• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Novel Method for Identifying Recursive Systematic Convolutional Encoders Based on the Cuckoo Search Algorithm

    2022-12-09 09:49:52ShunanHanPengLiuGuangHuang
    China Communications 2022年12期

    Shunan Han,Peng Liu,Guang Huang

    Aviation University of Air Force,Changchun 130000,China

    Abstract: The existing methods for identifying recursive systematic convolutional encoders with high robustness require to test all the candidate generator matrixes in the search space exhaustively.With the increase of the codeword length and constraint length,the search space expands exponentially,and thus it limits the application of these methods in practice.To overcome the limitation,a novel identification method,which gets rid of exhaustive test,is proposed based on the cuckoo search algorithm by using soft-decision data.Firstly,by using soft-decision data,the probability that a parity check equation holds is derived.Thus,solving the parity check equations is converted to maximize the joint probability that parity check equations hold.Secondly,based on the standard cuckoo search algorithm,the established cost function is optimized.According to the final solution of the optimization problem,the generator matrix of recursive systematic convolutional code is estimated.Compared with the existing methods,our proposed method does not need to search for the generator matrix exhaustively and has high robustness.Additionally,it does not require the prior knowledge of the constraint length and is applicable in any modulation type.

    Keywords: RSC code;blind identification;softdecision;cuckoo search algorithm

    I.INTRODUCTION

    In the field of information interception,the analyses of communication protocols are the key procedures.For the analyses of protocols,identification of channel encoders is a necessary technology.As the sub-code of Turbo code[1],recursive systematic convolutional(RSC)code has been widely used in modern communication systems,such as wireless sensor networks[2]and power line communication systems [3].Therefore,the identification of RSC code has drawn much attention.Usually,influenced by intentional and unintentional interferences,the signal to noise ratio of the intercepted signal may be low,which leads to the high bit error rates after blind demodulation.Therefore,it is necessary to do research on identification methods with high robustness.For the identification of RSC code under high bit error rates,a method based on walsh-hadamard transform (WHT) is proposed in[4].With the prior knowledge of the constraint length of the encoder,the WHT-based method tests all the binary vectors having the same length as the parity check vector of the RSC code.The binary vector with the maximum statistic value is determined as the parity check vector and the generator matrix can be naturally derived from it.The computational complexity of the WHT-based method increases with the speed of 2 to the power of the length of the parity check vector.Consequently,the computation load is hardly tolerable in practice,especially when the constraint length is not known priori.The segmented WHT-based method is proposed in [5].The segmented WHT-based method occupies less computer storage room than the WHTbased method.However,its computation complexity is the same as the original one.An identification method based on the maximum likelihood estimation is proposed in [6].It also needs to test all the candidates in the vector space,thus the computational complexity is still very high.The above methods achieve the identification of RSC code by searching for the parity check vector exhaustively,and the data that they employ is a hard-decision bit stream.It is seen that by using soft-decision data,the estimation of the parity check vector of RSC code can be achieved in the way of maximizing the log-likelihood ratio of two hypotheses in [7].Subsequently,a more concise loglikelihood ratio is proposed in [8].A new statistic value defined as likelihood difference is constructed by using soft-decision data in[9].The three methods covert the identification of RSC code to a hypothesis testing problem,but it is still required to search for the parity check vector exhaustively.In[10],a finite set of possible RSC encoders is constructed.All the candidate encoders are tested according to the established different test statistic,and the candidate having the best statistic value is regarded as the identification result.These methods can only identify a RSC encoder in the finite set,and they require to test the candidates exhaustively.By using soft-decision data,the first method breaking the limitation of exhaustive search is proposed in[11],which is based on the expectationmaximization(EM)algorithm[12].However,it is not applicable in high bit error rates.An identification method based on the gradient search is proposed in[13].Compared with the method based on the EM algorithm,it has higher correct identification rates.Nevertheless,like other soft-decision data based methods,it still has the limitation of being applicable only in the cases of binary modulations.The convolutional neural network is used to distinguish Turbo code from block code and convolutional code in[14],but it does not discuss the identification of the generator matrix of a RSC encoder.In this paper,by using soft-decision data,a novel identification method is proposed based on the cuckoo search algorithm.The method does not need to search for the parity check vector of a RSC encoder exhaustively,and the prior knowledge of the constraint length is not required.In addition,it has higher robustness compared with the method in [13],and can be applied in the multiple modulation cases.

    The contents are organized as follows.In section II,the identification model is established according to the parity check relation of RSC code.In section III,by using soft-decision data,solving the identification model is converted to minimize the derived cost function based on the cuckoo search algorithm.The experimental results are shown in section IV.Conclusions are given in section V.

    II.MODEL FOR IDENTIFICATION OF A RECURSIVE SYSTEMATIC CONVOLUTIONAL ENCODER

    The Figure 1 shows the structure of a parallel concatenated Turbo encoder.

    Figure 1.Sturcture of a Turbo encoder.

