• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Improved DHOA-Fuzzy Based Load Scheduling in IoT Cloud Environment

    2022-08-24 03:31:56JoshuaSamuelRajIlangoPrinceThomasUmaFahdAlWesabiRadwaMarzoukandAnwerMustafaHilal
    Computers Materials&Continua 2022年5期

    R.Joshua Samuel Raj,V.Ilango,Prince Thomas,V.R.Uma,F(xiàn)ahd N.Al-Wesabi,Radwa Marzouk and Anwer Mustafa Hilal

    1Department of Information Science&Engineering,CMR Institute of Technology,Bengaluru,560037,India

    2Department of Computer Application,CMR Institute of Technology,Bangalore,560037,India

    3School of Computing,Woldia Institute of Technology,Woldia University,Ethiopia

    4Department of Commerce,School of Commerce,F(xiàn)inance and Accountancy,Christ University,Bangalore,560029,India

    5Department of Computer Science,College of Science&Art at Mahayil,King Khalid University,Saudi Arabia

    6Faculty of Computer and IT,Sana’a University,Yemen

    7Department of Information Systems,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Saudi Arabia

    8Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam bin Abdulaziz University,Alkharj,Saudi Arabia

    Abstract: Internet of things (IoT) has been significantly raised owing to the development of broadband access network,machine learning(ML),big data analytics(BDA),cloud computing(CC),and so on.The development of IoT technologies has resulted in a massive quantity of data due to the existence of several people linking through distinct physical components, indicating the status of the CC environment.In the IoT, load scheduling is realistic technique in distinct data center to guarantee the network suitability by falling the computer hardware and software catastrophe and with right utilize of resource.The ideal load balancer improves many factors of Quality of Service(QoS) like resource performance, scalability, response time, error tolerance,and efficiency.The scholar is assumed as load scheduling a vital problem in IoT environment.There are many techniques accessible to load scheduling in IoT environments.With this motivation,this paper presents an improved deer hunting optimization algorithm with Type II fuzzy logic(IDHOA-T2F)model for load scheduling in IoT environment.The goal of the IDHOA-T2F is to diminish the energy utilization of integrated circuit of IoT node and enhance the load scheduling in IoT environments.The IDHOA technique is derived by integrating the concepts of Nelder Mead (NM) with the DHOA.The proposed model also synthesized the T2L based on fuzzy logic(FL)systems to counterbalance the load distribution.The proposed model finds useful to improve the efficiency of IoT system.For validating the enhanced load scheduling performance of the IDHOA-T2F technique,a series of simulations take place to highlight the improved performance.The experimental outcomes demonstrate the capable outcome of the IDHOA-T2F technique over the recent techniques.

    Keywords: Load scheduling; internet of things; cloud computing;metaheuristics;fuzzy logic

    1 Introduction

    In recent times, Internet of Things (IoT) was developed as the most important revolution in information and communication technology (ICT) production [1].By IoT, Internet connections extended over standard smart devices namely smartphone and tablet for different range of devices(machine, vehicle, sensors, and so on.) for accomplishing several distinct applications and services namely health care,medicinal treatment,traffic controller,energy organization,vehicle network,and so on.This generates a massive number of information which require that exists saved,processed,and analyzed for obtaining valuable data for meeting user aim as well as requires [2].Also, the number and scale of applications and services are improving quickly that needs processing ability which even one of the powerful smart devices could not presently meet.The Cloud environment that is recognized as huge resource center which permits ubiquitous access for sharing as well as providing resources to users flexible with virtualization approach is a potential platform for supporting IoT progresses.Limitations of recent smart devices are minimization by getting time utilization and resource intensive tasks for powerful computing environment namely Cloud computing (CC) but exit the easy task to smart device for handling.But,if relating IoT as well as CC,novel issues appear[3].

    An IoT is enormous advantage to their lives, assisting those by relating many sensors and actuators.Besides,relating to many requests to varying devices all simultaneously is a general subject for scholar analyzing the IoT.It could not only interfere with the smooth efficiency of an IoT ecosystems along with lead to load balancing(LB)issues.Researches are thoroughly examined LB in allocated environment and network[4].The LB is 2 modes:unaware(allocating the request similarly to every server,regardless of its load)and conscious(transmitting the request from worse loaded servers).LB goals at making sure which processor in the model does approximately a similar load of work at all particular times.LB amongst every virtual device is a vital topic in IoT due to many desires and variety of resources.It can be important topic in IoT;it can be helpful if any points are overload,some under-loaded and remainder is idle with no interfering with the effective model[5].

    An optimum load balancer improves many factors of Quality of Service (QoS) like resource performance, scalability, response time, error tolerance, and efficiency [6].It can be need for a nonlinear technique for handling this problem as their aim for improving the LB and reducing energy utilization as NPhard problem.An IoT is difficult for wireless gadget/hub interrelating with sending packages for everyone or another gadget/hub, not containing some outline control information for routing.IoT centers are unrestricted amount of schemes and flexibility to different hubs.An important problem in IoT is the secured broadcast from source-destination.At this point, it can be presented LB manner for minimized the energy utilization of combined circuit of IoT node and enhance the LB in IoT platform [7].Kumar et al.[8] establish a task processing structure which is the decision making ability for selecting the optimum resource at runtime for processing the application(different and difficult nature) at virtual machine (VM) utilizing modified particle swarm optimization (PSO)technique in end-user deadline.The presented technique offers non-dominance group of optimum solutions and enhances different effective parameters (task acceptance ratio, throughput, time, and cost)by sequence of experimentations on distinct synthetic datasets utilizing Cloudsim tool.

