• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Analysis and Simulations of Open-Source Intelligence Process System Dynamics from User’s Perspective

    2023-01-22 09:01:00HuanLiuZhenyuTangNingZhaoandWeiQian

    Huan Liu,Zhenyu Tang,Ning Zhao,★and Wei Qian,★

    1Northeast Agricultural University,Harbin,150030,China

    2Harbin Institute of Technology Library,Harbin,150001,China

    ABSTRACT In today’s society with advanced Internet, the amount of information increases dramatically with each passing day, which leads to increasingly complex processes of open-source intelligence.Therefore, it is more important to rationalize the operation mode and improve the operation efficiency of open-source intelligence under the premise of satisfying users’needs.This paper focuses on the simulation study of the process system of opensource intelligence from the user’s perspective.First, the basic concept and development status of open-source intelligence are introduced in details.Second,six existing intelligence operation process models are summarized and their advantages and disadvantages are compared in focus.Based on users’preference, the open-source intelligence system simulation theory model is constructed from four aspects:intelligence collection,intelligence processing, intelligence analysis, and intelligence delivery.Meanwhile, the dynamics model of the open-source intelligence process system is constructed based on the open-source intelligence system simulation theoretical model, which specifically includes five parts:determination of system boundary, construction of causal loop diagram,construction of stock flow diagram,writing of mathematical equations,and system sensitivity test.Finally,the system simulation results were analyzed.It was found that improving the system of intelligence agencies,opening up government affairs, improving the professional level of intelligence personnel, strengthening the communication and cooperation among personnel of various intelligence departments,and expressing intelligence products through diverse forms can effectively improve the operational efficiency of the open-source intelligence process system.

    KEYWORDS Open-source intelligence;system dynamics;feedback;user demand deviation

    1 Introduction

    Data and information, as the basis and original carrier of intelligence, have greatly enriched the content of intelligence work; and new technologies such as artificial intelligence techniques have changed the traditional intelligence operation [1].Recently, obtaining intelligence from opensources has gradually become hot topic among intelligence agencies and academics.Nowadays,opensource intelligence has transformed from an isolated effort by a few to a partially open, networked and collaborative project [2].However, the development of intelligence work in China still lags behind, in which open-source intelligence agencies still suffer from many problems such as chaotic business processes,low efficiency of intelligence operations,and low credibility of intelligence products.Under such circumstances,strengthening the development and utilization of open-source intelligence,improving the institutional mechanism of intelligence work, and improving the professional level of intelligence personnel and the communication and cooperation among staff members have become important issues that need to be solved[3].

    The existing literature on open-source intelligence mainly covers three aspects:the conceptual definition of open-source intelligence,the analysis of open-source intelligence processes,and the application of open-source intelligence.The first is the definition of the concept of open-source intelligence.The Central Intelligence Agency(CIA)considers open-source intelligence as“information collected from open sources such as media, commercial data, and other processed information” [4].NATO believes that only resources obtained within the scope of the public license provided by law can be called open-source intelligence.Ding B.T., a Chinese scholar [5] showed that the concept of opensource intelligence should be understood in both narrow sense and broad sense.The narrow sense mainly refers to the openness on the“source”of intelligence,but the content of intelligence still has a certain degree of confidentiality;the broad sense mainly refers to the openness on the“work”,that is,anyone can participate in the intelligence work and realize the sharing of intelligence.The authors of this paper agree more with the viewpoint of Ding B.T.scholars that open-source intelligence is an intelligence model with feedback loop,where the source of information is open and transparent,and anyone can participate in the intelligence work, but the intelligence content is only provided to the target users.In fact,as long as the source of information is open and transparent,the intelligence processed from this information is open-source intelligence regardless of its presentation[1].Secondly,for the analysis of the open-source intelligence process, existing studies point out that open-source intelligence, while following the established intelligence generation laws, also goes through several specific links such as user requirements, intelligence collection, intelligence processing, intelligence analysis, and intelligence feedback, which in turn form a certain feedback loop.The research of Bo-Tao Ding scholars shows that the application of artificial intelligence in various aspects of the open-source intelligence process greatly improves the efficiency of information collection,processing,and analysis,saves a lot of Labor,capital and time,improves the operational efficiency of the opensource intelligence process[6].Zhong[7]summarized the shortcomings of the traditional intelligence process and introduced two methods,Meta-analysis and ACH,to construct a new intelligence process model.Li et al.[8] constructed an intelligence process model based on multiple types of decision support;meanwhile,they divided the existing intelligence process models into two categories:process models emphasizing structure and process models emphasizing function,analyzed the limitations of the two types of process models, and constructed a decision-driven intelligence process model [9].Zhang et al.[10]constructed a theoretical model of cyber financial crime intelligence process of multichain blockchain based on the basic principles and basic features of blockchain and analyzed the operation process in detail.Huang et al.[11]constructed a workflow model of enterprise competitive intelligence with network multi-source information,which includes several links of demand analysis,information source selection, information collection, information processing, information analysis,and intelligence result output.Finally, there are two main areas of applied research on open-source intelligence.On the one hand, there are applications to government-led military, national security,public safety, and other law enforcement sectors.for example, Ju et al.[12] analyzed the use of open-source information such as social media in the field of military intelligence.Li [13] detailed the application of open-source intelligence in the field of cyber security.Tan et al.[14] repositioned the role and path of open-source intelligence to serve the overall national security concept.Benedict et al.[15] used artificial intelligence technology combined with intelligence to predict and research the early information of China COVID-19.Hong et al.[2]showed that in the era of big data,opensource intelligence is used in government departments to better implement government information disclosure and promote epidemic prevention and control.Wang et al.[16]described the positive role of open-source intelligence in the detection work in the Internet environment.The second is the use of competitive intelligence in enterprises dominated by private organizations.For example,Zheng et al.[17] constructed an enterprise competitive intelligence system based on the ACP theory, which provides intelligent support for enterprise decision making.Wang et al.[18]constructed a competitive intelligence early warning mechanism for small and micro enterprises based on big data thinking,which significantly avoided the possible risks faced by small and micro enterprises.Based on big data thinking, Wang et al.[19] used a system dynamics approach to simulate the early warning mechanism of competitive intelligence for small and micro enterprises.Wang et al.[20]constructed a model of competitive intelligence collection system for SMEs based on the theory of particle swarm optimization algorithm.Liao et al.[21]analyzed the competitive intelligence service business models of different types of enterprises and empirically verified the effectiveness of improving the competitive intelligence service model of enterprises.

