• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Improved DHOA-Fuzzy Based Load Scheduling in IoT Cloud Environment

    2022-08-24 03:31:56JoshuaSamuelRajIlangoPrinceThomasUmaFahdAlWesabiRadwaMarzoukandAnwerMustafaHilal
    Computers Materials&Continua 2022年5期

    R.Joshua Samuel Raj,V.Ilango,Prince Thomas,V.R.Uma,F(xiàn)ahd N.Al-Wesabi,Radwa Marzouk and Anwer Mustafa Hilal

    1Department of Information Science&Engineering,CMR Institute of Technology,Bengaluru,560037,India

    2Department of Computer Application,CMR Institute of Technology,Bangalore,560037,India

    3School of Computing,Woldia Institute of Technology,Woldia University,Ethiopia

    4Department of Commerce,School of Commerce,F(xiàn)inance and Accountancy,Christ University,Bangalore,560029,India

    5Department of Computer Science,College of Science&Art at Mahayil,King Khalid University,Saudi Arabia

    6Faculty of Computer and IT,Sana’a University,Yemen

    7Department of Information Systems,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Saudi Arabia

    8Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam bin Abdulaziz University,Alkharj,Saudi Arabia

    Abstract: Internet of things (IoT) has been significantly raised owing to the development of broadband access network,machine learning(ML),big data analytics(BDA),cloud computing(CC),and so on.The development of IoT technologies has resulted in a massive quantity of data due to the existence of several people linking through distinct physical components, indicating the status of the CC environment.In the IoT, load scheduling is realistic technique in distinct data center to guarantee the network suitability by falling the computer hardware and software catastrophe and with right utilize of resource.The ideal load balancer improves many factors of Quality of Service(QoS) like resource performance, scalability, response time, error tolerance,and efficiency.The scholar is assumed as load scheduling a vital problem in IoT environment.There are many techniques accessible to load scheduling in IoT environments.With this motivation,this paper presents an improved deer hunting optimization algorithm with Type II fuzzy logic(IDHOA-T2F)model for load scheduling in IoT environment.The goal of the IDHOA-T2F is to diminish the energy utilization of integrated circuit of IoT node and enhance the load scheduling in IoT environments.The IDHOA technique is derived by integrating the concepts of Nelder Mead (NM) with the DHOA.The proposed model also synthesized the T2L based on fuzzy logic(FL)systems to counterbalance the load distribution.The proposed model finds useful to improve the efficiency of IoT system.For validating the enhanced load scheduling performance of the IDHOA-T2F technique,a series of simulations take place to highlight the improved performance.The experimental outcomes demonstrate the capable outcome of the IDHOA-T2F technique over the recent techniques.

    Keywords: Load scheduling; internet of things; cloud computing;metaheuristics;fuzzy logic

    1 Introduction

    In recent times, Internet of Things (IoT) was developed as the most important revolution in information and communication technology (ICT) production [1].By IoT, Internet connections extended over standard smart devices namely smartphone and tablet for different range of devices(machine, vehicle, sensors, and so on.) for accomplishing several distinct applications and services namely health care,medicinal treatment,traffic controller,energy organization,vehicle network,and so on.This generates a massive number of information which require that exists saved,processed,and analyzed for obtaining valuable data for meeting user aim as well as requires [2].Also, the number and scale of applications and services are improving quickly that needs processing ability which even one of the powerful smart devices could not presently meet.The Cloud environment that is recognized as huge resource center which permits ubiquitous access for sharing as well as providing resources to users flexible with virtualization approach is a potential platform for supporting IoT progresses.Limitations of recent smart devices are minimization by getting time utilization and resource intensive tasks for powerful computing environment namely Cloud computing (CC) but exit the easy task to smart device for handling.But,if relating IoT as well as CC,novel issues appear[3].

    An IoT is enormous advantage to their lives, assisting those by relating many sensors and actuators.Besides,relating to many requests to varying devices all simultaneously is a general subject for scholar analyzing the IoT.It could not only interfere with the smooth efficiency of an IoT ecosystems along with lead to load balancing(LB)issues.Researches are thoroughly examined LB in allocated environment and network[4].The LB is 2 modes:unaware(allocating the request similarly to every server,regardless of its load)and conscious(transmitting the request from worse loaded servers).LB goals at making sure which processor in the model does approximately a similar load of work at all particular times.LB amongst every virtual device is a vital topic in IoT due to many desires and variety of resources.It can be important topic in IoT;it can be helpful if any points are overload,some under-loaded and remainder is idle with no interfering with the effective model[5].

    An optimum load balancer improves many factors of Quality of Service (QoS) like resource performance, scalability, response time, error tolerance, and efficiency [6].It can be need for a nonlinear technique for handling this problem as their aim for improving the LB and reducing energy utilization as NPhard problem.An IoT is difficult for wireless gadget/hub interrelating with sending packages for everyone or another gadget/hub, not containing some outline control information for routing.IoT centers are unrestricted amount of schemes and flexibility to different hubs.An important problem in IoT is the secured broadcast from source-destination.At this point, it can be presented LB manner for minimized the energy utilization of combined circuit of IoT node and enhance the LB in IoT platform [7].Kumar et al.[8] establish a task processing structure which is the decision making ability for selecting the optimum resource at runtime for processing the application(different and difficult nature) at virtual machine (VM) utilizing modified particle swarm optimization (PSO)technique in end-user deadline.The presented technique offers non-dominance group of optimum solutions and enhances different effective parameters (task acceptance ratio, throughput, time, and cost)by sequence of experimentations on distinct synthetic datasets utilizing Cloudsim tool.