    This paper presents an improved deer hunting optimization algorithm with Type II fuzzy logic(IDHOA-T2F) model to load scheduling in IoT environments.The goal of the IDHOA-T2F is to diminish the energy utilization of integrated circuit of IoT node and enhance the load scheduling in IoT environments.The IDHOA technique is derived by integrating the concepts of Nelder Mead(NM)with the DHOA.The proposed model also synthesized the T2L based on fuzzy logic(FL)systems to counterbalance the load distribution.The proposed model finds useful to improve the efficiency of IoT systems.For validating the enhanced load scheduling performance of the IDHOA-T2F technique,a series of simulations take place to highlight the improved performance.

    The rest of the paper is organized as follows.Section 2 offers the related works,Section 3 provides the proposed model,Section 4 validates the results,and Section 5 concludes the paper.

    2 Related Works

    Ma et al.[9] present the deadline and cost-aware scheduling technique which minimizing the executing cost of progress in deadline constraint from IaaS approach.Assuming the VM efficiency difference and acquisition delay,it can be initial separate tasks as to varying levels based on topological framework so no dependencies exist among tasks at a similar level.In 3 strings are utilized for coding the genes in presented technique for optimum reproduce the heterogeneous and resilient features of cloud environment.Afterward, the heterogeneous earliest finish time (HEFT) was utilized for generating those with minimal completion time as well as cost.Fadlallah et al.[10] planned and validated greedy scheduling and LB techniques for improving the consumption of resources.It can be shown a comparative analysis with longest cloudlet fact processing(LCFP),shortest cloudlet fact processing(SCFP),and Min-Min heuristic techniques.The selection of an individual’s 3 techniques was dependent upon the performance and simplicity of its systems, as described in the works, to allocate task to device.

    Narman et al.[11] presented dynamic dedicate server scheduling to heterogeneous as well as homogeneous methods for effectively giving wanted service by regarding priorities of requests.Refaat et al.[12] present a novel scheduling approach to control real time and soft service request in Fog methods that are named decentralize load-balance scheduling(DLBS).The projected techniques give decentralization LB control technique.This technique allocates the load depends on kind of service request and load status of all fog nodes.Gawali et al.[13] introduce a heuristic technique which comprises the modified analytic hierarchy process (MAHP), bandwidth aware divisible scheduling(BATS)+BAR optimization,longest expected processing time preemption(LEPT),and divide-andconquer techniques for performing task scheduling (TS) and resource allocation (RA).During this method, all tasks are managed earlier their actual distribution to cloud resource employing MAHP method.The resource is distributed utilizing the collective BATS+BAR optimization technique that assumes the bandwidth and load of cloud resource as constraint.Wang et al.[14]analyses the feature of IoT request and intend to an enhanced Poisson task method with new approach for predicting the arrivals of IoT requests.It can be present an adaptive energy performance method for adjusting the priority of an optimized objective.Lastly,an energy-efficient VM scheduling technique was presented for maximizing the energy performance of data center.

    In Maamari et al.[15],a dynamic adaptive PSO(DAPSO)algorithm was executed for improving the efficiency of basic PSO technique for optimizing the task runtime by minimized the makespan of specific task set, and at once, maximized resource consumption.Therefore, a TS technique is presented for scheduling the independence task on CC.The presented technique was assumed an amalgamation of DAPSO technique and the Cuckoo search (CS) technique is named MDAPSO.Ni et al.[16] presented a 3-layer scheduling method dependent on whale-Gaussian cloud.In the second layer of approach,the whale optimization approach dependent upon Gaussian cloud technique(GCWOAS2)was utilized to multi-objective TS in CC that is for minimizing the completion time of task through efficiently employing the VM resource and for keeping the LB of all VM, decreasing the effective cost of model.In the GCWOAS2 approach, opposition-based learning (OBL) method was initially utilized for initializing the scheduling approach for generating the optimum scheduling method.Though several load scheduling methods are available in the literature,there is still need to explore and improve the scheduling performance on the IoT and cloud environment.

    3 The Proposed Model

    In this study, a new IDHOA-T2F technique has been presented for load scheduling in IoT cloud environment.The IDHOA-T2F technique involves a T2F system with distinct input variables for scheduling load in the IoT cloud environment.Besides, the IDHOA technique is applied to appropriately select the membership functions(MFs)of the T2F system.The IDHOA-T2F technique has established a multi-objective fitness function(FF)dependent upon load balancing(LB)and energy utilization and implemented.

    where ω1and ω2are adaptable parameters and ω1+ω2=1.

    The detailed working of these processes is given in the succeeding sections.

    3.1 Overview of T2F Model

    Type-2 fuzzy set(T2F)has considered as fuzzy membership operation;i.e.,the value of membership (membership degree) of all elements of set is fuzzy set in 0 and 1.The structure of T2F model is shown in Fig.1.The sets are utilized in conditions where it can be uncertainty on the values of similar membership.Uncertainty is the procedure of either the membership function (MF) or most of their parameter[17].Assume that transition from normal to fuzzy sets.Therefore,perfectly it can be required for utilizing fuzzy sets type-∞for completing the illustration of uncertainty.Obviously,it could not appreciate this in practice,as it could not for utilizing fuzzy sets of finite type.So,type-1 fuzzy sets (T1FS) are assumed as 1st order estimates of uncertainty, but T2FS are regarded as 2nd order estimates.T2FS are generalization procedures of individuals of type-l(with FOU as additional degree of freedom).

