• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    HELP-WSN-A Novel Adaptive Multi-Tier Hybrid Intelligent Framework for QoS Aware WSN-IoT Networks

    2022-08-24 03:25:52SampathkumarandMalmurugan
    Computers Materials&Continua 2022年5期

    J.Sampathkumar and N.Malmurugan

    Mahendra College of Engineering,Salem,636106,India

    Abstract: Wireless Sensor Network is considered as the intermediate layer in the paradigm of Internet of things (IoT) and its effectiveness depends on the mode of deployment without sacrificing the performance and energy efficiency.WSN provides ubiquitous access to location,the status of different entities of the environment and data acquisition for long term IoT monitoring.Achieving the high performance of the WSN-IoT network remains to be a real challenge since the deployment of these networks in the large area consumes more power which in turn degrades the performance of the networks.So,developing the robust and QoS (quality of services) aware energy-efficient routing protocol for WSN assisted IoT devices needs its brighter light of research to enhance the network lifetime.This paper proposed a Hybrid Energy Efficient Learning Protocol(HELP).The proposed protocol leverages the multi-tier adaptive framework to minimize energy consumption.HELP works in a two-tier mechanism in which it integrates the powerful Extreme Learning Machines for clustering framework and employs the zonal based optimization technique which works on hybrid Whale-dragonfly algorithms to achieve high QoS parameters.The proposed framework uses the sub-area division algorithm to divide the network area into different zones.Extreme learning machines(ELM)which are employed in this framework categories the Zone’s Cluster Head(ZCH)based on distance and energy.After categorizing the zone’s cluster head, the optimal routing path for an energy-efficient data transfer will be selected based on the new hybrid whale-swarm algorithms.The extensive simulations were carried out using OMNET++-Python userdefined plugins by injecting the dynamic mobility models in networks to make it a more realistic environment.Furthermore, the effectiveness of the proposed HELP is examined against the existing protocols such as LEACH,M-LEACH, SEP, EACRP and SEEP and results show the proposed framework has outperformed other techniques in terms of QoS parameters such as network lifetime,energy,latency.

    Keywords: Internet of things; extreme learning machines; zones’ cluster head; hybrid whale-swarm

    1 Introduction

    Over the last few years, WSN assisted Internet of Things paradigm [1] has evolved as one of the biggest technological advances in the modern era of science.WSN assisted IoT networks to consist of sensor nodes, actuators, transceivers and many more devices for better data collection,monitoring and controlling.These hubs presented in WSN supported IoT networks create the physical objects aware of different attributes in the deployed networks and trigger an event in coordination with the other nodes in the network.Also, these hubs are usually energy consuming which demands intelligent techniques to increase network lifetime [2].To countermeasure, these concerns, different intelligent algorithms were where the clustering algorithms occupy the major share for a WSN-IoT Implementation.The preliminary moto of the routing protocols based on clustering is to choose the outstanding energy-efficient Cluster Head (CH) to route the other nodes via in it.This CH has accountability for the data collection and aggregation which then transmit the aggregated data to BS.To countermeasure all the above-mentioned issues, this paper proposes the new protocol HELP-DAR (Hybrid Efficient Learning Protocol using Dynamic Adaptive Routing), a hybrid multi-tier and intelligent energy-efficient routing protocol which integrates the powerful extreme learning machines for the selection of zone-based CHs along with the hybrid metaheuristic algorithm for an efficient and optimal zonal routing protocol.The main contribution of the paper is as follows as

    (1) A multi-tier hierarchical framework for WSN-assisted IoT networks in a Smart Health care system has been proposed.The proposed framework aims to transmit the data in an energy-efficient network with less delay and high performance.

    (2) Usage of Single Feed Forward learning models in the Cluster Head election has been introduced with the adaptive energy-distance data training vectors.

    (3) Integration of hybrid whale optimized swarm routing algorithms to achieve lossless data transmission and to prolong the network lifetime.

    The paper flow is presented as follows:The related works regarding the different routing protocols for WSN and WSN assisted networks has been discussed in Section-II.Section-III discusses the network model, energy models and proposed frameworks with an effective selection of Cluster heads with effective implementation of the hybrid routing algorithm.The experimental setup, simulation parameters, result analysis were discussed in Section-IV.The Conclusion is presented in Section-V.

    2 Related Works

    Jaiswal et al.(2020) designed a novel routing protocol for WSN.The proposed model is energy efficient and guarantees the improvement of QoS.The routing protocol is designed to withstand high traffic loads.The path selection process is carried out based on the lifetime of the link,reliability and traffic intensity at the surrounding nodes.The result shows better energy saving and better packet delivery ratio (PDR).The limitation of the model is moderate consideration of delay in the intermediate layers, which can further increase the delay in the overall network [3].

    Sambo et al.(2019) performed an elaborate study on clustering in large WSN models.Hierarchy issue arises while clustering the nodes in the WSN’s.Hence, intelligent clustering schemes are needed to optimize the WSN systems.In the study, based on 10 different parameters in WSN,the clustering algorithm are categorized to study the overall efficiency of various protocols.The study didn’t consider the spectrum efficiency of WSN’s while clustering [4].

    So he paid his bill, and bought a horse with the money that remained, and when the evening came he mounted his horse and stood in front of the inn door, determined22 to stay there all night

    Zhao et al.(2018) developed a CH selection protocol that relies on LEACH.The ZigBee modules are employed to calculate the residual energy and IP of the node to update the cluster head selection equation.This type of modification drastically enhances energy efficiency [5].

    Sharma et al.(2018) proposed an enhanced mobility aware energy-efficient routing protocol for IoT (EMAEER) to optimize the routes to establish point-to-point communication.The mobile nodes are always held within the network to further reduce the loss of energy.The simulation is compared with RPL, P2R RPL and ER-RPL algorithms and the energy consumption is reduced at a rate of 9.61% providing better packet delivery.The model withholds only a minimum number of mobile nodes [6].

    Neetesh et al.(2019) put forth an idea of energy conservation in WSN as a green routing protocol that enables a fork and uses modified PSO (Particle Swarm Optimization) to expand the network’s life competency.The system outperforms even in high collision IoT WSN’s.Intelligent hardware deployment is quite challenging in this model [7].

    A Proposed framework consists of directed acrylic graph G= (x, y).Where x →the vertex of the hubs which integrates ZCH and other monitoring hubs, these hubs are distributed randomly within the health care systems.The following characteristics of the proposed framework are listed

    Dwi Widode et al.(2019) developed a novel cluster head selection model using the reinforcement learning method.RC being an MC based scheme learns the behaviour of clusters in the entire network.The sorting of clusters is carried out from the pre-learned ideas and then transmission of packets is attained.The method enhances life and reduces the energy usage in the WSN’s.The model lagged to transmit data due to the prolonged collision of nodes [8].

