• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Behavior pattern mining based on spatiotemporal trajectory multidimensional information fusion

    2023-05-19 03:40:38QiowenJIANGYuLIUZirnDINGShunSUN
    CHINESE JOURNAL OF AERONAUTICS 2023年4期

    Qiowen JIANG, Yu LIU,b,*, Zirn DING, Shun SUN

    aInstitute of Information Fusion, Naval Aviation University, Yantai 264001, China

    bDepartment of Electronic Engineering, Tsinghua University, Yantai 100083, China

    KEYWORDSBehavior pattern;Hausdorff distance;Information fusion;Spatiotemporal trajectory;Trajectory clustering

    AbstractTrajectory data mining is widely used in military and civil applications, such as early warning and surveillance system, intelligent traffic system and so on.Through trajectory similarity measurement and clustering, target behavior patterns can be found from massive spatiotemporal trajectory data.In order to mine frequent behaviors of targets from complex historical trajectory data, a behavior pattern mining algorithm based on spatiotemporal trajectory multidimensional information fusion is proposed in this paper.Firstly, spatial–temporal Hausdorff distance is proposed to measure multidimensional information differences of spatiotemporal trajectories, which can distinguish the behaviors with similar location but different course and velocity.On this basis,by combining the idea of k-nearest neighbor and density peak clustering,a new trajectory clustering algorithm is proposed to mine behavior patterns from trajectory data with uneven density distribution.Finally, we implement the proposed algorithm in simulated and radar measured trajectory data respectively.The experimental results show that the proposed algorithm can mine target behavior patterns from different complex application scenarios more quickly and accurately compared to the existing methods, which has a good application prospect in intelligent monitoring tasks.

    1.Introduction

    With the rapid development of target location technology such as radar,sonar,satellite,and wireless sensor network,a multilayer sensor early warning and surveillance system has been established, covering land, air, marine, and even underwater targets.1–5Many kinds of monitored targets are accurately detected, tracked and correlated, and finally recorded in the form of spatiotemporal trajectory.6–8Massive spatiotemporal trajectories are constantly generated and accumulated in the early warning and surveillance system, which contain a lot of regular information and knowledge of target behavior.In the process of movement, targets often show their characteristics and regular behaviors.For example, in air traffic control, trajectories of military and civil aircraft show different characteristics in specific spatiotemporal range due to their different movement purposes, such as longitude, latitude, height,course, velocity and so on.The target behavior pattern refers to the typical global trajectories of targets that frequently appear in a certain spatiotemporal range according to their action purpose.Through reasonable multidimensional similarity measurement and unsupervised clustering technology, we can fully mine the behavior patterns of targets during task activities from massive historical spatiotemporal trajectory data.These behavior patterns provide decision makers with knowledge of regularity, which contributes to situational awareness,command and dispatch.At present,trajectory data mining technology has become a hot topic in both military and civil fields,9–11which is of great significance for situation evaluation, threat assessment, behavior prediction, abnormal behavior detection, and intelligent command decisions.

    In recent years, many researchers have conducted a large number of valuable studies on target behavior pattern analysis methods.Zheng12systematically summarized the existing trajectory data mining techniques, and constructed a behavior pattern mining framework including trajectory data preprocessing, similarity measurement and trajectory clustering.Tao et al.13compared five of the most important and commonly used similarity measures in different application scenarios.Morris and Trivedi14proposed a trajectory clustering framework for live video to analyze behaviors of surveillance subjects.Li et al.15analyzed flight data using clustering techniques to identify and mitigate risks before accidents occur.Rong et al.16proposed an Automatic Identification System(AIS)trajectory data mining method to analyze maritime traffic patterns.Reyes et al.17proposed a GPS trajectory clustering method for decision making on intelligent transportation systems.Izakian et al.18proposed an automated trajectory data clustering method using Dynamic Time Warping (DTW) and Particle Swarm Optimization (PSO).Li et al.19proposed an adaptive constrained DTW algorithm by introducing penalty function, which can adaptively adjust the corresponding relationship between spatiotemporal trajectories.With the development of Deep Learning (DL), some researchers tried to use Convolutional Neural Networks (CNN) to process trajectory information and classify target behavior patterns, which achieved some good results20–22.

