataset.

    Figure 5: MSE analysis of IML-ELNVBD model existing techniques

    Table 2: Result analysis of IML-ELNVBD model with existing techniques interms of MSE

    Tab.3 offers the classification results analysis of the IML-ELNVBD technique under varying aspects such as training-All Class (Tr-AC), training-five class (Tr-FC), testing-all class (Te-AC), and testing-five class (Te-FC).

    Fig.6 shows the results analysis of the IML-ELNVBD technique on Tr-AC dataset.The figure has shown that the IML-ELNVBD technique has gained effective outcomes under every fold.For instance,with fold-1, the IML-ELNVBD technique has obtained TP, TN, and accuracy of 93.70%, 90.70%,and 92.20%.Similarly, with fold-3, the IML-ELNVBD technique has attained TP, TN, and accuracy of 91.90%, 94.50%, and 93.20%.Likewise, with fold-5, the IML-ELNVBD technique has depicted d TP, TN, and accuracy of 93.70%, 90.80%, and 92.25%.Similarly, the figure revealed that the IMLELNVBD technique has attained improved results outcome under every fold on Tr-FC dataset.For instance, with fold-1, the IML-ELNVBD technique has resulted in TP, TN, and accuracy of 83.40%,80.80%, and 82.10%.Followed by, fold-3, the IML-ELNVBD technique has provided TP, TN, and accuracy of 84.90%, 82.50%, and 83.70%.Moreover, with fold-5, the IML-ELNVBD technique has resulted in TP, N, and accuracy of 80.20%, 82.80%, and 81.50%.

    Figure 6: Result analysis of IML-ELNVBD model on Tr-AC dataset

    Table 3: Classification result analysis of IML-ELNVBD model

    Fig.7 provides a comprehensive results analysis of the IML-ELNVBD technique on Te-AC dataset.The figure has shown that the IML-ELNVBD technique has accomplished better results under every fold.For instance, with fold-1, the IML-ELNVBD technique has resulted in TP, TN, and accuracy of 90.30%, 93.30%, and 91.80%.Concurrently, with fold-3, the IML-ELNVBD technique has provided TP, TN, and accuracy of 90.70%, 92.90%, and 91.80%.Simultaneously, with fold-5, the IML-ELNVBD technique has accomplished TP, N, and accuracy of 92.50%, 92.10%, and 92.30%.The results reported that the IML-ELNVBD technique has accomplished enhanced outcomes under every fold on Te-FC dataset.For instance, with fold-1, the IML-ELNVBD technique has resulted in TP, TN, and accuracy of 81.80%, 80.90%, and 81.35%.Meanwhile, with fold-3, the IML-ELNVBD technique has provided TP,TN,and accuracy of 82.10%,82.40%,and82.25%.Eventually,with fold-5,the IML-ELNVBD technique has resulted in TP, N, and accuracy of 80.70%, 84.40%, and 83.55%.

    Figure 7: Result analysis of IML-ELNVBD model on Te-AC dataset

    Finally, a classification accuracy analysis of the IML-ELNVBD technique takes place with recent techniques in Tab.4 and Fig.8.The results demonstrated that the CC-ANN(Te-AC) and CCANN(Te-FC) techniques have obtained the least accuracy of 73.23% and 72.93% respectively.At the same time, the IML-ELNVBD(Tr-FC) and IML-ELNVBD(Te-FC) techniques have resulted in moderate accuracy of 82.32% and 82.87% respectively.Followed by, the CC-ANN(Tr-AC) and CCANN(Tr-FC) techniques have obtained a competitive accuracy of 85.53% and 86.97% respectively.However, the IML-ELNVBD(Tr-AC) and IML-ELNBBD(Te-AC) approaches have resulted in a maximum accuracy of 92.79%and92.23%respectively.By looking into the above mentioned tables and figures, it is demonstrated that the IML-ELNVBD technique has accomplished improved outcomes over the recent techniques.