    As the girls flopped31 down on the grayish-white bedspread to compare notes about the school day, I followed Susan s foster mom - who introduced herself as Glenda - into the kitchen. After clearing a small area, Glenda placed a couple of mugs on the table. Her hand trembled slightly as she poured us each a cup of steaming black coffee. The tightness of her features began to relax as we sipped32 our coffee and chatted about her cats.

    Chriki et al.(2019) proposed an idea of positioning the clusters by using multiple class SVM structures and with the received signal strength measurements.The model is tested with real datasets being collected from a hospital and a laboratory area.The method uses a neural network architecture to perform efficient routing.The false transmission rate is reduced up to 90% in the proposed scheme.The model is suitable only for small-scale network applications [9].

    She was shuffling29 through the stacks of expensive stockings, sheer colors shining through slick cellophane windows: taupe, navy, a maroon30 as dark as pig s blood. The sleeve of her green coat brushed his and he smelled her perfume, something delicate and yet pervasive31, something like the dense pale petals32 of lilacs outside the window of the student rooms he d once occupied in Pittsburgh. The squat33 windows of his basement apartment were always grimy, opaque34 with steel-factory soot35 and ash, but in the spring there were lilacs blooming, sprays of white and lavender pressing against the glass, their scent36 drifting in like light.

    Behera et al.(2017) developed an improved model of stable Election Routing Protocol.This model uses a threshold value to decide the cluster head in the network.This aids in the optimal decision of cluster heads.The efficiency is improved up to 56% than state-of-art models [10].

    Li et al.(2019) introduced a deep learning-based approach with bat optimization to training the model.The extreme learning approach decides the path using a threshold onset and the bioinspired Bat optimizer decides the optimal solution.The node decaying is the main issue faced in this optimization scheme.When a node decays, the injection of a new node needs to be considered for effective communication [11].

    Anurag et al.(2018) developed a “scalable and Energy Efficient Routing Protocol”to conserve energy in WSN systems.The methods divide the network based on the distance and congestion,clustering is performed.The stability of the model is quite challenging in large area WSN’s [12].

    3 Proposed Framework

    3.1 System Overview

    Fig.1 represents the HELP Multi-Tier Clustering framework for the WSN assisted IoT networks.The nodes belong to this framework are static and dynamic in nature which relies on the requirements of the application.In this proposed framework, rectangular shape networks area is implemented for the processing as mentioned in [12].The cloud server will act as a BS layer,which occupies the top position in the hybrid framework.Based on distance (low, medium, long)the total network area is subdivided into different zones every category of zones has sub-zones and it is denoted as Cluster.As the distance increases, the increased number of cluster heads leads each sub-zones.The Low distance and Medium distance zones have a minimum area with a minimum No.of CHs whereas long-distance zones have a maximum area with a maximum No.of CHs.The upper zones not only aggregate the data from the other zones but also depends on the traffic in the preceding zones.The intracluster communication is reduced by increasing the number of CHs which depends upon area and distance.

    In this research, smart healthcare systems are taken for investigation.In this framework,to monitor and collect body parameters, humans are well equipped with IoT wearable gadgets.Various Zonal CHs (ZCH) are incorporated to transmit the health care data Cloud BS (CBS).This is considered to be a continuous process until CBS receives all the health care data from the upper zone ZCH.Efficient inter-zonal communication and intra-cluster communication are effectively achieved by the hybrid optimization algorithm which will be discussed in the preceding section.As the nodes detect the critical health data from the patient, an alert message is evoked from the particular node and it is transmitted to the CBS so the CBS broadcast the emergency message to all nearby hospitals with the ZCH’s information along with patients Id so that ambulance can be sent from the hospitals to reach the destination place with minimum time.Since wearable devices are mounted on a patient’s body, frequent recharging and replacement of batteries are quite complex, hence intelligent and effective communication is required to avoid the fatal ends.

    3.2 Network Model

    35.I will teach you a way to see him: In Cupid and Psyche, the heroine s sisters encourage her to look at her husband in his sleep. The sisters are jealous and hope to replace their sister. The mother appears to be genuinely concerned about her daughter s welfare. While the mother s intentions might be good, the heroine s fault lies in listening to her mother and/or sisters instead of her new husband s counsel, always a danger in marriages.Return to place in story.

    (1) Nodes in the network are considered wearable IoT devices, which are used to sense clinical parameters such as temperature, breath rate and pulse rates.

    (2) To complete the task, various programs were embedded to sense the programs and unique identities are given to each node for better identification.(ID)

    (3) Each ZCH, node is considered as both static and dynamic which are then typically required for WSN applications.

    (4) The proposed framework is dedicated to the smart health care environment, which senses the clinical data from the patients.

    But when the third child was taken away, and the Queen was again accused, and could not utter a word in her own defence, the King was obliged to give her over to the law, which decreed that she must be burnt to death

    (6) Among all the nodes Communication links are truly symmetric.Therefore, every node can do the distance estimation based on the received signal strength.

    3.3 Energy Models

    The paper uses the energy model from [13–15].Data handling in WSN links consume energy in three different phases namely, data transmission mode, reception phase and aggregation phase.The energy being consumed in the data transmission phase beETX.The energy consumed in the reception phase beERXand the energy consumed in the aggregation phase beEDA.The energy being utilized in the aggregationEDAremains fixed for the entire cycle, whereas the energiesETXandERXwill vary based on the situation.Letdbe the distance between the transmitting sensor nodes to the receiver head.The energy valueETXalways depends on the distanced.Letd0be the threshold value to develop a multi-state model and ifd <do

    (2) The nodes which are nearer to the BS can help to prolong the networks lifetime by significantly decreasing the communication distance

    The energy utilized at the reception phase converts the received signal into data andEelecis the electric energy consumed for this conversion.The relationship between based on length of the received datalbe

    3.4 Working Mechanism

    The proposed HELP framework works on the following phases such as Initialization Phase,Cluster Head Formation, Data Routing Mechanism and Aggregations.The detailed description of the proposed model is discussed in the following section’

    3.4.1 Initialization Phase

    The proposed model mentioned were trained from the different energy, distance vectors using sigmoid activation function with the learning rate of 1 × 10-3learning and moving average decay of 0.9999.Furthermore, the performance of the proposed ELM in terms of training &testing accuracy was calculated for the different number of input neurons which is shown in Fig.2

    3.4.2 Cluster Head Decision

    Once the initialization phase is established, ZCH selection will be evoked by the base station,which runs the proposed extreme learning machines (ELM) on it.Initially, the CBS is trained with the data models with the following criteria

    25.Fetch one of his best suits: Once again, clothes make the man. Puss resorts to more trickery to gain grand apparel for the youngest son. In other versions of the tale, such as Basile s Gagliuso, (also know as Caglioso), the cat arrives at the castle before a scheduled appointment announcing that the Marquis servants have stolen all of his clothing. The king then sends a wardrobe to the Marquis. Once the youngest son appears in the king s own majestic clothing, he cannot be recognized as a lowly commoner.Return to place in story.