    As shown in Figure 1,RSC code with the code rate 1/2 is the sub-code of a Turbo code.Consequently,the identification of RSC code with 1/2 code rate is a key step for the identification of a Turbo code.Additionally,for the identification of RSC code with the code rate 1/n,it can be converted to the identification of several RSC codes with the code rate 1/2.So the identification of RSC code with the code rate 1/2 is discussed.

    Figure 2.The flow chart of the optimizing procedure.

    The task of identifying a RSC encoder is to estimate its generator matrixG(D).The generator matrix of RSC code with the code rate 1/2 can be denoted as

    wheregi(D)=gi,0+gi,1D+···+gi,mDm,(i=1,2)is the generator polynomial.

    For RSC code with the code rate 1/2,there exists an unique parity check matrixH(D)which is orthogonal to the generator matrix,i.e.,

    Through combining(1)and(2),it can be obtained that

    Therefore,the estimation of the generator matrix can be achieved by estimating the parity check matrix.

    The relationship between the encoder input sequenceU(D) and the output sequenceC(D) can be expressed as

    From(2)and(4),it is derived that

    According to(5),the following parity check equation set can be established.

    The solution of the parity check equation set is the parity check vector of the encoder,and it consists of coefficients of the generator polynomials.Through solving the equation set,the generator matrix can be estimated directly.

    III.SOLVING PARITY CHECK EQUATIONS

    In this section,a novel scheme for solving parity check equations is presented.Firstly,according to the parity check equation set,shown in(6),a cost function is established.In the cost function,each unknown variable represents the probability that the corresponding coefficient of a generator polynomial equals 1.Thus,solving parity check equations is converted to minimize the cost function.Then,the standard cuckoo search(CS)algorithm is employed to optimize the cost function.Subsequently,the computational complexity of the scheme is analyzed.

    3.1 Cost Function of Parity Check Relations

    In practice,bit errors in the received sequence lead to invalid equation in the parity check equation set.Since the number of invalid equations is less than that of valid equations,solving the parity check equation set is to find the vector that makes the number of valid equations largest,which is equal to maximize the joint probability that the equations hold,i.e.,

    By using the soft-decision datar,which are the realistic output data of the correlator in demodulator,the estimation of the generator polynomials can be achieved through maximizing the posterior probabilities that the equations hold,i.e.,

    Since

    the above maximization problem can be converted the following minimization problem.

    Theorem 1.[15] Let b1,b2,···,bq are independent variables in GF(2).Then,

    Since all of the encoded bits and the coefficients of the generator polynomials are independent from each other,according to Theorem 1,the probabilityPcan be simplified further as

    where the variablesη1,η2,···,η2(m+1)denote the probabilitiesP(g2,m=1),P(g1,m=1),···,P(g1,0=1)respectively.

    Subsequently,the analytic expression of the posterior probabilityis derived.For any M-ary modulation,there exists a one-to-one mapping between transmitted symbols and binary bits.For instance,in quadrature phase shift keying (QPSK),a symbol corresponds to a combination of two bits.LetHp,(p=1,2,···,M)represent the different hypotheses of a transmitted symbol.Thus,the probabilitycan be expressed as

    Furthermore,it can be derived that

    If the prior probabilities of transmitted symbolsP(Hp),(p=1,2,···,M) are equal,then equation(14)can be simplified as

    According to the hypothesisHp,the likelihood functioncan be obtained directly.For example,in QPSK modulation,the soft-decision datar=[r1;r2]have the following four possible relations with the noise under different hypotheses of the transmitted symbol.

    wheren1,iandn2,irepresent the Gaussian white noise.

    Consequently,combining (12),(13) and(15),we can derive the analytic expression of the cost function,as shown in (17).

    Through minimizing the cost function,the estimation ofη1,η2,···,η2(m+1)are estimated.Then according to the following decision-rule,the coefficients of the generator polynomials are estimated.

    3.2 Optimization of the Cost Fuction

    The standard CS algorithm is used to minimize the cost function.The CS algorithm belong to a kind of meta-heuristic algorithms.According to different behaviors and phenomenon in reality,various kinds of meta-heuristic algorithms have been proposed,such as the genetic algorithm(GA),the particle swarm optimization (PSO) algorithm,the African vulture optimization algorithm(AVOA)[16]and the artificial gorilla troops optimization (GTO) algorithm [17].The CS algorithm combines the cuckoo breeding behavior and the L′evy flight [18].Compared with other metaheuristic algorithms,such as the GA and the PSO algorithm,it can find the global optima with higher success rates.Thanks to its superior performance,it has been widely used to solve many engineering problems.In[19],the CS algorithm is used to solve the inversion of magnetic flux leakage signals.A modified CS algorithm is employed to optimize the dispatch of economic power in [20].In [21],the CS algorithm is adopted to schedule the semiconductor testing facilities.The block length of an asymmetric turbo code is optimized by using the CS algorithm in [22].Additionally,the CS algorithm is also employed to solve some optimization problems in the fields of artificial networks[23]and energy systems[24].