    Table 4: Comparative analysis of IML-ELNVBD model with existing techniques interms of accuracy

    Figure 8: Accuracy analysis of IML-ELNVBD model with existing approaches

    5 Conclusion

    In this study, a novel IML-ELNVBD technique is presented for the detection and classification of non-verbal behaviour of the e-learner in the IoT environment.The proposed IML-ELNVBD technique allows the IoT devices such as audio sensors, cameras, etc.which are then connected to the cloud server for further processing.The proposed IML-ELNVBD technique involves different sub-processes namely data collection, behaviour modelling, behaviour extraction, ELM-SAE based classification, and ACO based parameter optimization.For examining the enhanced outcomes of the proposed model, a comprehensive simulation analysis is carried out.The experimental results highlighted the betterment of the IML-ELNVBD technique compared to the recent models.As a part of future extension, the classification performance can be boosted by the inclusion of advanced deep learning models.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (RGP.1/127/42).www.kku.edu.sa.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    熟女少妇亚洲综合色aaa.| 日韩精品青青久久久久久| 亚洲天堂国产精品一区在线| 桃红色精品国产亚洲av| 97超视频在线观看视频| 国产老妇女一区| 中出人妻视频一区二区| 午夜福利视频1000在线观看| 欧美一区二区亚洲| 国产精品香港三级国产av潘金莲| 变态另类成人亚洲欧美熟女| 一区二区三区国产精品乱码| 国产精品久久久久久久久免 | 国产中年淑女户外野战色| 国产精品三级大全| 日本成人三级电影网站| 级片在线观看| 午夜老司机福利剧场| 国产国拍精品亚洲av在线观看 | 少妇人妻一区二区三区视频| 国产精品98久久久久久宅男小说| 国产视频内射| or卡值多少钱| 国产精品女同一区二区软件 | a在线观看视频网站| 九九久久精品国产亚洲av麻豆| 日韩中文字幕欧美一区二区| 少妇熟女aⅴ在线视频| 国产精品野战在线观看| 欧美中文综合在线视频| 99在线人妻在线中文字幕| 在线观看av片永久免费下载| 99国产精品一区二区三区| 精品99又大又爽又粗少妇毛片 | 亚洲av不卡在线观看| 色综合站精品国产| 久久99热这里只有精品18| 1000部很黄的大片| 午夜福利高清视频| 亚洲av五月六月丁香网| 午夜日韩欧美国产| 最新美女视频免费是黄的| 夜夜夜夜夜久久久久| e午夜精品久久久久久久| 