    At the start of the retreat, T. J. was literally standing10 outside the circle of students, against the back wall, with that go ahead, impress me look on his face. He didn t readily join the discussion groups, didn t seem to have much to say. But slowly, the interactive11 games drew him in. The ice really melted when the groups started building a list of positive and negative things that had occurred at school that year. T. J. had some definite thoughts on those situations. The other students in T. J. s group welcomed his comments. All of a sudden T. J. felt like a part of the group, and before long he was being treated like a leader. He was saying things that made a lot of sense, and everyone was listening. T. J. was a smart guy and he had some great ideas.

    whereEelecis the electric energy needed to convert single bit data into a signal,lis the length of the data and∈fsand∈msare power consumption for the multi-state model to satisfy the thresholdd0,

    The two features are used mainly to train the CBS to select the ZCH in the network scenario.For the distance calculation, the model uses the Euclidian distance (ED) and average distance(AD) between the CBS and nodes.Subsequently, the value of the energy in the nodes and distance is used as the ZCH selection.In this case, the adaptive energy-distance parameter is calculated in which energy consumption per average distance will be measured as a threshold.The mathematical expression for calculating the energy and distance vectors are calculated as mentioned in [16].The working mechanism for the Extreme Learning Machines for selecting the Cluster head is given as follows

    3.5 Extreme Learning Machines–an Overview

    The CH is selected based on the ELM proposed by Huang et al.[16].These ELM network main features are high speed and accuracy.This network has universal function approximation capabilities and a single HL (hidden layer).The main advantage of this ELM framework is the HL needs no to be tuned necessarily.Here, HL needs to work with activation function (i.e.,sigmoid function) which is vastly differentiable.ELM, the system yield is expressed as follows (4)

    where x →input,β→“Output weight vector”, H(x)→output HL, H*→inverse of H

    Sad and lonely do I live like any hermit87 within these walls, avoided by the world and a terror even to animals; the beauties of nature are hidden from me, for I am blind by day, and it is only when the moon sheds her pale light on this spot that the veil falls from my eyes and I can see

    The cock agreed to this plan, and all four went on together. They could not, however, reach the city of Bremen in one day, and in the evening they came to a forest13 where they meant to pass the night. The donkey and the hound laid themselves down under a large tree, the cat and the cock settled themselves in the branches; but the cock flew right to the top, where he was most safe. Before he went to sleep he looked round on all four sides, and thought he saw in the distance a little spark burning; so he called out to his companions that there must be a house not faroff, for he saw a light.14 The donkey said, If so, we had better get up and go on, for the shelter here is bad. The hound thought that a few bones with some meat on would do him good too!

    The kernel function is incorporated for better accuracy in ELM.In the proposed framework,ELM is used to select the CHs based on the Energy & distances.The two or more CHs are selected based on the above features to ensure the increased lifetime in the network.The ELM is trained with a sigmoidal activation function with a learning rate of 0.001.The pseudo-code of the proposed ELM for the selection of Cluster head is given as follows

    Algorithm 1:Pseudo-Code for the ELM to Select the Cluster Head (Algorithm-1)Sl.No.01ELM based Cluster Head Selection 02Input Features H = (Energy of the nodes, Node_ID, Euclidian Distance and Average distance) -03Output Features = Zonal Cluster heads(ZCH)04Preparation of Training data with features in step 02 with sigmoidal functions and N hidden neurons 05While true :Input weights and bias are randomly Calculate the Pseudo -Inverse matrix H by equation Calculate the Output Weight Matrix .β.by eqn Determination of Different Ranks for Cluster Head in Zones Selection of ZCH =fZCH(x)=Limages/BZ_30_1042_1183_1089_1228.pngβihi(x)=h(x)β If (fZCH(x)<1)Cluster Head Selection -Rank 1 Else if(fZCH==1)Cluster Head Selection -Rank 2 Else Out of the Selection End End End End i=1

    3.5.1 Routing Phase

    After the ZCH selection in every zone by adopting algorithm-1, routing will take place.It can be noticed from the above energy model that energy consumption is proportional to the communication distance.Hence optimized routing path has to be selected for an increased lifetime of networks.To save this purpose, a hybrid whale-firefly algorithm is used for selecting the optimal path.The working mechanism utilizes the firefly [17] and whale algorithm [18]

    Four years later it was the nation s turn to mourn the Duke and to reflect on one man s decision to trade the crown of England for the love of Wallis and the price they had both had to pay.

    3.6 Proposed Optimizer for Routing

    The proposed protocol uses the hybrid combination of the firefly [17] and whale algorithm [18]for finding the optimized energy-efficient path.Since the WSN-assisted IoT networks cover a larger area, usage of metaheuristic algorithms may lead to the trapping problem which may lead to low efficiency.Hence the proposed protocol uses the hybrid combination of firefly and whale algorithms for finding the optimized energy-efficient path.These hybrid combinations truly reduce the trapping problem and find its suitability for the larger area coverage.For the best performance,a multi-objective fitness function has been designed

    where c1, c2, c3 are randomly assigned (randomly assigned between 0 to 1), N(CHi) is the complete neighbour list of nodes in particular zones, NE is the residual energy of every node, and ND represents the distance between the neighbours in the zones.To obtain the energy-efficient path with lossless data transmission, iteration is fixed to maximum numbers and the fitness value of the proposed routing is computed at every iteration.The proposed working mechanism’s complete pseudo-code is given as follows

    Algorithm 2:Pseudo Code - Proposed Routing – Algorithm-2 Sl.No.1Initialize the Whale Population with the node positions, energy levels and distance 2Let Nbest_Positions = Node best positions (Source nodes to Zonal CH)3Let Nrandom _Positions = Initial Positions of hubs FF = fitness function CSP = Current Search Position 2Update Energy & Distance level of the hubs 3Calculate the FF using Eq.(7)4While(i = 1) to maximum_iteration 7 If (pu<0.5)8 If(S<1)9 CSP update utilizing by eqn (t+1) = [Xrandom (t) - {U.D}]referred in [18]10Elseif (S>1)11Update for Random search prey agent & CSP (NRandom_Position)12End if 13Else if (pu>0.5)14CSP update by utilizing by equnX(t+1) =Dl.ebl.cos(2πl(wèi)) + X*(t)referered in [18]15endif 16 End 17 Examination for an exploration agent if it goes beyond the search space 18 FF measurement by utilizing Eq.(5)19 If (best)20 Update Nbest_position,21 If (Nbest_Positions is not equal to FF 22 position Update by using the equnX(t+1) =Dl.ebl.cos(2πl(wèi)) + X*(t) referred in [18]23 Else 24 Nbest_position = Sort(Nbest_positions)25 End 26 End

    3.7 Aggregation Model

    In this framework, eligible CHs performs the data aggregation process, which decreases the energy depletion of the hubs.the data aggregation model adopted in the proposed framework and through cluster heads data, CBS receives the data from all the nodes.