    The vector|η1,η2,···,η2(m+1)|represents a location of a nest in the CS algorithm.The steps of minimizing the cost function by using the standard CS are as follows.

    Step 1:Initialize the nests.The generator polynomialsg1(D) andg2(D) have the same order,and therefore,we can assign the first two elements of the nests to be the constant 1.Since 0≤ηi ≤1,(3≤i ≤2(m+1)),other elements in the initial nests are drawn randomly from the standard uniform distribution on the interval[0,1].

    Step 2: The fitness of the initial nests is evaluated,and the current best nest is found.

    Step 3: New nests are generated via the L′evy flight.The best nest is retained.Based on the principle of the L′evy flight,new nests are generated according to the following equation.

    wherextrepresents the nest in thet-th iteration andxt+1represents the new nest.αis the step controlling parameter,and in the paper,we assume it equals the constant 0.1.Srepresents the step size vector.Each elementλiin the vectorSis drawn from a L′evy distribution and can be expressed as

    Step 4: The fitness of new nests is evaluated.If the fitness of the new nest is better than that of the corresponding old one,it replaces the old nest in the population.Through evaluation,the current best nest is found.

    Step 5: A fraction of nests with lower fitness is replaced by random new nests.The cuckoo’s egg can be discovered by the host with the probabilitypa,and in this paper,we assumepa=0.25.It means that 25 percent of nests with lower fitness will be replaced by random new nests in each iteration.

    Step 6: The steps from 3 to 5 are carried out iteratively,until the number of iterations reaches the largest value or the best fitness exceeds the pre-defined threshold.

    The final best nest is determined as the best solution,and then according to(18),we can estimate the generator polynomials of the RSC code from the solution.

    The flow chart of the optimizing procedure is shown in Figure 2.

    Figure 3.The value of the cost function along with iterations.

    3.3 Complexity Analysis

    The computation of the identification method concentrates on generating new nests through the L′evy flight and evaluating the fitness of new nests.An operation(addition or multiplication) between two variables is used in this analysis.Assuming that the number of nests in the population isMand the dimension of each nest isL,thus in each iteration,generating new nests requires 9MLoperations.Assuming that the number of parity check equations isN,evaluating the fitness of new nests requires 4NML(1+pa)operations.If the number of iterations isT,the computational complexity of our identification method isO(TNML(1+pa)).

    IV.EXPERIMENTAL RESULTS

    The first experiment shows the effectiveness of our method.In this experiment,the RSC code is a(2,1,4)code whose generator matrix is.The number of parity check equations is 100.The modulation type is QPSK and the the signal to noise ratio(SNR) is 10dB.In the CS algorithm,the number of nests is 25.The number of iterations in the CS algorithm is 100.We assume the constraint length of the RSC code is known priori or not respectively.In the two cases,the value of the cost function in each iteration is shown in Figure 3.

    Figure 4.Comparisons of the correct identification rates of two methods.

    From Figure 3,it can be seen that the value of the cost function decreases along with the increase of the number of iterations and converges to the minimal point after some iterations.The final best solutions in the two cases are [1101101011] and[11011010110000] respectively.In both of the cases,the generator matrix can be estimated correctly.The experimental results indicate that our method does not require the prior knowledge about the constraint length.When the constraint length is not known priori,the constraint length can be assumed to be a large value.In this case,the minimal point is the combination of the true solution and a zero vector,as shown in the experimental result.Since all of the coefficients of the terms whose order are larger than the constraint length equal zero,the generator still can be estimated correctly.This means our method is also applicable even without the prior knowledge of the constraint length.

    In the second experiment,the correct identification rates of our method and the method in [13] are compared under the same condition.Since the method in [13] is only applicable in the case of binary phase shift keying(BPSK),the modulation type is BPSK in this experiment.The SNR ranges from 0dB to 10dB and the difference between two adjacent SNR is 1dB.Other experimental conditions are the same as those in the first experiment.The simulation is carried out for one hundred times,and the correct identification rates of our method and the method in [13] are shown in Figure 4.

    As shown in Figure 4,the correct identification rates by our method is much higher than that by the method in [13] under the same condition,especially in the medium SNR.The experimental results illustrated that compared with the method in[13],our method is more robust.The cost function established is in the real domain,and according to the decision-rule,shown in(18),only if the solution falls into the certain region near the global minimum point,the generator polynomial can be estimated correctly.Additionally,the CS algorithm has a stronger capability in global optimization.These reasons lead to the high robustness of our method.

    In the third experiment,the correct identification rates by using the standard CS algorithm,the standard GA and the standard PSO algorithm are compared.The parameters of the GA algorithm are as follows.The number of individuals in the population is 50.The individuals are ranked via linear ranking method and the selective pressure equals 2.The rate of individuals to be selected for generating offspring is 0.8.The probability for mutation of each variable is 1.The rate of offspring to be inserted is 0.9 in each iteration.The number of iterations in the GA is 1000.As to the PSO algorithm,the number of individuals in the population is also 50.The inertance-weight of the speed is 0.9.The individual-learning factor equals 0.3 and the population-learning factor equals 0.9.The number of iterations in the PSO algorithm is also 1000.

