• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Novel RFID Localization Approach to Smart Self-Service Borrowing and Returning System

    2023-03-12 09:00:50SiguoBiCongWangJiajieShenWangXiangWeiNiXinWangBochunWuandYiGong

    Siguo Bi,Cong Wang,Jiajie Shen,Wang Xiang,Wei Ni,Xin Wang,Bochun Wu,★and Yi Gong,3,★

    1Fudan University,Shanghai,200433,China

    2Commonwealth Scientific and Industrial Research Organization,Sydney,2122,Australia

    3Zhengzhou University of Industrial Technology,Zhengzhou,451100,China

    ABSTRACT The misreading problem of a passive ultra-high-frequency(UHF)radio frequency identification(RFID)tag is a frequent problem arising in the field of librarianship.Unfortunately,existing solutions are something inefficient,e.g.,extra resource requirement,inaccuracy,and empiricism.To this end,under comprehensive analysis on the passive UHF RFID application in the librarianship scenario,a novel and judicious approach based on RFID localization is proposed to address such a misreading problem.Extensive simulation results show that the proposed approach can outperform the existing ones and can be an attractive candidate in practice.

    KEYWORDS IoT;RFID;passive UHF;tag misreading;librarianship;localization;failure analysis

    1 Introduction

    Driven by the great advances of integrated circuits (IC) and wireless communications [1], the applications of Internet-of-Things (IoT) have been infiltrated to each realm of the society [2], e.g.,environment surveillance, smart home, remote health care, and smart library.Thousands of devices equipped with sensing modules(e.g.,radio frequency identification(RFID))have been interconnected with each other [3–5].Specifically, as a critical IoT technology, RFID has been widely adopted and deployed in many fields, e.g., access control, traffic control, retail business, and librarianship, due to its convenience in non-contacted bidirectional data communication [6–8].As a matter of fact,RFID technology has been applied in librarianship to improve the efficiency of book circulation since the 1990s.Until now,libraries worldwide have typically deployed ultra-high-frequency(UHF)RFID technology to manage books instead of the manual way,which is inefficient and error-prone.

    Despite the great convenience of UHF RFID, there still exists some fatal failure in the book circulations of libraries,and the typical ones are concentrated in the tag misreading of the UHF RFID self-service borrowing and returning system(RFID-SBRS).According to[9,10],the detection radius of UHF RFID can be up to 10 m.While this extends the effective operation range of the RFID systems,it is the key cause of the misreading problem encountered by libraries.Although the transmitting power of the UHF RFID readers has been restricted to alleviate the misreading or interference from the other irrelevant passive UHF RFID tags,there inevitably exists quite a few cases caused by tag misreading,especially taking the near-field and far-field effect into consideration.To tackle this,an effective way is urgently needed.

    1.1 Basic Framework of UHF RFID-SBRS

    First of all, it will be necessary for us to introduce the basic framework of UHF RFID-SBRS briefly.A typical UHF RFID-SBRS is a classic client-server (CS) architecture, whose components mainly include three kinds:the tag,the terminal,and the server[11–14].

    Tag:An UHF RFID tag is a physical data carrier for storing the data information of the identified object,and there are two major types of UHF RFID tags:active tags and passive tags.The active tags are generally equipped with built-in batteries to supply the power for transmitting signals,while the passive tags are battery-free, and the power for transmitting signals depends on the electromagnetic induction power transmitted from UHF RFID readers.

    Terminal:An UHF RFID-SBRS terminal is equipped with an UHF RFID reader,middleware,operating system,and corresponding RFID application software.The UHF RFID reader can transmit reading signals,receive the backscatter from the passive UHF RFID tag,and demodulate the specific data.The middleware is an interface including drives of hardware,data reading and writing protocol,etc.It can be seen as a bridge for data exchange between RFID software and hardware.The operating system is the software operating on a higher level than middleware and can be seen as a container for running RFID application software.The RFID application software is the special software integrated with all kinds of book-related transactions, e.g., user identity authority service, books information query service,and books borrowing and returning service,etc.

    Server:An RFID-SBRS server is a system including both physical hardware and software,and can be used to process the request from the UHF RFID-SBRS terminal for book-related transactions,e.g.,process the corresponding borrowing transactions based on the general data interface and integrated library system.

    The identification procedure of a general UHF RFID system is listed as follows:

    · The UHF RFID reader starts the identification process by sending out radio frequency signals via antennas and keeping the detection in the meantime.

    · Whenever a passive UHF RFID tag is in the scope of action of the radio signal by the RFID reader mentioned above, the passive UHF RIFD tag is activated, then powered by the radio frequency signal.

    · The stored information is coded,modulated,and then transmitted via embedded antennas by resorting to the electromagnetic induction power collected from the UHF RFID reader.

    · The signal transmitted by the passive UHF RFID tag is then received, demodulated, and decoded at the UHF RFID reader side.

    · After a series of data format transformations,the output data is delivered to the central control system and further processed.

    · The legitimacy of data is double-checked in the central control system.According to the specific instructions embodied in the data,the verified data is then used to control the corresponding transactions.

    Specifically,the RFID tag misreading problem mainly relates to the first three steps in the above list,and the details of such failure are discussed in the next section.