    4 Experimental Setup

    We have validated the performance of the proposed protocol in two ways such as algorithm centric evaluation and performance-centric validation respectively.Since the proposed protocol has integrated the Extreme Learning Machines for Cluster Head Selection, performance metrics such as accuracy, precision and recall have been calculated utilizing the following mathematical formula

    where DR →Detected Results, TNI →Total number of Iterations, TP →True Positive, TN →True Negative

    True positive values are the number of CHs selected based on the residual energy, distance and channel properties.True negative is the number of non-cluster heads nodes when they indeed to be normal.Nearly 3300 data were collected in wireless assisted IoT scenario using OMNET ++Python API scenario and the proposed learning algorithm has been implemented with Python-Tensor Flow in which the 80% were used for training and 20% were used for Testing.Tab.1 presents the proposed protocol parameter for the performance validation.Furthermore, to evaluate network lifetime and energy comparison, we have used First Node Dead Metrics (FNDM), Half Node Dead Metrics (HNDM), Last Node Dead Metrics (LNDM) and No.of dead nodes after each round.The number of nodes received by the sink (base station) through adaptive hybrid protocol is denoted as one round.FNDM, HNDM, LNDM represents the duration between the rounds, which illustrates the point of time when the first nodes, half nodes and last nodes become dead [12].The complete simulation scenario for the proposed HELP protocol is shown in Fig.4.OMNET++ has been used for the complete implementation of the proposed protocol.Tab.1 presents the complete simulation parameters utilized for the experimentation.

    4.1 Results and Discussion

    The proposed HELP protocol performance is in a two-tier fashion, which is discussed in this section.In the first tier, performance metrics of proposed Extreme Learning Machines(ELM) has been evaluated and compared with the other existing algorithms such as Reinforcement Learning Algorithms (RL) [8], “Support Vector machines” (SVM) [9], Artificial Neural Networks (ANN) [19], Na?ve Bayes Algorithms (NB) [20], K-Nearest Neighborhood algorithm(KNN) [21–23].

    Algorithm Centric Evaluation

    In this phase, sensor nodes are deployed in a particular area in the form of a rectangular shape by following the area-subdivision algorithm as mentioned by Anurag et al.[12] Once the sensor nodes are placed in the different zonal areas, CBS sends the beacon messages to all nodes present in the different zones.Each node transmits the data to CBS in the following format such as Zone ID, Node ID, Energy ID and distance d.Once the data frames are received by the CBS,CBS extracts the different features from the above data frame format, CBS adopts the Extreme Learning Machines for further processing.

    Table 1:Simulation parameters utilized for the experimentation

    From Fig.2, it is clear that the accuracy of the proposed algorithm in determining the zonal cluster heads is found to be 97.25% at 75 hidden neurons.Even though accuracy has reached its maximum at 75 hidden neurons, we have taken the optimal value of 100 neurons for training and testing the different data vectors.

    In some variants of the tale, the prince acquires Cinderella s lost shoe by putting pitch or tar61 in the entrance to try to catch her when she runs away. He only succeeds in catching97 her shoe in the tar and then begins his search for its owner.Return to place in story.

    Tab.2 shows the comparative analysis of performance metrics for the different learning models for the various area coverage.In all scenarios, the accuracy, precision and recall are found to be 97.25%, 96.5% and 96.25% respectively.Also, the accuracy of the proposed algorithm has exhibited a 5% increase than KNN, 7.25% increase than Na?ve Bayes (NB), 8% increase than Artificial Neural Networks(ANN), and 5.25% increase than Reinforcement Learning(RL)respectively.Also, tables clearly illustrate that the proposed learning model outperforms the other existing learning models and proves its suitability in the detection of the different zonal cluster heads.

    4.2 Network Centric Evaluation

    In this section, QoS metrics such as network lifetime, energy analysis, PDR (packet delivery ratio) were calculated for the proposed model under increasing network size and compared with the other existing static and dynamic models.

    Table 2:Comparative analysis of performance for different learning models @ different area

    4.2.1 Network Life Time

    (1) The ZCH with high residual energy can keep support uniform energy depletion in the networks.

    In this analysis, network lifetime has been calculated based on FNDM, HNDM, LNDM statistics under increasing area coverage such as 60×120 m, 80×160 m, 100×200 m and 120×240 m respectively.

    Fig.3 illustrates the dead node trend of compared protocols.To make it clearer, network lifetime is compared with the FDNM, HDNM and LDNM analysis in the figure.

    At last, however, the king urged him so greatly that he said: The king s daughter will marry the son of a poor slave-girl called Puruna, who belongs to the king of the land of the north

    Figs.3 and 4 shows the network lifetime analysis of the proposed HELP model with the changes in the area dimensions.It has been noticed in Fig.4 when the network size was increased from 7200 Sq.metres to 12000 Sq.meters, the proposed framework remains stable due to the more amount of zones and also the adoption of the optimized routing path to the nodes present in all zones.The large “communication distance” is divided into small multi-hop communications with a large number of CH selected by the powerful extreme learning machines that distribute the load to the network.The network lifetime of HELP is maintained constant up to network size reaches 20000 square meters and decreases slightly when it exceeds the 20000 square meters whereas other algorithms such M-LEACH, SEP, LEACH decreases exponentially as the area of coverage increases.The other algorithms such as EACRP and SEEP remains almost stable till the network size reaches 12800 sq.Meters but considerably reduces when reaches beyond the 20000 sqm.The proposed HELP performs well and gained a network lifetime even greater than 1500 rounds.

    (5) Initial Energy has been fairly distributed in the networks and purely location-unaware as well as not equipped with GPS.

    Both SEEP and EACRP divides the coverage area into the number of zones in which SEEP categories more number of zones when compared with the EACRP.But the non-integration of optimization techniques in the SEEP makes the little ineffective in achieving network stability.From all the Figures it has been proved that the integration of optimized paths in the zones has enhanced network lifetime.

    Figure 1:Hybrid intelligent framework (multi-tier clustering framework)

    Figure 2:Performance evaluation of the proposed extreme learning machines for different neurons

    Figure 3:Network life time characteristics for proposed models at different area coverage

    Figure 4:Network life time analysis at different area coverage (a) FDNM analysis (b) HDNM analysis (c) LDNM analysis

    Figure 5:Energy consumption analysis for the different protocols at area of dimension 60×120 Sq.meters (7200 Sq.meters)

    Figure 6:Energy consumption analysis for the different protocols at area of dimension 80×160 Sq.meters (12800 Sq.meters)

    Figure 7:Energy consumption analysis for the different protocols at area of dimension 100×200 Sq.meters (20000 Sq.meters)

    Figure 8:Energy consumption analysis for the different protocols at area of dimension 120×240 Sq.meters (28800 Sq.meters)

    4.2.2 Energy Consumption

    In this scenario.Total energy depletion is calculated by the below mathematical expression for the increasing area of coverage.To analyze the energy consumption of the networks, 100 nodes were randomly deployed in a different area of coverage which is mentioned section.Total Energy consumption is calculated by using the mathematical expression

    where ETtx, rx is Energy transmitted and Received by the Nodes in the Networks and EtxCh is the transmission and reception energy for the Cluster heads in zones.