    The modulation type is QPSK.The SNR ranges from 5.5dB to 10dB and the difference between two adjacent SNR is 0.5dB.To make a fair comparison,the number of nests and iterations in the CS algorithm is 50 and 1000 respectively.Other experimental conditions are the same as those in the first experiment.Under the different SNR,the simulation experiment is carried out for one hundred times and the correct identification rates for the RSC encoder by using these three optimization algorithms are shown in Figure 5.

    As indicated in Figure 5,the correct identification rates by using the CS algorithm is higher than that by using the GA or the PSO algorithm.Compared with the GA and the PSO algorithms,less parameters need to be set in the CS algorithm,and thus it can find the global optimum with a higher success rate.

    Figure 5.Comparisons of the correct identification rates by using different optimization algorithms.

    In the fourth experiment,the average and standard deviation of the cost function by using these three optimization algorithms are compared.The SNR is 10dB and other parameters are the same as the above.For a certain bit sequence of RSC code,we use the CS algorithm,the GA and the PSO algorithm to minimize the cost function respectively.Each optimization algorithm is run for two hundred times.The average and standard deviation of the cost function are presented in Table 1.

    Table 1.The average and standard derivation of the cost function.

    From Table 1,it can be seen that the average and standard deviation obtained by the CS algorithm are smaller than those by the GA and the PSO algorithm.The results also testify that the CS algorithm has a stronger capability in global optimization.

    The fifth experiment illustrates the influence of the number of coefficients 1 in the generator matrix to the correct identification rates.In the experiment,the generator matrixes to be identified arerespectively.The SNR ranges from 5dB to 10dB,and the difference between two adjacent SNR is 0.5dB.The modulation type is QPSK.The number of iterations in the CS algorithm is 1000.Other conditions are the same as those in the first experiment.The correct identification rates in the two cases are shown in Figure 6.

    From Figure 6,it can be seen that with the decrease of the number of coefficient 1 in the generator matrixes,the correct identification rate increases.The reason is that in the same SNR,the more the number of coefficient 1 is,the more invalid parity check equations there are.More invalid parity check equations would make the difference between the minimum value and the subminimum value of the cost function smaller.Consequently,the optimization algorithm converges to the local minimum more easily.

    Figure 6.Comparison of the correct identification ratios for two different generator matrixes.

    Figure 7.Comparisons of the correct identification rates in the cases of different number of equations.

    In the sixth experiment,the influence of the number of parity check equations to the correct identification rates is discussed.The identification of RSC code with the generator matrixis considered in the cases that the number of parity check equations is 100 and 500 respectively.Other conditions are the same as those in the fifth experiment.The correct identification rates in the two cases are displayed in Figure 7.

    As can be seen in Figure 7,the increase of the number of the parity check equations leads to the increase of the correct identification rate.As the increase of the number of parity check equations,there exist more valid equations in the equation set and therefore,the difference between the minimum value and the subminimum value of the cost function become larger.Consequently,the difficulty in searching for correct solutions decreases.In real application,as much available data as possible should be used to construct the cost function.

    V.CONCLUSIONS

    A novel method for identifying RSC encoders is proposed based on the cuckoo search algorithm.The method does not need to test all the possible binary vectors exhaustively for estimating the parity check vector,and has good robustness against bit errors.It also does not require the prior knowledge of the constraint length.Additionally,the method overcomes the limitation that the existing soft-decision data based identification methods are only applicable in BPSK modulation and can be applied in any modulation type.The limitation of our identification method is that the prior knowledge about the type of channel code and the start point of the received codewords is required.In our identification scheme,the cost function is established according to the parity check relation of RSC code.Therefore,our identification scheme can be extended further to solve other channel code identification problems with the requirements of solving parity check equations.As future work,we plan to modify the CS algorithm or hybridize it with other optimization algorithms to improve the capability in finding global optimum in higher dimensional search space.By using modified schemes,it is expected to achieve the identification of low density parity check(LDPC)code and Reed Solomon(RS)code with more robustness to noise.