    Although there have been a lot of studies on the similarity measurement and clustering methods of trajectories,some limitations still need to be resolved, which are shown below.

    In the research of trajectory similarity measurement, most widely used methods, such as DTW, Hausdorff Distance23(HD), Longest Common Sub-Sequence24(LCSS) and Fre′chet distance,25mainly consider the location information, ignoring the course and velocity information, which cannot distinguish the behavior patterns with similar location but different course and velocity.Lee et al.26proposed a new Hausdorff distance measurement algorithm integrating multiple horizontal, vertical and angular distance.Ansari et al.27applied similar idea to the spatiotemporal trajectories.But these methods only work well for sub-trajectory clustering, and are not suitable for some application scenarios which should cluster the whole trajectories.In recent years, some trajectory similarity measurements based on multi-feature are proposed.28,29However,this algorithm fuses multidimensional features of different dimensions through weight coefficient, which has disadvantages of difficult parameter setting and weak universality for different application scenarios.

    In trajectory clustering applications, current main clustering algorithms include K-means,30K-medoids,31Spectral Clustering32(SC), Density Based Spatial Clustering of Applications with Noise33(DBSCAN) and their improvements.Kmeans, K-medoids and SC algorithms need to set the number of clustering in advance, which usually requires multiple adjustment of parameters for trajectory data without prior knowledge.In addition,they cannot avoid the influence of outlier trajectories.DBSCAN can cluster trajectories based on density and eliminate outliers, which has been widely used in behavior pattern mining methods.However, DBSCAN works better for data with uniform density distribution and less well for data with complex density distribution.Density Peaks Clustering33(DPC) proposed by Rodriguez and Laio is an advanced clustering algorithm.It only needs one parameter and can cluster data of any shape,which is applied to behavior pattern mining.34But the disadvantage is that clustering centers and outliers need human selection.

    In order to solve the above problems,this paper carries out some innovative work.The main contributions of this paper can be summarized as follows:

    (1) Spatio-Temporal Hausdorff Distance (STHD) is proposed to measure multidimensional information of spatiotemporal trajectory, and meanwhile reduces the complexity of Hausdorff distance.

    (2) Center Trajectory Decision algorithm based on Filter Elbow method(FE-CTD)is proposed to determine the trajectory cluster centers and get rid of the outlier trajectories adaptively.

    (3) Spatiotemporal Trajectory K-Nearest Neighbor Decision Clustering algorithm based on Multidimensional Information Fusion (MIF-STKNNDC) is proposed, which can cluster trajectories with complex distributions.

    (4) The proposed algorithm is implemented in simulated and radar measured trajectory data respectively, which prove that it has better performance in running time,silhouette coefficient and accuracy compared with the existing methods.

    The rest of this paper is organized as follows.In Section 2,spatiotemporal trajectory and STHD are introduced.Then,FE-CTD and MIF-STKNNDC are introduced in Section 3.Next,two experiments are implemented to research the performance of the proposed algorithms in Section 4.Finally, conclusions are drawn in Section 5.

    2.Multidimensional trajectory similarity measure

    2.1.Spatiotemporal trajectory

    The spatiotemporal trajectory data is a sequence of several target intelligence information points in chronological order.The spatiotemporal trajectory data of all targets accumulated in the early warning and surveillance system is expressed as.

    where pi;krepresents the kth intelligence information data point in the ith spatiotemporal trajectory, and m is the total number of intelligence information points in the spatiotemporal trajectory tri.Due to the difference in sampling rate of various sensors and the occasional loss of information, the total number of intelligence information points is usually not the same in different spatiotemporal trajectories,even for trajectories with similar behaviour patterns.

    pi;kis an intelligence information point with multidimensional information, which contains at least two important information: detection time ti;kand target location li;k.ti;k

    2.2.Hausdorff distance

    Hausdorff distance is a measure to describe the similarity between two sets, which is widely used in the measurement of trajectory similarity.Its advantage is that it does not require the same sampling rate and the number of points of the trajectory, and can measure the global features of the entire trajectory.When the trajectory is incomplete, it can still measure the similarity well, and has strong robustness.For the spatiotemporal trajectories triand trj, the meaning of Hausdorff distance is the maximum of the nearest distance between the position information point in triand the position information point in trj, and the directional Hausdorff distance from trito trjis defined as.