    Figs.5 to 8 illustrates the total energy consumption analysis of the compared protocols for all area dimensions from the first to last rounds.Fig.5 shows the total energy consumption analysis of the different protocols for the area coverage of 60 × 120 Sq.meters.Both LEACH and M-LEACH depletes their full energy as it reaches 600 and 1000 rounds respectively.The other algorithms such as SEP, EARCP, SEEP and Proposed HELP exhibits good performance

    and consumes less energy.Fig.6 shows the total energy consumption analysis of the different protocols for the area coverage of 8×160 Sq.meters.In this case, LEACH and M-LEACH algorithms deplete completely at 600 and 400 rounds respectively.The energy consumption of other algorithms such as SEP, EARCP and SEEP exhibits the medium edge of performance whereas the proposed algorithm maintains the same high performance as in the previous case.Fig.7 shows the total energy consumption analysis of the different protocols for the area coverage of 100×200 Sq.meters.It is clear, as the area of coverage increases, the performance of LEACH,M_LEACH and SEP degrades gradually even at 300, 600, 1000 rounds respectively.It is also found that the EARCP and SEEP exhibit lesser performance comparatively depletes completely at 1300 and 1500 rounds.Though the area of coverage increases, HELP remains active even greater than 1500 rounds.Fig.8 shows the total energy consumption analysis of the different protocols for the area coverage of 120×240 Sq.meters.In this analysis, LEACH, SEP and MLEACH deplete fast as the area increases.Both EACRP and SEEP exhibits good performance in consuming less energy again these algorithms suffers from a faster depletion rate as it drains even at 1200 and 1400 rounds respectively.The plots illustrate that the proposed protocol has a uniform energy depletion curve as contrasted with other WSN-assisted IoT protocols even greater than 1500 rounds.It can be observed from all figures; the proposed HELP exhibits uniformity in energy consumption even though the area of coverage increases.It can be observed, both LEACH, and M-LEACH depletes fast as the area increases.Both EACRP and SEEP exhibits good performance in consuming less energy again these algorithms suffers from a faster depletion rate when the area increases.The plots illustrate that the proposed HELP protocol has a “uniform energy depletion curve” as compared with other existing WSN-assisted IoT protocols even greater than 1500 rounds.The effective selection of areas based on zonal cluster heads interfaced with optimized routing algorithm makes the proposed algorithm consume less energy of 11% than SEEP, 25% than EARCP, 34% than SEP, 75% than LEACH and M-LEACH respectively.

    Table 3:Comparative analysis of E2E delay for different algorithms with different zonal area

    4.2.3 E2e(End to End)Delay Analysis

    To evaluate the E2E delay analysis, we have deployed the number of 100 nodes at different area dimensions as in the previous experimentations.Since the proposed HELP architecture has incubated the powerful optimization algorithm for the different zonal areas, E2E delay (latency)has very much reduced for effective data transmission,

    From Tab.3, the adoption of optimal algorithms in the proposed framework has reduced the delay in transmission even though the area of implementation has increased.It is noticed that both SEEP and HELP exhibits the same characteristics at less area of coverage while the SEEP framework has reduced performance when the area increases.As the area increases, the effective delay transmission of the proposed algorithm is 16.66% lesser than SEEP 33.3% than EARCP,50% SEP, M-LEACH and 60% than LEACH respectively.Since the optimal path is chosen for data transmission, the end to end delay than the other existing algorithms and finds it suitability for prolonged network lifetime in WSN -assisted IoT Networks.

    5 Conclusion

    The WSN assisted IoT devices are equipped with batteries and hence the energy consumption plays an important role in the increased lifetime of the network.In this research, a novel energyefficient routing algorithm based on the integration of machine learning and hybrid optimization along with the multi-tier architecture has been proposed.The paper introduces the new approach of implementing the learning models over the base station for an accurate selection of CHs, which depends on the energy and distance.The performance of Extreme Learning machines in terms of accurate detection of cluster heads has been analyzed and compared with the other existing algorithms.Which in turn proves its suitability for the process of selection when compared with the other traditional algorithms.Furthermore, the integration of hybrid optimization to determine the energy-efficient routing protocol is scalable to larger networks.Extensive experiments were conducted and various metrics were analyzed.

    Grandpa Nybakken loved life -- especially when he could play a trick on somebody. At those times, his large Norwegian frame shook with laughter while he feigned1 innocent surprise, exclaiming, “Oh, forevermore!” But on a cold Saturday in downtown Chicago, Grandpa felt that God played a trick on him, and Grandpa wasn’t laughing.

