• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Efficient Stacked-LSTM Based User Clustering for 5G NOMA Systems

    2022-11-11 10:50:02PrabhaKumaresanCheeKeongTanandYinHoeNg
    Computers Materials&Continua 2022年9期

    S.Prabha Kumaresan,Chee Keong Tanand Yin Hoe Ng

    1Faculty of Engineering,Multimedia University,Cyberjaya,63100,Malaysia

    2School of Information Technology,Monash University,Subang Jaya,47500,Malaysia

    Abstract: Non-orthogonal multiple access(NOMA)has been a key enabling technology for the fifth generation (5G)cellular networks.Based on the NOMA principle,a traditional neural network has been implemented for user clustering(UC)to maximize the NOMA system’s throughput performance by considering that each sample is independent of the prior and the subsequent ones.Consequently,the prediction of UC for the future ones is based on the current clustering information, which is never used again due to the lack of memory of the network.Therefore, to relate the input features of NOMA users and capture the dependency in the clustering information, time-series methods can assist us in gaining a helpful insight into the future.Despite its mathematical complexity,the essence of time series comes down to examining past behavior and extending that information into the future.Hence, in this paper, we propose a novel and effective stacked long short term memory(S-LSTM)to predict the UC formation of NOMA users to enhance the throughput performance of the 5G-based NOMA systems.In the proposed strategy, the S-LSTM is modelled to handle the time-series input data to improve the predicting accuracy of UC of the NOMA users by implementing multiple LSTM layers with hidden cells.The implemented LSTM layers have feedback connections that help to capture the dependency in the clustering information as it propagates between the layers.Specifically,we develop,train,validate and test the proposed model to predict the UC formation for the futures ones by capturing the dependency in the clustering information based on the time-series data.Simulation results demonstrate that the proposed scheme effectively predicts UC and thereby attaining near-optimal throughput performance of 98.94%compared to the exhaustive search method.

    Keywords: Non-orthogonal multiple access (NOMA); deep neural network(DNN);long short term memory(LSTM);temporal channel;user clustering

    1 Introduction

    Imminent 5G and beyond 5G networks are anticipated to provide high spectral-energy efficiency,deliver super-fast data transmission, ensure ultra-reliability, support massive connectivity and guarantee the lowest possible latency compared to its predecessors [1].Unfortunately, the conventional orthogonal multiple access (OMA)[2,3] schemes adopted in 4G networks will not be employed in the future cellular networks due to its orthogonality limitation prohibiting bandwidth expansion from accommodating the spectral demand for future applications.Recently, the emergence of nonorthogonal multiple access (NOMA)[4] introduced a technological paradigm shift in accessing networks,which has successfully lifted the bandwidth limit boundary above the OMA spectral limit[5,6].The main feature of NOMA is to remove orthogonality requirements between the allocated resource blocks to different users who are allowed to simultaneously send data over the same frequency,time,or code.

    Generally, NOMA is classified into two types, i.e., power-domain NOMA (PD-NOMA)and code-domain NOMA (CD-NOMA).PD-NOMA is the most widely studied NOMA scheme for 5G networks and beyond.The working principle of the PD-NOMA is to allow the non-orthogonal transmission of multiple users’signals using superposition coding(SC)at the transmitting end,and the superposed signal is then passed through the successive interference cancellation(SIC)receiver at the receiving end to eliminate interference and implement quadrature demodulation.For a multi-carrier PD-NOMA,the subchannel transmission still adopts the orthogonal frequency division multiplexing(OFDM), where the subchannels are partitioned so that they are orthogonal to each other and do not interfere.Unlike orthogonal frequency division multiple access(OFDMA),the subchannel is no longer exclusively assigned to one user only,but it is shared by various users to increase the spectrum utilization.The users who share the same set of subchannels can transmit their signal using power multiplexing technology such as the SC technique.Hence,the signal power of each user arriving at the receiver is unique and distinguishable.Non-orthogonal transmission between different users on the same subchannel will generate co-channel interference between users,which can be solved using SIC technology at the receiver.The SIC implementation enforces a strict power allocation requirement that associates users of good channel conditions with low-power assignment policy while users of poor channel conditions with high-power allocation policy.These policies allow the SIC to effectively eliminate interference and decode the signals for each user[7].Nevertheless,this new multiple access approach of permitting multiple users to share a set of subchannels raises another research issue on how to cluster users on different sets of subchannels so that the users can benefit spectrally from the sharing of subchannels while satisfying the power allocation policies enforced by the SIC.

    1.1 Recent Works

    Over the last few years, user pairing and user clustering (UC)for NOMA networks have been vigorously studied from different perspectives due to the emergence of SIC technology.In [8], two different user pairing schemes were investigated to evaluate the outage probability and average achievable bit rate of a dense NOMA network.In this study, the first scheme was developed based on a random pairing basis, in which two users are randomly chosen to form a NOMA cluster.On the other hand,the second scheme enhances the system performance by selectively pairing the users whose normalized channel gains are above and below certain pre-determined threshold levels,which leads to lower outage probability.Since the user pairing is highly dependable on the locations of users, the impact of near-far user pairing on the performance of cell center, mid, edge users were meticulously explored in[9].In this work,the authors proposed a novel pairing scheme that groups the near-far users,leaving the cell mid users ungrouped to solve the SIC imperfection issue due to the small channel diversity among the NOMA users.Subsequently,the authors in[10]developed a user pairing and access algorithm to enhance NOMA spectral efficiency and system capacity while ensuring fairness among NOMA users.The proposed mechanism first sorts the users based on channel states and pairs them with the most distinctive channel conditions.In[11],the UC was developed to group user equipment into several clusters equal to or more than the base station (BS)transmit antennas.After that,a linear beamforming approach was incorporated to mitigate inter-cluster interference.The inter-cluster and intra-cluster power allocation was then applied to maximize the overall cell capacity of the NOMA system.Furthermore,a simple heuristic user pairing algorithm[12]was designed for a two-user scenario to pair a cell center user with an edge user, aiming to improve the edge user’s achievable rate.

    In general,the UC for a NOMA network is always intertwined with power allocation.The impact of user pairing on the performance of fixed power allocation for a NOMA system and a cognitive radio assisted NOMA was examined in [13] to demonstrate that the NOMA system could offer a larger sum-rate than that of the OMA schemes.In this work,it is suggested that the users who do not experience a significant difference in channel gains are opportunistically paired under the condition that the interference generated by one of the users does not adversely impact the quality of service(QoS)requirement of another user.With this mechanism,the cognitive radio assisted NOMA system prefers to pair the first strongest users with the second strongest users.In contrast,the NOMA system with fixed power allocation favors the pairing of the strongest user with the weakest user.In [14],the user pairing for a cooperative NOMA transmission system with power allocation was explored.This work reveals that the two users experiencing significantly different channel diversity should be grouped based on the ascending order of the users’channel gains.In another novel study, two-user pairing schemes, i.e., centralized UC and distributed UC was proposed in [15] in which the NOMA users are sorted based on the large-scale fading (LSF)gain.The centralized UC selects the primary user with the highest LSF and pairs it with the complementary chosen users based on signal difference alignment.On the other hand,the proposed distributed UC pairs the primary user with the highest LSF with the user-selected based on the zero-forcing vector achieved by the primary user.

    From the state-of-the-art,it is observed that the user pairing and clustering for NOMA systems are pretty inflexible.Recently, a dynamic user clustering (DUC)scheme was proposed in [16] by selecting a feasible number of clusters and grouping the NOMA users into these clusters.As a result,the size of the cluster is dynamically adjusted based on the performance requirements.Nevertheless,the maximum limit imposed on the number of users grouped in a cluster has forced some users to be unfavorably paired together,yielding lower throughput performance.This rigid limit has been lifted in [17], which proposes a UC based on the Brute-force search (B-FS)method where the users are clustered dynamically without any limit merely subject to the SIC constraints.The approach used in[17]has manifested that the NOMA system can achieve a higher performance limit than the OMA.However, the method developed in [17] can only serve for upper-bound performance limits because implementing the B-FS-based clustering method incurs prohibitive computational cost and is not scalable efficiently with the network size.Subsequently,the authors in[18]proposed a particle-swarm optimization (PSO)based UC scheme capable of reducing the complexity.Its main drawback is the early convergence of the particles causing the search space to get trapped in a local minimum.