    In the mathematical way, a T2FS is referred as, is considered by type-2 MF(x,u), wherex∈Xandu∈Jχ?[0,1]:i.e.,

    where 0 ≤(x,u)≤1.In order to continuous universe of discourse,is written as:

    whereJχis signified the initial membership ofx.Thus type-l fuzzy logic (T1FL), discrete fuzzy sets are demonstrated as symbolrather than ∫.The secondary MF connected toχ=χ′,to providedχ′∈X,is type-l MF determined as(x=x′,u),?u∈Jx.

    Type-2 MFs:Type-2 fuzzy logic(T2FL)methods were considered as the procedure of its MFs.In 2 varying MFs:(a)a classic type-l MF and(b)a blurred type-1 MF which signifies the type-2 MF.

    Figure 1:Structure of T2F model

    The uncertainty in first membership of T2FSis demonstrated as FOU.Noticeable the FOU is also the union of every primary membership:

    The upper as well as lower MFs,denoted by(x)and(x),respectively,are two type-l membership.

    Fuzzifier:The MF type-2 offers many degrees of membership to all inputs.So, the uncertainty is further signified.This illustration permits us to taken to account that is unnoticed by type-l.The fuzzifier map the input vector(e1,e2,...,en)Ton a type-2 fuzzy(T2F)system,most same to process carried out in T1FL system.

    Rules:The common procedure ofithrule of T2FL is expressed as:

    Inference Engine:In fuzzy model interval type-2 utilizing the minimal or productt-norms operation, theithstimulated ruleFi(x1,...xn) offers us the interval which is defined as 2 extremes,

    whereandare provided as:

    Type Reducer:Afterward the rule is fired and inference is applied, the attained T2F system resultant in type-1 fuzzy(T1F)system was calculated.During this part,the accessible techniques for computing the centroid of T2F system utilizing the extension lead rule are discussed.The centroid of T1F systemAis provided as:

    wherenindicates the amount of discretized domains ofA,zi∈R,andwi∈[0,1].When allziandwiare exchanged with T1F system,ZiandWi,with connected to MF ofμZ(zi)andμW(Wi)correspondingly as utilizing the extension rule is generalization centroid for T2F systemis provided as:

    Timplies thet-norm andrefers the T1F system.In order to interval T2F system,

    Defuzzifier:For getting a crisp output from T1FL system,the type-reduced set is defuzzified.One of the general techniques for finding the centroid of type-reduced set.When the type_reduced setYimplies discretized tonpoint,at that time the subsequent written offers the centroid of type_reduced set as:

    It is calculated the output utilizing the iterative Karnik Mendel Algorithms.So, the defuzzified output ofIT2FLCis

    With

    3.2 Design of IDHOA Technique for MF Selection

    In order to choose the optimal MFs of the T2FS approach,the IDHOA is derived.A new metaheuristic DHO technique was presented[18]that is simulated as hunting of deer by a set of hunters.For hunting the deer,the hunter surrounds it and travels near dependent upon any approaches.The approaches contain the concern of different parameters as wind angle,deer place,etc.Co-operation amongst the hunter is another essential condition which creates the hunting effectual.Eventually,it can influence the target dependent upon place of leader and successor.An objective functions of this presented technique is provided in Eq.(16).

    The steps for weight optimized utilizing DHO technique are discussed under Because of the different capabilities of deer,it simply escapes from hunting by predators.The technique begins with vector of arbitrary population is named hunters.This procedure is defined as:

    Winston Churchill failed sixth grade. He did not become Prime Minister of England until he was 62, and then only after a lifetime of defeats and setbacks. His greatest contributions came when he was a “senior citizen.”

    wheremrepresents the amount of hunters population (weight) and the entire amount of weight implemented to optimized are signified asX.It can be determined in Eq.(18)[18],

    where, the arbitrary number containing range 0 and 1 has signified asa, and the current iteration is signified asJ.At this point,θrefers the wind angle.After, the place propagation with successor place(Xs)and leader place(Xl)to optimized was established.The successor place explains the place of following weight but the leader place explains the primary optimum place of hunter.

    After initializing the optimum place,all weights in population effort to influence which optimum place[19].Then,the place upgradation model starts by modelling the surrounding performance that is determined in Eq.(19),

    where,Xjimplies the place at the current iteration and the succeeding iteration place has demonstrated asXj+1.The 2 coefficient vectorsZandKare contained in this technique.The arbitrary number which is established by regarding the wind speed is signified asp, and it comprises values from (0–2).The expression for evaluating the coefficient vectorsZandKare illustrated in Eqs.(20)and(21)[18],

    where the maximal iteration is signified asjmax.A primary place of hunter was signified as(X,Y)that obtains upgraded dependent upon place of prey.The 2 coefficient vectorsZandKare according to gain the optimum place(Xb,Yb).When the value ofp <1,afterward the place upgrade model occurs that means the hunter is arbitrarily moves in varied ways without regarding the position angle.

    The position angle upgradation has been regarded for increasing the search space.For making the hunting model effectual,it can be important for determining the position angle of hunter.According to position angle,the place upgrade was carried out utilizing in Eq.(22),

    where the optimum place has signified asB=φj+1,Xbjandpimplies the arbitrary number.

    In the exploration,Kvector has been established within the surrounding performance.Primarily,the arbitrary search model was performed regarding the value ofKlesser to 1.Eventually,the place upgrade model occurs on the basis of successor position instead of assuming the optimum place.Afterward,the global search is carried out utilizing the Eq.(23),

    The place upgraded model was performed for identifying the optimum place (for instance, end condition).The flowchart of the DHOA technique is depicted in Fig.2.