    1.2 Motivation and Contributions

    This paper is motivated to address the misreading problem of a passive UHF RFID tag generally adopted by libraries.A new approach based on RFID localization technology is proposed to determine an adequate threshold to differentiate the misread books from the intended books, specifically, the misread books considered in this paper are referred to the ones in the reading area of UHF RFID reader, but not in the predefined threshold.Given the considerable RFID localization accuracy, the misreading problem of a passive UHF RFID tag can be resolved.

    The key contributions of this paper are summarized,as follows:

    · A new RFID localization-based solution is proposed to resolve the book misreading failures in libraries,after the cause of failures is comprehensively analyzed.

    · The proposed solution can be technically readily and cost-effectively deployed with simple configurations.There is no need for additional hardware or firmware.

    · The proposed approach can achieve significant improvements in accuracy, availability, and robustness over existing solutions.

    The remainder of this paper is organized as follows.In Section 2, we analyze the misreading failure problem of passive UHF RFID tags,and overview existing solutions and their limitations.In Section 3,we propose a new RFID localization-based approach and provide the detailed procedure of the approach.We conduct extensive simulations to validate the accuracy,availability,and robustness of the approach in Section 4,followed by conclusions in Section 5.

    2 Failure Analysis

    2.1 Failure of RFID-SBRS

    Let us consider a typical scenario.A borrower wants to use the RFID-SBRS to borrow several books and waits in line for his turn.After a long-time waiting,he takes his turn to use RFID-SBRS.He logs in the system to obtain authorization for borrowing service with proper username and password,puts the wanted books in the specific places for RFID tags detection,and then chooses the number of wanted books via the interactive interface.The RFID reader of RFID-SBRS will immediately start the detection process and return a long list of book names for confirmation via the interactive interface.The borrower should carefully check the feedback list at this time.However,the borrower may restrict the number of lines with the number of wanted books and confirm the feedback for efficiency due to long waiting time or the urged pressure from the next borrower.Unfortunately,the RFID tags of the wanted books cannot be guaranteed to be valid all the time.The failures of RFID tags can be easily occurred.A considerable number of funds have been granted to purchase the new tags for the failed/faulted RFID tags in the field of library.It is worth noting that it is not realistic to recover the functionality of faulted RFID tags when considering the expense.Under the practical assumption of considered scenario,we thus unify the failed and faulted tags as the failure tags.In such a case,some of the books he/she just confirms to borrow are not the required ones but the misread ones from the other borrowers,bringing unnecessary troubles to multiple borrowers.

    How to efficiently identify the misread books and remind the borrower of the unwanted books in advance is the key to avoid the embarrassing failure problem,e.g.,give some tips when the misread books are identified or highlight the misread book names in the feedback list of RFID-SBRS.

    2.2 General Solutions Adopted in Librarianship

    The technology of tuning coverage distance of the RFID reader according to the actual scenario has been adopted in the field of library.The RFID project engineer has to make subjective decisions to fetch a suitable coverage distance of the deployed RFID reader.Such a case requires an RFID project engineer who has a high comprehensive quality,as well as the upcoming time and economic cost.Furthermore, limited coverage may cause an undesirable effect on the normal function of the RFID reader,e.g.,both the size and the material of books have a deep effect on the reliability of the RFID tag[15].The deeply affixed passive tags cannot be generally detected for too low transmitting power.In contrast,extensive coverage may cause more misreading on the books.One natural idea for tackling this troublesome thing is to locate all the detected books efficiently,and the books far away from RFID-SBRS can be seen as the unrelated books,and vice versa.

    2.3 Further Discussion on Direct Solutions

    One straightforward and plausible way is to utilize the localization of the active RFID tags to distinguish the wanted books from the misread ones based on the received signal strength (RSS).Typically, according to the classical path loss model, the attenuation of the signal propagated from an active RFID tag is a function of the distance between the RFID reader and the RFID tag, and the distance estimation can thus be translated into the power difference between the RFID reader and the active RFID tag.The transmitting power can be obtained from the specification of the active RFID tag,and the RSS can be directly obtained at the reader side.Yet, the cost of an active RFID tag can be comparatively high,and the size cannot be relatively small with the built-in battery,which consequently limits the life cycle.It is thus impractical for library to deploy thousands of active RFID tags on books.In reality, almost without exception, the RFID tags adopted by libraries to manage books are passive RFID tags for their superior characteristic on low cost and small size[16–18].

    3 Approach to Failure Prevention

    How to efficiently locate the misread books solely based on existing resources and circumstances of library becomes the key for solving the misreading problem.To this end, inspired by the recent work on RFID indoor localization technology,we develop a novel passive UHF RFID tag localization approach to overcome the failure of books misreading[19–21].With reasonably good accuracy,any defined threshold can be set according to the actual needs for identifying the right books for the borrower,and the failures on misreading can thus be alleviated.

    3.1 Preliminary

    The main principle of the proposed approach is based on two assumptions:

    · The RSS at the RFID reader is a function of the distance between the RFID reader and the passive RFID tag;

    · The environment around RFID-SBRS is comparatively static or conforms to the statistically regular environment.