    久99久视频精品免费| 久久久a久久爽久久v久久| 国产 一区 欧美 日韩| 欧美高清性xxxxhd video| 国产91av在线免费观看| 丝袜喷水一区| 久久久久久久久久成人| av天堂中文字幕网| 日本黄大片高清| 成年版毛片免费区| 欧美日韩一区二区视频在线观看视频在线 | 97热精品久久久久久| 久久久久久久午夜电影| 成人无遮挡网站| 久99久视频精品免费| 久久精品国产99精品国产亚洲性色| 男女那种视频在线观看| 人妻制服诱惑在线中文字幕| 插逼视频在线观看| 亚洲电影在线观看av| 22中文网久久字幕| 国产一区二区三区av在线 | 国产精品爽爽va在线观看网站| 99九九线精品视频在线观看视频| 有码 亚洲区| 男人舔女人下体高潮全视频| 色哟哟哟哟哟哟| 国内精品美女久久久久久| 亚洲电影在线观看av| 亚洲一区二区三区色噜噜| 永久网站在线| 不卡一级毛片| 大型黄色视频在线免费观看| 亚洲精品亚洲一区二区| 在线观看av片永久免费下载| 久久精品91蜜桃| 永久网站在线| 亚洲av中文av极速乱| av天堂在线播放| 亚洲欧美精品专区久久| 少妇人妻一区二区三区视频| 国产精品综合久久久久久久免费| 天天躁夜夜躁狠狠久久av| 12—13女人毛片做爰片一| 亚洲一区二区三区色噜噜| 不卡一级毛片| 波多野结衣高清无吗| 亚洲自拍偷在线| av免费观看日本| 色综合亚洲欧美另类图片| 久久这里只有精品中国| 国产成人91sexporn| 色吧在线观看| 亚洲18禁久久av| 九色成人免费人妻av| 嫩草影院精品99| 免费观看人在逋| 日日摸夜夜添夜夜爱| 亚洲五月天丁香| 日本一二三区视频观看| 麻豆国产av国片精品| 欧美xxxx性猛交bbbb| 国产视频内射| 如何舔出高潮| 国产久久久一区二区三区| 日韩欧美国产在线观看| 国产精品麻豆人妻色哟哟久久 | 深夜精品福利| 国产亚洲91精品色在线| 国产成人福利小说| 中国国产av一级| 日本免费a在线| 亚洲av熟女| 午夜老司机福利剧场| 国产亚洲av嫩草精品影院| 亚洲人与动物交配视频| 成人鲁丝片一二三区免费| 蜜桃久久精品国产亚洲av| 久久久a久久爽久久v久久| 天堂av国产一区二区熟女人妻| 日韩在线高清观看一区二区三区| 亚洲欧美成人精品一区二区| 亚洲精华国产精华液的使用体验 | 哪里可以看免费的av片| 国产精品三级大全| 综合色丁香网| 丝袜美腿在线中文| 日韩高清综合在线| 麻豆成人午夜福利视频| 国产黄色视频一区二区在线观看 | 99热全是精品| av免费观看日本| 一区二区三区高清视频在线| 国产成人精品久久久久久| 三级国产精品欧美在线观看| 不卡一级毛片| 2022亚洲国产成人精品| 亚洲精品日韩在线中文字幕 | 男人和女人高潮做爰伦理| 国产淫片久久久久久久久| 少妇熟女欧美另类| 成熟少妇高潮喷水视频| av黄色大香蕉| 可以在线观看毛片的网站| 久久精品国产亚洲av涩爱 | 成人无遮挡网站| 久久精品夜色国产| 国产精品久久电影中文字幕| 欧美一级a爱片免费观看看| 91狼人影院| 变态另类成人亚洲欧美熟女| 91久久精品电影网| 91av网一区二区| 亚洲精品色激情综合| 亚洲无线在线观看| 69av精品久久久久久| 精品一区二区三区视频在线| 国产v大片淫在线免费观看| 看片在线看免费视频| av在线亚洲专区| 日韩在线高清观看一区二区三区| 三级经典国产精品| ponron亚洲| 亚洲国产精品sss在线观看| 国产精品人妻久久久影院| 天美传媒精品一区二区| 国产精华一区二区三区| 韩国av在线不卡| 在线播放国产精品三级| 亚洲av中文字字幕乱码综合| 国产精品一区二区三区四区免费观看| 国产极品精品免费视频能看的| 又粗又爽又猛毛片免费看| 男女下面进入的视频免费午夜| 亚洲av男天堂| а√天堂www在线а√下载| 日本欧美国产在线视频| 国产视频内射| 蜜桃久久精品国产亚洲av| 国产在线精品亚洲第一网站| 国产午夜精品一二区理论片| 国产精品一区二区三区四区免费观看| 12—13女人毛片做爰片一| av国产免费在线观看| 成年女人永久免费观看视频| 夜夜爽天天搞| 国产精品美女特级片免费视频播放器| 99热这里只有精品一区| 欧美变态另类bdsm刘玥| 在线观看66精品国产| 久久精品91蜜桃| 欧美日韩精品成人综合77777| 亚洲精品色激情综合| 国产av不卡久久| 日韩av在线大香蕉| 