    This paper presents an improved deer hunting optimization algorithm with Type II fuzzy logic(IDHOA-T2F) model to load scheduling in IoT environments.The goal of the IDHOA-T2F is to diminish the energy utilization of integrated circuit of IoT node and enhance the load scheduling in IoT environments.The IDHOA technique is derived by integrating the concepts of Nelder Mead(NM)with the DHOA.The proposed model also synthesized the T2L based on fuzzy logic(FL)systems to counterbalance the load distribution.The proposed model finds useful to improve the efficiency of IoT systems.For validating the enhanced load scheduling performance of the IDHOA-T2F technique,a series of simulations take place to highlight the improved performance.

    The rest of the paper is organized as follows.Section 2 offers the related works,Section 3 provides the proposed model,Section 4 validates the results,and Section 5 concludes the paper.

    2 Related Works

    Ma et al.[9] present the deadline and cost-aware scheduling technique which minimizing the executing cost of progress in deadline constraint from IaaS approach.Assuming the VM efficiency difference and acquisition delay,it can be initial separate tasks as to varying levels based on topological framework so no dependencies exist among tasks at a similar level.In 3 strings are utilized for coding the genes in presented technique for optimum reproduce the heterogeneous and resilient features of cloud environment.Afterward, the heterogeneous earliest finish time (HEFT) was utilized for generating those with minimal completion time as well as cost.Fadlallah et al.[10] planned and validated greedy scheduling and LB techniques for improving the consumption of resources.It can be shown a comparative analysis with longest cloudlet fact processing(LCFP),shortest cloudlet fact processing(SCFP),and Min-Min heuristic techniques.The selection of an individual’s 3 techniques was dependent upon the performance and simplicity of its systems, as described in the works, to allocate task to device.

    Narman et al.[11] presented dynamic dedicate server scheduling to heterogeneous as well as homogeneous methods for effectively giving wanted service by regarding priorities of requests.Refaat et al.[12] present a novel scheduling approach to control real time and soft service request in Fog methods that are named decentralize load-balance scheduling(DLBS).The projected techniques give decentralization LB control technique.This technique allocates the load depends on kind of service request and load status of all fog nodes.Gawali et al.[13] introduce a heuristic technique which comprises the modified analytic hierarchy process (MAHP), bandwidth aware divisible scheduling(BATS)+BAR optimization,longest expected processing time preemption(LEPT),and divide-andconquer techniques for performing task scheduling (TS) and resource allocation (RA).During this method, all tasks are managed earlier their actual distribution to cloud resource employing MAHP method.The resource is distributed utilizing the collective BATS+BAR optimization technique that assumes the bandwidth and load of cloud resource as constraint.Wang et al.[14]analyses the feature of IoT request and intend to an enhanced Poisson task method with new approach for predicting the arrivals of IoT requests.It can be present an adaptive energy performance method for adjusting the priority of an optimized objective.Lastly,an energy-efficient VM scheduling technique was presented for maximizing the energy performance of data center.

    In Maamari et al.[15],a dynamic adaptive PSO(DAPSO)algorithm was executed for improving the efficiency of basic PSO technique for optimizing the task runtime by minimized the makespan of specific task set, and at once, maximized resource consumption.Therefore, a TS technique is presented for scheduling the independence task on CC.The presented technique was assumed an amalgamation of DAPSO technique and the Cuckoo search (CS) technique is named MDAPSO.Ni et al.[16] presented a 3-layer scheduling method dependent on whale-Gaussian cloud.In the second layer of approach,the whale optimization approach dependent upon Gaussian cloud technique(GCWOAS2)was utilized to multi-objective TS in CC that is for minimizing the completion time of task through efficiently employing the VM resource and for keeping the LB of all VM, decreasing the effective cost of model.In the GCWOAS2 approach, opposition-based learning (OBL) method was initially utilized for initializing the scheduling approach for generating the optimum scheduling method.Though several load scheduling methods are available in the literature,there is still need to explore and improve the scheduling performance on the IoT and cloud environment.

    3 The Proposed Model

    In this study, a new IDHOA-T2F technique has been presented for load scheduling in IoT cloud environment.The IDHOA-T2F technique involves a T2F system with distinct input variables for scheduling load in the IoT cloud environment.Besides, the IDHOA technique is applied to appropriately select the membership functions(MFs)of the T2F system.The IDHOA-T2F technique has established a multi-objective fitness function(FF)dependent upon load balancing(LB)and energy utilization and implemented.

    where ω1and ω2are adaptable parameters and ω1+ω2=1.

    The detailed working of these processes is given in the succeeding sections.

    3.1 Overview of T2F Model

    Type-2 fuzzy set(T2F)has considered as fuzzy membership operation;i.e.,the value of membership (membership degree) of all elements of set is fuzzy set in 0 and 1.The structure of T2F model is shown in Fig.1.The sets are utilized in conditions where it can be uncertainty on the values of similar membership.Uncertainty is the procedure of either the membership function (MF) or most of their parameter[17].Assume that transition from normal to fuzzy sets.Therefore,perfectly it can be required for utilizing fuzzy sets type-∞for completing the illustration of uncertainty.Obviously,it could not appreciate this in practice,as it could not for utilizing fuzzy sets of finite type.So,type-1 fuzzy sets (T1FS) are assumed as 1st order estimates of uncertainty, but T2FS are regarded as 2nd order estimates.T2FS are generalization procedures of individuals of type-l(with FOU as additional degree of freedom).