天美传媒精品一区二区| 久久婷婷人人爽人人干人人爱| 欧美三级亚洲精品| 亚洲午夜理论影院| 日本在线视频免费播放| 久99久视频精品免费| 国产精品久久久久久人妻精品电影| 国产伦精品一区二区三区视频9 | 成人国产一区最新在线观看| 国产精品99久久99久久久不卡| 好看av亚洲va欧美ⅴa在| 白带黄色成豆腐渣| 亚洲成人久久爱视频| 91久久精品国产一区二区成人 | 一个人免费在线观看电影| 国产三级黄色录像| 十八禁网站免费在线| 午夜两性在线视频| 一本精品99久久精品77| 麻豆国产av国片精品| 老汉色av国产亚洲站长工具| 波野结衣二区三区在线 | 91字幕亚洲| 在线观看66精品国产| 热99re8久久精品国产| 国模一区二区三区四区视频| 长腿黑丝高跟| 午夜福利18| 婷婷精品国产亚洲av| 精品国内亚洲2022精品成人| 亚洲av不卡在线观看| 欧美成狂野欧美在线观看| 欧美一区二区亚洲| 国产精品,欧美在线| 日韩欧美精品v在线| 三级国产精品欧美在线观看| 又黄又粗又硬又大视频| 亚洲av成人精品一区久久| 夜夜夜夜夜久久久久| 夜夜夜夜夜久久久久| 别揉我奶头~嗯~啊~动态视频| 在线观看美女被高潮喷水网站 | 亚洲欧美日韩高清在线视频| 亚洲国产精品久久男人天堂| 久久久久精品国产欧美久久久| 国产日本99.免费观看| 男人和女人高潮做爰伦理| 一本一本综合久久| 麻豆国产av国片精品| 亚洲成av人片免费观看| 国产精品久久久久久人妻精品电影| 亚洲18禁久久av| 久久这里只有精品中国| 国产av在哪里看| 亚洲专区国产一区二区| 在线国产一区二区在线| 99精品在免费线老司机午夜| 最新美女视频免费是黄的| 制服人妻中文乱码| 成人18禁在线播放| 99热这里只有是精品50| 国产高清三级在线| 久久久久精品国产欧美久久久| 在线看三级毛片| 一边摸一边抽搐一进一小说| 成人午夜高清在线视频| 亚洲精品国产精品久久久不卡| 久久精品国产亚洲av香蕉五月| 18禁黄网站禁片免费观看直播| 午夜两性在线视频| 网址你懂的国产日韩在线| 亚洲中文日韩欧美视频| 日本在线视频免费播放| 性欧美人与动物交配| 最近在线观看免费完整版| 免费人成视频x8x8入口观看| 乱人视频在线观看| 国产91精品成人一区二区三区| 最好的美女福利视频网| 此物有八面人人有两片| 国产一级毛片七仙女欲春2| 色综合婷婷激情| 人妻丰满熟妇av一区二区三区| 午夜久久久久精精品| 国产亚洲欧美98| 很黄的视频免费| 老司机午夜十八禁免费视频| 国产欧美日韩一区二区精品| 亚洲精华国产精华精| 国产三级黄色录像| 亚洲精品粉嫩美女一区| 久久久国产精品麻豆| 欧美性感艳星| 黄色视频,在线免费观看| 一个人免费在线观看的高清视频| 欧美黑人欧美精品刺激| 他把我摸到了高潮在线观看| 亚洲美女黄片视频| 国产激情欧美一区二区| 亚洲精品456在线播放app | 欧美精品啪啪一区二区三区| 老司机深夜福利视频在线观看| 欧美最黄视频在线播放免费| 天堂av国产一区二区熟女人妻| 国产高清videossex| 中文字幕人妻熟人妻熟丝袜美 | 欧美区成人在线视频| 国语自产精品视频在线第100页| 淫妇啪啪啪对白视频| 成人欧美大片| 好看av亚洲va欧美ⅴa在| 激情在线观看视频在线高清| 亚洲中文字幕日韩| 国产精品综合久久久久久久免费| 精品久久久久久,| 亚洲av美国av| 露出奶头的视频| 天天添夜夜摸| 69人妻影院| 一夜夜www| 亚洲性夜色夜夜综合| 国产精品爽爽va在线观看网站| 久久久久久久午夜电影| 亚洲内射少妇av| 草草在线视频免费看| 亚洲激情在线av| 黄片小视频在线播放| 国产成年人精品一区二区| 日韩欧美三级三区| 国产精品久久久久久精品电影| 日韩精品青青久久久久久| 一a级毛片在线观看| АⅤ资源中文在线天堂| 99国产精品一区二区蜜桃av| 国产高清有码在线观看视频| 欧美性猛交╳xxx乱大交人| 99国产综合亚洲精品| or卡值多少钱| 国产精品女同一区二区软件 | 熟女人妻精品中文字幕| 精品熟女少妇八av免费久了| 