    Figure 2:Flowchart of the DHOA technique

    The IDHOA technique is derived by integrating the concepts of Nelder Mead (NM) with the DHOA.In NM simplex search is part of common class of direct search techniques.It can be most famous technique to resolve unconstrained non-linear optimized issues without utilizing derivatives[20–22].In general,it can be utilized for local optimization.The NM technique tend for minimizing a non-linear scalar function ofnvariables by utilizing only the estimation of objective functions.Primarily, the NM technique carries out their initial simplex, Δ1, ofn+ 1 vertices from beginning pointx0,where the vertex signifies the variable set,x,ofnparameter.

    4 Performance Validation

    This section investigates the performance of the proposed IDHOA-T2F technique under different aspects.A brief total energy consumption analysis of the IDHOA-T2F technique takes place in Tab.1 and Fig.3.From the outcomes, it can be demonstrated that the IDHOA-T2F approach has accomplished least TEC over the other techniques.For instance,with 100 resources,the IDHOA-T2F technique has offered a lower TEC of 26J whereas the ACO-PSO,GA,and social spider optimization algorithm (SSOA) techniques have provided a maximum TEC of 76J, 58J, and 34J respectively.In addition,with 150 resources,the IDHOA-T2F approach has existed a minimal TEC of 53J whereas the ACO-PSO,GA,and SSOA methods have given a superior TEC of 65J,74J,and 63J correspondingly.Likewise,with 250 resources,the IDHOA-T2F technique has accessible a lower TEC of 80J whereas the ACO-PSO, GA, and SSOA methodologies have provided a higher TEC of 203J, 143J, and 96J correspondingly.

    Table 1:Total energy consumption analysis of proposed IDHOA-T2F model

    Figure 3:Total energy consumption analysis of IDHOA-T2F model

    Tab.2 and Fig.4 offer the load balance degree analysis of the IDHOA-T2F technique under varying data sizes.From the obtained values,it is ensured that the IDHOA-T2F technique has resulted in a higher load balance degree compared to other techniques.For instance,with the data size of 100,the IDHOA-T2F technique has resulted in an increased load balance degree with 0.59 whereas the TEENA, MOFA, and SSOA techniques have accomplished a reduced load balance degree of 0.19,0.42,and 0.52 respectively.In line with,the data size of 300,the IDHOA-T2F approach has resulted in an improved load balance degree of 0.8 whereas the TEENA, MOFA, and SSOA manners have accomplished a minimal load balance degree of 0.45, 0.59, and 0.75 correspondingly.At the same time, with the data size of 500, the IDHOA-T2F method has resulted in a maximum load balance degree of 0.92 whereas the TEENA, MOFA, and SSOA manners have accomplished a lesser load balance degree of 0.65,0.79,and 0.87 correspondingly.

    Table 2:Load balance degree analysis of IDHOA-T2F model

    Figure 4:Load balance degree analysis of IDHOA-T2F model

    Brief fitness analysis of the IDHOA-T2F technique takes place under different iterations and runs in Tab.3 and Fig.5.The IDHOA-T2F technique has resulted in a better fitness value under all iterations.For instance, with iteration 10, the IDHOA-T2F technique has obtained a fitness value of 0.40, 0.38, and 0.37 under three distinct runs 1–3 respectively.Moreover, with iteration 50, the IDHOA-T2F method has reached a fitness value of 0.22, 0.21, and 0.14 under 3 different runs 1–3 correspondingly.Furthermore,with iteration 150,the IDHOA-T2F algorithm has gained a fitness value of 0.17,0.16,and 0.11 under three varying runs 1–3 respectively.Additionally,with iteration 350,the IDHOA-T2F method has obtained a fitness value of 0.15,0.13,and 0.10 under three various runs 1–3 correspondingly.In the same way,with iteration 550,the IDHOA-T2F methodology has attained a fitness value of 0.14,0.12,and 0.10 under 3 distinct runs 1–3 respectively.At last,with iteration 850,the IDHOA-T2F approach has achieved a fitness value of 0.13, 0.12, and 0.10 under three distinct runs 1–3 correspondingly.

    Table 3:Result analysis of IDHOA-T2F model with different iterations and runs

    Figure 5:Result analysis of IDHOA-T2F model with different runs

    For ensuring the improved performance of IDHOA-T2F technique,a comparison study is made in Tab.4 and Fig.6.The experimental outcomes stated that the IDHOA-T2F approach has accomplished superior performance over the SSOA technique.For instance, with 10 iterations, the IDHOA-T2F technique has attained a lower fitness function of 0.37 whereas the SSOA has obtained an increased fitness value of 0.40.In addition,with 100 iterations,the IDHOA-T2F method has reached a lesser fitness function of 0.12 whereas the SSOA has attained a maximum fitness value of 0.23.Similarly,with 350 iterations, the IDHOA-T2F algorithm has gained a lesser fitness function of 0.10 whereas the SSOA has obtained an improved fitness value of 0.19.Moreover,with 500 iterations,the IDHOAT2F methodology has attained a minimal fitness function of 0.10 whereas the SSOA has obtained an enhanced fitness value of 0.19.Furthermore,with 700 iterations,the IDHOA-T2F technique has obtained a lower fitness function of 0.10 whereas the SSOA has reached a superior fitness value of 0.19.At last,with 850 iterations,the IDHOA-T2F technique has obtained the least fitness function of 0.10 whereas the SSOA has gained an improved fitness value of 0.19.The experimental outcomes demonstrate the promising outcome of IDHOA-T2F technique over the recent techniques due to the inclusion of T2F and IDHOA.