    Fig.1 Schematic diagram of Spatiotemporal trajectory.

    Fig.2 Schematic diagram of directional Hausdorff distance.

    The directional Hausdorff distance of trajectory is shown in Fig.2.

    In general, we use bidirectional Hausdorff distance to define the similarity between trajectories:

    2.3.Spatiotemporal Hausdorff distance

    In fact,the target location information is the result of the accumulation of course and velocity in time during its movement.Therefore, we consider using the time information in spatiotemporal trajectories to measure multidimensional feature differences through the accumulation of distance between trajectories in time.By dividing time window, we propose a multidimensional trajectory similarity measure algorithm: Spatio-Temporal Hausdorff Distance (STHD) (see Algorithm 1),which could solve the problem that Hausdorff distance only considers the location information of trajectories, ignoring the course and velocity information.STHD is constructed by the following steps:

    Step 1.Determine the length of time slide window τ.τ is determined by parameter ξ, which represents the number of information points that we expect in each time window.Define the length of the time slide window.

    Step 2.Segment the trajectory according to the length τ of the time window.The spatiotemporal trajectorytriandtrjafter segmentation are expressed as.

    Fig.3 Add information points at edge of time windows.

    It can be seen intuitively from Fig.4 that,for spatiotemporal trajectories with similar position but opposite course,STHD reaches a high degree of differentiation in the first or last few time windows.For spatiotemporal trajectories with similar position but different velocity, STHD becomes larger and more discriminative as the time window moves.In this way,the similarity measure of multidimensional feature fusion such as position, course and velocity of spatiotemporal trajectory can be realized by using a distance measurement.STHD is an implicit multidimensional information fusion, which only uses the time and position information of the target, and can still distinguish the trajectory velocity and course characteristics without reliable velocity and course measurement.Due to the introduction of time information,compared with Hausdorff distance, trajectories with similar positions but different course and velocity have good regional differentiation.

    It is worth mentioning that STHD algorithm complexity is O(nξ ), while Hausdorff and MFHD algorithm complexity is O(nm ),which is better than Hausdorff and MFHD.In particular,when the time window τ is large enough,STHD is equivalent to the traditional Hausdorff distance and the complexity is O(nm ).In this case, the algorithm has the maximum complexity and cannot reflect the difference of trajectory speed and heading information.When the time window τ is small enough, STHD is similar to the Euclidean distance measure and the complexity is O (n ).At this time, the algorithm has the minimum complexity and the measurement effect of speed and heading is the best.

    Fig.4 Schematic diagram of spatiotemporal Hausdorff distance.

    Algorithm 1 STHD.Input: 1.Spatiotemporal trajectory triand trj2.Time window parameter ξ Output: Trajectory similarity HSTtri;trj( )1.Δt-←Σn( )2.τ ← ξ ?Δt i=1-Σm-1k=1 ti;k+1-ti;k( )/Σni=1count pi;k■( )/τ 3.N ← Σn-1k=1 ti;k+1-ti;k■■( )/τ,M ← Σm-1k=1 ti;k+1-ti;k■4.for q ←1 to max {N;M} do 5.if q ≤min {N;M} then 6.h tri;q;trj;q( )← max&{( )}'pi;k?tri;qpj;k?trj;qdist li;k;lj;kmin 7.else 8.h tri;q;trj;q( )← max&{( )}'pi;k?tri;min{N;M}pj;k?trj;qdist li;k;lj;kmin 9.end if 10.H tri;q;trj;q( )←max h tri;q;trj;q{( );h tri;q;trj;q( )}11.end for 12.HSTtri;trj( )←max H tri;q;trj;q{( )}

    3.Behavior pattern mining

    3.1.Definitions and framework

    Aiming at the shortcomings of the existing trajectory clustering algorithm,combining the idea of k-nearest neighbour distance and decision graph in density peak clustering,we propose Spatiotemporal Trajectory K-Nearest Neighbour Decision Clustering algorithm based on Multidimensional Information Fusion (MIF-STKNNDC), which adopts STHD as the similarity measure.Here are some definitions about MIFSTKNNDC:

    Definition 1.(K-nearest neighbour trajectory) The k-nearest neighbour trajectory oftriis defined as the trajectory whose spatiotemporal Hausdorff distance is the kth closest totri,recorded as NN(tri;k).