    Of course,some scholars have also studied the dynamic mechanism of information systems using system dynamics methods,for example,Li et al.[22]constructed a system dynamics model of Baidu Encyclopedia by analyzing causality and system flowcharts,and proposed the dynamic mechanism of Baidu Encyclopedia based on the simulation results.Abdallah[23]describe the mechanism of optimal control theory applied to stochastic elliptic systems.All these literatures have greatly guided the study of this paper.

    Through reading the existing literature,we also found that most of the existing research on opensource intelligence focuses on three aspects:concept definition, process analysis, and intelligence application, and the research is more comprehensive and in-depth.As such, this paper constructs a theoretical model of open-source intelligence process system based on the users’perspective as critical feedback.We gradually screened the chaotic open-source intelligence by intelligence collection, intelligence processing, intelligence analysis, and intelligence delivery processes, which finally transformed to theoretical intelligence model as valid intelligence products.Nevertheless, during information transfer processes,many factors can affect the transmission rate of the system as well as the final intelligence products.Therefore,by using system dynamics method,we attempted to simulate the actual information flow operation pattern by optimizing important parameters in the process;we then revealed the effects of such parameters on the efficiency of intelligence operation.The biggest innovation of this paper is:first,in the research process of open-source intelligence,many scholars have constructed corresponding theoretical models of intelligence processes according to specific problems,and the constructed models may be too complex or even not operable in reality, and more costly to run.In this paper, based on re-examining the existing six types of intelligence process models, we reconstruct the theoretical model of open-source intelligence process from the perspective of user thinking at the macro level, which is more operable in reality compared with the existing literature.Second,most of the existing literature analyzes the process model of open-source intelligence based on the theoretical level, without clarifying the intrinsic reasons for the inefficient operation of the intelligence process model.Based on the theoretical analysis,this paper combines the system dynamics approach,uses the drawing tool that comes with Vensim-PLE software to draw causal loop diagrams and flow stock diagrams,and simulates the open-source intelligence process under user thinking based on the corresponding functions of the software Third,this paper constructs a theoretical model of the open-source intelligence process,which can test the rationality and feasibility of the system dynamics model of the open-source intelligence process.

    2 Construction of Theoretical Model for Open-Source Intelligence Process

    Regarding the study of intelligence process,intelligence scholars and related scholars believe that it can be divided into seven links, six links, five links, four links, etc.There is a certain logical order among the various links of the intelligence process,and different scholars consider different problem contexts and construct different models of the intelligence process.Peng[24]summarized the existing intelligence process models, mainly the linear propulsion model, intelligence cycle model, multiple cycle model, goal-oriented model, decision-driven model, etc.Each intelligence process model has certain advantages and disadvantages,which are shown in Table 1.

    Table 1:Longitudinal comparison of various intelligence process models

    Table 1 (continued)Type Main features Advantages Disadvantages Goal-oriented model[29]Decision-driven model[8]Target-centric intelligence process model Emphasis on the intertwining of intelligence decision makers and the decision environment It avoids confusion and disorganization in intelligence work.At the same time,users and intelligence staff can share information and add new intelligence requirements at any time.Breaks through the limitations of traditional intelligence cycle thinking and focuses all aspects of intelligence activities on the intelligence function.It is more idealistic and difficult to operate.Also,the process requires repeated communication between departments and is more costly.Updated decisions Timely require the support of modern communication technologies.This is more costly in terms of capital and time.

    The above limitations of the intelligence process are mainly manifested in:(1) The traditional intelligence process model is not consistent with the actual intelligence work, the actual intelligence work is not a simple linear advance or a single cyclical cycle,the links are likely to produce duplication,jump.(2)The traditional intelligence process is complex to run,and the source of information is not open and transparent,which will significantly increase the cost of intelligence work in the process of advancing.(3)The user’s needs and timely feedback in the operation of the intelligence process is not prominent enough.

    In view of the shortcomings of the current intelligence process, this paper proposes a userdriven intelligence process model, which does not simplify the content of intelligence links and sever the links between intelligence links because of excessive emphasis on efficiency, and does not overemphasize the function of intelligence, which makes the intelligence process too detached from reality and complicated.The model mainly starts from the feedback of users’needs,incorporates useful information from various aspects into the intelligence process, and provides the most satisfactory intelligence to users through the repeated operation mode of intelligence departments’screening and circulation.Compared with the existing intelligence process model,this model has certain innovation and realistic guidance.The innovation is mainly reflected in the fact that the model is driven by the feedback of user needs, and the intelligence process will advance with the change of user needs to realize the cycle of each intelligence link.Realistic guidance is mainly reflected in the fact that the model runs a relatively simple process without much crossover,and the intelligence work emphasizes internal and external linkage and open and transparent information sources.The theoretical model of the open-source intelligence process constructed in this paper is shown in Fig.1.

    Figure 1:Theoretical model of open-source intelligence process

    According to the different data and intelligence content flowing in each intelligence link, the theoretical model of open-source intelligence process is divided into four stages,namely,the demand confirmation stage based on user feedback,the preliminary screening stage based on demand-related open-source information, the intelligence processing stage based on intelligence professionals, and the intelligence transmission stage based on relevant transmission platforms.New intelligence needs are discovered through user feedback, intelligence needs generate a large amount of open-source information converted into preliminary key information that can be used,intelligence agency professionals carry out key content analysis of intelligence information,and the final intelligence products generated are transmitted to specific users, and new data are generated to facilitate the revision of existing intelligence content by combining user feedback and collaborative communication of intelligence personnel at various stages.The cycle is repeatedly progressed to achieve the improvement of intelligence work and the satisfaction of user needs.The four stages of the theoretical model correspond to the four stages of intelligence collection, intelligence processing, intelligence analysis and intelligence delivery.

    1.The demand confirmation stage based on user feedback:This stage mainly relies on user feedback to start intelligence collection, which is an important basis for carrying out other aspects of intelligence work, and at the same time, extensive open-source information and timely and accurate communication with users becomes the basis for this stage to be carried out smoothly.The process of clarifying requirements in the context of open-source information,mainly based on user feedback as the starting point to obtain requirements,collect information from various public channels,including electronic media,social networking sites,government meeting reports,academic reports,etc.,combined with feedback information or data generated in the process of intelligence delivery, and finally collect a large amount of relevant or usable data.

    2.The preliminary screening stage based on demand-related open-source information:this stage involves the cleaning of a large amount of information,and the integration of cluttered data is an important part of data transformation into intelligence.In the context of open-source information, the scale of data is huge, data types are complex, structured and unstructured data coexist, and data sources are extensive and disorganized.Therefore, this stage needs to rely on the professional level of intelligence processors,the level of development of information technology,etc.,to determine as soon as possible the effective scope of data,the timeliness of intelligence and the authenticity and availability of intelligence content.