    Let us first discuss the rationality of two assumptions.For the first assumption, the communication between the RFID reader and the passive RFID tag is duplex, which includes the signal transmitted from the RFID reader to the passive RFID tag and the backscatter from an activated passive RFID tag to the RFID reader.The channels in both directions are assumed to follow the wellknown path loss model.By resorting to the path loss model,it is thus rational to make the assumptions that the distance between the RFID reader and the passive RFID tag has a functional relationship with the RSS at the RFID reader.Based on this assumption, the longer the distance between the RFID reader and the RFID tag is,the more the path loss will be,and the less the RSS received by the RFID reader will be.For the second assumption,the RFID-SBRS is generally placed indoors(e.g.,the reading room and the comparatively static environment).In such a case,the effect of multi-path propagation and the interference are tiny.The channel model can thus maintain a steadily statistical state,e.g.,the free-space path loss model.

    3.2 Proposed Approach

    Based on the two assumptions above,we further propose an approach for identifying the justifiably needed books for the borrower.

    As shown in Fig.1,the workplace of RFID-SBRS is a semi-circle area centered at RFID-SBRS with the radius of the semi-circle area denoted asR.The area is divided intoM×Ngrids,whereMis the number of the divided sectors(identified byj∈{1,...,M}),andNis the number of the divided sweeps in each divided sector(identified byi∈{1,...,N})[22].As denoted by(xi,j,yi,j),the coordinate of grid(i,j)can be roughly calculated by

    whereRiandθjare the polar coordinates of grid(i,j).

    Figure 1:RFID-SBRS scheme

    Based on the model,the procedure of the proposed approach mainly includes two parts:the offline part and the online part,whose details are respectively listed below.

    3.2.1 Offline Part

    · Confirm the scope of the testing area.The test area is centered on the RFID-SBRS with an RFID reader equipped,with the maximum read range as the test radius.

    · Divide the test area into a set of grids.The number of the divided grids affects the accuracy of RFID tag identification.Typically, the more grids divided, the more accurate the tag identification can be.An on-site measurement can directly obtain a distance from each center of the grid to the RFID reader.

    · Set up a fingerprint set of the environment for RFID tag.In detail,in each center of the divided grids, to deploy a test RFID tag, take 100 times measurements of RSS at RFID reader, and take an average of the measurements as the final measured RSS for this grid.Combining the corresponding measured RSS with the distance be-tween each center of grid and RFID reader,a bijection relationship can be established,a fingerprint set of the test area with RSS as key,and the other data including distances and coordinates value is consequently set up[22,23].

    · Define a suitable distance threshold for distinguishing the misread books from the truly needed books,after the fingerprint set has been set up.

    · Store all the parameters,including the fingerprint set and the threshold parameter,into the local database of the RFID-SBRS terminal.

    3.2.2 Online Part

    · The borrower who carries wanted books equipped with RFID tags enters into the test area of the RFID-SBRS.

    · The borrower can confirm the number of the books,the RSS of related books can be obtained at the RFID reader.

    · The measured RSS is compared with the aforementioned RSS fingerprint database built in the offline part.The K closest key-value pairs with measured RSS can be chosen from the fingerprint database.

    · For each detected book, take a coordinates average of the chosen as the final pre-dicted localization, and compare the localization with the threshold parameter.Any RFID tag exceeding the threshold parameter will be judged as the misread RFID tags.The detection of multiple tags can be generalized to differentiate the tags if the pairwise distance is longer than the resolution of the proposed approach,as discussed in Section 4.The predicted localization can be given by

    wherexis the horizontal coordinate andyis the vertical coordinate, andxkandykare the coordinates ofk-th chosen fingerprint as inspired by the well-knownK-nearest neighbor(KNN)algorithm[24].

    · The location information and the preset book ID information of each detected book are encapsulated into a data pair,inserted into the raw list of detected books,and sent to the RFIDSBRS server for further processing.

    · The RFID-SBRS server parses the raw list sent from the RFID-SBRS terminal,and processes the list of tags,e.g.,setting the status field of misread tags bonded with specific ID to“1”.Then,the processed list is returned to the RFID-SBRS terminal.

    · The RFID-SBRS terminal filters out all the misread books in the feedback list of book names,or highlight the misread books in the feedback list, e.g., all the mis-read book names are highlighted with red color,in contrast to the black color for wanted books.

    4 Simulation Results

    We conduct simulations using synthetic data generated according to the path loss model in[25].The RSS at RFID reader is assumed to be corrupted by multiplicative noise for robustness,as given by

    wherePris the RSS at the RFID reader,Ptis the transmitting power of the RFID reader,γis a path loss exponent,dis the actual distance between the transmitter and the receiver,d0is a distance parameter related to a specific scenario,θis a Gaussian variable with zero-mean andσ2-variance[19],andKis a parameter related tod0,as given by

    4.1 Realization of the Proposed Approach

    As shown in Fig.2, we consider a realization of the scenario as discussed in Section 3, where parameters are set up as follows.The radius of the semi-circle areaR= 10 m [9,10], the number of divided angelsM= 5, the number of divided radiusN= 5, the transmitting power of the RFID readerPt= 30 dBm,the frequency of transmitting radio signalf= 900 MHz[25,26],the parameterd0= 1 m,the path loss exponentγ= 2,the KNN parameterK= 10,and the varianceσ2= 0.001.It can be observed that the predicted position under the proposed approach is almost the same as the true position,even with the RSS corrupted.