    Machine learning and artificial intelligence (AI)have recently started to make inroads into 5G and beyond 5G networks.In[19],the authors have successfully designed an efficient network slicing scheme using a hybrid machine learning algorithm involving three phases,i.e.,data collection,optimal weight feature extraction,and slice classification.The experimental results indicated that the proposed hybridization greatly influences the provision of accurate network slicing.Besides,the review in[20]also highlights the need for explainable AI(XAI)towards the upcoming 6G networks in every aspect that can mitigate the risk of losing control over decision making including 6G technologies (e.g.,intelligent radio, zero-touch network management)and 6G use cases (e.g., industry 5.0)to make a future AI-based 6G system more transparent and trustworthy.

    Not surprisingly, machine learning has been widely applied to solve various resource allocation problems in NOMA networks.In terms of UC for the NOMA system, the availability of clustering datasets obtained from the B-FS method in[17]inspired the author in[21]to adopt an artificial neural network(ANN)as an efficient clustering tool to learn the grouping behaviors of the users based on their power levels and the diversity of the channel gains.Due to the single hidden-layer feature in ANN,the proposed ANN cannot efficiently capture the input-output relationship between the clustering behaviors with the channel heterogeneity and power differences among NOMA users.The work[22]enhanced the performance by extending it to the deep neural network (DNN)based UC scheme,which provides more room for hyperparameter optimization to improve the learning competency.The DNN-based UC method can learn effectively, attaining approximately 97% of the B-FS approach’s throughput performance.In[23],an extreme learning machine(ELM)was employed to the same UC problem to improve the training and testing speed together with the computational complexity of the DNN-based UC.The use of the ELM eliminates the backpropagation algorithm during the training process of the DNN approach,thereby producing a fast-learning UC method,which can also achieve near-optimal performance.

    1.2 Motivations and Contributions

    Taking into account the discussions mentioned above, it is apparent that all the state-of-the-art UC methods only solve the clustering problem for an instantaneous time without considering the historical clustering results and the variation of channel gains and power levels.Theoretically, the channel variations of wireless 5G networks can be modelled statistically and estimated accurately[24].The time-series data on the channel variations, power assignment and the clustering behaviors is an essential input to increase the optimality in UC.In this paper,the implementation of long short term memory (LSTM)is developed to characterize the dependency on the sequential processing of the clustering information,including the channel gains,powers and clustering outcomes.Unlike the traditional neural networks, LSTM consists of multiple feedback connections to capture the timeseries data indicating the dependency on the clustering information.

    Recently,LSTM has been widely applied for natural language processing(NLP)in[25,26]due to its superiority of signal processing and the capability of resolving the vanishing gradient and long term dependency present in recurrent neural network(RNN).The application of LSTM in cellular networks is also not newfangled.In [27], the LSTM network was developed to autonomously determine the channel characteristics by training the network with simulated channel data.The results showed an improvement in terms of sum rates and bit error rates(BERs)when the LSTM is utilized and compared with the conventional NOMA.In[28],the authors estimate the channel and detect multiple users to avoid the propagation of errors in the sequential decoding process of the SIC detector in the receivers using LSTM, which is able to detect the changing characteristics of the channel.Meanwhile, a new channel estimation technique based on LSTM aimed to improve the outage probability, BER, and user sum rate of the conventional NOMA is presented in [29].LSTM has also been demonstrated in conjunction with an appropriate gradient-based learning algorithm to overcome error backflow problems in[30]to bridge time intervals above 1000 steps even in case of noisy,incompressible input sequences, without loss of short-time-lag capabilities.In [30], LSTM-based NOMA receivers are investigated over the Rayleigh fading channel conditions.It has been proved that the LSTM-based NOMA detector performance is much better than the conventional NOMA detectors.

    In this paper,the promising deep learning(DL)approach can be integrated into the traditional neural network and the implementation of proposed stacked LSTM(S-LSTM)to perform the learning mechanism that results in the automatic prediction of UC to enhance the throughput performance of the NOMA system.The proposed S-LSTM is also known as deep LSTM.Hence,the two terms will be used interchangeably throughout the paper.Compared to the conventional S-LSTM applied to solve different problems in other domains,we have adapted the S-LSTM to NOMA environments to tackle UC issue.In summary,the main contributions of this paper are summarized as follows:

    1.The UC problem in the NOMA system is investigated with the help of DL by implementing the deep neural network(DNN)with multiple layers to enhance the flexibility of the model.

    2.The S-LSTM architecture is then constructed and integrated into the DNN model to process the time-series data to capture the dependency in the clustering information.This model aims to avoid shrinking gradient values that usually vanish as the information propagates between multiple hidden layers during backward propagation(BP).The power allocation strategy for each user is then derived that can provide optimal throughput performance.

    3.The performance analysis of the proposed S-LSTM-UC NOMA system under various network parameters is provided.Specifically, the average throughput and mean squared error(MSE)has been examined.In addition, significant simulation findings and comparisons are shown to prove the effectiveness and strength of the proposed schemes.

    1.3 Organization of the Paper

    The remaining sections of this paper are laid out as follows.In Section 2, a NOMA-based 5G system model is developed with the temporal channel model.Besides,the SIC constraints are outlined in this section, while the UC and power allocation problems are also formulated.Subsequently, the working principle of S-LSTM-based UC is described in Section 3.The proposed new UC algorithms for training and testing phases are also outlined in this section.Simulation results with in-depth analytical discussions are shown in Section 4.Last but not least,the paper ends with some insightful concluding remarks and navigates the readers to some possible future research directions related to this work in Section 5.

    2 System Model and Problem Formulation

    2.1 System Model and Temporal Channel Model for NOMA-Based Networks

    Consider a downlink NOMA-based single-cell 5G system with a single BS located at the center of the cell, within which K number of users are randomly and uniformly distributed.In the NOMA system, the users can share a set of exclusive subcarriers in distinct clusters.The inter-cluster interference does not exist due to the assumption of perfect orthogonality among all subcarriers.The users are susceptible to interference caused by other users within the same cluster due to the sharing of subcarriers.Even though sharing among users increases subcarriers’frequency reuse, it does not guarantee a throughput improvement due to the interference.Therefore,clustering users to share the subcarriers becomes the determining factor in overall system throughput.Rationally,when the channel diversity among users is small,it is preferable to group more users in a cluster to increase the spectrum utilization.Still, increasing cluster size certainly causes higher interference, resulting in throughput degradation.Therefore,it is essential to find a good tradeoff between the two conflicting parameters,i.e.,cluster size and interference.

    In the NOMA system,the 5G spectrum is partitioned into J subcarriers,each with a bandwidth Bjwhich is less than the channel’s coherence bandwidth such that each subcarrier manifests flat fading.In addition,it is assumed that the adjacent subcarriers can perfectly preserve orthogonality so that intersymbol interference between the adjacent symbols can be eliminated.The 5G channel is assumed to exhibit frequency-selective Rayleigh fading in which a noticeable correlation between channel gains of adjacent subcarriers is perceived.The subcarrier correlation coefficient between subcarriersiandjfor userkcan be defined as

    whereis the complete elliptic integral of the second kind andcan be denoted as

    wheredenotes the root-mean-square(RMS)channel delay spread normalized by the number of subcarriers,which can be further expressed as

    where Aiandτirepresent the amplitude and time delay for ray l, respectively, in a M-ray Rayleigh fading model.