    3.The intelligence processing stage based on intelligence professionals:This stage involves the normalization of data.In the era of information open-source, intelligence analysis is more manifested in the format transformation of various data types into data that can be stored and have value.Through data extraction technology,natural language processing technology,etc.,the required data are stored and extracted,and indexes are established and data permissions are set to ensure that the data can be accessed quickly and accurately by users or related personnel,and turned into readable normative data.At the same time,intelligence staff and related experts conduct research and judgment to examine the processing speed of data,the security of storage,the standardization of data,the value of intelligence,etc.

    4.The intelligence transmission stage based on relevant transmission platforms:This link produces regulated intelligence products.Through data translation technology,data is accurately reduced to its represented content to achieve data content integration; through natural language processing technology,semantically effective understanding of data content is achieved to achieve data semantic integration.At this point, intelligence agencies submit intelligence products to users in various readable forms, such as documents, videos, voice, etc.After receiving the intelligence products,the user puts forward a new round of demand feedback,and each link of the process is repeatedly cycled,which eventually makes the intelligence products gradually meet the needs of users.

    3 Dynamics Model Construction for Open-Source Intelligence Process System

    As we all know,the reality of the open-source intelligence system is a large and complex system,in this large system not only involves a number of links and a variety of information collection and processing, and links and elements also exist between the inextricable links.On the one hand, the current research only through theoretical models to roughly express the process system and the analysis of the internal structure of the system is still very unclear; on the other hand, the development of China’s open-source intelligence is more serious problems and intelligence-related laws and regulations are not sound, intelligence agencies are more fragmented, less cooperation and communication between departments,in the process of information transfer,there will inevitably be information delays and loss.However, system dynamics software comes with a smoothing function that can visually represent this phenomenon, which is of great value for solving this problem.Therefore, this paper constructs a system dynamics simulation model of open-source intelligence process, and uses the advantages of system dynamics in many aspects to simulate a realistic open-source intelligence process system as much as possible,and find the factors affecting the operation efficiency of the system through parameter adjustment to improve the efficiency of intelligence delivery.

    3.1 Determination of System Boundary and Prerequisite Assumptions

    In this paper, we first consider rate variables such as intelligence collection rate, intelligence processing rate,intelligence system output rate,and state variables such as the amount of information at the perception level, the amount of information at the monitoring level, the total amount of intelligence products, and some auxiliary variables as endogenous variables of the system, while the degree of institutional perfection of intelligence agencies,the level of infrastructure construction,the user target demand, the level of government policy restrictions, the professional level of intelligence personnel, etc., are identified as the exogenous variables of the system.The following are the basic assumptions of this model.

    H1:The“l(fā)evel of Internet development”in the model is represented by the“Internet penetration rate”in the 47th Statistical Report on the Development Status of the Internet in China, and as of December 2020, the Internet penetration rate in China has reached as of December 2020, China’s Internet penetration rate has reached 70.4%, so it is assumed that the Internet development level is 0.7,which indicates that China’s Internet development has reached a medium to high level.

    H2:The “degree of policy restriction”in the model indicates the degree of restriction of public information by the Chinese government,which is expressed by the indicator of“number of microblogs of government agencies”.Therefore, it is assumed that the degree of information restriction by government policies is 0.2, which indicates that the degree of government restriction on public information is relatively small.

    H3:Open-source intelligence agencies in China are relatively scattered and do not form a more centralized and unified intelligence system,and there is a large amount of wasted resources.Therefore,it is assumed that the degree of perfection of open-source intelligence agencies is 0.1,which indicates that the degree of perfection of open-source intelligence agencies in China is low.

    H4:The“l(fā)evel of infrastructure construction”in the model affects the processing rate of intelligence,and the level of infrastructure construction is assumed to be 0.7,which indicates that the level of computer equipment infrastructure in China reaches a medium level.

    3.2 Causal Loop Diagram Construction of the System

    In this paper, we strictly follow the principles of Vensim-PLE software for drawing causal loop diagrams for open-source intelligence development and exploitation systems,as shown in Fig.2.

    Important feedback loops.

    B1:User demand deviation →Intelligence collection rate →Amount of information in the perceptual layer →Perception layer value →Effective information output from the perceptual layer→Intelligence processing rate →Amount of information in the monitoring layer →Monitoring layer value →Effective information output from the monitoring layer →Analysis rate of intelligence→Total assessment layer information →Assessment layer value →Valid information output at the evaluation level →Intelligence transfer rate →Total platform level information →Platform layer value →Effective information output at the platform level →Output rate of intelligence systems →Total Intelligence Products →User demand deviation

    Figure 2:Causal loop diagram of the system

    B2:Amount of information in the perceptual layer →Perception layer value →Effective information output from the perceptual layer →Amount of information in the perceptual layer

    B3:Amount of information in the monitoring layer →Monitoring layer value →Effective information output from the monitoring layer →Amount of information in the monitoring layer

    B4:Total assessment layer information →Assessment layer value →Valid information output at the evaluation level →Total assessment layer information

    B5:Total Platform layer information →Platform layer value →Effective information output at the platform layer →Total Platform layer information

    3.3 Flow Diagram Construction of the System

    In this paper, after constructing the causal loop diagram to express the causal relationship and feedback loop, the flow stock diagram of the system was drawn in order to better establish the mathematical relationship between the variables,as shown in Fig.3.

    Next, the state variables, rate variables, constants, and auxiliary variables within the system are organized according to the flow stock diagram drawn,as shown in Table 2.The remaining variables not listed in Table 2 are all auxiliary variables of the system, and there are a total of 26 auxiliary variables in the system.

    Figure 3:Flow stock diagram of the system

    Table 2 (continued)Name Type Symbol Remarks Evaluation layer output rate V8 Platform level value output V9 Intelligence product input rate V10 Knowledge decay rate V11 User target demand Constants C1 Bit Internet development level C2 Dmnl User learning ratio C3 Knowledge forgetting ratio C4

    3.4 Construction and Description of the Equation

    Cause and effect diagrams and flowcharts are used to succinctly describe the logical relationships between the elements of a system, while equations are used to quantitatively analyze the dynamic behavior of the system.Constructing equations is a transformation of the model structure, which can be simulated by computer to study the dynamic characteristics implied in the model and find the methods and countermeasures to solve the problem.Therefore,referring to Soliman et al.[30]for nonlinear and linear differential equations,the main mathematical equations constructed in this paper are as follows.