    In the mathematical way, a T2FS is referred as, is considered by type-2 MF(x,u), wherex∈Xandu∈Jχ?[0,1]:i.e.,

    where 0 ≤(x,u)≤1.In order to continuous universe of discourse,is written as:

    whereJχis signified the initial membership ofx.Thus type-l fuzzy logic (T1FL), discrete fuzzy sets are demonstrated as symbolrather than ∫.The secondary MF connected toχ=χ′,to providedχ′∈X,is type-l MF determined as(x=x′,u),?u∈Jx.

    Type-2 MFs:Type-2 fuzzy logic(T2FL)methods were considered as the procedure of its MFs.In 2 varying MFs:(a)a classic type-l MF and(b)a blurred type-1 MF which signifies the type-2 MF.

    Figure 1:Structure of T2F model

    The uncertainty in first membership of T2FSis demonstrated as FOU.Noticeable the FOU is also the union of every primary membership:

    The upper as well as lower MFs,denoted by(x)and(x),respectively,are two type-l membership.

    Fuzzifier:The MF type-2 offers many degrees of membership to all inputs.So, the uncertainty is further signified.This illustration permits us to taken to account that is unnoticed by type-l.The fuzzifier map the input vector(e1,e2,...,en)Ton a type-2 fuzzy(T2F)system,most same to process carried out in T1FL system.

    Rules:The common procedure ofithrule of T2FL is expressed as:

    Inference Engine:In fuzzy model interval type-2 utilizing the minimal or productt-norms operation, theithstimulated ruleFi(x1,...xn) offers us the interval which is defined as 2 extremes,

    whereandare provided as:

    Type Reducer:Afterward the rule is fired and inference is applied, the attained T2F system resultant in type-1 fuzzy(T1F)system was calculated.During this part,the accessible techniques for computing the centroid of T2F system utilizing the extension lead rule are discussed.The centroid of T1F systemAis provided as:

    wherenindicates the amount of discretized domains ofA,zi∈R,andwi∈[0,1].When allziandwiare exchanged with T1F system,ZiandWi,with connected to MF ofμZ(zi)andμW(Wi)correspondingly as utilizing the extension rule is generalization centroid for T2F systemis provided as:

    Timplies thet-norm andrefers the T1F system.In order to interval T2F system,

    Defuzzifier:For getting a crisp output from T1FL system,the type-reduced set is defuzzified.One of the general techniques for finding the centroid of type-reduced set.When the type_reduced setYimplies discretized tonpoint,at that time the subsequent written offers the centroid of type_reduced set as:

    It is calculated the output utilizing the iterative Karnik Mendel Algorithms.So, the defuzzified output ofIT2FLCis

    With

    3.2 Design of IDHOA Technique for MF Selection

    In order to choose the optimal MFs of the T2FS approach,the IDHOA is derived.A new metaheuristic DHO technique was presented[18]that is simulated as hunting of deer by a set of hunters.For hunting the deer,the hunter surrounds it and travels near dependent upon any approaches.The approaches contain the concern of different parameters as wind angle,deer place,etc.Co-operation amongst the hunter is another essential condition which creates the hunting effectual.Eventually,it can influence the target dependent upon place of leader and successor.An objective functions of this presented technique is provided in Eq.(16).

    The steps for weight optimized utilizing DHO technique are discussed under Because of the different capabilities of deer,it simply escapes from hunting by predators.The technique begins with vector of arbitrary population is named hunters.This procedure is defined as:

    Winston Churchill failed sixth grade. He did not become Prime Minister of England until he was 62, and then only after a lifetime of defeats and setbacks. His greatest contributions came when he was a “senior citizen.”

    wheremrepresents the amount of hunters population (weight) and the entire amount of weight implemented to optimized are signified asX.It can be determined in Eq.(18)[18],

    where, the arbitrary number containing range 0 and 1 has signified asa, and the current iteration is signified asJ.At this point,θrefers the wind angle.After, the place propagation with successor place(Xs)and leader place(Xl)to optimized was established.The successor place explains the place of following weight but the leader place explains the primary optimum place of hunter.

    After initializing the optimum place,all weights in population effort to influence which optimum place[19].Then,the place upgradation model starts by modelling the surrounding performance that is determined in Eq.(19),

    where,Xjimplies the place at the current iteration and the succeeding iteration place has demonstrated asXj+1.The 2 coefficient vectorsZandKare contained in this technique.The arbitrary number which is established by regarding the wind speed is signified asp, and it comprises values from (0–2).The expression for evaluating the coefficient vectorsZandKare illustrated in Eqs.(20)and(21)[18],

    where the maximal iteration is signified asjmax.A primary place of hunter was signified as(X,Y)that obtains upgraded dependent upon place of prey.The 2 coefficient vectorsZandKare according to gain the optimum place(Xb,Yb).When the value ofp <1,afterward the place upgrade model occurs that means the hunter is arbitrarily moves in varied ways without regarding the position angle.

    The position angle upgradation has been regarded for increasing the search space.For making the hunting model effectual,it can be important for determining the position angle of hunter.According to position angle,the place upgrade was carried out utilizing in Eq.(22),

    where the optimum place has signified asB=φj+1,Xbjandpimplies the arbitrary number.

    In the exploration,Kvector has been established within the surrounding performance.Primarily,the arbitrary search model was performed regarding the value ofKlesser to 1.Eventually,the place upgrade model occurs on the basis of successor position instead of assuming the optimum place.Afterward,the global search is carried out utilizing the Eq.(23),

    The place upgraded model was performed for identifying the optimum place (for instance, end condition).The flowchart of the DHOA technique is depicted in Fig.2.