    In the conventional OMA system(also known as Orthogonal Frequency Division Multiple Access(OFDMA)),the users perceive different channel gains on different subcarriers and let the channel gain experienced by user k on subcarrier j be gj,k.Instead of simulating a snapshot or ensemble description of channel gains for all the subcarriers, we observe the channel variation experienced by the users in a temporal dimension for a period T which is slotted discretely in this context (T denotes the total number of time slots).Let’s assume the random channel gain variables based on the Gaussian distribution over a specific time t bewhereis the channel gain of user k on subcarrier j at a specific time t whileμandσdenote the mean and standard deviation of normal distributionN, respectively.In this context, we assume that the NOMA network is geographically static because the time scale of algorithm convergence is shorter than the channel coherence time,and the sampling period of the time slot is chosen such that the channel gains are fixed for a particular time slot.The probability density function,f(x)of the Gaussian distributed channel variation of temporal NOMA channel can be modelled as

    Precisely,μandσcan be represented as follows

    In a power-domain NOMA-based 5G system, users can share a set of exclusive subcarriers in which superposition coding (SC)is used to multiplex users on the same subcarriers.denotes clustercin which a set of users multiplexed on subcarrierjat time slottwhereis the power allocated for userkon subcarrierjat time slott.Usually,the users inmay also share other subcarriers to achieve the minimum bit rate, hence,is the collection of the subcarriers allocated toIn other words,the users who are clustered together are required to share the same set of subcarriers;even some subcarriers are not their best choice.This allocation has made the NOMA system’s UC an NP-hard problem that requires an exhaustive search to obtain the optimal solution[17].

    Let’s assume that the cardinality ofdenoted asrepresents the number of users in the clusterUct.To facilitate the implementation of SIC at the receivers ofUctwhen, the SIC conditions must be fulfilled so that NOMA users can distinguish the decodable signals from nondecodable signals.For simplicity,the signalreceived by userkon subcarrierjat time slottcan be shown as

    whereis the signal transmitted by the BS destined to userkon subcarrierjat time slottwhileis the additive white Gaussian noise(AWGN)power perceived by userkon subcarrierjat time slott.It is shown in Eq.(7)that the superimposed signal comprises multiple signals intended to multiple users,where the first term of Eq.(7)is the intended signal.In contrast,the second term of Eq.(7)is unwanted signals or interference.

    At a specific time slott,let’s assume a scenario where there are three users(usersx,y,z)sharing an exclusive set of subcarriers.The channel gains of the users are arranged in a descending orderThe transmission power allocated to each user on a particular subcarrier must satisfy the following SIC conditions so that the SIC can work at the users’receivers.

    wherepSICis the minimum power difference for a user to distinguish the intended signal from the unwanted signals.From the SIC conditions for userxdenoted in Eq.(8),the power allocation among usersx,y,andzis to ensure that userxcan eliminate the interference signals caused by usersyandz.The SIC condition for userydenoted in Eq.(9)is for useryto efficiently cancel the interference signal from userz.However,useryis unable to decode and cancel interference signals from userx,which is then treated as noise.This assumption works validly because userxis allocated lower downlink power compared to userysuch that,which results in negligible interference to usery.Similarly,userzwho possesses the lowest channel gain on subcarrierjcannot adopt the SIC mechanism to cancel any interference signals from all users who have higher channel gains,but the efficient NOMA power allocation such thatleads to insignificant interference on userz.Based on Eqs.(8)and(9),the SIC conditions for a set of subcarriers shared by a group of users with the number of the user indicated ascan be generalized as

    The SIC condition in Eq.(10)works for any number of users in1.In this context,we assume that all users’receivers adopt the same SIC threshold,pSIC.

    To better model the SIC implementation mathematically, the order of decoding for each userwhose signal is superimposed on subcarriercan be represented by a permutation functionFordenotes the index for decoded user m and user k’s order of decoding is then represented byHence,the user’s signalsare decoded first and removed from the superimposed signal before decoding the signal forFurthermore,useris still susceptible to the interference caused byif n>m.On the other hand,ifusers’signals are decoded successfully,thenwill be decoded last,and this user is not exposed to any intra-band interference.In general,the optimal order of decoding upholds the respective sorting can be shown as

    Based on the Shannon capacity formula,the achievable throughputof user k on subcarrier j at time slot t can be expressed as

    Based on Eq.(12),the sum throughput of the NOMA system at time slot t can be further expressed as

    where C is the total number of clusters formed in the NOMA clustering process.This work aims to cluster the NOMA users optimally and allocate the downlink power to maximize throughput denoted in Eq.(13)subject to various constraints and conditions,including the SIC conditions.

    2.2 User Clustering and Power Allocation Problem Formulation

    Fig.1 illustrates a NOMA-based system model where a BS concurrently servesKusers in downlink transmission.It is seen thatKusers are grouped intoCclusters, each sharing a set of subcarriers on which the superposed signals are transmitted by the BS to all clusters.The channel gains of each user on the allocated subcarriers are observed for the duration of time,which is discretely partitioned intoTslots.The variation of the channel gains over time has a direct impact on the cluster formation because the order of decoding may change after some time as some users may experience degrading channel conditions,whereas some users may achieve better channel gains.In such a case,the original cluster formation might not be optimal after some time because the throughput achieved by some clusters may degrade, and the SIC conditions might be violated, which should trigger a cluster re-formation.Once a new cluster formation is initiated, the power allocation should also be re-performed to maximize the throughput and satisfy the SIC conditions.In this paper,a UC scheme will be developed to maximize the sum throughput of the NOMA system by taking into account the time-varying communication channels.Once the optimal UC is obtained,the power allocation scheme proposed in[21]can be adopted to maximize throughput performance.

    Figure 1:Downlink NOMA time-series system model

    Let the UC indicator vector of a user k for C number of clusters bewhere(c) ∈{0,1}is a Boolean variable such that(c) = 1 if user k is grouped into cluster c on subcarrier j at time slot t, otherwise(c) = 0.For simplicity, the cluster set is represented byIt is noteworthy that the cluster formation problem in this work is dynamic clustering which does not fix the cluster size and the number of clusters in the NOMA system,unlike the existing works,which place stringent conditions on cluster formation.With the relaxation on the cluster formation,the value of C is not pre-determined,and the number of users per cluster may be different due to the channel diversity of the NOMA users.Naturally,C becomes larger if the channel diversity among the users is small because the users tend to form smaller clusters by not sharing their subcarriers owing to the incompliance to the SIC conditions denoted in Eq.(10).On the other hand,if the channel difference among the users is significantly great, C becomes smaller as the users can form larger clusters to share their subcarriers due to the relaxation of conditions in Eq.(10).In this context,The UC strategies for all users at time slot t can be represented by

    To fulfil the SIC conditions, power allocation of the users on the shared subcarriers must be prudently implemented.Letbe the power allocation strategy of user k on all the subcarriers, and the power allocation strategies for all users are represented by Pt=Zero power will be allocated for those subcarriers not assigned to user k.

    In this context,the sum throughput of the NOMA system is defined as the objective function,and the joint clustering and power allocation problem for throughput maximization in a downlink NOMA system can be formulated as

    subject to

    where constraint Eq.(16a)limits the allocation of power to all users to the total power budget available at the BS,constraint Eq.(16b)guarantees that every NOMA user can achieve the minimum throughput, constraint Eq.(16c)imposes the SIC conditions to all users’receivers.Constraint Eq.(16d)ensures that one NOMA user is only grouped to one cluster only.From [15], it can be noticed that the number of clusters is not fixed initially,but it is only known once the optimalis obtained.This is the key difference of the optimization of this work as compared to that of the existing results.

    This paper presents a novel machine learning approach to solve the UC problem formulated in Eq.(15)and Eqs.(16a)-(16d).In the throughput maximization in Eq.(15)considered in this work,it is assumed that the subcarriers are pre-allocated randomly to each user before they form clusters to share their subcarriers.In other words,each user will be allocated an exclusive set of subcarriers before the UC process.The subcarriers assigned to a user will not be exchanged with other users during the UC process.The users can only share their subcarriers with other users based on their cluster formation strategy.In short,subcarrier allocation is not the primary consideration in this work.