狂野欧美白嫩少妇大欣赏| 国产精品永久免费网站| 看片在线看免费视频| 国产黄片美女视频| 九九在线视频观看精品| 国产女主播在线喷水免费视频网站 | 成人特级av手机在线观看| 一个人观看的视频www高清免费观看| 亚洲欧美中文字幕日韩二区| 欧美另类亚洲清纯唯美| 国产午夜精品一二区理论片| 成人亚洲欧美一区二区av| 亚洲国产精品sss在线观看| 亚洲av成人av| 夜夜爽天天搞| 女人被狂操c到高潮| 久久久精品大字幕| 亚洲国产精品合色在线| 欧美一区二区精品小视频在线| 亚洲欧美成人综合另类久久久 | 岛国在线免费视频观看| 1024手机看黄色片| 国产av一区在线观看免费| 国产成人一区二区在线| 天堂中文最新版在线下载 | 国产精品一区二区性色av| 国产 一区精品| 国国产精品蜜臀av免费| 免费人成视频x8x8入口观看| av卡一久久| 亚洲一区高清亚洲精品| 国产色爽女视频免费观看| 久久鲁丝午夜福利片| 中文字幕av成人在线电影| 久久久成人免费电影| 观看美女的网站| 国产精品美女特级片免费视频播放器| 亚洲人成网站在线播| 国产精品不卡视频一区二区| 不卡一级毛片| 黑人高潮一二区| 国产成人a∨麻豆精品| 性欧美人与动物交配| 亚洲av不卡在线观看| 老女人水多毛片| 黄色一级大片看看| 蜜臀久久99精品久久宅男| 久久久久久久久久黄片| 男女视频在线观看网站免费| 国产中年淑女户外野战色| 大又大粗又爽又黄少妇毛片口| 国产成人freesex在线| 日韩一本色道免费dvd| 22中文网久久字幕| 国产色婷婷99| 午夜免费激情av| 国产精品福利在线免费观看| 国产综合懂色| 五月伊人婷婷丁香| 亚洲国产高清在线一区二区三| 亚洲精品亚洲一区二区| 五月玫瑰六月丁香| 亚洲婷婷狠狠爱综合网| 女人被狂操c到高潮| 欧美高清成人免费视频www| 寂寞人妻少妇视频99o| 热99在线观看视频| 一个人观看的视频www高清免费观看| 免费搜索国产男女视频| 日韩 亚洲 欧美在线| 国产成人精品一,二区 | 乱人视频在线观看| 亚洲欧美中文字幕日韩二区| 国产在视频线在精品| 亚洲最大成人中文| 久久人人精品亚洲av| 久久久久久久午夜电影| 国内精品宾馆在线| 色尼玛亚洲综合影院| 特级一级黄色大片| 亚洲精品久久久久久婷婷小说 | 1000部很黄的大片| 搡女人真爽免费视频火全软件| av在线播放精品| 欧美3d第一页| 成人综合一区亚洲| 国产一级毛片七仙女欲春2| 欧美bdsm另类| 深爱激情五月婷婷| 可以在线观看的亚洲视频| 直男gayav资源| 亚洲无线观看免费| 最好的美女福利视频网| 亚洲最大成人av| 少妇人妻精品综合一区二区 | 国产高清不卡午夜福利| 久久99精品国语久久久| 国国产精品蜜臀av免费| 久久久色成人| 丝袜喷水一区| 美女脱内裤让男人舔精品视频 | 久久综合国产亚洲精品| 久久精品国产亚洲网站| 日韩一区二区视频免费看| 寂寞人妻少妇视频99o| 菩萨蛮人人尽说江南好唐韦庄 | 天堂√8在线中文| 午夜激情欧美在线| 国产午夜精品一二区理论片| 不卡一级毛片| 亚洲自偷自拍三级| 97热精品久久久久久| 国产久久久一区二区三区| www.av在线官网国产| 国产亚洲5aaaaa淫片| 国产一区二区三区在线臀色熟女| 国产片特级美女逼逼视频| 99热这里只有是精品50| 国产亚洲精品久久久久久毛片| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 18禁黄网站禁片免费观看直播| 狂野欧美激情性xxxx在线观看| 午夜福利视频1000在线观看| 校园春色视频在线观看| 日韩欧美在线乱码| 日韩精品青青久久久久久| 国产一区二区在线av高清观看| 给我免费播放毛片高清在线观看| 久久久a久久爽久久v久久| 人体艺术视频欧美日本| 亚洲欧洲国产日韩| 日本av手机在线免费观看| 久久九九热精品免费| 午夜久久久久精精品| 精品不卡国产一区二区三区| 最新中文字幕久久久久| 岛国在线免费视频观看| 中出人妻视频一区二区| 精品少妇黑人巨大在线播放 | 自拍偷自拍亚洲精品老妇| 黄色视频,在线免费观看| 韩国av在线不卡| 欧美激情国产日韩精品一区| 亚洲自拍偷在线| а√天堂www在线а√下载| 成年av动漫网址| 黄色配什么色好看| 热99在线观看视频| 亚洲va在线va天堂va国产| 天堂影院成人在线观看| 在线a可以看的网站| 