    Figure 2:Realization for RFID tag localization using the proposed approach

    4.2 Metrics for Evaluation

    We consider two metrics to evaluate the proposed approach, as shown in Figs.3 and 4.All the parameters are the same as in the previous subsection,exceptM=N= 10 and the variation ofK.In order to further measure the robustness of proposed approach,we have also considered the cases that the variances of noise are respectively 0.001,0.01,and 0.1.Every point ofKis the average of 100 realizations.It can be observed that the error evaluated by the metric of error of distance is generally smaller than the metric of error of a position.This is due to the evaluation of position can be seen as a two-dimensional localization,while the evaluation of distance can be seen as a one-dimensional localization.With the same prior knowledge, the estimation for a smaller scale of parameters can be more accurate, e.g., only the absolute distance is considered in Fig.4, in contrast to the concrete position estimation as in Fig.3.In the actual scenario,it seems more suitable to evaluate the approach with a metric of distance.In other words,the books can be seen as the wanted ones once placed within the bounds of the threshold.Both of them can be valid evaluations according to the specific needs.It is worth noting that parameterKcan be generally obtained via cross-validation.It can also be observed that the proposed approach can exhibit fine performance with the error no more than 0.2 under the case that variance of noise is 0.01 when evaluated by error of distance.Even under the case that variance of noise is 0.1, the errors evaluated by both metrics are still no more than 1, and can still be an efficient solution in actual scenario.It is worth mentioning that multiple tags that are very close to each other can be differentiated if the pairwise distance is longer than the resolution of the proposed approach,e.g.,0.2 in the case that the noise variance is 0.001.

    Figure 3:Impact on error of position

    Figure 4:Impact on error of distance

    4.3 Discussion of Practical Deployment

    We further consider the impact of the scale of grids.All the parameters in Fig.5 are consistent with the parameters in Fig.2 except the variation of the scale of grids.Without loss of generality,the number of the divided angels is equal to the number of the divided radius under each realization,and every point of the scale of grids is the average of 100 realizations.We have also considered the cases that the variances of noise are respectively 0.001, 0.01, and 0.1.It can be observed that the error of position decreases geometrically with the increasing scale of grids.This accords with the basic prior knowledge, which can be interpreted that the localization will be more accurate with more accurate neighbors’information.In practice,deploying more grids implies more overhead in the offline part of the proposed approach.It will be more sensible to have a reasonable trade-off between accuracy and expense.It can also be observed that the proposed approach exhibits fine robustness when the scale of grids is over 5.Under the consideration of combining the expense with the robustness,a suitable the scale of grids can be rationally determined,e.g.,the scale of grids is 5.

    Figure 5:Impact of grid number on the error of position

    The RFID readers typically have cross polarization to capture different possible orientations of the RFID tags(due to manual placement).The affected area is typically a semi-hemisphere centered at the RFIS reader in three-dimensional(3D)spaces,and a semi-circular area in the top view.For illustration convenience, we consider horizontally polarized RFID tags and study the horizontal semi-circular area.Nevertheless,the study can be readily extended to a semi-hemispherical area in 3D spaces.We next evaluate the proposed approach in a 3D scenario, where the space is a semi-hemisphere area centered at semi-hemisphere area.Fig.6 shows a realization of the proposed approach deployed in 3D scenario.All the parameters in Fig.5 are consistent with the parameters in Fig.2 except the test space is a 3D space.It can be observed that the predicted position under the proposed approach is almost the same as the true position,even applied in the 3D scenario.

    Figure 6: Realization for RFID tag localization using the proposed approach in three dimensional space

    5 Conclusions

    The misreading of a passive UHF RFID tag is a critical issue frequently arising in the field of librarianship.We made a comprehensive analysis on such a recurrent problem with an actual scenario as an entry point.We further discussed the existing solutions adopted by most libraries,and developed a novel approach for accurate book localization based on RFID,without needing extra resources.The extensive simulation results show that the proposed approach can achieve significant performance on accuracy,availability,and robustness,and can thus be an attractive candidate in practice.

    It is worth noting that in our discussion on the accurate RFID tag localization by the proposed approach applied in the librarianship, the RFID-based misread cases can be readily and efficiently alleviated without extra resources, which can be an attractive engine for any RFID-relied scenarios.For example, considering the RFID-based self-help checkout machine adopted in the supermarket,it apparently can lead to the economic loss of the customers when the RFID tags of commodities are misread.A similar case can be aroused in the scenario of an RFID-based self-help charge for parking.In addition,in the scenario of medical care service,the RFID-based misread cases will cause not only money expense but also personal health even death on the patients.Thus,in our future work,we intend to extend the proposed approach to more passive UHF RFID based scenarios and to take more artificial intelligence (AI)-based ideologies into considerations, aiming to further develop the approach.

    Acknowledgement:Part of this work was initially presented at CCIE 2021[27].