    3.4.1 Construction of Mathematical Equations

    1.Amount of information in the perceptual layer = INTEG (Intelligence collection rate -Perceptual layer output rate,0),the symbols are expressed as:S1=Integ(V1-V6,0)

    2.Amount of information in the monitoring layer = INTEG (Intelligence processing rate -Monitoring layer output rate,0),the symbols are expressed as:S2=Integ(V2-V7,0)

    3.Amount of information in the assessment layer = INTEG (Intelligence analysis rate -Evaluation layer output rate,0),the symbols are expressed as:S3=Integ(V3-V8,0)

    4.Total intelligence products=INTEG(Intelligence output rate,10),the symbols are expressed as:S5=Integ(V5,10)

    5.Total user knowledge=INTEG(Perceptual layer output rate-Knowledge decay rate,0),the symbols are expressed as:S6=Integ(V10-V11,0)

    6.Intelligence collection rate = User demand deviation * ln (1 + Internet development level * Completeness of intelligence agencies * Professional level of collectors/Degree of policy restrictions)/Adjustment time for deviations, the symbols are expressed as:V1=

    7.Intelligence processing rate= Perceptual layer output rate *ln(1 + degree of infrastructure development),the symbols are expressed as:V2=V6×ln(1+D12)

    8.Intelligence analysis rate = Monitoring layer output rate * ln (1 + Professional level of analysts),the symbols are expressed as:V3=V7×ln(1+D17)

    9.Perceptual layer output rate=Smooth(Perceptual layer value,Delay time of the perceptual layer)/perceptual layer delay time,the symbols are expressed as:V6=smooth(D9,D10)/D10

    10.Monitoring layer output rate = Smooth (Monitoring layer value, Delay time of the monitoring layer)/Delay time of the monitoring layer, the symbols are expressed as:V7=smooth(D24,D16)/D16

    11.Evaluation layer output rate = Smooth (Evaluation layer value, Delay time of the Evaluation layer)/Delay time of the Evaluation layer, the symbols are expressed as:V8=smooth(D25,D20)/D20

    12.Platform level value output = Smooth (Platform layer value, Delay time of the Platform layer)/Delay time of the Platform layer,the symbols are expressed as:V9=smooth(D26,D23)/D23

    13.Perceptual layer value=Max(Amount of information in the perceptual layer,0)*ARCTAN(Relevance to users’needs*Reliability of intelligence content*Extensive scope of collection),the symbols are expressed as:D9=max(S1,0)×arctan(D7*D6*D8)

    14.Monitoring layer value = MAX (Amount of information in the monitoring layer, 0) *ARCTAN (Degree of novelty of information * Degree of truthfulness of information *Degree of specification of data format), the symbols are expressed as:D24=max(S2,0) ×arctan(D13*D14*D15)

    15.Assessment layer value = MAX (Amount of information in the assessment layer, 0) *ARCTAN (Expert participation * Degree of team collaboration), the symbols are expressed as:D25=max(S3,0)×arctan(D18*D19)

    16.Platform layer value=MAX(Amount of information in the platform layer,0)*ARCTAN(degree of intelligence product visualization * intelligence system carrying capacity), the symbols are expressed as:D26=max(S4,0)×arctan(D21*D22)

    17.Intelligence product input=Total intelligence products*User learning ratio/Cycle of intelligence,the symbols are expressed as:V10=(S5×C3)/D11

    After several weeks, Kelly made it all the way to the yard! She positively18 glowed as the children congratulated her with gentle pats on the back and warm hugs

    18.User demand deviation=IF THEN ELSE(User target demand-Total intelligence products>0,User target demand-Total Intelligence Products,0),the symbols are expressed as:D1=IfThenElse(C1-S5>0,C1-S5=0)

    3.4.2 Description of Equations

    Eqs.(1)–(5) set the initial values of the perception layer information volume, monitoring layer information volume,evaluation layer information volume,and total user knowledge volume to 0,and the initial value of the intelligence product volume to 10 bits.the perception layer information volume,monitoring layer information volume, evaluation layer information volume, intelligence product volume,and total user knowledge volume are all stock quantities,so they are expressed by the integral function integ(-).

    Eqs.(6)–(8) set the initial values of Internet development level, open-source intelligence agency perfection,professional level of collectors,government policy restrictions,infrastructure development water,and professional level of analysts as 0.7,0.5,0.75,0.2,0.7,and 0.65,respectively,with deviation adjustment time of 2 days.Multiplication is used to indicate positive impact,and division is used to indicate negative impact.For example,the level of Internet development,the improvement of opensource intelligence agencies, and the professionalism of collectors will make the rate of intelligence collection faster,and government policy restrictions will make the rate of intelligence collection slower.The LN function is introduced to indicate that the influence of these factors on the intelligence collection rate and intelligence processing rate is not infinitely growing, and the growth rate will gradually slow down after reaching a certain level.

    Eqs.(9)–(12)let the delay time of perception layer,monitoring layer,evaluation layer,and platform layer are all 1 day.There will be delay effects when intelligence is delivered in each link,for example,after intelligence collectors collect the information, they need to make preliminary screening of the information,and intelligence processors need some time to process the information to output to the next link,etc.Therefore,the information smoothing function smooth(-)is introduced.

    Eqs.(13)–(16)set the initial values of relevance to user needs,authority of intelligence content,and breadth of collection to 0.8,the initial values of novelty of information,truthfulness of information,and standardization of data format to 0.9, 0.9, and 0.8, respectively, the initial values of expert participation and teamwork to 0.2 and 0.55, and the initial values of visualization of intelligence products The value of the value of the perception layer is non-negative, and the maximum function max(-) is introduced to indicate that the relevance to user needs, the authority of the intelligence content,and the wide range of collection will make the effective information of the perception layer increase,that is,the increase of the value of the perception layer,but this effect is not infinite,and there will be a peak,so Introduce the arctan(-)representation of the arctangent function.

    Eq.(17) let the user learning ratio be 0.85 and the knowledge decay ratio be 0.21.After the intelligence products are handed over to customers,customers are limited by their own knowledge level and cannot completely transform the products into knowledge,so the amount of intelligence products is multiplied by the user learning ratio to represent the input amount of intelligence products,and the knowledge mastered by users will be gradually forgotten with the extension of time,so the knowledge decay ratio is multiplied by the total amount of user knowledge indicates the amount of knowledge decay.

    Eq.(18) the user demand deviation amount is the user target demand minus the intelligence product amount, and the operation of the system will make the user demand deviation amount gradually decrease, and the introduction of IF THEN ELSE function makes the system stop when the user demand deviation amount is zero.

    3.5 System Sensitivity Test

    1.The professional level of intelligence collectors and analysts are set as(0.625,0.5),(0.75,0.65)and (0.82, 0.7) in turn, and the values of other elements remain unchanged.The simulation results are shown in Fig.4a below.