    Similarly, even though power allocation is one of the maximizing variables in [15], the power allocation problem is not the main focus of this work.In this optimization problem, since power allocation and user clustering are intertwined,the optimization is an NP-hard problem,which requires an exhaustive search method to find the optimal solution.To solve this problem within an allowable time,we have decoupled the problem into multiple sub-problems(i.e.,power allocation problem and user clustering problem), which can be solved in a series.Therefore, an equal power allocation is employed before the UC process,and once the optimal UC is obtained,the power allocation strategy proposed in[17]is adopted to maximize the throughput.

    3 Proposed Stacked-LSTM Based UC

    This section presents the proposed stacked LSTM based UC (S-LSTM-UC)technique for the NOMA downlink.We first describe the generation and the attributes of the dataset and then explain the holistic working principle of S-LSTM-UC in detail.

    3.1 Data Acquisition

    To train the proposed S-LSTM-UC, the B-FS based UC (B-FS-UC)[17] is utilized to generate a time series dataset that comprises the transmit powers, channel gains, and the optimal cluster formation by exhaustively examining the throughputs for all the possible combinations of cluster formations and selecting the best cluster formation that maximizes the throughput performance.In addition,considering the aspect of subcarrier allocation,each user will be randomly pre-allocated with a subset of subcarriers before UC.As described in Section 2.2,the time series dataset is collected by observing the channel gains of the users,and the corresponding transmit powers forTtime slots.As such,the dataset for aK-user NOMA system consists of a total ofKTchannel gain values,KTpower gain values, andKcluster information values.To improve the robustness of the proposed scheme against network dynamics and channel variations, we collect the dataset for NOMA systems with different numbers of users,which are randomly distributed and a different number of subcarriers with varying fading levels.

    3.2 Working Principle of Stacked LSTM Based UC

    Fig.2 depicts the structure of the proposed S-LSTM-UC.As illustrated, it is constructed by cascading an input layer withK×Lnodes,NLSTM layers,and a dense layer withKoutput nodes.In the figure,Xis a multivariate input window that contains the channel gains and users’initial transmit powers,whileZis a vector of size 1×Kthat corresponds to the UC information at timet.To enable the proposed S-LSTM-UC to effectively mine the deep temporal correlations between the multivariate time-series inputs(channel gains and users’initial transmit powers)and the UC information,NLSTM layers are employed and stacked.As shown in the figure,the output of the LSTM layer of S-LSTM-UC serves as an input to the subsequent layer.As compared to a single-layer LSTM,multi-layer LSTM is endowed with a superior ability to disentangle the underlying complex temporal dynamics of the time-series data and to progressively create a higher level of representation of the time series inputs.

    Figure 2:Architecture of stacked LSTM based UC

    In S-LSTM-UC, each LTSM layer consists of multiple LSTM cells, and the internal structure of the LSTM cell is shown in Fig.3.Generally, LSTM is a variant of recurrent neural network(RNN)designed to capture the long term dependencies present in time-series data.Unlike the vanilla RNNs, which are plagued by the issues of gradient disappearance and gradient explosion during backpropagation,LSTM regulates the flow of information and maintain the features extracted from the previous time steps through the dynamics of gating mechanism,short-term and long-term memory cells.

    Figure 3:Schematic diagram of LSTM cell

    As illustrated in Fig.3,each LSTM cell is comprised of 2 internal states(hidden state htand cell state ct)and three gates(input gate it,output gate ut,and forget gate ft).The role of the cell state is to keep track of the valuable information obtained from past inputs.On the other hand,the hidden state synthesizes the information obtained from the current input,the previous cell state,and the previous hidden state.

    The forget gate governs what information to be retained and what information to be removed from the previous cell state ct-1.Both information from the previous hidden state ht-1and the current input vector xtwill be processed by a logistic activation functionσ(·) which has an output value ftthat ranges from 0 to 1.Intuitively,ft=1 indicates that the entire information from the ct-1is retained while ft= 0 implies that the information from ct-1is irrelevant, and it should be removed entirely.Mathematically,the operation of the forget gate can be expressed as

    wherewxfis the weight matrix from the input layer to the forget gate,whfis the weight matrix from the hidden state to the forget gate,andbfrepresents bias term for the forget gate.

    The input gateitand the candidate hidden statedetermine the amount of information to be added to the cell state,and the information is generated based on the current input vectorxtand the previous hidden stateht-1as follows:

    where wxiis the weight matrix from the input layer to the input gate,whiis the weight matrix from the hidden state to the input layer,is the weight matrix from the input layer to the candidate hidden state,is the weight matrix from the hidden state to the candidate hidden state,bidenotes the bias term for the input gate, bQcsignifies the bias term for the candidate hidden state and represents the hyperbolic activation function that scales the output values from-1 to 1.Next,the cell state ctcan be updated as follows:

    where ?denotes element-wise operation.

    The output gate utselects the information that should be passed on to the next hidden state,and it can be written as

    Finally,to predict the best UC formation,a dense layer connects all the neurons in theN-th LSTM layer to each of the output nodes.It is noteworthy that the UC problem in this work is modelled using a regression-based S-LSTM-UC which outputs the cluster number for each user.The cluster number is a continuous value,which will be rounded up as an integer to indicate the cluster number of a particular formation.The efficiency and deficiency of the S-LSTM-UC can be assessed by using mean-squared error(MSE),which is defined as

    whereSandrepresents the total number of samples and the predicted cluster value for then-th user.

    The working principle of S-LSTM-UC during the training and testing phases are summarized in Algorithm 1 and Algorithm 2,respectively.

    Algorithm 1:S-LSTM-UC Training Algorithm Input: Multivariate input window representing the input features in t continuous time slots of K NOMA users Output:S-LSTM-UC model 1.Initialize the model gt-L j,1 ,...,gt-2j,1 ,gt-1j,1 ,gtj,1 pt-L j,1 ,...,pt-2j,1 ,pt-1j,1 pt j,1 gt-L j,2 ,...,gt-2j,2 ,gt-1j,2 ,gtj,2 2.Input:X =images/BZ_1868_601_1781_635_1827.pngimages/BZ_1868_601_1861_635_1907.pngimages/BZ_1868_601_1889_635_1935.pngimages/BZ_1868_601_1916_635_1962.pngimages/BZ_1868_601_1944_635_1990.pngimages/BZ_1868_601_1971_635_2017.pngimages/BZ_1868_601_1999_635_2045.pngimages/BZ_1868_601_2026_635_2072.pngimages/BZ_1868_601_2054_635_2100.pngimages/BZ_1868_601_2081_635_2127.pngimages/BZ_1868_601_2111_635_2157.pngpt-L j,2 ,...,pt-2j,2 ,pt-1j,2 pt...j,2 gt-L j,K ,...,gt-2j,K,gt-1j,K,gtj,Kimages/BZ_1868_1037_1781_1070_1827.pngimages/BZ_1868_1037_1861_1070_1907.pngimages/BZ_1868_1037_1889_1070_1935.pngimages/BZ_1868_1037_1916_1070_1962.pngimages/BZ_1868_1037_1944_1070_1990.pngimages/BZ_1868_1037_1971_1070_2017.pngimages/BZ_1868_1037_1999_1070_2045.pngimages/BZ_1868_1037_2026_1070_2072.pngimages/BZ_1868_1037_2054_1070_2100.pngimages/BZ_1868_1037_2081_1070_2127.pngimages/BZ_1868_1037_2111_1070_2157.pngpt-L j,K ,...,pt-2j,K,pt-1j,K pt j,K 3.for k=1,2,...,K do 4.for t=1,2,...,T do 5.for j =1,2,...,J do 6.Calculate ft,it and ct by utilizing(17),(18),and(19),respectively 7.Update cell state ct by using(20)8.Calculate ut and ht by applying(21)and(22),respectively 9.end for 10.end for 11.Output:Z =images/BZ_1868_653_2623_672_2669.pngZt1,Zt2,...,ZtKimages/BZ_1868_943_2623_961_2669.png