    Figure 2:Flowchart of the DHOA technique

    The IDHOA technique is derived by integrating the concepts of Nelder Mead (NM) with the DHOA.In NM simplex search is part of common class of direct search techniques.It can be most famous technique to resolve unconstrained non-linear optimized issues without utilizing derivatives[20–22].In general,it can be utilized for local optimization.The NM technique tend for minimizing a non-linear scalar function ofnvariables by utilizing only the estimation of objective functions.Primarily, the NM technique carries out their initial simplex, Δ1, ofn+ 1 vertices from beginning pointx0,where the vertex signifies the variable set,x,ofnparameter.

    4 Performance Validation

    This section investigates the performance of the proposed IDHOA-T2F technique under different aspects.A brief total energy consumption analysis of the IDHOA-T2F technique takes place in Tab.1 and Fig.3.From the outcomes, it can be demonstrated that the IDHOA-T2F approach has accomplished least TEC over the other techniques.For instance,with 100 resources,the IDHOA-T2F technique has offered a lower TEC of 26J whereas the ACO-PSO,GA,and social spider optimization algorithm (SSOA) techniques have provided a maximum TEC of 76J, 58J, and 34J respectively.In addition,with 150 resources,the IDHOA-T2F approach has existed a minimal TEC of 53J whereas the ACO-PSO,GA,and SSOA methods have given a superior TEC of 65J,74J,and 63J correspondingly.Likewise,with 250 resources,the IDHOA-T2F technique has accessible a lower TEC of 80J whereas the ACO-PSO, GA, and SSOA methodologies have provided a higher TEC of 203J, 143J, and 96J correspondingly.

    Table 1:Total energy consumption analysis of proposed IDHOA-T2F model

    Figure 3:Total energy consumption analysis of IDHOA-T2F model

    Tab.2 and Fig.4 offer the load balance degree analysis of the IDHOA-T2F technique under varying data sizes.From the obtained values,it is ensured that the IDHOA-T2F technique has resulted in a higher load balance degree compared to other techniques.For instance,with the data size of 100,the IDHOA-T2F technique has resulted in an increased load balance degree with 0.59 whereas the TEENA, MOFA, and SSOA techniques have accomplished a reduced load balance degree of 0.19,0.42,and 0.52 respectively.In line with,the data size of 300,the IDHOA-T2F approach has resulted in an improved load balance degree of 0.8 whereas the TEENA, MOFA, and SSOA manners have accomplished a minimal load balance degree of 0.45, 0.59, and 0.75 correspondingly.At the same time, with the data size of 500, the IDHOA-T2F method has resulted in a maximum load balance degree of 0.92 whereas the TEENA, MOFA, and SSOA manners have accomplished a lesser load balance degree of 0.65,0.79,and 0.87 correspondingly.

    Table 2:Load balance degree analysis of IDHOA-T2F model

    Figure 4:Load balance degree analysis of IDHOA-T2F model

    Brief fitness analysis of the IDHOA-T2F technique takes place under different iterations and runs in Tab.3 and Fig.5.The IDHOA-T2F technique has resulted in a better fitness value under all iterations.For instance, with iteration 10, the IDHOA-T2F technique has obtained a fitness value of 0.40, 0.38, and 0.37 under three distinct runs 1–3 respectively.Moreover, with iteration 50, the IDHOA-T2F method has reached a fitness value of 0.22, 0.21, and 0.14 under 3 different runs 1–3 correspondingly.Furthermore,with iteration 150,the IDHOA-T2F algorithm has gained a fitness value of 0.17,0.16,and 0.11 under three varying runs 1–3 respectively.Additionally,with iteration 350,the IDHOA-T2F method has obtained a fitness value of 0.15,0.13,and 0.10 under three various runs 1–3 correspondingly.In the same way,with iteration 550,the IDHOA-T2F methodology has attained a fitness value of 0.14,0.12,and 0.10 under 3 distinct runs 1–3 respectively.At last,with iteration 850,the IDHOA-T2F approach has achieved a fitness value of 0.13, 0.12, and 0.10 under three distinct runs 1–3 correspondingly.

    Table 3:Result analysis of IDHOA-T2F model with different iterations and runs

    Figure 5:Result analysis of IDHOA-T2F model with different runs

    For ensuring the improved performance of IDHOA-T2F technique,a comparison study is made in Tab.4 and Fig.6.The experimental outcomes stated that the IDHOA-T2F approach has accomplished superior performance over the SSOA technique.For instance, with 10 iterations, the IDHOA-T2F technique has attained a lower fitness function of 0.37 whereas the SSOA has obtained an increased fitness value of 0.40.In addition,with 100 iterations,the IDHOA-T2F method has reached a lesser fitness function of 0.12 whereas the SSOA has attained a maximum fitness value of 0.23.Similarly,with 350 iterations, the IDHOA-T2F algorithm has gained a lesser fitness function of 0.10 whereas the SSOA has obtained an improved fitness value of 0.19.Moreover,with 500 iterations,the IDHOAT2F methodology has attained a minimal fitness function of 0.10 whereas the SSOA has obtained an enhanced fitness value of 0.19.Furthermore,with 700 iterations,the IDHOA-T2F technique has obtained a lower fitness function of 0.10 whereas the SSOA has reached a superior fitness value of 0.19.At last,with 850 iterations,the IDHOA-T2F technique has obtained the least fitness function of 0.10 whereas the SSOA has gained an improved fitness value of 0.19.The experimental outcomes demonstrate the promising outcome of IDHOA-T2F technique over the recent techniques due to the inclusion of T2F and IDHOA.