    Table 4:Comparative analysis of IDHOA-T2F model under varying iterations

    Figure 6:Comparative analysis of IDHOA-T2F model with distinct iterations

    5 Conclusion

    In this study, a new IDHOA-T2F technique has been presented for load scheduling in IoT cloud environment.The IDHOA-T2F technique involves a T2F system with distinct input variables for scheduling load in the IoT cloud environment.Besides, the IDHOA technique is applied to appropriately select the MFs of the T2F system.The proposed model finds useful to improve the efficiency of IoT models.For validating the enhanced load scheduling efficiency of the IDHOA-T2F technique,a series of simulations take place to highlight the improved performance.The experimental outcomes demonstrate the promising outcome of IDHOA-T2F technique over the recent techniques.In future,the outcome of the IDHOA-T2F technique is extended to the design of context aware route planning in the IoT cloud platform.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number (RGP 2/209/42).This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-Track Path of Research Funding Program.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    不卡视频在线观看欧美| 丰满的人妻完整版| 精品午夜福利在线看| 中国国产av一级| 搡老妇女老女人老熟妇| 精品一区二区三区视频在线| 天堂影院成人在线观看| 黄色一级大片看看| 97人妻精品一区二区三区麻豆| 我的女老师完整版在线观看| 亚洲欧美日韩卡通动漫| 99热全是精品| 免费一级毛片在线播放高清视频| 日本黄大片高清| 日韩中字成人| 国产精品日韩av在线免费观看| 亚州av有码| 在线a可以看的网站| 女的被弄到高潮叫床怎么办| 久久综合国产亚洲精品| 色哟哟哟哟哟哟| 直男gayav资源| 少妇人妻精品综合一区二区 | 免费av不卡在线播放| 成人永久免费在线观看视频| 日韩,欧美,国产一区二区三区 | 一本久久中文字幕| 国产精品嫩草影院av在线观看| 国产亚洲精品久久久com| 一级毛片我不卡| 成人无遮挡网站| 亚洲精品久久国产高清桃花| 久99久视频精品免费| av黄色大香蕉| 成年av动漫网址| 日韩在线高清观看一区二区三区| 国产av在哪里看| 女生性感内裤真人,穿戴方法视频| 美女黄网站色视频| 日韩av在线大香蕉| 色av中文字幕| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲精品日韩在线中文字幕 | 国产亚洲精品久久久com| av黄色大香蕉| 国产午夜福利久久久久久| 国产蜜桃级精品一区二区三区| 亚洲aⅴ乱码一区二区在线播放| 色视频www国产| 真人做人爱边吃奶动态| 欧美+亚洲+日韩+国产| 久久人人爽人人爽人人片va| 国产美女午夜福利| 亚洲精华国产精华液的使用体验 | 久久久久久国产a免费观看| 一本一本综合久久| 美女被艹到高潮喷水动态| 日本黄色视频三级网站网址| 久久久久久久久大av| 欧美成人a在线观看| 成熟少妇高潮喷水视频| 国产成人freesex在线 | 性插视频无遮挡在线免费观看| 在线观看午夜福利视频| 日本欧美国产在线视频| 成人性生交大片免费视频hd| 麻豆av噜噜一区二区三区| 麻豆av噜噜一区二区三区| 女人被狂操c到高潮| 精品99又大又爽又粗少妇毛片| 国产在视频线在精品| 亚洲精品乱码久久久v下载方式| 久久人妻av系列| 国产欧美日韩精品一区二区| 亚洲欧美成人精品一区二区| 日本熟妇午夜| 精品不卡国产一区二区三区| 22中文网久久字幕| av天堂在线播放| 久久久久久久久大av| 