    2.The degree of perfection of open-source intelligence is set to 0.4,0.5 and 0.6 in turn,and the values of other elements remain unchanged.The simulation results are shown in Fig.4b.

    3.The degree of teamwork and expert participation are set as(0.3,0.1),(0.55,0.2),and(0.7,0.3)in turn,and the values of other elements remain unchanged.The simulation results are shown in Fig.4c.

    4.The visualization degree of the intelligence product is set to 0.7,0.9,and 0.95 in turn,and the values of other elements remain unchanged.The simulation results are shown in Fig.4d.

    The sensitivity test results in Figs.4a–4d show that the output rate of the intelligence system also changes from low to high and changes more obviously when the professional level of intelligence collectors and analysts is adjusted from low to high with the same values of other elements.The faster the output rate of the intelligence system,the more the system can meet the user’s needs in a shorter period of time, but the change is less sensitive when the values of the two parameters are reduced.Similarly,the lower the degree of teamwork and expert participation,the lower the output rate of the intelligence system,and the more significant the increase in the output rate of the intelligence system with the gradual increase in the degree of teamwork and expert participation,with a slight oscillation,while the values of other factors remain unchanged.With the same values of other elements,increasing the visualization of intelligence products,disseminating intelligence products in various ways,such as music,WeChat,videos,etc.,and presenting them to the target customers imaginatively,will make the output rate of intelligence system faster, and the more user needs can be satisfied in a short time.5 Results and analysis of the simulation

    Figure 4:Graph of sensitivity test results

    3.6 Simulation Results

    In this paper,Vensim-PLE software is used to simulate the open-source intelligence process system model,assuming that the user’s target demand is a constant 20 bits,the intelligence cycle is 7 days,the simulation step is 1 day, and the simulation time is 20 days; the initial values of other variables are derived from the statistical almanac and multiple simulations,and the specific simulation results are shown in Table 3,Where the unit of time is day and the unit of information is bit.

    From Table 3,it can be concluded that the intelligence system carries out intelligence collection work after receiving the user’s demand feedback, which makes the amount of information in the perception layer gradually increase from zero, but after one intelligence cycle, it starts to gradually decrease.The information collection link to the intelligence processing link,the information transfer of the staff in both departments and the intelligence processing itself need time, so the amount of information in the perception layer starts to increase from the second day and then gradually shows a decreasing trend.Similarly,both intelligence analysis and intelligence transmission itself take some time, so the amount of information in the evaluation layer gradually increases from the fourth day and then gradually decreases,and the amount of information in the platform layer gradually increases from the sixth day and then gradually decreases.The amount of user demand deviation is equal to the user target demand minus the amount of intelligence products, the user target demand is constant,the initial value of intelligence products is 10 bits, with the operation of the intelligence process, it gradually shows a growth trend,so that the amount of user demand deviation starts from 10 bits and gradually decreases;at the same time,after the intelligence products are generated,the user receives new intelligence knowledge so that the total amount of knowledge it has gradually increases,but the knowledge does not increase infinitely.However,the knowledge does not increase infinitely,and there exists a certain proportion of forgetting, so that the total amount of user knowledge shows a slow growth trend,and gradually reaches the peak with the growth of time.

    Table 3:Simulation results table

    1.The degree of perfection of open source intelligence agencies,the degree of policy restrictions,the professionalism of intelligence staff and the degree of teamwork,expert involvement,and the degree of visualization of intelligence products play an important role in the intelligence process system,which improves the operational efficiency of the intelligence process system by influencing the rate of intelligence delivery in a fixed period of time,resulting in a rapid decrease in the amount of user demand deviation,and thus satisfying in a shorter time the user needs in a shorter period of time.Therefore, improving the institutional mechanism of intelligence agencies, making government affairs appropriately open, improving the professionalism of intelligence staff,strengthening the communication and cooperation among the staff of various intelligence departments,and presenting intelligence products in various forms can effectively improve the operational efficiency of the open-source intelligence process system.

    2.The operation process of open-source intelligence process system is a process of creating intelligence value continuously,and this value creation occurs in all aspects of the intelligence process.The main outputs of the open-source intelligence process system are intelligence products and the total amount of user knowledge,of which the total amount of user knowledge is the total value created by the intelligence process system.

    3.The extensive scope of collection, the authority of intelligence content, and the relevance to user needs are the main factors that lead to the generation of value in the intelligence collection subsystem;the degree of specification of data format,the degree of truth and novelty of information are the main factors that affect the generation of value in the intelligence processing subsystem; the degree of teamwork and expert participation are the main factors that lead to the generation of value in the intelligence analysis subsystem;the bearing capacity of the intelligence system and the degree of visualization of intelligence products are the main factors that lead to the production of value in the intelligence delivery subsystem.

    4.There is a certain information delay effect in the open-source intelligence development and utilization process system due to the lack of communication and cooperation between personnel in the same department as well as across departments.

    4 Conclusion

    In this paper, the main factors affecting the operational efficiency of open-source intelligence systems are studied using a system dynamics approach.First, a theoretical model and a dynamics model of the open-source intelligence process system are constructed.Then, the amount of user demand deviation, the professional level of intelligence personnel, the degree of government policy restrictions, and the degree of expert participation as feedback conditions were added to the model and computer simulations were conducted; secondly, the values of some variables were changed to simulate their dynamic change curves to study the sensitivity and trend of their changes.Finally,based on the simulation results, the dynamic mechanism of the open-source intelligence process system is analyzed.In conclusion,this study reveals an efficient mode of operation of the intelligence process system in today’s rapidly developing Internet and information-exploding society, and then explores the important factors affecting the operational efficiency of the intelligence process and the dynamic mechanism of the intelligence system, so that the intelligence products can better meet the needs of users and provide some feasible suggestions for establishing a think-tank-based intelligence service system in China as soon as possible.

    Data Availability:The data used in this paper is available in the paper.