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲专区国产一区二区| 赤兔流量卡办理| 成年人午夜在线观看视频| 91老司机精品| 日韩制服骚丝袜av| 成年人黄色毛片网站| 免费看十八禁软件| 成人国产一区最新在线观看 | 国产真人三级小视频在线观看| 超碰97精品在线观看| 国产在视频线精品| 校园人妻丝袜中文字幕| 一本—道久久a久久精品蜜桃钙片| 老鸭窝网址在线观看| 欧美日本中文国产一区发布| 男女边吃奶边做爰视频| 1024视频免费在线观看| 亚洲成色77777| 日韩欧美一区视频在线观看| 蜜桃国产av成人99| 久久久久网色| 亚洲av电影在线观看一区二区三区| 日本wwww免费看| 亚洲激情五月婷婷啪啪| 久久女婷五月综合色啪小说| 欧美97在线视频| 一级黄色大片毛片| 国产1区2区3区精品| 国产精品 欧美亚洲| 亚洲人成电影免费在线| 中文字幕人妻丝袜制服| 蜜桃在线观看..| 精品视频人人做人人爽| 嫩草影视91久久| 国产无遮挡羞羞视频在线观看| 亚洲精品日本国产第一区| 热re99久久国产66热| 精品少妇久久久久久888优播| 免费久久久久久久精品成人欧美视频| 日本午夜av视频| 免费女性裸体啪啪无遮挡网站| 国产精品二区激情视频| 80岁老熟妇乱子伦牲交| 飞空精品影院首页| 国产精品一二三区在线看| 国产片特级美女逼逼视频| 亚洲成人手机| 亚洲,一卡二卡三卡| 成人三级做爰电影| 国产精品秋霞免费鲁丝片| 亚洲国产中文字幕在线视频| 电影成人av| 少妇裸体淫交视频免费看高清 | 青青草视频在线视频观看| 18禁裸乳无遮挡动漫免费视频| 一级片'在线观看视频| 日韩大片免费观看网站| 1024视频免费在线观看| 国产免费现黄频在线看| h视频一区二区三区| 午夜精品国产一区二区电影| 在现免费观看毛片| av国产精品久久久久影院| 精品久久蜜臀av无| 麻豆国产av国片精品| 丝袜美腿诱惑在线| 亚洲成人国产一区在线观看 | 中文字幕人妻熟女乱码| 只有这里有精品99| 大型av网站在线播放| 天堂中文最新版在线下载| 亚洲九九香蕉| 永久免费av网站大全| 亚洲一码二码三码区别大吗| 欧美精品一区二区大全| av有码第一页| 大香蕉久久网| 国产男女超爽视频在线观看| 美女脱内裤让男人舔精品视频| 久久亚洲精品不卡| av天堂在线播放| 自线自在国产av| 亚洲国产欧美日韩在线播放| 亚洲熟女毛片儿| 丝袜美足系列| 看免费av毛片| 婷婷丁香在线五月| 国产麻豆69| 如日韩欧美国产精品一区二区三区| 视频在线观看一区二区三区| 久久人妻熟女aⅴ| 久久久国产精品麻豆| www.999成人在线观看| 18禁国产床啪视频网站| 一本一本久久a久久精品综合妖精| 国产不卡av网站在线观看| 免费看不卡的av| 午夜福利,免费看| 91精品三级在线观看| 99国产精品免费福利视频| 国产欧美日韩精品亚洲av| 久久亚洲国产成人精品v| 另类亚洲欧美激情| avwww免费| 午夜免费男女啪啪视频观看| 欧美变态另类bdsm刘玥| 免费少妇av软件| 少妇精品久久久久久久| 天天影视国产精品| 国产真人三级小视频在线观看| 一个人免费看片子| 丝袜喷水一区| 亚洲第一av免费看| 日韩电影二区| 成人午夜精彩视频在线观看| 亚洲久久久国产精品| 啦啦啦 在线观看视频| 亚洲人成77777在线视频| 成人亚洲精品一区在线观看| 成年美女黄网站色视频大全免费| 免费观看av网站的网址| 在线看a的网站| 亚洲一区二区三区欧美精品| 国产黄色免费在线视频| 纵有疾风起免费观看全集完整版| cao死你这个sao货| 永久免费av网站大全| 亚洲七黄色美女视频| 一级,二级,三级黄色视频| 久久性视频一级片| 久久精品成人免费网站| 91国产中文字幕| 日本av免费视频播放| 91国产中文字幕| 国产黄频视频在线观看| 欧美日韩福利视频一区二区| 久久精品久久久久久噜噜老黄| 国产国语露脸激情在线看| 亚洲国产av影院在线观看| 国产男人的电影天堂91| 国产精品 欧美亚洲| 久久久久精品国产欧美久久久 | 在线 av 中文字幕| 女人爽到高潮嗷嗷叫在线视频| 欧美国产精品va在线观看不卡| 亚洲欧美中文字幕日韩二区| 男人爽女人下面视频在线观看| 国产精品99久久99久久久不卡| 麻豆乱淫一区二区| 亚洲三区欧美一区| 韩国高清视频一区二区三区| 日韩制服丝袜自拍偷拍| 伊人久久大香线蕉亚洲五| 欧美在线黄色| 