    Table 4:Comparative analysis of IDHOA-T2F model under varying iterations

    Figure 6:Comparative analysis of IDHOA-T2F model with distinct iterations

    5 Conclusion

    In this study, a new IDHOA-T2F technique has been presented for load scheduling in IoT cloud environment.The IDHOA-T2F technique involves a T2F system with distinct input variables for scheduling load in the IoT cloud environment.Besides, the IDHOA technique is applied to appropriately select the MFs of the T2F system.The proposed model finds useful to improve the efficiency of IoT models.For validating the enhanced load scheduling efficiency of the IDHOA-T2F technique,a series of simulations take place to highlight the improved performance.The experimental outcomes demonstrate the promising outcome of IDHOA-T2F technique over the recent techniques.In future,the outcome of the IDHOA-T2F technique is extended to the design of context aware route planning in the IoT cloud platform.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number (RGP 2/209/42).This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-Track Path of Research Funding Program.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    婷婷色综合大香蕉| 国产精品久久久久成人av| 国产亚洲最大av| 精品免费久久久久久久清纯 | 成年美女黄网站色视频大全免费| 国产黄频视频在线观看| 日韩中文字幕视频在线看片| 91精品伊人久久大香线蕉| 精品少妇一区二区三区视频日本电影 | 极品少妇高潮喷水抽搐| 久久精品国产综合久久久| 免费在线观看黄色视频的| 欧美 日韩 精品 国产| 亚洲,欧美,日韩| 1024香蕉在线观看| 国产成人啪精品午夜网站| 最近中文字幕2019免费版| 亚洲人成网站在线观看播放| 91精品三级在线观看| 91成人精品电影| 桃花免费在线播放| 精品少妇黑人巨大在线播放| 精品视频人人做人人爽| 夫妻性生交免费视频一级片| 国产色婷婷99| www.精华液| 日日撸夜夜添| 亚洲人成网站在线观看播放| netflix在线观看网站| 国产av国产精品国产| 亚洲一区中文字幕在线| 丁香六月天网| av一本久久久久| 日韩成人av中文字幕在线观看| 国产高清不卡午夜福利| 男女之事视频高清在线观看 | 国产av国产精品国产| 99re6热这里在线精品视频| 国产精品国产三级专区第一集| 黄片播放在线免费| 宅男免费午夜| 亚洲成av片中文字幕在线观看| 亚洲欧美色中文字幕在线| 91老司机精品| 亚洲av中文av极速乱| 又黄又粗又硬又大视频| 男的添女的下面高潮视频| 亚洲视频免费观看视频| 日日撸夜夜添| 自线自在国产av| 国产男人的电影天堂91| 80岁老熟妇乱子伦牲交| 大香蕉久久成人网| xxxhd国产人妻xxx| 高清黄色对白视频在线免费看| 亚洲四区av| 精品国产露脸久久av麻豆| xxx大片免费视频| 美女视频免费永久观看网站| 亚洲激情五月婷婷啪啪| 国产乱人偷精品视频| 国产伦人伦偷精品视频| 一级毛片电影观看| 女人被躁到高潮嗷嗷叫费观| 五月开心婷婷网| 啦啦啦在线观看免费高清www| 女人被躁到高潮嗷嗷叫费观| 中文字幕色久视频| 丝袜在线中文字幕| 欧美国产精品va在线观看不卡| 另类亚洲欧美激情| 一级毛片电影观看| xxx大片免费视频| 九色亚洲精品在线播放| 亚洲,欧美,日韩| 女人精品久久久久毛片| 久久99热这里只频精品6学生| 国产有黄有色有爽视频| av有码第一页| 日本欧美视频一区| 午夜福利网站1000一区二区三区| 欧美国产精品一级二级三级| 亚洲精品成人av观看孕妇| 亚洲精品久久成人aⅴ小说| 一级毛片黄色毛片免费观看视频| 大码成人一级视频| 一边摸一边抽搐一进一出视频| 狠狠精品人妻久久久久久综合| 亚洲久久久国产精品| 亚洲在久久综合| 欧美日韩一区二区视频在线观看视频在线| 免费观看a级毛片全部| 免费看不卡的av| 男人爽女人下面视频在线观看| 如何舔出高潮| 91精品伊人久久大香线蕉| 亚洲精品久久午夜乱码| 日韩av免费高清视频| av网站免费在线观看视频| 看非洲黑人一级黄片| 18禁动态无遮挡网站| 免费久久久久久久精品成人欧美视频| 久久久久国产一级毛片高清牌| 女人久久www免费人成看片| 熟女少妇亚洲综合色aaa.