99在线视频只有这里精品首页| a在线观看视频网站| 免费看十八禁软件| 男女视频在线观看网站免费| 日本a在线网址| 免费人成视频x8x8入口观看| 久久久久国内视频| 成人无遮挡网站| 欧美成狂野欧美在线观看| 男人和女人高潮做爰伦理| 在线观看免费午夜福利视频| 狂野欧美白嫩少妇大欣赏| 很黄的视频免费| 久久久久久久亚洲中文字幕 | 欧美色视频一区免费| 欧美激情在线99| 午夜亚洲福利在线播放| 老鸭窝网址在线观看| 黄片大片在线免费观看| 别揉我奶头~嗯~啊~动态视频| 热99re8久久精品国产| 人妻久久中文字幕网| 免费在线观看日本一区| 国产成人av激情在线播放| 国产精品99久久久久久久久| 岛国在线观看网站| 精品人妻偷拍中文字幕| 一卡2卡三卡四卡精品乱码亚洲| 久久久久久大精品| 亚洲欧美一区二区三区黑人| 一本久久中文字幕| 久久性视频一级片| 国产淫片久久久久久久久 | 国产精品野战在线观看| 欧美最黄视频在线播放免费| 免费看光身美女| 国产午夜福利久久久久久| 97碰自拍视频| 精华霜和精华液先用哪个| АⅤ资源中文在线天堂| 最近最新中文字幕大全免费视频| 欧美日韩福利视频一区二区| 蜜桃久久精品国产亚洲av| 在线观看舔阴道视频| 日本黄大片高清| 免费看a级黄色片| 国产高清视频在线观看网站| 欧美zozozo另类| www国产在线视频色| 国产成人av激情在线播放| 欧美日本视频| 全区人妻精品视频| 老熟妇乱子伦视频在线观看| 婷婷精品国产亚洲av| 日本免费一区二区三区高清不卡| 精品国产三级普通话版| 91麻豆精品激情在线观看国产| 欧美日韩中文字幕国产精品一区二区三区| 亚洲欧美一区二区三区黑人| 在线观看午夜福利视频| 男插女下体视频免费在线播放| 嫩草影院入口| а√天堂www在线а√下载| 18禁黄网站禁片午夜丰满| 在线播放国产精品三级| 99久久成人亚洲精品观看| 亚洲av电影不卡..在线观看| 欧美丝袜亚洲另类 | 久久人妻av系列| 国产熟女xx| 国产精品亚洲一级av第二区| 此物有八面人人有两片| 国产伦精品一区二区三区视频9 | 亚洲欧美一区二区三区黑人| 99riav亚洲国产免费| 热99re8久久精品国产| 亚洲人成网站在线播| 美女被艹到高潮喷水动态| 成年版毛片免费区| 又粗又爽又猛毛片免费看| 国产91精品成人一区二区三区| 超碰av人人做人人爽久久 | 国内精品久久久久精免费| 国语自产精品视频在线第100页| av国产免费在线观看| 亚洲av成人av| 最近最新免费中文字幕在线| 免费在线观看成人毛片| 国产精品电影一区二区三区| 三级男女做爰猛烈吃奶摸视频| 婷婷精品国产亚洲av在线| 国产精品爽爽va在线观看网站| 黄色片一级片一级黄色片| 人妻久久中文字幕网| 亚洲国产欧美网| 亚洲专区国产一区二区| 久久久久亚洲av毛片大全| 午夜免费观看网址| 免费观看人在逋| 听说在线观看完整版免费高清| 中文字幕熟女人妻在线| 毛片女人毛片| 亚洲精品456在线播放app | 人人妻人人澡欧美一区二区| 午夜免费观看网址| 免费看十八禁软件| 亚洲成a人片在线一区二区| 脱女人内裤的视频| 国产精品99久久99久久久不卡| 国产99白浆流出| 国产一区在线观看成人免费| 国产一区二区三区在线臀色熟女| 欧美成人一区二区免费高清观看| 久99久视频精品免费| 久久久久性生活片| 在线播放无遮挡| 日韩欧美国产一区二区入口| 国产欧美日韩精品亚洲av| 国产亚洲精品久久久com| 欧美中文综合在线视频| 亚洲av成人精品一区久久| 国产精品国产高清国产av| 男女午夜视频在线观看| 变态另类丝袜制服| 国模一区二区三区四区视频| 蜜桃久久精品国产亚洲av| 在线观看舔阴道视频| 亚洲专区中文字幕在线| 精品乱码久久久久久99久播| 两个人视频免费观看高清| 桃色一区二区三区在线观看| 脱女人内裤的视频| 麻豆成人av在线观看| 欧美在线黄色| av在线天堂中文字幕| 亚洲人成电影免费在线| 久久久久久久久中文| 国产视频一区二区在线看| 久久精品国产自在天天线| 岛国在线免费视频观看| 国产成人aa在线观看| 真实男女啪啪啪动态图| 国产精品1区2区在线观看.