    Funding Statement:This paper was supported by the National Social Science Foundation of China under the project“Research on the mechanism of developing and utilizing domestic and foreign opensource intelligence under product-oriented thinking(20BTQ049)”.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产精品 国内视频| 人妻少妇偷人精品九色| 综合色丁香网| 久久 成人 亚洲| 久久99热这里只频精品6学生| 国产成人免费无遮挡视频| 国产免费视频播放在线视频| 不卡av一区二区三区| 国产精品熟女久久久久浪| 97人妻天天添夜夜摸| 国产乱来视频区| 妹子高潮喷水视频| 免费黄网站久久成人精品| 亚洲av在线观看美女高潮| 老熟女久久久| 久久久久久久精品精品| 久久午夜综合久久蜜桃| 大片免费播放器 马上看| 观看美女的网站| 观看美女的网站| 午夜福利视频精品| 老司机亚洲免费影院| 久久国内精品自在自线图片| 97精品久久久久久久久久精品| 国产 精品1| 在线免费观看不下载黄p国产| 一级黄片播放器| 三级国产精品片| 性色av一级| 国产精品久久久久久精品古装| 天天躁日日躁夜夜躁夜夜| 嫩草影院入口| 99热全是精品| 欧美成人午夜免费资源| 精品一品国产午夜福利视频| 日韩在线高清观看一区二区三区| 成人亚洲欧美一区二区av| 大话2 男鬼变身卡| 中文字幕人妻熟女乱码| 18禁裸乳无遮挡动漫免费视频| 国产精品三级大全| 久久韩国三级中文字幕| 97人妻天天添夜夜摸| 久久久久久人人人人人| 亚洲精品久久成人aⅴ小说| 久久亚洲国产成人精品v| 黄色配什么色好看| 交换朋友夫妻互换小说| 亚洲欧洲国产日韩| 国产一区二区 视频在线| 中文字幕人妻丝袜制服| 亚洲精品,欧美精品| 日韩av不卡免费在线播放| 国产免费又黄又爽又色| 免费女性裸体啪啪无遮挡网站| 啦啦啦视频在线资源免费观看| 亚洲视频免费观看视频| 亚洲精品国产一区二区精华液| 久久鲁丝午夜福利片| 亚洲成人一二三区av| 久久 成人 亚洲| 大话2 男鬼变身卡| 热99久久久久精品小说推荐| 三级国产精品片| 少妇猛男粗大的猛烈进出视频| 国产成人精品久久二区二区91 | 成年女人毛片免费观看观看9 | 国产精品久久久久成人av| 久久国产亚洲av麻豆专区| 国产老妇伦熟女老妇高清| 免费看av在线观看网站| 久久这里有精品视频免费| 精品人妻熟女毛片av久久网站| 免费观看av网站的网址| 99热国产这里只有精品6| 啦啦啦在线观看免费高清www| 丰满迷人的少妇在线观看| 亚洲欧美一区二区三区久久| 九色亚洲精品在线播放| 丝袜喷水一区| 欧美黄色片欧美黄色片| 免费观看在线日韩| 美女主播在线视频| 9色porny在线观看| 国产 精品1| 精品亚洲乱码少妇综合久久| 国产探花极品一区二区| av网站免费在线观看视频| 亚洲伊人久久精品综合| 王馨瑶露胸无遮挡在线观看| 中文字幕亚洲精品专区| 美女中出高潮动态图| 亚洲国产日韩一区二区| 欧美精品一区二区免费开放| 欧美国产精品一级二级三级| 高清欧美精品videossex| 妹子高潮喷水视频| 1024香蕉在线观看| 日本免费在线观看一区| 日韩中字成人| 日韩av免费高清视频| 日韩欧美精品免费久久| 精品少妇一区二区三区视频日本电影 | 亚洲三区欧美一区| 久久毛片免费看一区二区三区| 看免费成人av毛片| 国产欧美亚洲国产| 午夜日韩欧美国产| 一区二区av电影网| 国产av码专区亚洲av| 久久久精品免费免费高清| 国产色婷婷99| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲成人一二三区av| 性色av一级| 三级国产精品片| 亚洲国产色片| 欧美国产精品va在线观看不卡| 久久青草综合色| 久久精品夜色国产| 久热这里只有精品99| 精品国产露脸久久av麻豆| 欧美bdsm另类| 国产综合精华液| 免费黄色在线免费观看| 一区福利在线观看| 寂寞人妻少妇视频99o| 久久精品久久久久久噜噜老黄| 免费久久久久久久精品成人欧美视频| 咕卡用的链子| 97在线人人人人妻| av有码第一页| 日本色播在线视频| 久久久久久久久免费视频了| 国产精品久久久久久精品电影小说| 国产野战对白在线观看| 99国产综合亚洲精品| 日本色播在线视频| 精品第一国产精品| 亚洲欧美精品综合一区二区三区 | 久久韩国三级中文字幕| 国产爽快片一区二区三区| 成人午夜精彩视频在线观看| 亚洲欧美精品自产自拍| av又黄又爽大尺度在线免费看| 美女福利国产在线| 婷婷成人精品国产| 欧美+日韩+精品| 天天操日日干夜夜撸| 一级毛片 在线播放| 中文字幕av电影在线播放| 秋霞在线观看毛片| 婷婷色av中文字幕| 午夜福利乱码中文字幕| 日韩人妻精品一区2区三区| 又粗又硬又长又爽又黄的视频| 黄色毛片三级朝国网站| 国产精品一二三区在线看| 青春草视频在线免费观看| 久久精品国产亚洲av天美| 伦精品一区二区三区| 女性被躁到高潮视频| av天堂久久9| 国产精品一区二区在线不卡| 国产日韩一区二区三区精品不卡| 欧美精品av麻豆av| av天堂久久9| 97在线视频观看| 欧美精品av麻豆av| 两个人看的免费小视频| 777米奇影视久久| 久久热在线av| 黄网站色视频无遮挡免费观看| 久久精品aⅴ一区二区三区四区 | 国产精品免费视频内射| 精品人妻在线不人妻| 国产黄频视频在线观看| 午夜91福利影院| 久久精品熟女亚洲av麻豆精品| 欧美日韩成人在线一区二区| 最近手机中文字幕大全| 国产又色又爽无遮挡免| 免费在线观看黄色视频的| 春色校园在线视频观看| 亚洲精华国产精华液的使用体验| 七月丁香在线播放| 九色亚洲精品在线播放| 丝袜美腿诱惑在线| 在线观看美女被高潮喷水网站| 乱人伦中国视频| 永久免费av网站大全| 午夜精品国产一区二区电影| 国产乱人偷精品视频| 亚洲伊人色综图| 亚洲伊人色综图| 在线观看www视频免费| 国产精品久久久久久久久免| www.