| 午夜福利影视在线免费观看| 午夜激情久久久久久久| 欧美中文综合在线视频| 不卡av一区二区三区| 午夜福利视频在线观看免费| 亚洲婷婷狠狠爱综合网| 欧美精品一区二区大全| 天天躁夜夜躁狠狠躁躁| 国产精品99久久99久久久不卡 | 亚洲精品视频女| 男女床上黄色一级片免费看| 丝袜喷水一区| 丰满迷人的少妇在线观看| 欧美xxⅹ黑人| 欧美亚洲日本最大视频资源| 亚洲激情五月婷婷啪啪| 亚洲成人手机| 亚洲欧洲精品一区二区精品久久久 | 电影成人av| 十八禁人妻一区二区| 亚洲欧美一区二区三区久久| 男人添女人高潮全过程视频| 久久国产精品大桥未久av| 亚洲四区av| 色精品久久人妻99蜜桃| 五月天丁香电影| 天天躁夜夜躁狠狠久久av| 日韩不卡一区二区三区视频在线| 久久久久精品性色| 另类精品久久| 亚洲精品第二区| 国产精品嫩草影院av在线观看| 国产成人系列免费观看| 国产精品嫩草影院av在线观看| 男女边吃奶边做爰视频| 十分钟在线观看高清视频www| 亚洲成人国产一区在线观看 | 免费看不卡的av| 国产无遮挡羞羞视频在线观看| 别揉我奶头~嗯~啊~动态视频 | 在线 av 中文字幕| 久久久久久久久久久免费av| 成人国语在线视频| 国产又爽黄色视频| 婷婷色综合大香蕉| 国语对白做爰xxxⅹ性视频网站| 色吧在线观看| 亚洲精品美女久久av网站| 欧美国产精品va在线观看不卡| 老汉色∧v一级毛片| 悠悠久久av| 亚洲精品久久成人aⅴ小说| 日韩熟女老妇一区二区性免费视频| av在线观看视频网站免费| 18禁国产床啪视频网站| 欧美精品高潮呻吟av久久| 日韩大片免费观看网站| 伦理电影免费视频| 亚洲国产精品成人久久小说| 免费日韩欧美在线观看| av天堂久久9| 操出白浆在线播放| 一区二区av电影网| 精品国产一区二区久久| 男女无遮挡免费网站观看| 色视频在线一区二区三区| 日韩伦理黄色片| 91精品三级在线观看| 97人妻天天添夜夜摸| 亚洲欧美精品综合一区二区三区| 极品人妻少妇av视频| 天天躁狠狠躁夜夜躁狠狠躁| 国产精品一区二区在线观看99| 欧美xxⅹ黑人| 国产伦理片在线播放av一区| 久久久久久久国产电影| 丰满乱子伦码专区| 女性生殖器流出的白浆| 涩涩av久久男人的天堂| 免费黄色在线免费观看| 日本wwww免费看| 亚洲七黄色美女视频| 中文字幕另类日韩欧美亚洲嫩草| 精品少妇黑人巨大在线播放| 欧美黑人精品巨大| 亚洲精品久久午夜乱码| 国产成人啪精品午夜网站| 一级,二级,三级黄色视频| 交换朋友夫妻互换小说| 自拍欧美九色日韩亚洲蝌蚪91| av在线app专区| 亚洲成人手机| 免费在线观看视频国产中文字幕亚洲 | 亚洲欧洲精品一区二区精品久久久 | 成人亚洲精品一区在线观看| 成人国产麻豆网| 久久热在线av| 国产一区二区三区av在线| 赤兔流量卡办理| 男女免费视频国产| 女人久久www免费人成看片| 最近最新中文字幕大全免费视频 | 在线观看www视频免费| 国产精品久久久久成人av| 久久久久视频综合| 亚洲av成人精品一二三区| 亚洲成人av在线免费| 精品国产露脸久久av麻豆| 1024视频免费在线观看| 少妇被粗大的猛进出69影院| 看免费成人av毛片| 看十八女毛片水多多多| 免费看不卡的av| 乱人伦中国视频| 精品亚洲乱码少妇综合久久| 欧美最新免费一区二区三区| 丝袜美腿诱惑在线| 999久久久国产精品视频| 日韩,欧美,国产一区二区三区| 国产精品久久久av美女十八| 天天躁狠狠躁夜夜躁狠狠躁| 一级毛片我不卡| 一级,二级,三级黄色视频| 日韩视频在线欧美| 在线天堂中文资源库| 一区二区三区激情视频| 黄片小视频在线播放| 老熟女久久久| 日日摸夜夜添夜夜爱| 中文字幕高清在线视频| 亚洲精品中文字幕在线视频| 亚洲av在线观看美女高潮| 欧美日韩亚洲高清精品| 侵犯人妻中文字幕一二三四区| 国产精品国产av在线观看| 国产乱人偷精品视频| 成年av动漫网址| 超碰97精品在线观看| 一级片'在线观看视频| 久久精品久久久久久噜噜老黄| 99久久综合免费| 在线亚洲精品国产二区图片欧美| 成人午夜精彩视频在线观看| 亚洲成人av在线免费| 99国产综合亚洲精品| 亚洲欧美成人综合另类久久久| 午夜91福利影院| 99热全是精品| 国产不卡av网站在线观看| 蜜桃国产av成人99| 亚洲成av片中文字幕在线观看| 