    Algorithm 2:S-LSTM-UC Testing Algorithm Input:S-LSTM-UC network with a fixed power allocation scheme Output:S-LSTM-UC model UC of NOMA users in t continuous time slots 1.Feed from testing data samples into the trained S-LSTM-UC network 2.Process the network model to predict Z =images/BZ_1869_1196_626_1214_672.pngZt1,Zt2,...,ZtKimages/BZ_1869_1485_626_1503_672.png3.Calculate MSE by using(23)

    4 Numerical Results and Discussions

    This section verifies the effectiveness of the proposed S-LSTM-UC via extensive MATLAB simulation.More specifically, we have done an extensive hyper-parameter tuning on the proposed S-LSTM-UC model to investigate the influence of hyper-parameters.The learning rate, activation functions,length of training data samples,network depth,number of hidden layer nodes,and number of epochs on the MSE and the average throughput performance of S-LSTM-UC in NOMA downlink systems for different numbers of users will be thoroughly analyzed.The performance of the proposed S-LSTM-UC will also be compared against the existing OMA, DUC, ANN-UC, and B-FS-UC schemes.Tabs.1 and 2 summarize the detailed configuration of the simulation parameters for the proposed S-LSTM-UC and the downlink NOMA system.Unless otherwise specified, the learning rate,batch size,and activation function are set as 0.001,50,and ReLu,respectively.The selection of the ranges for investigation outlined in Tab.1 is determined from the extensive simulation to avoid any local maxima issue.

    Table 1: Simulation parameters for S-LSTM-UC

    Table 2: Simulation parameters for the downlink NOMA system

    Table 2:Continued

    Fig.4 presents the throughput performance of S-LSTM-UC during the training phase as a function of the length of training data and the number of users at a learning rate of 0.001.Unsurprisingly,the throughput performance of S-LSTM-UC improves as the number of users and number of training samples increase.This phenomenon is attributed to the fact that the number of training samples below 33600 is inadequate to train the proposed model to effectively disentangle the complex correlation between the input features of NOMA users and the UC.For instance,in the 24-user NOMA downlink,the throughput performance of S-LSTM-UC with 28800 and 24000 training samples dropped by 3.26%and 7.95%,respectively,compared to the case 33600 training samples.

    Figure 4: Throughput performance of S-LSTM-UC for the different number of users and different lengths of training samples

    Having studied the influence of the length of the training samples and number of users, Fig.5 shows the throughput performance of S-LSTM-UC during the testing phase for different numbers of epochs.The learning rate is varied from 0.001 to 0.1.It is observed that the throughput of S-LSTM-UC increases when smaller step size is adopted.In addition,the throughput performance of the proposed schemes also improves as the number of epochs is increased from 10 to 40.However,when the number of epochs is increased to 50, the throughput performance of the model degrades.This observation is because the proposed model could be sufficiently trained to learn the cluster formation using 40 epochs.Further training of the model will lead to over-fitting and the noise present in the training samples will be captured, resulting in throughput degradation.As such, the optimum throughput performance for this deployment scenario could be obtained when the learning rate and the number of epochs are configured as 0.001 and 40,respectively.

    Figure 5: Throughput performance of S-LSTM-UC for different learning rates and the different number of epochs

    Fig.6 provides an insight into the effects of the depth of S-LSTM-UC.At a learning rate of 0.001,we investigate the number of epochs on the MSE and the average throughput performance during the testing phase.As the number of epochs increases, the MSE decreases while the average throughput increases linearly.It is also noteworthy that the MSE and throughput performance tend to improve when the depth of S-LSTM-UC increases, i.e., more hidden layers are utilized.For instance, in the case of 40 epochs,the best MSE and throughput performance are attained when four hidden layers are used.Compared to the case of 4 hidden layers,the average throughput performance of S-LSTMUC with 2 and 3 hidden layers drops by 9.32%and 6.02%,respectively.However,when the number of hidden layers increases to 5 and 6,the throughput and MSE performance degrade.This phenomenon can be explained as follows.When the number of users and subcarriers are large,NOMA clustering and power allocation will incur higher complexity, and the dimensions of the non-convexity of the UC dataset will increase.Consequently,S-LSTM-UC schemes with 2 and 3 hidden layers fail to fully extract the deep temporal correlations between the multivariate time-series input features and the UC information.On the other hand, S-LSTM-UC with a four-layer configuration can fully exploit the inherent temporal dependency of the time series sequence and generalize well.Nonetheless, further increasing the network depth to 5 and beyond has no favorable effect on the MSE and throughput performance as the model will be over-fitted to the training data.

    Figure 6: MSE and average throughput performance of S-LSTM-UC for the different number of epochs and different numbers of hidden layers

    In Fig.7, the average throughput performance of the proposed S-LSTM-UC during the testing phase for different network depths and the different number of hidden layers and hidden nodes is investigated.Judicious selection of the number of hidden layer nodes is essential as the insufficient number of hidden nodes would result in the under-fitted model.The UC scheme would fail to capture the underlying complex structure of the time-series datasets fully.In contrast,excessive hidden nodes may result in overfitting.Since UC in NOMA system is a highly complex problem, the number of hidden layer nodes should be carefully determined to achieve optimum performance.Hence,investigations are carried out by considering 2 to 6 hidden layers and 32 to 56 hidden nodes.The simulations show that the highest average throughput could be attained when 40 hidden nodes are chosen for all the number of hidden layers considered.

    Since activation function is one of the essential hyper-parameters in S-LSTM-UC,the effects of 4 well-known activation functions, i.e., ReLu, Sigmoid, Sine and Tanh, on the average throughput performance during the testing phase are investigated in Fig.8.As illustrated in the figure,the ReLU activation function is the best performer, and the average throughput performance gain of ReLU over other activation functions is increasingly more prominent as the number of users increases.Quantitatively,in the case of 24 users,it can be seen that the ReLu activation function substantially outperforms the Sigmoid, Sine and Tanh counterparts in terms of average throughput by 21.01%,30.13%and 33.80%,respectively.This observation is because the Sigmoid,Sine,and Tanh functions fail to model the cluster formation precisely because the functions could lead to negative outputs.However,the values of cluster information should always be positive.Conversely,the ReLu function could effectively overcome this issue by only outputting non-negative values.Hence,the ReLu function is recommended for the proposed S-LSTM-UC.

    Figure 7:Average throughput performance of S-LSTM-UC for the different number of hidden layers and the different number of hidden layer nodes

    Figure 8: Average throughput performance of S-LSTM-UC for different activation functions and different number of users

    In Fig.9, S-LSTM-UC is compared with ANN-UC to characterize their attainable MSE and throughput performance at continuous time intervals for 24 users during the testing phase.The figure shows that the throughput of S-LSTM-UC continues to increase at continuous time intervals t as the optimality in learning the UC has been improved due to the sequential processing of clustering information.On the other hand,MSE reduces for continuous-time intervals.However,for ANN-UC,the throughput does not significantly improve compared to S-LSTM-UC,as it considers instantaneous time without considering the historical clustering results and the variation of channel gains and power levels.

    Figure 9:MSE and throughput performance of S-LSTM-UC and ANN-UC at different time intervals

    To assess the effectiveness of the proposed S-LSTM-UC scheme, four benchmarked techniques have been identified,i.e.,BF-S-UC,ANN-UC,DUC,and OMA.Fig.10 depicts the comparison of average throughput performance for various techniques considered for the different number of users during the testing phase.The proposed S-LTSM-UC is configured using the best hyper-parameters recommended in the initial analysis in this simulation.The figure shows that the techniques under consideration demonstrate the following increasing order of average throughput performance:B-FSUC,S-LSTM-UC,ANN-UC,DUC,OMA.As anticipated,the proposed S-LSTM-UC significantly outperforms the OMA,and its average throughput is about five times that of the OMA.Furthermore,it is also noteworthy that S-LSTM-UC can achieve near-optimal average throughput performance,which is approximately 98.94%of B-FS-UC for the different number of users considered.Compared to DUC, S-LSTM-UC can obtain more than 50% of throughput.This performance advantage is attributed to its capability to exploit the users’channel diversity and heterogeneity fully.Thus, as the number of users in the NOMA system grows, the performance gap between S-LSTM-UC and DUC increases.Owing to the capability of S-LSTM-UC in capturing the deep and complex temporal dynamics of the time-series data via long-term memory cells and its deep architecture,it can improve the throughput performance of ANN-UC by 7%-30%.