自偷自拍.com| 欧美97在线视频| 中文字幕精品免费在线观看视频| 日韩欧美精品免费久久| 国产片特级美女逼逼视频| 国产老妇伦熟女老妇高清| 亚洲三区欧美一区| 丝袜在线中文字幕| 看非洲黑人一级黄片| 亚洲欧洲日产国产| 三级国产精品片| 最近中文字幕2019免费版| 久久这里只有精品19| 精品国产国语对白av| 精品亚洲乱码少妇综合久久| 精品国产一区二区三区久久久樱花| 亚洲美女视频黄频| 多毛熟女@视频| 精品少妇久久久久久888优播| 国产女主播在线喷水免费视频网站| 男的添女的下面高潮视频| 亚洲欧美成人综合另类久久久| 丰满迷人的少妇在线观看| 国产精品嫩草影院av在线观看| 久久久久久人人人人人| 欧美变态另类bdsm刘玥| 最近中文字幕2019免费版| 日韩伦理黄色片| 青春草亚洲视频在线观看| 亚洲欧美一区二区三区久久| 中文字幕制服av| 午夜免费男女啪啪视频观看| 欧美最新免费一区二区三区| 亚洲精品久久久久久婷婷小说| 亚洲美女视频黄频| av免费在线看不卡| 免费av中文字幕在线| 在线观看美女被高潮喷水网站| 亚洲国产欧美网| 久久影院123| 男男h啪啪无遮挡| 最近2019中文字幕mv第一页| 啦啦啦视频在线资源免费观看| 亚洲国产最新在线播放| 欧美日韩国产mv在线观看视频| 一二三四在线观看免费中文在| 欧美成人午夜免费资源| 午夜福利网站1000一区二区三区| 在线观看国产h片| 国产日韩欧美亚洲二区| 日韩一本色道免费dvd| 国产片内射在线| 青春草国产在线视频| 久久精品熟女亚洲av麻豆精品| av有码第一页| 有码 亚洲区| 麻豆乱淫一区二区| 免费高清在线观看日韩| 欧美日韩亚洲国产一区二区在线观看 | 99热国产这里只有精品6| 日本wwww免费看| 亚洲国产av新网站| 亚洲人成电影观看| 香蕉国产在线看| 女人精品久久久久毛片| 免费不卡的大黄色大毛片视频在线观看| 青春草亚洲视频在线观看| 久久韩国三级中文字幕| 狂野欧美激情性bbbbbb| 久久久久国产精品人妻一区二区| 午夜精品国产一区二区电影| 国产xxxxx性猛交| 91精品三级在线观看| 日本-黄色视频高清免费观看| 18在线观看网站| 69精品国产乱码久久久| av免费观看日本| 国产成人精品一,二区| 精品人妻一区二区三区麻豆| 久久久国产欧美日韩av| 少妇的逼水好多| 欧美最新免费一区二区三区| 1024视频免费在线观看| 最近最新中文字幕免费大全7| 91久久精品国产一区二区三区| 亚洲婷婷狠狠爱综合网| 老司机亚洲免费影院| 热re99久久精品国产66热6| 精品亚洲成国产av| 赤兔流量卡办理| 久久久久久久久久人人人人人人| 亚洲美女视频黄频| 中文乱码字字幕精品一区二区三区| 久久精品熟女亚洲av麻豆精品| 国产国语露脸激情在线看| 久久久久网色| 深夜精品福利| 久久久久久久久久久久大奶| 夜夜骑夜夜射夜夜干| 国产色婷婷99| 亚洲欧洲国产日韩| 黄色 视频免费看| 黄频高清免费视频| 一区二区三区四区激情视频| 中文字幕制服av| 这个男人来自地球电影免费观看 | 亚洲综合色网址| 一级黄片播放器| 国产精品.久久久| 一级片'在线观看视频| 欧美日韩亚洲高清精品| 免费女性裸体啪啪无遮挡网站| 国产精品 欧美亚洲| 女人被躁到高潮嗷嗷叫费观| 免费高清在线观看日韩| 国产精品久久久久久av不卡| 久久久精品免费免费高清| 美女主播在线视频| 激情视频va一区二区三区| 熟女电影av网| 搡老乐熟女国产| 久久久久久免费高清国产稀缺| 不卡av一区二区三区| 国产探花极品一区二区| av一本久久久久| 热99国产精品久久久久久7| 亚洲第一av免费看| 91aial.com中文字幕在线观看| videossex国产| 国产日韩欧美亚洲二区| 亚洲美女视频黄频| 亚洲精品成人av观看孕妇| 国产白丝娇喘喷水9色精品| 国产麻豆69| 午夜精品国产一区二区电影| 国产成人精品久久久久久| 国产精品女同一区二区软件| 欧美亚洲日本最大视频资源| 69精品国产乱码久久久| 久久久久精品性色| 黄色一级大片看看| 观看美女的网站| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲美女黄色视频免费看| 三级国产精品片| 国产av精品麻豆| 久久ye,这里只有精品| 建设人人有责人人尽责人人享有的| 在线天堂最新版资源| 久久热在线av| 天天影视国产精品| 在线观看三级黄色| 中文字幕制服av| 亚洲av欧美aⅴ国产| 婷婷色综合www| 国产在线视频一区二区| av网站在线播放免费| 精品亚洲成a人片在线观看| 欧美日韩成人在线一区二区| 99九九在线精品视频| 国产色婷婷99| 欧美精品国产亚洲| 999久久久国产精品视频| 永久免费av网站大全| 校园人妻丝袜中文字幕| 久久精品国产亚洲av涩爱| 啦啦啦在线观看免费高清www| 晚上一个人看的免费电影| 香蕉国产在线看| 下体分泌物呈黄色| 精品国产露脸久久av麻豆| 日韩三级伦理在线观看| 久久久精品区二区三区| 成人毛片a级毛片在线播放| 中文精品一卡2卡3卡4更新| 免费少妇av软件| 波多野结衣一区麻豆| 人妻人人澡人人爽人人| 在线天堂最新版资源| 国产成人av激情在线播放| 亚洲国产毛片av蜜桃av| 制服诱惑二区| 晚上一个人看的免费电影| 中文天堂在线官网| 午夜福利影视在线免费观看| 欧美日韩一区二区视频在线观看视频在线| 中文字幕av电影在线播放| 男人添女人高潮全过程视频| 亚洲精品国产一区二区精华液| 免费黄网站久久成人精品| 一区二区三区精品91| 免费看av在线观看网站| 中文天堂在线官网| 9191精品国产免费久久| 国产高清不卡午夜福利| 人人澡人人妻人| 亚洲第一av免费看| 又粗又硬又长又爽又黄的视频| 亚洲图色成人| 国产 一区精品| 