久久精品人人爽人人爽视色| 成人手机av| 大片电影免费在线观看免费| netflix在线观看网站| 国产成人a∨麻豆精品| 久久久久久久久久久久大奶| 日韩制服骚丝袜av| 青春草亚洲视频在线观看| 国产免费一区二区三区四区乱码| 黄网站色视频无遮挡免费观看| av在线app专区| 午夜免费男女啪啪视频观看| 国产成人一区二区在线| 90打野战视频偷拍视频| 久久精品成人免费网站| 色婷婷av一区二区三区视频| 久久99热这里只频精品6学生| 一本久久精品| 国产黄色视频一区二区在线观看| 亚洲成人免费电影在线观看 | 波野结衣二区三区在线| 狠狠婷婷综合久久久久久88av| 欧美日韩成人在线一区二区| 亚洲天堂av无毛| 一本色道久久久久久精品综合| 国产精品欧美亚洲77777| 国产成人a∨麻豆精品| 亚洲精品国产av成人精品| 国产精品熟女久久久久浪| 曰老女人黄片| 亚洲精品中文字幕在线视频| 亚洲av美国av| 久久免费观看电影| 极品人妻少妇av视频| 高清不卡的av网站| 水蜜桃什么品种好| 国产精品久久久av美女十八| 成人免费观看视频高清| 欧美亚洲 丝袜 人妻 在线| 一本色道久久久久久精品综合| 亚洲av片天天在线观看| 国产精品免费视频内射| 国产精品国产三级国产专区5o| 黄网站色视频无遮挡免费观看| 国产精品麻豆人妻色哟哟久久| 欧美变态另类bdsm刘玥| 美女高潮到喷水免费观看| 青草久久国产| 欧美黄色淫秽网站| 久久热在线av| av电影中文网址| 激情视频va一区二区三区| 三上悠亚av全集在线观看| 日韩电影二区| 美女脱内裤让男人舔精品视频| 国产色视频综合| 黑人猛操日本美女一级片| 在现免费观看毛片| av在线老鸭窝| 国产欧美亚洲国产| 国产伦人伦偷精品视频| 亚洲国产欧美一区二区综合| 嫁个100分男人电影在线观看 | 欧美日韩精品网址| 亚洲av综合色区一区| 亚洲精品一区蜜桃| 亚洲精品美女久久久久99蜜臀 | 日韩 亚洲 欧美在线| 巨乳人妻的诱惑在线观看| 精品久久久久久久毛片微露脸 | 九草在线视频观看| 欧美成狂野欧美在线观看| 国产一区二区三区av在线| 免费不卡黄色视频| 国产亚洲午夜精品一区二区久久| 亚洲情色 制服丝袜| 好男人视频免费观看在线| a级毛片黄视频| 黄色 视频免费看| 天天躁狠狠躁夜夜躁狠狠躁| 国产一区二区激情短视频 | 超色免费av| 男女高潮啪啪啪动态图| a级毛片黄视频| 美女午夜性视频免费| 久久人妻熟女aⅴ| 菩萨蛮人人尽说江南好唐韦庄| 国产成人av激情在线播放| 亚洲欧美日韩另类电影网站| 国产成人欧美| 老司机靠b影院| 少妇粗大呻吟视频| 亚洲专区中文字幕在线| 自线自在国产av| 精品人妻1区二区| 午夜日韩欧美国产| 中文乱码字字幕精品一区二区三区| 嫩草影视91久久| 欧美激情 高清一区二区三区| 一级,二级,三级黄色视频| 免费不卡黄色视频| 欧美另类一区| 国产av国产精品国产| 免费一级毛片在线播放高清视频 | 嫩草影视91久久| 久热这里只有精品99| 90打野战视频偷拍视频| 国产麻豆69| 91精品国产国语对白视频| 亚洲五月色婷婷综合| 欧美成人精品欧美一级黄| 美女午夜性视频免费| 成人免费观看视频高清| 一级片免费观看大全| bbb黄色大片| 亚洲精品国产一区二区精华液| 女性被躁到高潮视频| 天天影视国产精品| 免费观看人在逋| 色婷婷av一区二区三区视频| 国产成人精品久久二区二区免费| 日韩制服丝袜自拍偷拍| 大香蕉久久网| 亚洲国产av新网站| 无限看片的www在线观看| tube8黄色片| 成人亚洲欧美一区二区av| 日韩伦理黄色片| 亚洲色图综合在线观看| 韩国高清视频一区二区三区| 赤兔流量卡办理| 男女下面插进去视频免费观看| 最新在线观看一区二区三区 | 午夜两性在线视频| 两个人免费观看高清视频| 大型av网站在线播放| 一级片'在线观看视频| 美女国产高潮福利片在线看| 欧美97在线视频| 国产女主播在线喷水免费视频网站| 久久久久视频综合| 日本欧美国产在线视频| 在线观看一区二区三区激情| 你懂的网址亚洲精品在线观看| 亚洲免费av在线视频| 国产精品 欧美亚洲| 高清不卡的av网站| 亚洲五月色婷婷综合| 免费黄频网站在线观看国产| 欧美人与善性xxx| 中文欧美无线码| 2018国产大陆天天弄谢| 99九九在线精品视频| 晚上一个人看的免费电影| 在线观看免费视频网站a站| 满18在线观看网站| 国产精品一国产av| av国产精品久久久久影院| 婷婷色av中文字幕| 国产精品麻豆人妻色哟哟久久| 男女床上黄色一级片免费看| 男女下面插进去视频免费观看| 日韩制服骚丝袜av| 亚洲,一卡二卡三卡| 亚洲欧美日韩另类电影网站| 亚洲成人免费av在线播放| 免费女性裸体啪啪无遮挡网站| 少妇人妻久久综合中文| 久久ye,这里只有精品| 免费日韩欧美在线观看| 欧美av亚洲av综合av国产av| 人人妻人人澡人人爽人人夜夜| 最黄视频免费看| 日本av手机在线免费观看| 黄网站色视频无遮挡免费观看| 久久久精品免费免费高清| 欧美精品一区二区大全| 777米奇影视久久| 夜夜骑夜夜射夜夜干| www.