黄色 视频免费看| 老汉色av国产亚洲站长工具| 两个人免费观看高清视频| 亚洲欧美一区二区三区久久| 麻豆乱淫一区二区| 国产一区二区 视频在线| 一级毛片黄色毛片免费观看视频| 国产一区二区在线观看av| 大话2 男鬼变身卡| 婷婷色av中文字幕| 精品第一国产精品| 婷婷色麻豆天堂久久| 成年美女黄网站色视频大全免费| 久久99精品国语久久久| 男女床上黄色一级片免费看| 青春草视频在线免费观看| 老鸭窝网址在线观看| 国产熟女欧美一区二区| 亚洲精品日本国产第一区| 日韩成人av中文字幕在线观看| 伦理电影免费视频| 观看av在线不卡| 欧美精品高潮呻吟av久久| 伊人亚洲综合成人网| 男女国产视频网站| 日本vs欧美在线观看视频| 亚洲国产av影院在线观看| 国产在线视频一区二区| 这个男人来自地球电影免费观看 | 制服丝袜香蕉在线| e午夜精品久久久久久久| 18在线观看网站| 在线观看国产h片| 亚洲七黄色美女视频| av视频免费观看在线观看| 97人妻天天添夜夜摸| 午夜91福利影院| 国产亚洲午夜精品一区二区久久| 精品国产一区二区久久| 最新的欧美精品一区二区| 亚洲国产日韩一区二区| 亚洲av综合色区一区| 欧美另类一区| 在线观看www视频免费| 香蕉国产在线看| 精品一区二区三卡| 成年动漫av网址| 亚洲国产精品999| 伊人亚洲综合成人网| 精品一品国产午夜福利视频| 午夜精品国产一区二区电影| 国产av一区二区精品久久| 丝瓜视频免费看黄片| 蜜桃在线观看..| 免费黄频网站在线观看国产| 免费黄频网站在线观看国产| 欧美变态另类bdsm刘玥| 欧美人与善性xxx| 日韩 欧美 亚洲 中文字幕| 欧美日韩亚洲高清精品| 日韩制服丝袜自拍偷拍| 高清视频免费观看一区二区| 九草在线视频观看| 精品国产露脸久久av麻豆| 久久久久国产一级毛片高清牌| 欧美日韩视频高清一区二区三区二| 日本av手机在线免费观看| 国产亚洲午夜精品一区二区久久| 国产成人精品无人区| 在线观看免费午夜福利视频| 国产成人91sexporn| 中文精品一卡2卡3卡4更新| 精品久久久久久电影网| 国产麻豆69| 欧美日韩视频高清一区二区三区二| 欧美少妇被猛烈插入视频| 天天躁夜夜躁狠狠久久av| 女人爽到高潮嗷嗷叫在线视频| 中文字幕最新亚洲高清| 精品少妇黑人巨大在线播放| 丝袜脚勾引网站| 丝袜在线中文字幕| 国产福利在线免费观看视频| 制服人妻中文乱码| 亚洲第一区二区三区不卡| 人人妻人人澡人人爽人人夜夜| 日韩视频在线欧美| 午夜福利,免费看| 女人高潮潮喷娇喘18禁视频| 精品亚洲成国产av| 久久鲁丝午夜福利片| 精品人妻熟女毛片av久久网站| 人成视频在线观看免费观看| 国产色婷婷99| 亚洲婷婷狠狠爱综合网| 亚洲精品久久久久久婷婷小说| 国产黄色免费在线视频| 一级爰片在线观看| 国产成人精品无人区| 亚洲人成77777在线视频| 国产成人午夜福利电影在线观看| videosex国产| 日本黄色日本黄色录像| 尾随美女入室| 成人国产麻豆网| 欧美亚洲 丝袜 人妻 在线| 国产精品无大码| 国产一区亚洲一区在线观看| 亚洲欧洲日产国产| 丝袜脚勾引网站| av天堂久久9| 欧美日韩成人在线一区二区| 满18在线观看网站| 国产精品偷伦视频观看了| 一区二区av电影网| 一本大道久久a久久精品| 亚洲精品av麻豆狂野| 丰满乱子伦码专区| 制服人妻中文乱码| 制服人妻中文乱码| 久久性视频一级片| av有码第一页| 国产精品国产av在线观看| 日本一区二区免费在线视频| 国产精品av久久久久免费| 亚洲欧美色中文字幕在线| 国产淫语在线视频| 免费观看人在逋| 美女脱内裤让男人舔精品视频| 欧美日韩福利视频一区二区| 各种免费的搞黄视频| 国产乱来视频区| 最近2019中文字幕mv第一页| 狂野欧美激情性bbbbbb| www.自偷自拍.com| 高清在线视频一区二区三区| 十八禁网站网址无遮挡| 一边亲一边摸免费视频| av线在线观看网站| 黑人巨大精品欧美一区二区蜜桃| 国产精品久久久人人做人人爽| 日本黄色日本黄色录像| 亚洲中文av在线| 爱豆传媒免费全集在线观看| 日本wwww免费看| 制服人妻中文乱码| 成人影院久久| av天堂久久9| a级毛片黄视频| 大片免费播放器 马上看| 欧美日韩视频高清一区二区三区二| 爱豆传媒免费全集在线观看| www日本在线高清视频| 另类精品久久| 免费观看人在逋| 夫妻午夜视频| tube8黄色片| 亚洲人成电影观看| 国产黄频视频在线观看| 亚洲国产精品成人久久小说| 国产亚洲精品第一综合不卡| 国产一卡二卡三卡精品 | 2018国产大陆天天弄谢| 亚洲av综合色区一区| 亚洲一码二码三码区别大吗| 天堂8中文在线网| 午夜精品国产一区二区电影| 国产深夜福利视频在线观看| 国产精品一国产av| 操出白浆在线播放| 久久这里只有精品19| 女人爽到高潮嗷嗷叫在线视频| 亚洲精品第二区| 亚洲第一区二区三区不卡| 女人久久www免费人成看片| 亚洲av日韩精品久久久久久密 | 一边摸一边抽搐一进一出视频| 亚洲成色77777| 亚洲精品国产色婷婷电影| 99九九在线精品视频| 国产精品.