    Figure 10:Comparison of throughput performance on the number of users for various UC schemes in NOMA and OMA system

    5 Conclusion and Future Work

    This work proposes a novel S-LSTM-UC to tackle the UC problem in NOMA 5G systems by capitalizing on the underlying deep temporal dynamics of the time-series inputs captured via longterm memory cells and its deep architecture.The S-LSTM-UC can better characterize the non-linear transformation of diversity in channel gains and powers into cluster formation by including more LSTM layers in the model.Following the cluster formation,a power allocation method is implemented to ensure all users in each cluster achieve the minimum throughput requirement while adhering to the SIC constraint.To optimize the hyper-parameters of the S-LSTM-UC, extensive simulations have been conducted.It is found that the proposed S-LSTM-UC achieves the best performance for all the scenarios considered when it is equipped with four hidden layers and 40 nodes.With these optimal settings,the proposed S-LSTM-UC scheme could significantly outperform the existing schemes and achieve a near-optimal throughput performance, around 98.94% of the throughput attained by the B-FS-UC method.In addition, the robustness of the S-LSTM-UC has also been tested in diverse NOMA deployment scenarios.The results reveal that the proposed method could effectively adapt to different NOMA environments without the need for re-training.In general,S-LSTM-UC is efficient to forecast UC formation based on the time-series data collected over a period of time.To make it more efficient and robust,more stacking LSTM layers can be incorporated,but this will increase the complexity of the model,which will require a longer time to train and test.Furthermore,S-LSTM-UC is sensitive to different random weight initializations.As future work,the proposed S-LSTM can be developed deeper to accurately learn more complex time-series data to make a more precise prediction.To cope with the complexity due to deeper S-LSTM model, some model compression techniques such as pruning can be implemented.Besides,more analysis can be done to maximize the throughput performance and minimize bit error rate and computational complexity.