自偷自拍.com| 性高湖久久久久久久久免费观看| 国产极品粉嫩免费观看在线| 亚洲自偷自拍图片 自拍| 精品视频人人做人人爽| 只有这里有精品99| 久久综合国产亚洲精品| 18禁观看日本| 男女之事视频高清在线观看 | 精品少妇久久久久久888优播| 欧美 日韩 精品 国产| 老汉色av国产亚洲站长工具| 久久99精品国语久久久| 高清av免费在线| 色婷婷久久久亚洲欧美| 日本91视频免费播放| 亚洲人成77777在线视频| 国产极品粉嫩免费观看在线| 色视频在线一区二区三区| 日韩中文字幕欧美一区二区 | 成年女人毛片免费观看观看9 | 婷婷色综合大香蕉| 黄片播放在线免费| 精品国产超薄肉色丝袜足j| 两个人免费观看高清视频| 交换朋友夫妻互换小说| xxx大片免费视频| 中文字幕精品免费在线观看视频| 日本五十路高清| 女人久久www免费人成看片| 久久久精品国产亚洲av高清涩受| 久久精品国产综合久久久| 日本五十路高清| 久久精品人人爽人人爽视色| 国产免费一区二区三区四区乱码| 国产又色又爽无遮挡免| 最黄视频免费看| 亚洲av片天天在线观看| 精品视频人人做人人爽| 亚洲一卡2卡3卡4卡5卡精品中文| 丝袜美足系列| 久久精品熟女亚洲av麻豆精品| 亚洲精品自拍成人| 啦啦啦视频在线资源免费观看| 丝袜喷水一区| 亚洲精品自拍成人| 亚洲,一卡二卡三卡| 日本91视频免费播放| 美女大奶头黄色视频| 久久久久久久精品精品| 欧美+亚洲+日韩+国产| 亚洲七黄色美女视频| 两个人看的免费小视频| 男女午夜视频在线观看| 国产精品一区二区在线观看99| 国产亚洲午夜精品一区二区久久| 国产精品香港三级国产av潘金莲 | 国产精品久久久人人做人人爽| 多毛熟女@视频| 成人午夜精彩视频在线观看| 成人18禁高潮啪啪吃奶动态图| a级片在线免费高清观看视频| 国产精品一区二区在线不卡| 国产精品二区激情视频| 久久 成人 亚洲| 日韩熟女老妇一区二区性免费视频| 啦啦啦在线免费观看视频4| 黄色一级大片看看| 午夜91福利影院| 亚洲九九香蕉| 中文乱码字字幕精品一区二区三区| 国产成人精品久久二区二区91| 亚洲欧美中文字幕日韩二区| 日韩大码丰满熟妇| 老汉色∧v一级毛片| 亚洲熟女精品中文字幕| 亚洲 国产 在线| 国产一区二区在线观看av| 97在线人人人人妻| 国产男人的电影天堂91| 赤兔流量卡办理| 国产精品一区二区在线不卡| 久久久久精品人妻al黑| 在线观看免费高清a一片| 亚洲av日韩精品久久久久久密 | 亚洲,欧美精品.| 亚洲av电影在线观看一区二区三区| 亚洲国产精品999| 9色porny在线观看| 女人久久www免费人成看片| 大片免费播放器 马上看| 美女脱内裤让男人舔精品视频| 亚洲自偷自拍图片 自拍| 亚洲一码二码三码区别大吗| 一级黄片播放器| 只有这里有精品99| 亚洲国产成人一精品久久久| 99热网站在线观看| 男女无遮挡免费网站观看| 免费av中文字幕在线| 热99久久久久精品小说推荐| 日本av手机在线免费观看| 国产亚洲欧美在线一区二区| 一本大道久久a久久精品| 国产女主播在线喷水免费视频网站| 日韩 亚洲 欧美在线| 欧美亚洲 丝袜 人妻 在线| 亚洲精品国产区一区二| 女警被强在线播放| 国产在线观看jvid| 国产高清videossex| 深夜精品福利| 99久久综合免费| 免费观看人在逋| 亚洲国产精品成人久久小说| 只有这里有精品99| 91字幕亚洲| 成人国产av品久久久| 欧美人与性动交α欧美软件| 天天躁夜夜躁狠狠久久av| 亚洲成人免费电影在线观看 | 免费黄频网站在线观看国产| 婷婷色综合www| 肉色欧美久久久久久久蜜桃| 一级a爱视频在线免费观看| 亚洲精品久久久久久婷婷小说| 丝袜在线中文字幕| 亚洲免费av在线视频| 国产淫语在线视频| 制服人妻中文乱码| av有码第一页| 免费日韩欧美在线观看| 欧美亚洲 丝袜 人妻 在线| 女人被躁到高潮嗷嗷叫费观| 欧美黄色淫秽网站| 另类亚洲欧美激情| 亚洲精品av麻豆狂野| 美女脱内裤让男人舔精品视频| 美女国产高潮福利片在线看| 欧美精品一区二区免费开放| 日本五十路高清| av网站在线播放免费| 亚洲成人国产一区在线观看 | 中文字幕人妻丝袜制服| 侵犯人妻中文字幕一二三四区| 后天国语完整版免费观看| 日韩制服丝袜自拍偷拍| 熟女少妇亚洲综合色aaa.