| av天堂在线播放| 国产精品一区二区三区四区久久| 午夜福利在线观看吧| 欧洲精品卡2卡3卡4卡5卡区| 757午夜福利合集在线观看| 日本与韩国留学比较| 亚洲精品美女久久久久99蜜臀| 女人十人毛片免费观看3o分钟| 中出人妻视频一区二区| 岛国在线观看网站| 一a级毛片在线观看| 一本久久中文字幕| 亚洲不卡免费看| 18+在线观看网站| 欧美av亚洲av综合av国产av| 嫩草影院精品99| 免费在线观看成人毛片| 中文字幕av在线有码专区| 大型黄色视频在线免费观看| 全区人妻精品视频| 国产亚洲精品av在线| 午夜视频国产福利| 欧美又色又爽又黄视频| 国产精品爽爽va在线观看网站| 日韩亚洲欧美综合| 免费观看精品视频网站| 午夜福利在线观看免费完整高清在 | 亚洲av成人精品一区久久| 久久国产精品影院| 99热只有精品国产| 久99久视频精品免费| 国产 一区 欧美 日韩| 国产亚洲精品久久久久久毛片| 波多野结衣高清无吗| 亚洲性夜色夜夜综合| 久久性视频一级片| 99久久成人亚洲精品观看| 亚洲国产精品合色在线| 国产精品影院久久| 国产成人福利小说| 黄片大片在线免费观看| 午夜久久久久精精品| 麻豆成人av在线观看| 少妇裸体淫交视频免费看高清| 男女那种视频在线观看| 国产爱豆传媒在线观看| 久久久国产精品麻豆| 色综合欧美亚洲国产小说| 999久久久精品免费观看国产| 九色成人免费人妻av| 熟女人妻精品中文字幕| 伊人久久精品亚洲午夜| 久久精品国产亚洲av香蕉五月| 中亚洲国语对白在线视频| 淫妇啪啪啪对白视频| 国产乱人视频| 日韩av在线大香蕉| 天堂av国产一区二区熟女人妻| 欧美又色又爽又黄视频| 天天添夜夜摸| 亚洲一区高清亚洲精品| 国产伦一二天堂av在线观看| 在线视频色国产色| 日韩av在线大香蕉| 高清在线国产一区| 中文亚洲av片在线观看爽| 国产精品,欧美在线| 给我免费播放毛片高清在线观看| 国产激情欧美一区二区| 欧美又色又爽又黄视频| 国产精品精品国产色婷婷| 老司机午夜福利在线观看视频| 日韩精品中文字幕看吧| 男人舔女人下体高潮全视频| 亚洲精品影视一区二区三区av| 国产激情偷乱视频一区二区| 日韩精品青青久久久久久| 18禁美女被吸乳视频| 欧美中文综合在线视频| 在线天堂最新版资源| 久久精品影院6| 特大巨黑吊av在线直播| 黄色日韩在线| 色吧在线观看| 久久久色成人| 国产精品乱码一区二三区的特点| 99热只有精品国产| 久久九九热精品免费| 免费一级毛片在线播放高清视频| av天堂在线播放| 亚洲精品影视一区二区三区av| 麻豆一二三区av精品| 色噜噜av男人的天堂激情| 精品欧美国产一区二区三| 欧美乱码精品一区二区三区| 国产精品香港三级国产av潘金莲| 午夜精品在线福利| 麻豆一二三区av精品| 最新中文字幕久久久久| 亚洲最大成人手机在线| 亚洲国产欧美网| 美女高潮喷水抽搐中文字幕| 亚洲成a人片在线一区二区| 在线观看免费视频日本深夜| 一个人免费在线观看的高清视频| 国产单亲对白刺激| 国语自产精品视频在线第100页| 国产精品爽爽va在线观看网站| svipshipincom国产片| 精品人妻1区二区| 亚洲最大成人手机在线| 国产精品乱码一区二三区的特点| 88av欧美| 老司机福利观看| 午夜福利在线观看免费完整高清在 | 午夜亚洲福利在线播放| 久久人妻av系列| 搡老岳熟女国产| 欧美乱妇无乱码| 国产探花极品一区二区| 十八禁网站免费在线| 亚洲男人的天堂狠狠| 2021天堂中文幕一二区在线观| 亚洲五月婷婷丁香| 国产精品98久久久久久宅男小说| 国产黄色小视频在线观看| 精品国内亚洲2022精品成人| 欧美午夜高清在线| 免费看日本二区| 日韩免费av在线播放| 国产精品永久免费网站| 亚洲专区国产一区二区| www.999成人在线观看| e午夜精品久久久久久久| 国内精品美女久久久久久| 麻豆国产97在线/欧美| 亚洲男人的天堂狠狠| 身体一侧抽搐| 一个人免费在线观看电影| 最近最新中文字幕大全电影3| 