我要看日韩黄色一级片| 三级毛片av免费| 国产激情偷乱视频一区二区| 人人妻,人人澡人人爽秒播| 丰满乱子伦码专区| 一级av片app| 国产免费男女视频| 国内揄拍国产精品人妻在线| 国产精品久久视频播放| 国产色婷婷99| av在线观看视频网站免费| 99九九线精品视频在线观看视频| 精品久久久久久成人av| 成人特级黄色片久久久久久久| 久久中文看片网| 日韩高清综合在线| av专区在线播放| 久久久久久九九精品二区国产| 国产一区二区亚洲精品在线观看| 热99re8久久精品国产| 日日摸夜夜添夜夜添小说| 亚洲激情五月婷婷啪啪| 成人漫画全彩无遮挡| 色视频www国产| 内射极品少妇av片p| av国产免费在线观看| 一区二区三区四区激情视频 | 欧美+日韩+精品| 日韩欧美精品v在线| 国产黄色小视频在线观看| 国产v大片淫在线免费观看| 精品少妇黑人巨大在线播放 | 中文字幕av成人在线电影| 97在线视频观看| 久久久久性生活片| 亚洲无线观看免费| 菩萨蛮人人尽说江南好唐韦庄 | 国产蜜桃级精品一区二区三区| 性色avwww在线观看| 亚洲av成人精品一区久久| 不卡一级毛片| 少妇裸体淫交视频免费看高清| 免费看日本二区| 日韩,欧美,国产一区二区三区 | 波多野结衣高清无吗| 97人妻精品一区二区三区麻豆| 性欧美人与动物交配| 亚洲av电影不卡..在线观看| 欧美成人精品欧美一级黄| 成人亚洲精品av一区二区| 成年av动漫网址| 内地一区二区视频在线| 男女那种视频在线观看| 亚洲av中文字字幕乱码综合| 欧美人与善性xxx| 在线天堂最新版资源| 99国产极品粉嫩在线观看| 国产精品av视频在线免费观看| 久久久久久大精品| 18禁在线无遮挡免费观看视频 | 国产黄片美女视频| 国产高潮美女av| 久久婷婷人人爽人人干人人爱| 99九九线精品视频在线观看视频| 亚洲欧美日韩高清专用| 欧美另类亚洲清纯唯美| 精品一区二区三区人妻视频| 狂野欧美激情性xxxx在线观看| 十八禁国产超污无遮挡网站| 亚洲真实伦在线观看| 一级毛片久久久久久久久女| 国产大屁股一区二区在线视频| 国产一级毛片七仙女欲春2| 免费高清视频大片| 免费看日本二区| av天堂中文字幕网| a级毛片免费高清观看在线播放| 国产精品一二三区在线看| 久久久久国产网址| АⅤ资源中文在线天堂| 中文字幕免费在线视频6| 精品不卡国产一区二区三区| АⅤ资源中文在线天堂| 蜜桃久久精品国产亚洲av| av.在线天堂| 久久精品综合一区二区三区| 亚洲美女搞黄在线观看 | 非洲黑人性xxxx精品又粗又长| 国产伦在线观看视频一区| 一a级毛片在线观看| 亚洲精品国产av成人精品 | av视频在线观看入口| 国产久久久一区二区三区| 不卡一级毛片| 亚洲国产精品成人综合色| 乱码一卡2卡4卡精品| 一区二区三区高清视频在线| 亚洲精品粉嫩美女一区| 99久久无色码亚洲精品果冻| 欧美色欧美亚洲另类二区| 香蕉av资源在线| 久久久精品欧美日韩精品| 久久综合国产亚洲精品| 亚洲人成网站在线播放欧美日韩| 1000部很黄的大片| 少妇人妻一区二区三区视频| 精品乱码久久久久久99久播| 麻豆国产97在线/欧美| 在线观看美女被高潮喷水网站| 午夜精品在线福利| 精品久久久久久成人av| 日日摸夜夜添夜夜添av毛片| 身体一侧抽搐| 久久精品久久久久久噜噜老黄 | 免费av观看视频| 国产高潮美女av| 深夜精品福利| 六月丁香七月| 免费黄网站久久成人精品| 搞女人的毛片| av天堂在线播放| 免费看美女性在线毛片视频| 干丝袜人妻中文字幕| 日韩成人伦理影院| 99国产极品粉嫩在线观看| 69av精品久久久久久| 韩国av在线不卡| 欧美绝顶高潮抽搐喷水| av免费在线看不卡| 精品日产1卡2卡| 九九在线视频观看精品| 校园人妻丝袜中文字幕| 看片在线看免费视频| 婷婷色综合大香蕉| 午夜激情欧美在线| 三级经典国产精品| 舔av片在线| 乱码一卡2卡4卡精品| 日本五十路高清| 久久午夜福利片| 午夜免费男女啪啪视频观看 | 啦啦啦韩国在线观看视频| 亚洲欧美日韩无卡精品| 熟女人妻精品中文字幕| 在线天堂最新版资源| 偷拍熟女少妇极品色| 中文字幕人妻熟人妻熟丝袜美| 又粗又爽又猛毛片免费看| 99久久无色码亚洲精品果冻| 亚洲,欧美,日韩| 色吧在线观看| 亚洲欧美精品综合久久99| 我的老师免费观看完整版| 日本a在线网址| 亚洲三级黄色毛片| 国产蜜桃级精品一区二区三区| 中文字幕精品亚洲无线码一区| 国产精品一区二区三区四区免费观看 | 亚洲av一区综合| 亚洲在线观看片| 亚洲成人中文字幕在线播放| 午夜爱爱视频在线播放| 变态另类成人亚洲欧美熟女| 两个人视频免费观看高清| 国产伦精品一区二区三区四那| 亚洲精品日韩av片在线观看| 日韩强制内射视频| 插阴视频在线观看视频| 99热全是精品| av专区在线播放| 国产视频一区二区在线看| 亚洲乱码一区二区免费版| 亚洲精品国产成人久久av| 国产亚洲精品久久久com| 免费人成在线观看视频色| 日本免费一区二区三区高清不卡| 亚洲熟妇熟女久久| 男人和女人高潮做爰伦理| 国内精品久久久久精免费| 