    It is found that the proposed HELP for static networks has a better network lifetime by 6.05% than SEEP, 20.4% than EARCP, 33% than SEP 70%, than LEACH and M-LEACH and consumes less energy by 11% than SEEP, 25% than EARCP, 34% than SEP, 75% than LEACH and M-LEACH.Moreover, the proposed framework has exhibited better performance in terms of high throughput and less delay during the data transmission.However, the performance of the proposed algorithm can be enhanced by the integration of deep reinforcement learning methods and adaptive metaheuristic optimized routing techniques.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    日日摸夜夜添夜夜添小说| 久久精品国产亚洲av香蕉五月| 国产精品一区二区免费欧美| 最近最新免费中文字幕在线| 91成年电影在线观看| 久久婷婷人人爽人人干人人爱| 国产高清视频在线播放一区| 国产人伦9x9x在线观看| 色精品久久人妻99蜜桃| 丝袜美腿诱惑在线| 精品国产一区二区三区四区第35| 变态另类成人亚洲欧美熟女| 国产亚洲精品综合一区在线观看 | 欧美激情极品国产一区二区三区| 18禁观看日本| 国产乱人伦免费视频| 淫妇啪啪啪对白视频| 91老司机精品| 国产亚洲欧美精品永久| 国产高清videossex| 国产视频内射| 午夜亚洲福利在线播放| 女生性感内裤真人,穿戴方法视频| 十八禁网站免费在线| 国产主播在线观看一区二区| 91字幕亚洲| 日韩国内少妇激情av| 国产av一区在线观看免费| 日韩有码中文字幕| 欧美成人性av电影在线观看| 国产又色又爽无遮挡免费看| 777久久人妻少妇嫩草av网站| 我的亚洲天堂| 午夜福利视频1000在线观看| АⅤ资源中文在线天堂| 99国产极品粉嫩在线观看| 免费无遮挡裸体视频| 亚洲天堂国产精品一区在线| 成年免费大片在线观看| 久久天躁狠狠躁夜夜2o2o| 极品教师在线免费播放| 久久久久久九九精品二区国产 | 精品欧美国产一区二区三| 久久中文字幕一级| 日韩精品免费视频一区二区三区| 老司机靠b影院| 日韩国内少妇激情av| 美女扒开内裤让男人捅视频| av超薄肉色丝袜交足视频| a级毛片a级免费在线| 日本三级黄在线观看| 国产伦人伦偷精品视频| 男女做爰动态图高潮gif福利片| 亚洲精品久久成人aⅴ小说| 亚洲一区二区三区色噜噜| 两性午夜刺激爽爽歪歪视频在线观看 | 欧美一区二区精品小视频在线| 老熟妇仑乱视频hdxx| 国产爱豆传媒在线观看 | 91在线观看av| 欧洲精品卡2卡3卡4卡5卡区| 成年免费大片在线观看| 久久午夜亚洲精品久久| 亚洲中文av在线| 动漫黄色视频在线观看| 精品日产1卡2卡| 国内精品久久久久久久电影| 在线观看午夜福利视频| 少妇裸体淫交视频免费看高清 | 人人妻人人看人人澡| 一本精品99久久精品77| e午夜精品久久久久久久| 这个男人来自地球电影免费观看| 黑丝袜美女国产一区| 少妇被粗大的猛进出69影院| 久久久国产欧美日韩av| 日本免费一区二区三区高清不卡| 中文亚洲av片在线观看爽| 欧美日韩瑟瑟在线播放| 亚洲在线自拍视频| 最新在线观看一区二区三区| 亚洲色图 男人天堂 中文字幕| 亚洲aⅴ乱码一区二区在线播放 | 欧美在线黄色| ponron亚洲| 少妇粗大呻吟视频| 男人舔奶头视频| www日本在线高清视频| 久久午夜综合久久蜜桃| 美女扒开内裤让男人捅视频| 久久草成人影院| 国产国语露脸激情在线看| 午夜福利视频1000在线观看| 香蕉国产在线看| 一区二区三区精品91| 亚洲五月天丁香| 丝袜美腿诱惑在线| 淫秽高清视频在线观看| 国产精品,欧美在线| 日韩欧美一区二区三区在线观看| 男女下面进入的视频免费午夜 | 亚洲熟妇熟女久久| 十八禁网站免费在线| 国产黄a三级三级三级人| 国产精品久久久av美女十八| 午夜福利欧美成人| 1024香蕉在线观看| 久久久久亚洲av毛片大全| 久久国产精品影院| 怎么达到女性高潮| 日韩欧美国产在线观看| 国产亚洲欧美精品永久| 午夜免费激情av| 国产成人精品无人区| 久久久国产精品麻豆| 色综合亚洲欧美另类图片| 国产av在哪里看| 日韩欧美 国产精品| 成人永久免费在线观看视频| 久久草成人影院| 亚洲人成电影免费在线| 国产亚洲精品久久久久5区| 亚洲国产精品成人综合色| 国产精品久久久人人做人人爽| 动漫黄色视频在线观看| 岛国在线观看网站| 亚洲中文日韩欧美视频| 脱女人内裤的视频| 日韩欧美国产在线观看| 国产亚洲精品av在线| 久久久久久久久免费视频了| 久久人妻av系列| 成人欧美大片| 午夜日韩欧美国产| 国产精品国产高清国产av| 777久久人妻少妇嫩草av网站| 此物有八面人人有两片| 熟女电影av网| 亚洲精品中文字幕在线视频| 亚洲 国产 在线| 男人舔女人的私密视频| av中文乱码字幕在线| 亚洲全国av大片| 国内少妇人妻偷人精品xxx网站 | 免费高清视频大片| 色综合亚洲欧美另类图片| 一进一出好大好爽视频| 草草在线视频免费看| 美女高潮喷水抽搐中文字幕| 日本精品一区二区三区蜜桃| 啦啦啦 在线观看视频| 久久久久久大精品| 久久人妻福利社区极品人妻图片| 国产成人精品久久二区二区91| а√天堂www在线а√下载| 免费看十八禁软件| 亚洲一卡2卡3卡4卡5卡精品中文| 精品熟女少妇八av免费久了| 男人的好看免费观看在线视频 | 亚洲成av片中文字幕在线观看| 亚洲av成人av| 搡老妇女老女人老熟妇| 亚洲黑人精品在线| 禁无遮挡网站| 亚洲色图 男人天堂 中文字幕| 无人区码免费观看不卡| 老司机福利观看| 国产人伦9x9x在线观看| 亚洲国产精品久久男人天堂| 