99国产极品粉嫩在线观看| 中亚洲国语对白在线视频| 人人妻人人看人人澡| 热99在线观看视频| 精品一区二区三区视频在线 | 黄色女人牲交| 一进一出抽搐动态| 婷婷亚洲欧美| 日本免费a在线| 国产 一区 欧美 日韩| 村上凉子中文字幕在线| 免费观看的影片在线观看| 91在线观看av| 免费av毛片视频| 很黄的视频免费| 熟女电影av网| 欧美一区二区亚洲| 国产成人a区在线观看| 精品久久久久久,| 久9热在线精品视频| 日韩精品中文字幕看吧| 亚洲内射少妇av| 99久久成人亚洲精品观看| 日韩欧美国产一区二区入口| 亚洲五月天丁香| 在线播放无遮挡| 在线免费观看的www视频| 国产单亲对白刺激| 午夜福利高清视频| 欧美成人一区二区免费高清观看| 小蜜桃在线观看免费完整版高清| 九九久久精品国产亚洲av麻豆| 精品无人区乱码1区二区| 亚洲人成网站在线播放欧美日韩| 亚洲性夜色夜夜综合| 国产精品一区二区免费欧美| 无遮挡黄片免费观看| 最近在线观看免费完整版| 欧美不卡视频在线免费观看| 亚洲国产欧美人成| 九色国产91popny在线| 色综合亚洲欧美另类图片| 欧美一级毛片孕妇| 午夜福利在线在线| tocl精华| 三级男女做爰猛烈吃奶摸视频| 91在线精品国自产拍蜜月 | 18禁国产床啪视频网站| 中出人妻视频一区二区| 国产乱人视频| 青草久久国产| 欧美不卡视频在线免费观看| 听说在线观看完整版免费高清| 国产伦精品一区二区三区四那| 久久婷婷人人爽人人干人人爱| 免费在线观看亚洲国产| 国产免费一级a男人的天堂| 欧美成人一区二区免费高清观看| 又黄又粗又硬又大视频| 有码 亚洲区| 99热这里只有是精品50| 日韩欧美一区二区三区在线观看| 婷婷丁香在线五月| av中文乱码字幕在线| 在线观看日韩欧美| 亚洲成人久久性| 欧美日韩一级在线毛片| 久久香蕉精品热| 免费观看的影片在线观看| 成人特级黄色片久久久久久久| 日本 欧美在线| www日本在线高清视频| 18禁美女被吸乳视频| 国产亚洲精品av在线| 国产三级黄色录像| 99精品在免费线老司机午夜| 中文字幕人妻丝袜一区二区| 欧美极品一区二区三区四区| 色噜噜av男人的天堂激情| 亚洲一区高清亚洲精品| 人人妻,人人澡人人爽秒播| 熟女人妻精品中文字幕| 亚洲成人久久性| 麻豆国产av国片精品| 悠悠久久av| 一本一本综合久久| 久久香蕉精品热| 一本久久中文字幕| 日本黄大片高清| 一级作爱视频免费观看| 欧美日韩黄片免| 久久久国产成人免费| 老汉色∧v一级毛片| 久9热在线精品视频| 在线观看av片永久免费下载| 一进一出抽搐动态| 一进一出抽搐gif免费好疼| 午夜精品在线福利| 色哟哟哟哟哟哟| 99精品久久久久人妻精品| 精品一区二区三区人妻视频| 亚洲五月婷婷丁香| 亚洲 欧美 日韩 在线 免费| 男人的好看免费观看在线视频| 欧美最新免费一区二区三区 | 久久久久久人人人人人| 午夜精品久久久久久毛片777| 欧美日韩黄片免| 免费观看的影片在线观看| 国产视频一区二区在线看| 日韩欧美精品免费久久 | 国产老妇女一区| 国产成人影院久久av| 国产精品1区2区在线观看.| 老鸭窝网址在线观看| 亚洲av二区三区四区| 嫩草影院入口| 精品不卡国产一区二区三区| 18美女黄网站色大片免费观看| 日本成人三级电影网站| 午夜精品在线福利| 嫩草影视91久久| 在线看三级毛片| 免费看a级黄色片| 国产69精品久久久久777片| av中文乱码字幕在线| 欧美色欧美亚洲另类二区| 99国产极品粉嫩在线观看| 日本撒尿小便嘘嘘汇集6| av天堂在线播放| 两人在一起打扑克的视频| av国产免费在线观看| 欧美丝袜亚洲另类 | 黄色片一级片一级黄色片| 99国产极品粉嫩在线观看| 久久精品国产99精品国产亚洲性色| 搡老岳熟女国产| 亚洲精品乱码久久久v下载方式 | 欧美黄色淫秽网站| 精品久久久久久,| 少妇的丰满在线观看| 在线观看一区二区三区| 国产久久久一区二区三区| 91麻豆精品激情在线观看国产| 夜夜躁狠狠躁天天躁| 丰满乱子伦码专区| 国产熟女xx|