    Funding Statement:This work was funded by Multimedia University under Grant Number MMUI/170084.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产有黄有色有爽视频| 热99国产精品久久久久久7| 久久精品国产99精品国产亚洲性色 | 久热这里只有精品99| 777久久人妻少妇嫩草av网站| 欧美国产精品一级二级三级| 久久人妻熟女aⅴ| 久久国产精品男人的天堂亚洲| 欧美日韩精品网址| 成人18禁高潮啪啪吃奶动态图| 久久精品91无色码中文字幕| 精品亚洲成国产av| 亚洲国产欧美网| 久久久国产一区二区| 又大又爽又粗| 欧美黄色片欧美黄色片| 建设人人有责人人尽责人人享有的| 国产精品电影一区二区三区 | av有码第一页| 国产日韩欧美亚洲二区| 美女国产高潮福利片在线看| 久久久国产一区二区| 久久久久久久久久久久大奶| 亚洲成人免费av在线播放| 9191精品国产免费久久| 操美女的视频在线观看| 精品福利永久在线观看| 亚洲精品一二三| 午夜精品国产一区二区电影| 女人爽到高潮嗷嗷叫在线视频| 亚洲第一欧美日韩一区二区三区 | 在线观看免费日韩欧美大片| 精品乱码久久久久久99久播| 纯流量卡能插随身wifi吗| 天天躁日日躁夜夜躁夜夜| 亚洲免费av在线视频| 一边摸一边抽搐一进一小说 | 十八禁高潮呻吟视频| 丁香六月欧美| 日韩中文字幕视频在线看片| 国产精品偷伦视频观看了| 亚洲第一青青草原| 极品少妇高潮喷水抽搐| 国产精品98久久久久久宅男小说| 怎么达到女性高潮| 成人国产av品久久久| 国产国语露脸激情在线看| 久久人妻熟女aⅴ| 国产91精品成人一区二区三区 | 最新在线观看一区二区三区| a级毛片在线看网站| 亚洲专区中文字幕在线| 日韩欧美国产一区二区入口| 嫩草影视91久久| 免费一级毛片在线播放高清视频 | 建设人人有责人人尽责人人享有的| 免费在线观看日本一区| 色综合欧美亚洲国产小说| 99riav亚洲国产免费| 人人妻人人澡人人爽人人夜夜| 久久精品aⅴ一区二区三区四区| 18禁观看日本| 欧美性长视频在线观看| 两个人看的免费小视频| 国产成人欧美在线观看 | 黄频高清免费视频| 丝袜美腿诱惑在线| 国产欧美日韩一区二区三| 国产91精品成人一区二区三区 | 亚洲免费av在线视频| 久久久久国产一级毛片高清牌| 别揉我奶头~嗯~啊~动态视频| 在线播放国产精品三级| 一本色道久久久久久精品综合| 久久九九热精品免费| 黑丝袜美女国产一区| 国产主播在线观看一区二区| 国产精品影院久久| 999精品在线视频| 十八禁高潮呻吟视频| 男女午夜视频在线观看| 国产精品久久久久久精品电影小说| 国产精品一区二区免费欧美| 777米奇影视久久| 中文字幕人妻熟女乱码| 久久99一区二区三区| 国产在线免费精品| 久热这里只有精品99| 国产野战对白在线观看| 国产欧美日韩一区二区三区在线| 久久国产精品影院| 757午夜福利合集在线观看| 91精品国产国语对白视频| 一本—道久久a久久精品蜜桃钙片| 国产成人影院久久av| 免费高清在线观看日韩| 国产精品国产av在线观看| 99国产极品粉嫩在线观看| 亚洲精品中文字幕在线视频| 美女国产高潮福利片在线看| 91精品国产国语对白视频| 黄色a级毛片大全视频| 亚洲avbb在线观看| 国产精品亚洲av一区麻豆| 别揉我奶头~嗯~啊~动态视频| 久久久久久久久久久久大奶| 国产三级黄色录像| 国产在线一区二区三区精| 超碰97精品在线观看| 亚洲一区中文字幕在线| 精品久久久精品久久久| 脱女人内裤的视频| 国产精品 欧美亚洲| 成人国产av品久久久| 国产男女内射视频| 别揉我奶头~嗯~啊~动态视频| 亚洲av第一区精品v没综合| 日韩三级视频一区二区三区| 亚洲av美国av| 一区二区日韩欧美中文字幕| 丝袜喷水一区| 大型黄色视频在线免费观看| 蜜桃国产av成人99| 动漫黄色视频在线观看| 女性被躁到高潮视频| 久久精品国产综合久久久| 精品国内亚洲2022精品成人 | 19禁男女啪啪无遮挡网站| 少妇被粗大的猛进出69影院| 亚洲成人免费av在线播放| 美女视频免费永久观看网站| 欧美成人午夜精品| 成年版毛片免费区| 高清欧美精品videossex| 久久精品国产综合久久久| 亚洲成人手机| 男男h啪啪无遮挡| 黄色怎么调成土黄色| 国产高清国产精品国产三级| 久久久精品94久久精品| 一级片'在线观看视频| 老司机午夜十八禁免费视频| 亚洲人成电影免费在线| 久久午夜亚洲精品久久| 香蕉国产在线看| 久久亚洲真实| 91av网站免费观看| 99精国产麻豆久久婷婷| 露出奶头的视频| 久久久水蜜桃国产精品网| 久久久久精品人妻al黑| 精品乱码久久久久久99久播| 久久久欧美国产精品| 国产免费av片在线观看野外av| 成年动漫av网址| 91成人精品电影| 国产野战对白在线观看| 国产在线一区二区三区精| av天堂在线播放| 好男人电影高清在线观看| 欧美日韩黄片免| 热re99久久精品国产66热6| 国产精品亚洲一级av第二区| 在线观看免费视频日本深夜| 亚洲五月色婷婷综合| 亚洲五月色婷婷综合| 一边摸一边做爽爽视频免费| 在线观看免费视频日本深夜| 国产亚洲一区二区精品| 日韩中文字幕欧美一区二区| 黑人巨大精品欧美一区二区mp4| av免费在线观看网站| 岛国在线观看网站| 亚洲色图av天堂| 久久精品亚洲精品国产色婷小说| 国产精品 欧美亚洲| 熟女少妇亚洲综合色aaa.| 777米奇影视久久| 母亲3免费完整高清在线观看| 国产亚洲精品久久久久5区| 国产免费av片在线观看野外av| 国产免费av片在线观看野外av| 久久精品aⅴ一区二区三区四区| 人妻 亚洲 视频| 久久毛片免费看一区二区三区| 国产一卡二卡三卡精品| 久久天堂一区二区三区四区| 国产91精品成人一区二区三区 | 欧美日韩视频精品一区| 久久精品91无色码中文字幕| 1024视频免费在线观看| 一边摸一边抽搐一进一小说 | 中文字幕另类日韩欧美亚洲嫩草| 免费观看a级毛片全部| 少妇被粗大的猛进出69影院| 日韩 欧美 亚洲 中文字幕| 久久久久久免费高清国产稀缺| 中文亚洲av片在线观看爽 | 一级毛片精品| 日日夜夜操网爽| 少妇猛男粗大的猛烈进出视频| 亚洲色图综合在线观看| 窝窝影院91人妻| 亚洲中文日韩欧美视频| 亚洲国产欧美网| 一本久久精品| 国产精品熟女久久久久浪| 岛国在线观看网站| 97人妻天天添夜夜摸| 又紧又爽又黄一区二区| 亚洲成人免费电影在线观看| 在线观看www视频免费| 黄色 视频免费看| 日韩免费av在线播放| 日韩欧美国产一区二区入口| videos熟女内射| 在线观看一区二区三区激情| 国产xxxxx性猛交| 精品一品国产午夜福利视频| 一进一出好大好爽视频| 精品乱码久久久久久99久播| 99re6热这里在线精品视频| 国产在线视频一区二区| 成人亚洲精品一区在线观看| 叶爱在线成人免费视频播放| 最近最新中文字幕大全免费视频| 电影成人av| 国产精品偷伦视频观看了| 久9热在线精品视频| 亚洲国产av影院在线观看| 亚洲免费av在线视频| av网站在线播放免费| svipshipincom国产片| 久久人妻av系列| 黄色毛片三级朝国网站| 美国免费a级毛片| 美女国产高潮福利片在线看| 久久国产精品影院| 一区二区日韩欧美中文字幕| 老鸭窝网址在线观看| 久久久精品国产亚洲av高清涩受| 日日爽夜夜爽网站| 丝袜美足系列| 欧美 亚洲 国产 日韩一| 国产精品久久久久久精品电影小说| 在线观看免费视频日本深夜| 久久婷婷成人综合色麻豆| 午夜免费成人在线视频| 天天影视国产精品| 久久毛片免费看一区二区三区| 亚洲久久久国产精品| 黄色视频,在线免费观看| 久久久久久久精品吃奶| 黄片大片在线免费观看| 在线观看免费午夜福利视频| 99热网站在线观看| 亚洲国产中文字幕在线视频| 黄色a级毛片大全视频| 亚洲午夜理论影院| 99久久99久久久精品蜜桃| 美女国产高潮福利片在线看| 精品一区二区三区视频在线观看免费 | 王馨瑶露胸无遮挡在线观看| 欧美国产精品va在线观看不卡| 亚洲专区国产一区二区| 久久久久久久大尺度免费视频| 无遮挡黄片免费观看| 考比视频在线观看| 亚洲精品国产精品久久久不卡| 国产亚洲精品久久久久5区| 欧美亚洲 丝袜 人妻 在线| 国产精品美女特级片免费视频播放器 | 免费在线观看日本一区| 国产在视频线精品| 国产精品亚洲一级av第二区| 波多野结衣av一区二区av| 一个人免费在线观看的高清视频| 精品久久久久久电影网| 欧美日韩国产mv在线观看视频| 亚洲美女黄片视频| 亚洲欧美一区二区三区黑人| 法律面前人人平等表现在哪些方面| 亚洲专区国产一区二区| 国产高清激情床上av| 亚洲精品自拍成人| 国精品久久久久久国模美| 国产深夜福利视频在线观看| 久久久久精品人妻al黑| 欧美精品一区二区免费开放| 亚洲免费av在线视频| 亚洲色图综合在线观看| 老熟妇仑乱视频hdxx| 久久久欧美国产精品| 又大又爽又粗| 制服人妻中文乱码| 我要看黄色一级片免费的| 精品国产超薄肉色丝袜足j| 亚洲国产看品久久| 90打野战视频偷拍视频| 欧美亚洲 丝袜 