12—13女人毛片做爰片一| 久久久精品94久久精品| 国产麻豆成人av免费视频| 麻豆一二三区av精品| 国产男靠女视频免费网站| 一级毛片久久久久久久久女| 成熟少妇高潮喷水视频| 精品熟女少妇av免费看| 欧美一区二区国产精品久久精品| 麻豆av噜噜一区二区三区| 亚洲欧美精品自产自拍| 亚洲精品久久国产高清桃花| 99久久九九国产精品国产免费| 国产精品爽爽va在线观看网站| 日韩欧美国产在线观看| 久久精品久久久久久噜噜老黄 | 一本久久中文字幕| 亚洲专区国产一区二区| av视频在线观看入口| 99久久成人亚洲精品观看| 少妇的逼水好多| 在线观看66精品国产| 国产欧美日韩精品亚洲av| 久久精品国产亚洲av天美| 变态另类成人亚洲欧美熟女| 成人特级av手机在线观看| 国产 一区 欧美 日韩| 亚洲国产精品sss在线观看| 麻豆成人午夜福利视频| 精品一区二区三区视频在线观看免费| 99riav亚洲国产免费| 国产成人freesex在线 | 欧美绝顶高潮抽搐喷水| 18禁在线播放成人免费| 日韩在线高清观看一区二区三区| 国国产精品蜜臀av免费| 精品国内亚洲2022精品成人| 欧美精品国产亚洲| 精品久久久久久久久久免费视频| 免费av毛片视频| 如何舔出高潮| 亚洲美女黄片视频| 狂野欧美白嫩少妇大欣赏| 亚洲中文字幕日韩| 久久天躁狠狠躁夜夜2o2o| 久久精品国产亚洲av涩爱 | 午夜激情欧美在线| 亚洲中文字幕一区二区三区有码在线看| 欧美zozozo另类| 97超碰精品成人国产| 国产男人的电影天堂91| 国产成人a区在线观看| 男女下面进入的视频免费午夜| 麻豆乱淫一区二区| 久久久午夜欧美精品| 日本欧美国产在线视频| 国产极品精品免费视频能看的| 亚洲aⅴ乱码一区二区在线播放| 色5月婷婷丁香| 国产精品免费一区二区三区在线| 国产麻豆成人av免费视频| 久久精品国产亚洲av涩爱 | 亚洲人成网站在线播放欧美日韩| 亚洲18禁久久av| 国内精品宾馆在线| 淫妇啪啪啪对白视频| 在线天堂最新版资源| 色综合亚洲欧美另类图片| 男人的好看免费观看在线视频| 亚洲图色成人| 变态另类成人亚洲欧美熟女| 一进一出好大好爽视频| 成人无遮挡网站| 中文字幕久久专区| 日本免费一区二区三区高清不卡| 淫秽高清视频在线观看| 成年免费大片在线观看| 尾随美女入室| 深夜a级毛片| 日本一二三区视频观看| 欧美高清成人免费视频www| 国产一区二区在线观看日韩| 好男人在线观看高清免费视频| 色5月婷婷丁香| 一区福利在线观看| 亚洲五月天丁香| 亚洲在线观看片| 婷婷精品国产亚洲av在线| 免费观看人在逋| 久久久久久久久久久丰满| 在线观看av片永久免费下载| а√天堂www在线а√下载| 男女那种视频在线观看| 日产精品乱码卡一卡2卡三| 亚洲国产精品成人综合色| 精品久久久久久久久久免费视频| 日韩av不卡免费在线播放| 乱人视频在线观看| 久久人人爽人人片av| 中国美白少妇内射xxxbb| 久久精品夜夜夜夜夜久久蜜豆| 亚洲aⅴ乱码一区二区在线播放| 国产色爽女视频免费观看| 久久精品国产自在天天线| 久久韩国三级中文字幕| 亚洲欧美日韩高清在线视频| 黄色日韩在线| 久久精品国产亚洲av香蕉五月| 性色avwww在线观看| 亚洲成av人片在线播放无| 九九久久精品国产亚洲av麻豆| 国产精品一区www在线观看| 国产精品一区二区三区四区免费观看 | 丝袜美腿在线中文| 99久久精品一区二区三区| 国产一区二区在线观看日韩| 人妻少妇偷人精品九色| 少妇高潮的动态图| 亚洲国产欧美人成| 蜜桃久久精品国产亚洲av| 亚洲激情五月婷婷啪啪| 亚洲五月天丁香| 成人永久免费在线观看视频| 天堂√8在线中文| 九九爱精品视频在线观看| 日韩av不卡免费在线播放| 欧美色视频一区免费| 国产午夜福利久久久久久| 国产亚洲精品久久久com| 精品一区二区三区视频在线观看免费| 99久久精品国产国产毛片| 成年女人看的毛片在线观看| 在线免费十八禁| 91久久精品电影网| 国产精品美女特级片免费视频播放器| 99国产极品粉嫩在线观看| 国产视频内射| 亚洲欧美日韩无卡精品| 中文字幕免费在线视频6| 精品国产三级普通话版| 国产大屁股一区二区在线视频| 99久久中文字幕三级久久日本| 国产久久久一区二区三区| 亚洲成人精品中文字幕电影| 国产成人aa在线观看| 中文资源天堂在线| 黄片wwwwww| АⅤ资源中文在线天堂| 永久网站在线| 香蕉av资源在线| 99riav亚洲国产免费| 精品久久久久久久久久久久久| 国产老妇女一区| 久久久久久伊人网av| 成年版毛片免费区| 97人妻精品一区二区三区麻豆| 99久久无色码亚洲精品果冻| av黄色大香蕉| 亚洲成人久久性| 狂野欧美激情性xxxx在线观看| 成人二区视频| 内射极品少妇av片p| 欧美bdsm另类| 欧美日韩乱码在线| 91精品国产九色| 在线国产一区二区在线| 最好的美女福利视频网| 男女之事视频高清在线观看| 成人欧美大片| 深夜精品福利| 久久精品国产亚洲av天美| 日韩欧美精品v在线| 久久精品国产自在天天线| 狂野欧美白嫩少妇大欣赏| 国内精品美女久久久久久| 嫩草影院入口| 