| 欧美激情 高清一区二区三区| 啦啦啦视频在线资源免费观看| 国产有黄有色有爽视频| 亚洲专区国产一区二区| 欧美日韩福利视频一区二区| 久久久国产欧美日韩av| 男女国产视频网站| 亚洲国产日韩一区二区| 亚洲自偷自拍图片 自拍| 中国美女看黄片| 欧美 日韩 精品 国产| 最新在线观看一区二区三区 | 18禁裸乳无遮挡动漫免费视频| 人妻 亚洲 视频| 国产99久久九九免费精品| 国产熟女欧美一区二区| 亚洲五月色婷婷综合| 精品国产乱码久久久久久小说| 一个人免费看片子| 久久影院123| 人人妻人人澡人人爽人人夜夜| 国产老妇伦熟女老妇高清| 久久精品亚洲av国产电影网| 午夜免费成人在线视频| 日本猛色少妇xxxxx猛交久久| www.999成人在线观看| 女人爽到高潮嗷嗷叫在线视频| 天天躁夜夜躁狠狠久久av| 每晚都被弄得嗷嗷叫到高潮| 成年女人毛片免费观看观看9 | 国产一区二区在线观看av| 日韩电影二区| 久久精品久久精品一区二区三区| 国产伦人伦偷精品视频| 久久久精品区二区三区| 亚洲免费av在线视频| 亚洲人成网站在线观看播放| 午夜福利视频精品| 欧美精品人与动牲交sv欧美| 亚洲国产成人一精品久久久| 色综合欧美亚洲国产小说| 男女床上黄色一级片免费看| 亚洲精品国产av成人精品| 亚洲精品久久久久久婷婷小说| 韩国精品一区二区三区| 欧美国产精品一级二级三级| 性高湖久久久久久久久免费观看| 9热在线视频观看99| 69精品国产乱码久久久| 美女午夜性视频免费| 高潮久久久久久久久久久不卡| 欧美激情高清一区二区三区| 建设人人有责人人尽责人人享有的| 国产精品秋霞免费鲁丝片| 日韩欧美一区视频在线观看| 日日爽夜夜爽网站| 精品福利永久在线观看| 狠狠精品人妻久久久久久综合| 大片电影免费在线观看免费| 久久鲁丝午夜福利片| www日本在线高清视频| 成人黄色视频免费在线看| 在线观看一区二区三区激情| 黄色怎么调成土黄色| 精品免费久久久久久久清纯 | 日本wwww免费看| 成人午夜精彩视频在线观看| 丝袜美足系列| 又大又爽又粗| 国产野战对白在线观看| 国产一区二区 视频在线| 久久人妻福利社区极品人妻图片 | 日本wwww免费看| 国产精品久久久人人做人人爽| 大片免费播放器 马上看| 亚洲精品自拍成人| 97在线人人人人妻| 在线亚洲精品国产二区图片欧美| 美女扒开内裤让男人捅视频| 国产精品.久久久| 亚洲精品一卡2卡三卡4卡5卡 | 国产男人的电影天堂91| 黄色视频不卡| 午夜激情av网站| 后天国语完整版免费观看| 国产xxxxx性猛交| 日日夜夜操网爽| 一级片免费观看大全| 久久精品国产a三级三级三级| 免费av中文字幕在线| 午夜福利在线免费观看网站| 国产精品国产三级国产专区5o| 国产97色在线日韩免费| av视频免费观看在线观看| netflix在线观看网站| 只有这里有精品99| 亚洲第一av免费看| 国产av国产精品国产| 久久久久久久久久久久大奶| 国产在线一区二区三区精| 精品一区在线观看国产| 国产精品av久久久久免费| 妹子高潮喷水视频| 一级片'在线观看视频| 亚洲av日韩精品久久久久久密 | 成年美女黄网站色视频大全免费| 悠悠久久av| www.精华液| 国产高清不卡午夜福利| 热re99久久精品国产66热6| 成人三级做爰电影| 久久精品人人爽人人爽视色| 日韩一区二区三区影片| av又黄又爽大尺度在线免费看| www.av在线官网国产| 亚洲专区国产一区二区| 欧美黄色淫秽网站| 日韩,欧美,国产一区二区三区| 777久久人妻少妇嫩草av网站| 亚洲av成人精品一二三区| a级片在线免费高清观看视频| av不卡在线播放| 18禁黄网站禁片午夜丰满| 1024香蕉在线观看| 不卡av一区二区三区| 欧美日韩一级在线毛片| 久久毛片免费看一区二区三区| 无限看片的www在线观看| av福利片在线| 蜜桃在线观看..| 欧美国产精品va在线观看不卡| 亚洲欧洲国产日韩| 久久av网站| 老司机在亚洲福利影院|