尤物成人国产欧美一区二区三区| 国产精品野战在线观看| 国内精品美女久久久久久| 亚洲国产欧美在线一区| 精品一区二区三区视频在线| av在线老鸭窝| 永久网站在线| 国产一区二区在线av高清观看| 麻豆乱淫一区二区| 成人综合一区亚洲| 天堂中文最新版在线下载 | 午夜a级毛片| 卡戴珊不雅视频在线播放| 成年av动漫网址| 欧美日韩综合久久久久久| 国产成年人精品一区二区| 欧美xxxx黑人xx丫x性爽| 干丝袜人妻中文字幕| 久久久久国产网址| 免费av毛片视频| 男人的好看免费观看在线视频| 大又大粗又爽又黄少妇毛片口| 亚洲精品自拍成人| 久久久久久大精品| 日本撒尿小便嘘嘘汇集6| 久久久久免费精品人妻一区二区| 亚洲精品成人久久久久久| 国产精品久久视频播放| 亚洲国产精品久久男人天堂| 成年女人看的毛片在线观看| 国产高清视频在线观看网站| av女优亚洲男人天堂| 久久久久免费精品人妻一区二区| 久久人人爽人人爽人人片va| 一级毛片久久久久久久久女| 欧美高清性xxxxhd video| 国产极品精品免费视频能看的| 爱豆传媒免费全集在线观看| 国产亚洲精品久久久com| 国产成人a区在线观看| 变态另类成人亚洲欧美熟女| 国产成人91sexporn| 一级毛片我不卡| 亚洲丝袜综合中文字幕| 2022亚洲国产成人精品| 乱人视频在线观看| 欧美3d第一页| 成年版毛片免费区| 亚洲国产欧洲综合997久久,| 久久久久网色| 亚洲成av人片在线播放无| 日本色播在线视频| 国产精品久久视频播放| 亚洲在线自拍视频| 国产av在哪里看| 中国国产av一级| 日本在线视频免费播放| 99久久久亚洲精品蜜臀av| 欧美性猛交╳xxx乱大交人| 婷婷色av中文字幕| 免费av不卡在线播放| 丰满人妻一区二区三区视频av| 国产淫片久久久久久久久| 成人永久免费在线观看视频| 少妇丰满av| 日韩高清综合在线| 成人综合一区亚洲| 欧美日本亚洲视频在线播放| 一区二区三区免费毛片| 啦啦啦韩国在线观看视频| 少妇人妻一区二区三区视频| 久久韩国三级中文字幕| 国产乱人偷精品视频| 两个人的视频大全免费| 免费大片18禁| 亚洲第一电影网av| 国产极品精品免费视频能看的| 久久久精品94久久精品| 人妻久久中文字幕网| 夫妻性生交免费视频一级片| 一边亲一边摸免费视频| 嘟嘟电影网在线观看| 在线a可以看的网站| 99在线人妻在线中文字幕| 青春草国产在线视频 | 日本免费一区二区三区高清不卡| 精品免费久久久久久久清纯| 国产精品久久电影中文字幕| 亚洲国产高清在线一区二区三| 国产黄a三级三级三级人| 成人二区视频| 欧美日韩一区二区视频在线观看视频在线 | 亚洲av成人精品一区久久| 人人妻人人澡欧美一区二区| 欧美成人a在线观看| 大又大粗又爽又黄少妇毛片口| 人人妻人人澡欧美一区二区| 美女内射精品一级片tv| 国产色婷婷99| 亚洲精品久久久久久婷婷小说 | 3wmmmm亚洲av在线观看| 久久午夜亚洲精品久久| 91狼人影院| 亚洲av免费在线观看| 狂野欧美白嫩少妇大欣赏| 黄色一级大片看看| 麻豆国产97在线/欧美| 如何舔出高潮| 精品熟女少妇av免费看| 日韩强制内射视频| 国产精品久久电影中文字幕| 欧美一区二区精品小视频在线| 欧美性猛交黑人性爽| 免费看日本二区| 亚洲一区二区三区色噜噜| 午夜亚洲福利在线播放| 观看免费一级毛片| 国产亚洲5aaaaa淫片| 日韩高清综合在线| 亚洲精华国产精华液的使用体验 | 欧洲精品卡2卡3卡4卡5卡区| 午夜福利高清视频| 两个人视频免费观看高清| 精品久久久噜噜| 美女大奶头视频| 亚洲精品久久国产高清桃花| 赤兔流量卡办理| 国产成人91sexporn| 欧美色欧美亚洲另类二区| 在线观看66精品国产| 乱人视频在线观看| 最近最新中文字幕大全电影3| 亚洲av中文av极速乱| 18禁裸乳无遮挡免费网站照片| 久久亚洲精品不卡| 高清毛片免费观看视频网站| kizo精华| 亚洲一级一片aⅴ在线观看| a级毛色黄片| 色哟哟哟哟哟哟| 观看美女的网站| 欧美最黄视频在线播放免费| 日韩精品有码人妻一区| 能在线免费观看的黄片| 中文亚洲av片在线观看爽| 一级毛片久久久久久久久女| 成人特级av手机在线观看| 亚洲最大成人手机在线| 久久久久国产网址| 亚洲无线在线观看| 亚洲图色成人| 2021天堂中文幕一二区在线观| 久久午夜亚洲精品久久| 