国产99久久九九免费精品| 久久国产亚洲av麻豆专区| 曰老女人黄片| 欧美 亚洲 国产 日韩一| 日本熟妇午夜| 侵犯人妻中文字幕一二三四区| 日本熟妇午夜| 成人国产综合亚洲| 久久精品91蜜桃| 天天躁夜夜躁狠狠躁躁| 巨乳人妻的诱惑在线观看| 一个人免费在线观看的高清视频| 老司机午夜十八禁免费视频| 一区二区三区精品91| 夜夜爽天天搞| 69av精品久久久久久| 国产精品 国内视频| 男女视频在线观看网站免费 | 久久中文看片网| 一区二区日韩欧美中文字幕| 精品久久久久久久毛片微露脸| 夜夜爽天天搞| 在线看三级毛片| 丰满人妻熟妇乱又伦精品不卡| 国产成人啪精品午夜网站| 法律面前人人平等表现在哪些方面| 国产激情久久老熟女| 国产精品永久免费网站| 国产精品电影一区二区三区| 亚洲中文日韩欧美视频| 亚洲五月色婷婷综合| 女人高潮潮喷娇喘18禁视频| 亚洲片人在线观看| 女生性感内裤真人,穿戴方法视频| 午夜亚洲福利在线播放| 欧美人与性动交α欧美精品济南到| 久久精品国产99精品国产亚洲性色| 国产片内射在线| 中文字幕av电影在线播放| 免费在线观看视频国产中文字幕亚洲| 亚洲午夜精品一区,二区,三区| 不卡一级毛片| 成人三级黄色视频| АⅤ资源中文在线天堂| 亚洲性夜色夜夜综合| 老鸭窝网址在线观看| 真人一进一出gif抽搐免费| av福利片在线| 亚洲第一欧美日韩一区二区三区| 制服人妻中文乱码| 精品高清国产在线一区| 国产精品乱码一区二三区的特点| 在线观看www视频免费| 欧美av亚洲av综合av国产av| 久久久久久久久久黄片| 精品免费久久久久久久清纯| 禁无遮挡网站| 欧美中文日本在线观看视频| 亚洲人成网站高清观看| 国产伦在线观看视频一区| 12—13女人毛片做爰片一| 久久99热这里只有精品18| 中文字幕另类日韩欧美亚洲嫩草| 真人一进一出gif抽搐免费| 欧美国产日韩亚洲一区| 人人妻人人看人人澡| 亚洲午夜精品一区,二区,三区| 一进一出抽搐gif免费好疼| www日本黄色视频网| 国产午夜精品久久久久久| 一本久久中文字幕| 色av中文字幕| 两性午夜刺激爽爽歪歪视频在线观看 | 老鸭窝网址在线观看| 精品一区二区三区四区五区乱码| 制服人妻中文乱码| 熟妇人妻久久中文字幕3abv| 国产一级毛片七仙女欲春2 | 人人妻人人澡人人看| 女人被狂操c到高潮| 男男h啪啪无遮挡| 亚洲三区欧美一区| 日韩 欧美 亚洲 中文字幕| 中文字幕人妻丝袜一区二区| 麻豆av在线久日| 国产精品 欧美亚洲| 一级a爱视频在线免费观看| 午夜福利在线在线| 哪里可以看免费的av片| bbb黄色大片| 精品久久久久久久久久久久久 | 亚洲熟女毛片儿| 美女免费视频网站| 亚洲精品粉嫩美女一区| 大香蕉久久成人网| 怎么达到女性高潮| 曰老女人黄片| 91字幕亚洲| 国产不卡一卡二| 久久久精品欧美日韩精品| 高清毛片免费观看视频网站| 色综合欧美亚洲国产小说| www.熟女人妻精品国产| 老熟妇乱子伦视频在线观看| 亚洲真实伦在线观看| 国产av不卡久久| 一本久久中文字幕| 亚洲精品国产一区二区精华液| 国产亚洲精品综合一区在线观看 | 又黄又爽又免费观看的视频| 亚洲专区中文字幕在线| 男女做爰动态图高潮gif福利片| 叶爱在线成人免费视频播放| 亚洲精华国产精华精| 亚洲人成伊人成综合网2020| 午夜久久久久精精品| 午夜激情av网站| 2021天堂中文幕一二区在线观 | 欧美色欧美亚洲另类二区| www.熟女人妻精品国产| 99久久99久久久精品蜜桃| 成年人黄色毛片网站| 亚洲一区高清亚洲精品| 亚洲 欧美一区二区三区| 国产精品一区二区精品视频观看| 亚洲第一av免费看| 女性生殖器流出的白浆| 一本久久中文字幕| 国产av一区在线观看免费| 91在线观看av| 亚洲精品久久成人aⅴ小说| 欧美日韩乱码在线| 国产国语露脸激情在线看| 脱女人内裤的视频| 亚洲国产欧美日韩在线播放| 国产精品,欧美在线| 日日干狠狠操夜夜爽| 国产区一区二久久| 国产成+人综合+亚洲专区| 久久久久亚洲av毛片大全| 国产伦人伦偷精品视频| 欧洲精品卡2卡3卡4卡5卡区| 亚洲午夜精品一区,二区,三区| 日韩成人在线观看一区二区三区| 男女床上黄色一级片免费看| a级毛片在线看网站| 久久草成人影院| 国产精品亚洲美女久久久| 91字幕亚洲| 亚洲国产欧洲综合997久久, | 欧洲精品卡2卡3卡4卡5卡区| 老熟妇乱子伦视频在线观看| 亚洲国产毛片av蜜桃av| 国产精品精品国产色婷婷| 可以在线观看的亚洲视频| 怎么达到女性高潮| 午夜两性在线视频| 啦啦啦免费观看视频1| 国产精品自产拍在线观看55亚洲| 国产色视频综合| 国产aⅴ精品一区二区三区波| 老司机在亚洲福利影院| 巨乳人妻的诱惑在线观看| 午夜亚洲福利在线播放| 狂野欧美激情性xxxx| 好看av亚洲va欧美ⅴa在| 亚洲专区中文字幕在线| 亚洲男人天堂网一区| 这个男人来自地球电影免费观看| 欧美日韩亚洲国产一区二区在线观看| 搞女人的毛片| 无遮挡黄片免费观看| 日本 欧美在线| 国产精品亚洲av一区麻豆| 看黄色毛片网站| 12—13女人毛片做爰片一| 啦啦啦 在线观看视频| 真人一进一出gif抽搐免费| 久久人妻av系列| 中文亚洲av片在线观看爽| 色综合亚洲欧美另类图片| 色精品久久人妻99蜜桃| 法律面前人人平等表现在哪些方面| 日本熟妇午夜| 久久国产精品男人的天堂亚洲| 性色av乱码一区二区三区2| 国产97色在线日韩免费| 亚洲一区二区三区不卡视频| 午夜福利18| 久久人妻福利社区极品人妻图片| 两人在一起打扑克的视频| 韩国av一区二区三区四区| 精品人妻1区二区| 日本免费a在线| 婷婷丁香在线五月| 亚洲国产精品合色在线| 中文字幕人成人乱码亚洲影| 久久精品国产亚洲av高清一级| 熟女少妇亚洲综合色aaa.