人妻 在线| 久久精品国产99精品国产亚洲性色 | 一进一出好大好爽视频| 免费观看av网站的网址| 中文字幕人妻熟女乱码| 色尼玛亚洲综合影院| 一级a爱视频在线免费观看| 精品人妻熟女毛片av久久网站| 亚洲精品自拍成人| 国产亚洲欧美精品永久| 99国产精品99久久久久| 亚洲专区字幕在线| 午夜日韩欧美国产| 久久久精品区二区三区| 国产又色又爽无遮挡免费看| 黄色视频不卡| 这个男人来自地球电影免费观看| 日韩一卡2卡3卡4卡2021年| 亚洲国产中文字幕在线视频| 国产成人精品久久二区二区免费| 精品一区二区三区视频在线观看免费 | 天天躁狠狠躁夜夜躁狠狠躁| 美女高潮到喷水免费观看| 欧美亚洲 丝袜 人妻 在线| 亚洲第一欧美日韩一区二区三区 | 999久久久精品免费观看国产| 精品视频人人做人人爽| 日韩欧美一区视频在线观看| 精品国产一区二区三区久久久樱花| 纵有疾风起免费观看全集完整版| 三级毛片av免费| 久久99热这里只频精品6学生| 国产精品亚洲一级av第二区| 亚洲国产看品久久| 91av网站免费观看| 国产精品成人在线| 法律面前人人平等表现在哪些方面| 香蕉久久夜色| 一二三四在线观看免费中文在| 黑人巨大精品欧美一区二区mp4| 国产高清视频在线播放一区| 欧美性长视频在线观看| 我要看黄色一级片免费的| 国产精品亚洲一级av第二区| 亚洲成人免费av在线播放| 亚洲欧美一区二区三区黑人| 我的亚洲天堂| 日韩成人在线观看一区二区三区| 国产熟女午夜一区二区三区| 一本综合久久免费| 人妻 亚洲 视频| 老司机午夜十八禁免费视频| 欧美日韩av久久| 久久中文看片网| 亚洲av欧美aⅴ国产| 国产单亲对白刺激| 亚洲午夜理论影院| 人人妻,人人澡人人爽秒播| 91成年电影在线观看| 国产黄频视频在线观看| 欧美国产精品一级二级三级| 岛国在线观看网站| tube8黄色片| 亚洲av日韩在线播放| 老司机午夜福利在线观看视频 | 亚洲精品中文字幕在线视频| 1024香蕉在线观看| 这个男人来自地球电影免费观看| 伦理电影免费视频| 侵犯人妻中文字幕一二三四区| 亚洲第一青青草原| 2018国产大陆天天弄谢| 国产深夜福利视频在线观看| 一夜夜www| 久久热在线av| 两个人免费观看高清视频| 免费在线观看黄色视频的| 一二三四在线观看免费中文在| 一个人免费在线观看的高清视频| 亚洲avbb在线观看| 国产精品影院久久| 亚洲精品中文字幕一二三四区 | 蜜桃在线观看..| 国产一区二区在线观看av| 97人妻天天添夜夜摸| 亚洲久久久国产精品| 三级毛片av免费| 老司机在亚洲福利影院| 91麻豆精品激情在线观看国产 | 免费黄频网站在线观看国产| 亚洲一区二区三区欧美精品| 日日摸夜夜添夜夜添小说| 午夜福利视频在线观看免费| 91国产中文字幕| 欧美性长视频在线观看| 国产淫语在线视频| 露出奶头的视频| 成人三级做爰电影| 欧美日韩av久久| 人妻 亚洲 视频| 国产麻豆69| 两性午夜刺激爽爽歪歪视频在线观看 | 国产在线精品亚洲第一网站| 啦啦啦中文免费视频观看日本| 在线观看一区二区三区激情| 免费人妻精品一区二区三区视频| 美国免费a级毛片| 久久中文看片网| 亚洲精品乱久久久久久| 免费在线观看视频国产中文字幕亚洲| 亚洲中文av在线| 美女扒开内裤让男人捅视频| 国产在线一区二区三区精| 香蕉国产在线看| 亚洲精品一卡2卡三卡4卡5卡| 午夜福利免费观看在线| 亚洲欧洲精品一区二区精品久久久| 97在线人人人人妻| 如日韩欧美国产精品一区二区三区| 久久国产精品影院| 欧美在线一区亚洲| 久久精品亚洲熟妇少妇任你| 成人亚洲精品一区在线观看| 国产成人av激情在线播放| 久久狼人影院| 亚洲成a人片在线一区二区| 亚洲国产成人一精品久久久| 久久精品91无色码中文字幕| www日本在线高清视频| 最近最新中文字幕大全免费视频| 青青草视频在线视频观看| 日韩欧美一区视频在线观看| 一本—道久久a久久精品蜜桃钙片| 久久久久久人人人人人| 汤姆久久久久久久影院中文字幕| 老熟妇乱子伦视频在线观看| 国产有黄有色有爽视频| 两个人看的免费小视频| 男女无遮挡免费网站观看| 操出白浆在线播放| 久热爱精品视频在线9| videosex国产| 人人澡人人妻人| 亚洲精品久久成人aⅴ小说| 国产成人一区二区三区免费视频网站| 国产精品久久久久久精品电影小说| 免费高清在线观看日韩| 日日夜夜操网爽| 日韩欧美一区视频在线观看| 精品久久蜜臀av无| 黑人巨大精品欧美一区二区蜜桃| 国产黄色免费在线视频| 国产aⅴ精品一区二区三区波| 91成人精品电影| 无人区码免费观看不卡 | 大香蕉久久网| 丰满迷人的少妇在线观看| 国产不卡一卡二| 亚洲免费av在线视频| 亚洲专区中文字幕在线| 国产精品偷伦视频观看了| 欧美日韩av久久| 欧美精品一区二区大全| 久久国产精品影院| 99精品久久久久人妻精品| 新久久久久国产一级毛片| 777米奇影视久久| 欧美日韩亚洲高清精品| 99国产综合亚洲精品| 五月天丁香电影| 欧美亚洲 丝袜 人妻 在线| 欧美日韩亚洲高清精品| 少妇的丰满在线观看| 一区二区日韩欧美中文字幕| 人人澡人人妻人| 亚洲av日韩精品久久久久久密| 欧美人与性动交α欧美软件| 国产精品 国内视频| 婷婷成人精品国产| 最新在线观看一区二区三区| 一区二区日韩欧美中文字幕| 精品国产乱子伦一区二区三区| 露出奶头的视频| 岛国在线观看网站| 国产精品偷伦视频观看了| 狠狠精品人妻久久久久久综合| 黄色片一级片一级黄色片| videos熟女内射| √禁漫天堂资源中文www| 男女床上黄色一级片免费看| 黑人操中国人逼视频| 精品福利永久在线观看| 美女视频免费永久观看网站| 最新在线观看一区二区三区| 久久精品国产亚洲av香蕉五月 | 欧美日韩亚洲高清精品| 一本色道久久久久久精品综合| 国产免费av片在线观看野外av| 50天的宝宝边吃奶边哭怎么回事| 国产av精品麻豆| 777久久人妻少妇嫩草av网站| 后天国语完整版免费观看| 精品亚洲乱码少妇综合久久| 色综合欧美亚洲国产小说| 亚洲男人天堂网一区| 色综合婷婷激情| 啪啪无遮挡十八禁网站| 免费在线观看影片大全网站| 久久精品国产99精品国产亚洲性色 | 久久精品国产亚洲av高清一级| 在线观看66精品国产| 久久香蕉激情| 美女午夜性视频免费| 黄色a级毛片大全视频| 黄色视频,在线免费观看| 成年版毛片免费区| 久久九九热精品免费| 男女午夜视频在线观看| 久久ye,这里只有精品| 成人亚洲精品一区在线观看| 国产精品久久久久久精品电影小说| 后天国语完整版免费观看| 日韩成人在线观看一区二区三区| 欧美大码av| 黑丝袜美女国产一区| 亚洲精品一卡2卡三卡4卡5卡| 日韩有码中文字幕| h视频一区二区三区| 啦啦啦中文免费视频观看日本| 51午夜福利影视在线观看| 亚洲中文字幕日韩| 极品人妻少妇av视频| 考比视频在线观看| 精品高清国产在线一区| 国产精品 国内视频| 亚洲专区中文字幕在线| 搡老熟女国产l中国老女人| 国产成人精品无人区| 欧美亚洲日本最大视频资源| 狂野欧美激情性xxxx| 人人妻人人爽人人添夜夜欢视频| 一区二区三区乱码不卡18| 高清毛片免费观看视频网站 | 咕卡用的链子| 免费看十八禁软件| av天堂在线播放| 成人影院久久| 久久中文字幕一级| 久久久精品区二区三区| 狂野欧美激情性xxxx| 国产又色又爽无遮挡免费看| 91老司机精品| 肉色欧美久久久久久久蜜桃| 建设人人有责人人尽责人人享有的| 国产成人免费观看mmmm| 久久中文看片网| 亚洲专区字幕在线| 香蕉国产在线看| 啦啦啦免费观看视频1| 亚洲精品久久午夜乱码| 99国产精品一区二区蜜桃av | 国产在线视频一区二区| www日本在线高清视频| 欧美人与性动交α欧美精品济南到| 国产成人系列免费观看| 精品少妇久久久久久888优播| 男女免费视频国产| 日韩免费av在线播放| 777米奇影视久久| 亚洲精品国产精品久久久不卡| 午夜激情av网站| 国产精品秋霞免费鲁丝片| kizo精华| 无限看片的www在线观看| 91国产中文字幕| 一个人免费看片子| av国产精品久久久久影院| 夜夜爽天天搞| 乱人伦中国视频| 国产日韩一区二区三区精品不卡| 国内毛片毛片毛片毛片毛片| 亚洲精品国产区一区二| 婷婷丁香在线五月| 国产精品九九99| 国产精品免费视频内射| 亚洲成a人片在线一区二区| 午夜福利,免费看| 国产精品熟女久久久久浪| 日韩有码中文字幕| av欧美777| 中文字幕高清在线视频| 一边摸一边抽搐一进一小说 | 天天添夜夜摸| 在线观看www视频免费| 精品午夜福利视频在线观看一区 | 国产高清videossex| 精品国产一区二区三区久久久樱花| 妹子高潮喷水视频| 一本色道久久久久久精品综合| 99在线人妻在线中文字幕 | 成人av一区二区三区在线看| 熟女少妇亚洲综合色aaa.| 亚洲精品美女久久av网站| 久久精品亚洲熟妇少妇任你| 一进一出抽搐动态| 亚洲精品一二三| 色婷婷久久久亚洲欧美| 久久久精品国产亚洲av高清涩受| 宅男免费午夜| 色老头精品视频在线观看| 国产成人一区二区三区免费视频网站| 一区二区日韩欧美中文字幕| 王馨瑶露胸无遮挡在线观看| 成人手机av| 一区二区日韩欧美中文字幕| 女人爽到高潮嗷嗷叫在线视频|