亚洲av免费高清在线观看| 国产福利在线免费观看视频| 99九九在线精品视频| 国产精品二区激情视频| 日韩成人av中文字幕在线观看| 两个人免费观看高清视频| 99热网站在线观看| 欧美人与性动交α欧美软件| 国产成人精品无人区| 一二三四中文在线观看免费高清| 久久久欧美国产精品| 国产高清国产精品国产三级| 国产一区有黄有色的免费视频| 国产黄频视频在线观看| 晚上一个人看的免费电影| 亚洲精品日韩在线中文字幕| av不卡在线播放| av网站免费在线观看视频| 久久影院123| 亚洲av综合色区一区| 久久婷婷青草| 国产免费福利视频在线观看| xxx大片免费视频| www日本在线高清视频| 国产成人精品一,二区| 精品国产露脸久久av麻豆| 久久精品久久久久久噜噜老黄| av在线播放精品| 18禁动态无遮挡网站| 久久精品人人爽人人爽视色| 亚洲伊人久久精品综合| 一本久久精品| 新久久久久国产一级毛片| 精品福利永久在线观看| 国产男人的电影天堂91| 欧美国产精品va在线观看不卡| a级片在线免费高清观看视频| 七月丁香在线播放| 丝瓜视频免费看黄片| 亚洲av男天堂| 久久精品国产亚洲av天美| 熟女电影av网| 久久久久精品性色| 欧美xxⅹ黑人| 春色校园在线视频观看| 美女大奶头黄色视频| 一级毛片我不卡| av有码第一页| 在线观看国产h片| h视频一区二区三区| 99热国产这里只有精品6| 国产亚洲av片在线观看秒播厂| 国产精品一国产av| 秋霞在线观看毛片| 久久免费观看电影| 丝袜脚勾引网站| 蜜桃在线观看..| 亚洲内射少妇av| av在线老鸭窝| 母亲3免费完整高清在线观看 | 亚洲精品aⅴ在线观看| 一二三四中文在线观看免费高清| 丝袜美腿诱惑在线| 精品卡一卡二卡四卡免费| 99国产精品免费福利视频| 精品久久蜜臀av无| 国产日韩欧美亚洲二区| 久久久久精品久久久久真实原创| 精品久久久精品久久久| 亚洲精品美女久久久久99蜜臀 | av片东京热男人的天堂| 久久久久久久亚洲中文字幕| 国产精品免费大片| 巨乳人妻的诱惑在线观看| 国产人伦9x9x在线观看 | 丝袜人妻中文字幕| 亚洲精品国产色婷婷电影| 免费大片黄手机在线观看| 综合色丁香网| 亚洲视频免费观看视频| 在线观看免费高清a一片| 亚洲欧美精品自产自拍| 麻豆精品久久久久久蜜桃| 欧美日韩一级在线毛片| 国产野战对白在线观看| 男女国产视频网站| 精品酒店卫生间| 亚洲综合精品二区| 久久久亚洲精品成人影院| 香蕉精品网在线| 七月丁香在线播放| 国产不卡av网站在线观看| 一二三四中文在线观看免费高清| 亚洲欧美精品自产自拍| 久久精品久久久久久久性| 日韩一卡2卡3卡4卡2021年| 欧美97在线视频| 欧美日韩视频高清一区二区三区二| 久久久久久久久久久免费av| 曰老女人黄片| 欧美日韩精品成人综合77777| 极品少妇高潮喷水抽搐| 国产亚洲午夜精品一区二区久久| 精品少妇黑人巨大在线播放| 人妻人人澡人人爽人人| 2022亚洲国产成人精品| 亚洲精品日本国产第一区| 日本av免费视频播放| 妹子高潮喷水视频| 一级毛片 在线播放| 乱人伦中国视频| 国产精品秋霞免费鲁丝片| 天堂俺去俺来也www色官网| 亚洲人成电影观看| 一区二区三区激情视频| 一区二区av电影网| 男女午夜视频在线观看| 一区二区av电影网| 欧美变态另类bdsm刘玥| 欧美精品av麻豆av| 天天影视国产精品| 大片电影免费在线观看免费| 国产日韩欧美在线精品| 我的亚洲天堂| 国产成人一区二区在线| 国产亚洲最大av| 美女高潮到喷水免费观看| 啦啦啦中文免费视频观看日本| 热99久久久久精品小说推荐| 成人影院久久| 人妻一区二区av| 中文字幕av电影在线播放| 国产免费现黄频在线看| 热re99久久国产66热| 边亲边吃奶的免费视频| 在线免费观看不下载黄p国产| 成人亚洲欧美一区二区av| 亚洲五月色婷婷综合| 男女啪啪激烈高潮av片| 免费黄网站久久成人精品| 极品人妻少妇av视频| 久久久精品免费免费高清| 中文字幕最新亚洲高清| 国产成人午夜福利电影在线观看| 高清不卡的av网站| 亚洲,欧美,日韩| 美国免费a级毛片| 精品国产一区二区三区久久久樱花| 精品久久久精品久久久| 美女中出高潮动态图| 国产精品秋霞免费鲁丝片| 一区二区日韩欧美中文字幕| 成人国语在线视频| 精品视频人人做人人爽| 色哟哟·www| 成人午夜精彩视频在线观看| 国产一区二区 视频在线| 日本黄色日本黄色录像| 国产av国产精品国产| 亚洲三级黄色毛片| 欧美日韩视频精品一区| 激情视频va一区二区三区| 观看av在线不卡| 麻豆精品久久久久久蜜桃| 两性夫妻黄色片| 夜夜骑夜夜射夜夜干| 高清欧美精品videossex| 久久久国产欧美日韩av| videosex国产| 亚洲av福利一区| 女的被弄到高潮叫床怎么办| 夫妻性生交免费视频一级片| 成人影院久久| 午夜福利视频在线观看免费| 两性夫妻黄色片| 亚洲欧美一区二区三区久久| 在线观看人妻少妇| 亚洲美女黄色视频免费看| 三级国产精品片| av有码第一页| 91久久精品国产一区二区三区| 波多野结衣av一区二区av| 欧美日韩一级在线毛片| 欧美 亚洲 国产 日韩一| 国产av一区二区精品久久| 高清av免费在线| 乱人伦中国视频| 日韩av在线免费看完整版不卡| 国产97色在线日韩免费| 亚洲,一卡二卡三卡| 精品人妻在线不人妻| 美女国产视频在线观看| 啦啦啦啦在线视频资源| 国产探花极品一区二区| 好男人视频免费观看在线| 国产探花极品一区二区| 有码 亚洲区| 精品亚洲成国产av| 亚洲美女视频黄频| 久久久精品区二区三区| 精品酒店卫生间| www.精华液| 亚洲伊人色综图| 女性生殖器流出的白浆| 免费观看无遮挡的男女| 亚洲,欧美精品.| 国产精品免费大片| 97在线人人人人妻| 日韩伦理黄色片| 久久久久久免费高清国产稀缺| 精品人妻偷拍中文字幕| 亚洲综合精品二区| 亚洲精品自拍成人| 啦啦啦啦在线视频资源| 夫妻午夜视频| 国产探花极品一区二区| 免费黄色在线免费观看| 日本午夜av视频|