伊人久久精品亚洲午夜| 亚洲精品国产成人久久av| 黄色欧美视频在线观看| 亚洲av免费在线观看| 欧洲精品卡2卡3卡4卡5卡区| av在线亚洲专区| 舔av片在线| 久久鲁丝午夜福利片| 美女内射精品一级片tv| 成人特级黄色片久久久久久久| 麻豆成人午夜福利视频| 国产精品福利在线免费观看| 亚洲久久久久久中文字幕| 精品一区二区免费观看| 啦啦啦韩国在线观看视频| 我要看日韩黄色一级片| 白带黄色成豆腐渣| 国产精华一区二区三区| 大型黄色视频在线免费观看| 成人二区视频| av免费在线看不卡| 成人精品一区二区免费| 男女之事视频高清在线观看| 三级男女做爰猛烈吃奶摸视频| 一本一本综合久久| 自拍偷自拍亚洲精品老妇| 一卡2卡三卡四卡精品乱码亚洲| 菩萨蛮人人尽说江南好唐韦庄 | 乱人视频在线观看| 国语自产精品视频在线第100页| 日韩高清综合在线| 又粗又爽又猛毛片免费看| 亚洲精品456在线播放app| 精品国产三级普通话版| 亚洲三级黄色毛片| 观看美女的网站| 在线a可以看的网站| 成人av在线播放网站| av天堂在线播放| 精品99又大又爽又粗少妇毛片| 亚洲一级一片aⅴ在线观看| 天堂av国产一区二区熟女人妻| 观看美女的网站| 小说图片视频综合网站| 国产人妻一区二区三区在| 无遮挡黄片免费观看| 在线播放国产精品三级| 久久精品综合一区二区三区| 日韩精品中文字幕看吧| 亚洲欧美日韩高清专用| 亚洲欧美日韩无卡精品| 观看免费一级毛片| 最近视频中文字幕2019在线8| 日韩,欧美,国产一区二区三区 | 免费人成视频x8x8入口观看| 我的老师免费观看完整版| 啦啦啦啦在线视频资源| 高清日韩中文字幕在线| av在线老鸭窝| 我的女老师完整版在线观看| 国产成人福利小说| 国产精品一区www在线观看| 少妇熟女aⅴ在线视频| 国产一区二区激情短视频| 欧洲精品卡2卡3卡4卡5卡区| 国产真实伦视频高清在线观看| 一本一本综合久久| 成年版毛片免费区| 露出奶头的视频| 国产色婷婷99| 日韩三级伦理在线观看| 亚洲美女搞黄在线观看 | 日本三级黄在线观看| 国产av不卡久久| 亚洲无线观看免费| 一本久久中文字幕| 午夜影院日韩av| 国产大屁股一区二区在线视频| 亚洲无线在线观看| 欧美最新免费一区二区三区| 久99久视频精品免费| 国产一区二区在线观看日韩| 国产探花在线观看一区二区| 男女之事视频高清在线观看| 你懂的网址亚洲精品在线观看 | 成人午夜高清在线视频| 内射极品少妇av片p| 亚洲精品日韩av片在线观看| 精品乱码久久久久久99久播| 亚洲久久久久久中文字幕| 婷婷六月久久综合丁香| 亚洲天堂国产精品一区在线| 亚州av有码| 欧美潮喷喷水| 乱人视频在线观看| 少妇熟女aⅴ在线视频| 免费人成视频x8x8入口观看| 人人妻人人澡人人爽人人夜夜 | 少妇猛男粗大的猛烈进出视频 | 亚洲性久久影院| 偷拍熟女少妇极品色| 日韩,欧美,国产一区二区三区 | 亚洲乱码一区二区免费版| 秋霞在线观看毛片| 国产乱人视频| 久久人人爽人人片av| 日日啪夜夜撸| 麻豆精品久久久久久蜜桃| 国产午夜精品久久久久久一区二区三区 | 一本一本综合久久| 国产精品综合久久久久久久免费| 在线免费观看不下载黄p国产| 午夜福利在线在线| 性欧美人与动物交配| 看非洲黑人一级黄片| 免费黄网站久久成人精品| www.色视频.com| 亚洲在线自拍视频| 女生性感内裤真人,穿戴方法视频| 18+在线观看网站| 俄罗斯特黄特色一大片| 久久久久国产网址| 日韩高清综合在线| 色哟哟哟哟哟哟| 在线免费观看不下载黄p国产| 亚洲自拍偷在线| 欧洲精品卡2卡3卡4卡5卡区| 国产私拍福利视频在线观看| 青春草视频在线免费观看| 中文字幕熟女人妻在线| 精品少妇黑人巨大在线播放 | 国产av在哪里看| 国产欧美日韩一区二区精品| 性欧美人与动物交配| av在线观看视频网站免费| 简卡轻食公司| 成人av一区二区三区在线看| 春色校园在线视频观看| 伦精品一区二区三区| 亚洲综合色惰| 老师上课跳d突然被开到最大视频| 午夜a级毛片| 国产v大片淫在线免费观看| 国产 一区精品| 亚洲久久久久久中文字幕| 在线免费观看的www视频| 国产成人freesex在线 | 成人av一区二区三区在线看| 日本在线视频免费播放| 18禁在线播放成人免费| 1000部很黄的大片| 直男gayav资源| 久久综合国产亚洲精品| 99久久久亚洲精品蜜臀av| 日本在线视频免费播放| 免费看美女性在线毛片视频| 亚洲成人久久性| 久久久久久久久久久丰满| 一级毛片久久久久久久久女| 12—13女人毛片做爰片一| 亚洲第一电影网av| 午夜亚洲福利在线播放| 久久久久久九九精品二区国产| 级片在线观看| 亚洲七黄色美女视频| 亚洲精品亚洲一区二区| 又黄又爽又刺激的免费视频.| 久久6这里有精品| av天堂在线播放| 免费观看精品视频网站| videossex国产| 日本色播在线视频| 成人精品一区二区免费| 国产亚洲av嫩草精品影院| 一区福利在线观看| 亚洲无线观看免费| 成人性生交大片免费视频hd| 亚洲国产精品国产精品| 精品免费久久久久久久清纯| 97碰自拍视频|