| 亚洲av五月六月丁香网| 一区二区日韩欧美中文字幕| 日本 欧美在线| 国产高清videossex| 精品不卡国产一区二区三区| 国产一卡二卡三卡精品| 俺也久久电影网| 国内精品久久久久精免费| 中文亚洲av片在线观看爽| 19禁男女啪啪无遮挡网站| 女警被强在线播放| 国产亚洲欧美精品永久| 在线观看舔阴道视频| 精品国产超薄肉色丝袜足j| 美女大奶头视频| 免费人成视频x8x8入口观看| 日韩欧美国产在线观看| 亚洲第一区二区三区不卡| 99在线人妻在线中文字幕| 午夜激情欧美在线| 国产伦在线观看视频一区| 国产不卡一卡二| 一区二区三区免费毛片| 精品人妻一区二区三区麻豆 | 色在线成人网| 一区二区三区四区激情视频 | 色视频www国产| 一个人看视频在线观看www免费| 3wmmmm亚洲av在线观看| 夜夜爽天天搞| 亚洲人成网站高清观看| 一进一出抽搐gif免费好疼| 狂野欧美激情性xxxx在线观看| 国产69精品久久久久777片| 欧美激情国产日韩精品一区| 欧美bdsm另类| 久久久久国内视频| av在线老鸭窝| 天天躁夜夜躁狠狠久久av| av免费在线看不卡| 亚洲美女黄片视频| 国产高清有码在线观看视频| 精品午夜福利视频在线观看一区| 99久久九九国产精品国产免费| 菩萨蛮人人尽说江南好唐韦庄 | 国产91av在线免费观看| 在线观看免费视频日本深夜| 国产高清视频在线观看网站| 在线免费观看不下载黄p国产| 精品少妇黑人巨大在线播放 | 如何舔出高潮| 欧美日韩综合久久久久久| 亚洲熟妇中文字幕五十中出| 国产中年淑女户外野战色| 日韩,欧美,国产一区二区三区 | 亚洲av电影不卡..在线观看| 熟女电影av网| 国产一区二区亚洲精品在线观看| 色视频www国产| 国产白丝娇喘喷水9色精品| 亚洲一级一片aⅴ在线观看| 可以在线观看的亚洲视频| 亚洲无线观看免费| 日本 av在线| 久久久色成人| 国产亚洲精品av在线| 在线观看一区二区三区| 日本一二三区视频观看| 国产片特级美女逼逼视频| 欧美最黄视频在线播放免费| 最好的美女福利视频网| 欧美zozozo另类| 国产精品一区二区免费欧美| 亚洲精品日韩在线中文字幕 | 久久久精品94久久精品| 久久草成人影院| 亚洲中文字幕日韩| or卡值多少钱| 成人亚洲精品av一区二区| 欧美区成人在线视频| 激情 狠狠 欧美| 亚洲不卡免费看| 国产精品综合久久久久久久免费| 国产黄色小视频在线观看| 老师上课跳d突然被开到最大视频| 日本免费一区二区三区高清不卡| 两个人视频免费观看高清| 精品久久久久久久久久免费视频| 午夜福利在线在线| 一区二区三区免费毛片| 看片在线看免费视频| 少妇被粗大猛烈的视频| 好男人在线观看高清免费视频| 欧美激情国产日韩精品一区| 久久中文看片网| 夜夜夜夜夜久久久久| 国产视频一区二区在线看| 我要看日韩黄色一级片| 国产精品永久免费网站| 亚洲真实伦在线观看| 插阴视频在线观看视频| 国产精品不卡视频一区二区| 免费av毛片视频| 夜夜夜夜夜久久久久| 亚洲国产高清在线一区二区三| 国产精品女同一区二区软件| 亚洲在线自拍视频| 美女大奶头视频| 国产淫片久久久久久久久| 国内精品一区二区在线观看| 亚洲内射少妇av| 人妻少妇偷人精品九色| 国产精品电影一区二区三区| 日韩中字成人| 一区二区三区四区激情视频 | 午夜激情欧美在线| 久久精品国产亚洲av涩爱 | 亚洲美女视频黄频| 亚洲成人久久爱视频| 人人妻人人澡人人爽人人夜夜 | 国产精品综合久久久久久久免费| 欧美日韩乱码在线| 精品一区二区三区av网在线观看| 午夜影院日韩av| 亚洲av免费高清在线观看| 欧美+日韩+精品| 欧美精品国产亚洲| 级片在线观看| 最好的美女福利视频网| 亚洲最大成人手机在线| 久久久久国产网址| 亚洲国产欧美人成| 久久人妻av系列| 国产一区二区在线观看日韩| 国产精品美女特级片免费视频播放器| 免费av不卡在线播放| 欧美性猛交╳xxx乱大交人| 国内精品久久久久精免费| 最新中文字幕久久久久| 久久久久性生活片| 国产爱豆传媒在线观看| 久久久色成人| 高清午夜精品一区二区三区 | 淫秽高清视频在线观看| 日韩欧美国产在线观看| 久久99热这里只有精品18| 晚上一个人看的免费电影| 国产v大片淫在线免费观看| 精品一区二区三区视频在线观看免费| 最近中文字幕高清免费大全6| 国产av麻豆久久久久久久| 国产成年人精品一区二区| 久久人妻av系列| 97超视频在线观看视频| 国产在视频线在精品| 黄片wwwwww| 成人鲁丝片一二三区免费| 午夜福利高清视频| 国产精华一区二区三区| 亚洲色图av天堂| 我要搜黄色片| 午夜日韩欧美国产| 国产精品一及| 亚洲人成网站在线播| 搡老岳熟女国产| 国产精品伦人一区二区| 2021天堂中文幕一二区在线观| 久久精品国产亚洲网站| 久久欧美精品欧美久久欧美| 国产成人aa在线观看| 精品人妻偷拍中文字幕| 日本欧美国产在线视频| 国产老妇女一区| 男女视频在线观看网站免费| 黄色一级大片看看| 亚洲七黄色美女视频| 91狼人影院| 亚洲最大成人av| 免费一级毛片在线播放高清视频| 国产欧美日韩精品亚洲av| 大又大粗又爽又黄少妇毛片口| 亚洲一级一片aⅴ在线观看| 亚洲精品乱码久久久v下载方式| eeuss影院久久| 欧美成人免费av一区二区三区| 久久人人精品亚洲av| 一级黄片播放器| 男女啪啪激烈高潮av片| 韩国av在线不卡| 日日啪夜夜撸| 少妇人妻精品综合一区二区 | 国产色爽女视频免费观看| 无遮挡黄片免费观看| 亚洲成a人片在线一区二区| 国产男靠女视频免费网站| 三级毛片av免费| 国内少妇人妻偷人精品xxx网站| 国产欧美日韩一区二区精品| 高清午夜精品一区二区三区 | 最近中文字幕高清免费大全6| 久久久久免费精品人妻一区二区| 综合色av麻豆| 97超碰精品成人国产| 中文字幕熟女人妻在线| 午夜日韩欧美国产| 一级毛片电影观看 | 午夜影院日韩av| 一进一出抽搐动态| 人人妻,人人澡人人爽秒播| 秋霞在线观看毛片| 国产三级中文精品| 一进一出抽搐动态| 国产三级中文精品| 在线看三级毛片| av中文乱码字幕在线| 女人被狂操c到高潮| 少妇人妻一区二区三区视频| 免费看av在线观看网站| 亚洲国产精品sss在线观看| 一级av片app| 色在线成人网| 成人二区视频| 亚洲精品成人久久久久久| 亚洲精品456在线播放app| 婷婷色综合大香蕉| 亚洲av不卡在线观看| 精品国产三级普通话版| 亚洲精品乱码久久久v下载方式| 亚洲欧美成人综合另类久久久 | 少妇人妻一区二区三区视频| 成人亚洲精品av一区二区| av国产免费在线观看| 免费看日本二区| 亚洲国产精品sss在线观看| 亚洲av电影不卡..在线观看| 婷婷六月久久综合丁香| 又黄又爽又刺激的免费视频.| 五月玫瑰六月丁香| 美女被艹到高潮喷水动态| a级毛片a级免费在线| 亚洲国产日韩欧美精品在线观看| 免费观看人在逋| 99久久九九国产精品国产免费| 卡戴珊不雅视频在线播放| 免费av不卡在线播放| 久久久久国内视频| 日本-黄色视频高清免费观看|