久久久| 国产片内射在线| 国产免费又黄又爽又色| 国产一区二区 视频在线| 国产精品香港三级国产av潘金莲 | 亚洲精品一二三| 欧美人与性动交α欧美精品济南到| 七月丁香在线播放| 卡戴珊不雅视频在线播放| av视频免费观看在线观看| 一本—道久久a久久精品蜜桃钙片| 一级黄片播放器| 五月开心婷婷网| 久久热在线av| 丝瓜视频免费看黄片| av在线观看视频网站免费| 国产成人一区二区在线| 爱豆传媒免费全集在线观看| 日韩不卡一区二区三区视频在线| av卡一久久| 女人被躁到高潮嗷嗷叫费观| 免费高清在线观看视频在线观看| 菩萨蛮人人尽说江南好唐韦庄| 欧美日韩国产mv在线观看视频| 男人添女人高潮全过程视频| 性少妇av在线| 激情视频va一区二区三区| a级片在线免费高清观看视频| 又粗又硬又长又爽又黄的视频| 亚洲欧美日韩另类电影网站| 亚洲精品国产av蜜桃| 久久av网站| 亚洲欧美一区二区三区黑人| 午夜91福利影院| 亚洲欧美中文字幕日韩二区| 亚洲欧美精品自产自拍| 精品少妇久久久久久888优播| 高清不卡的av网站| 老司机在亚洲福利影院| 久久精品aⅴ一区二区三区四区| 18禁动态无遮挡网站| 国产在视频线精品| 亚洲国产欧美日韩在线播放| 18禁国产床啪视频网站| 男的添女的下面高潮视频| 亚洲综合精品二区| 日日爽夜夜爽网站| 女人爽到高潮嗷嗷叫在线视频| h视频一区二区三区| 99国产综合亚洲精品| 男女边摸边吃奶| 美女国产高潮福利片在线看| 欧美xxⅹ黑人| 一区二区三区乱码不卡18| 好男人视频免费观看在线| 捣出白浆h1v1| 天天操日日干夜夜撸| 一本久久精品| 国产日韩欧美视频二区| 午夜福利一区二区在线看| 在线观看三级黄色| 亚洲欧洲精品一区二区精品久久久 | av国产精品久久久久影院| 亚洲av在线观看美女高潮| 哪个播放器可以免费观看大片| 亚洲欧美清纯卡通| 夫妻性生交免费视频一级片| 欧美日韩亚洲国产一区二区在线观看 | 女人高潮潮喷娇喘18禁视频| 亚洲欧洲国产日韩| 国产精品三级大全| 日本欧美视频一区| 成人三级做爰电影| 精品亚洲成国产av| 久久久久网色| 成人毛片60女人毛片免费| 美女主播在线视频| 精品少妇内射三级| 一区二区三区激情视频| 久久久亚洲精品成人影院| 中文字幕色久视频| 一二三四中文在线观看免费高清| 高清视频免费观看一区二区| 多毛熟女@视频| 日韩视频在线欧美| 九草在线视频观看| 久久久久精品国产欧美久久久 | 性少妇av在线| 欧美国产精品一级二级三级| 一级a爱视频在线免费观看| 国产在线一区二区三区精| 在线天堂最新版资源| 亚洲精品国产av成人精品| av女优亚洲男人天堂| 国产 一区精品| 老汉色∧v一级毛片| 成人手机av| 丰满少妇做爰视频| 老司机影院毛片| 成人黄色视频免费在线看| 最近中文字幕高清免费大全6| 妹子高潮喷水视频| 国产精品久久久久久精品电影小说| 天天操日日干夜夜撸| 国产亚洲欧美精品永久| 如何舔出高潮| 欧美精品高潮呻吟av久久| av视频免费观看在线观看| 色婷婷av一区二区三区视频| 极品少妇高潮喷水抽搐| 免费观看a级毛片全部| 一本—道久久a久久精品蜜桃钙片| 国产深夜福利视频在线观看| 91成人精品电影| 菩萨蛮人人尽说江南好唐韦庄| 国产精品国产三级专区第一集| 99热全是精品| 少妇 在线观看| 少妇人妻 视频| 国产精品久久久人人做人人爽| 丝袜美足系列| 高清黄色对白视频在线免费看| 性少妇av在线| 我的亚洲天堂| www.av在线官网国产| 国产成人a∨麻豆精品| 9热在线视频观看99| 人成视频在线观看免费观看| 亚洲免费av在线视频| 亚洲伊人久久精品综合| 热99久久久久精品小说推荐| 国产精品免费大片| 成年动漫av网址| 日韩熟女老妇一区二区性免费视频| av在线app专区| 纵有疾风起免费观看全集完整版| xxx大片免费视频| 国产精品二区激情视频| 久久天躁狠狠躁夜夜2o2o | 久久狼人影院| avwww免费| 亚洲国产欧美一区二区综合| svipshipincom国产片| 亚洲精品第二区| 久久天堂一区二区三区四区| 欧美人与性动交α欧美精品济南到| av电影中文网址| 日本欧美视频一区| 国产免费福利视频在线观看| 中文字幕最新亚洲高清| 亚洲图色成人| 黑丝袜美女国产一区| www.精华液| 韩国精品一区二区三区| 欧美在线一区亚洲| 久久影院123| 精品人妻一区二区三区麻豆| 国产成人午夜福利电影在线观看| 最黄视频免费看| 男人爽女人下面视频在线观看| 一级毛片黄色毛片免费观看视频| 亚洲av日韩在线播放| 观看av在线不卡| 久久精品熟女亚洲av麻豆精品| 搡老乐熟女国产| 亚洲欧美精品自产自拍| 亚洲五月色婷婷综合| 亚洲av男天堂| 精品一品国产午夜福利视频| av国产久精品久网站免费入址| av.在线天堂| 亚洲专区中文字幕在线 | 丝袜脚勾引网站| 最新的欧美精品一区二区| 国产日韩欧美在线精品| 激情五月婷婷亚洲| 国产伦人伦偷精品视频| 一二三四在线观看免费中文在| 中国三级夫妇交换|