国产精品一区二区三区四区免费观看| 久久久久久久午夜电影| 丝袜喷水一区| 亚洲欧洲国产日韩| 欧美成人免费av一区二区三区| 国产 一区精品| 国产一级毛片在线| 亚洲欧美精品专区久久| 久久精品国产亚洲网站| 中文字幕av成人在线电影| 99riav亚洲国产免费| 亚洲最大成人中文| 最近视频中文字幕2019在线8| 亚洲图色成人| 亚洲激情五月婷婷啪啪| 毛片一级片免费看久久久久| 少妇的逼水好多| 国产精品,欧美在线| 成年免费大片在线观看| 亚洲电影在线观看av| 欧美zozozo另类| 久久久久久久久中文| 丰满人妻一区二区三区视频av| 欧美3d第一页| 欧美精品一区二区大全| 国产成人影院久久av| 色综合色国产| 乱人视频在线观看| 国产精品电影一区二区三区| 日韩欧美三级三区| 中文字幕免费在线视频6| 亚洲乱码一区二区免费版| 熟女人妻精品中文字幕| av.在线天堂| 国产成人a∨麻豆精品| 国产精品99久久久久久久久| 亚洲最大成人av| 免费人成在线观看视频色| 在线免费观看的www视频| 亚洲国产精品国产精品| 午夜a级毛片| 国产单亲对白刺激| av在线观看视频网站免费| 久久久国产成人免费| 亚洲电影在线观看av| 国产成人a∨麻豆精品| 国产探花极品一区二区| 噜噜噜噜噜久久久久久91| 啦啦啦韩国在线观看视频| 丰满人妻一区二区三区视频av| 成年av动漫网址| 日韩中字成人| 国产一级毛片在线| 久久人人精品亚洲av| 少妇熟女欧美另类| 国产女主播在线喷水免费视频网站 | 久久草成人影院| av在线观看视频网站免费| 乱系列少妇在线播放| 欧美三级亚洲精品| 一边摸一边抽搐一进一小说| 日本熟妇午夜| 免费大片18禁| 亚洲国产日韩欧美精品在线观看| 又粗又硬又长又爽又黄的视频 | 欧美不卡视频在线免费观看| 精品免费久久久久久久清纯| 免费av观看视频| 国产一区二区亚洲精品在线观看| 亚洲在线自拍视频| av免费在线看不卡| 别揉我奶头 嗯啊视频| 久久亚洲精品不卡| 九九爱精品视频在线观看| 婷婷色综合大香蕉| 国产69精品久久久久777片| 日日啪夜夜撸| 一进一出抽搐动态| 亚洲精品亚洲一区二区| 午夜爱爱视频在线播放| 悠悠久久av| 老司机影院成人| 国产极品精品免费视频能看的| 亚洲精品久久国产高清桃花| h日本视频在线播放| 欧美激情在线99| 亚洲国产精品合色在线| 国产黄片视频在线免费观看| 日韩国内少妇激情av| 一个人免费在线观看电影| 内射极品少妇av片p| 我要看日韩黄色一级片| 亚洲成av人片在线播放无| 九九热线精品视视频播放| 天堂av国产一区二区熟女人妻| 丰满乱子伦码专区| 午夜视频国产福利| 国国产精品蜜臀av免费| 麻豆一二三区av精品| 久久久久久久午夜电影| 日韩视频在线欧美| 国产亚洲91精品色在线| 久久久久久久亚洲中文字幕| 亚洲自偷自拍三级| 国产成人精品一,二区 | 色尼玛亚洲综合影院| 国产高清激情床上av| 国内久久婷婷六月综合欲色啪| 日韩欧美一区二区三区在线观看| 在线播放国产精品三级| 国产私拍福利视频在线观看| 最近最新中文字幕大全电影3| av免费在线看不卡| 在线播放国产精品三级| 高清日韩中文字幕在线| 亚洲美女搞黄在线观看| 草草在线视频免费看| 中文字幕人妻熟人妻熟丝袜美| 在线免费观看的www视频| 中文字幕久久专区| 国产精品日韩av在线免费观看| 波多野结衣巨乳人妻| 黄色视频,在线免费观看| 欧美日韩国产亚洲二区| 青青草视频在线视频观看| 国产亚洲精品av在线| 超碰av人人做人人爽久久| 伊人久久精品亚洲午夜| 精品免费久久久久久久清纯| 九草在线视频观看| 中国美女看黄片| 午夜福利在线观看免费完整高清在 | 免费看日本二区| 一区福利在线观看| 国产在视频线在精品| 国产男人的电影天堂91| 国产在线男女| av在线天堂中文字幕| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲欧美日韩卡通动漫| 久久久久久久久久久免费av| 久久午夜福利片| 亚洲欧美精品自产自拍| 欧美色视频一区免费| 久久精品人妻少妇| 免费看av在线观看网站| 最新中文字幕久久久久| 91在线精品国自产拍蜜月| 黄色配什么色好看| 69av精品久久久久久| 全区人妻精品视频| 熟女人妻精品中文字幕| 黄片无遮挡物在线观看| 精品日产1卡2卡| 国产精品,欧美在线| 日韩一区二区视频免费看|