    Definition 2.(K-nearest spatiotemporal Hausdorff distance)The spatiotemporal Hausdorff distance betweentriand its knearest neighbour trajectory is defined as the k-nearest spatiotemporal Hausdorff distance, recorded as

    Definition 5.(Decision value) The ratio of δito λiis defined as the decision value, recorded as

    which is an important parameter for center trajectory decision making.

    Definition 6.(Center trajectory) Arrange the decision values in descending order, and r trajectories corresponding to γiof top r are defined as center trajectories, recorded asTRc.In practical application scenarios, each center trajectory represents a behavior pattern of the targets.

    Definition 7.(Abnormal trajectory) Irregular trajectories could affect the mining of major behavior patterns,and these irregular trajectories, called abnormal trajectory, should be eliminated before clustering.Abnormal trajectories are divided into two types:outlier trajectory and suspicious trajectory.If an appropriate threshold Λ is set,a trajectorytri,whose λiis greater than Λ,is defined as an outlier trajectory.After clustering, a trajectory triis assigned to a trajectory cluster, and if there is a trajectory trjin Nk(tri)belonging to another trajectory cluster, trajectory triwill be defined as a suspicious trajectory.

    As shown in Fig.5, the framework of MIF-STKNNDC mainly consists of three steps:

    Step 1.(Trajectory similarity measure) Use STHD, which has been introduced in Section 2.1,to measure the multidimensional similarity of all trajectories in the spatiotemporal trajectory datasetTR.

    Step 2.(Center trajectory decision) Determine r center trajectories which could best reflect the behavior patterns of targets in practical application scenarios according to decision value.In order to avoid the subjectivity of human selection,we propose a Center Trajectory Decision algorithm based on Filter Elbow method (FE-CTD), which will be introduced in Section 3.2.

    Fig.5 MIF-STKNNDC algorithm framework.

    Step 3.(Trajectory clustering) Firstly, eliminate the outlier trajectories.Then center trajectories are taken as the clustering center, and the remaining trajectories are matched to the corresponding trajectory clusters.Finally,detect and eliminate the suspicious trajectories from the trajectory clusters.The details will be explained in Section 3.3.

    3.2.Center trajectory decision

    In the traditional DPC and its improved algorithm, the selection of clustering center mostly needs human intervention.33This means that the clustering results are subjective and cannot match the target behavior pattern mining technology in intelligent monitoring tasks.This section proposes a Center Trajectory Decision algorithm based on Filter Elbow method (FECTD) (Algorithm 2) to solve this problem.

    If the decision values of all trajectories are arranged in descending order, we can find that the decision value curve presents a state of rapid decline and then flattening, where the inflection point is the boundary point between the center trajectories and the non-center trajectories.Therefore,we consider determining the center trajectories based on elbow method36.

    Elbow method, as the name implies,is similar to the elbow of a person and has an inflection point, which is usually applied to the K-means clustering algorithm to obtain the optimal cluster number k through this inflection point.It is based on two curves:one calculated from the Sum of Squared Errors(SSE)and the other,an SSE line,from the start and end of the search range.Then we take k of the maximum value in the difference between the two as the final result.In the application scenario of this section,the two curves are:γ curve in descending order and γ line from the start and end of the search range.Find γ corresponding to the maximum difference between the two curves,and take this as a threshold.The trajectories whose decision value is greater than the threshold are determined as the center trajectories.

    The result of center trajectory determination depends on the search range.However,the selection of search range is usually based on empirical values, which is difficult to apply to trajectory big data.So,an adaptive method is needed to determine the search range.We notice that the center trajectory has an important feature: Its K-nearest temporal Hausdorff distance is not less than all its K-neighbour trajectories.Therefore, we can filter out the potential center trajectory according to this feature, and use this as the search range for elbow method to determine the center trajectory.The detailed steps of FE-CTD are shown as follows:

    Step 1.Calculate k-nearest spatiotemporal Hausdorff distance λiand k-neighbour trajectories Nk(tri)of all trajectories in the dataset.

    Step 2.According to the feature of the center trajectory,define filter factor.

    If the filter factor of trajectory triis less than or equal to 1,add it to the search range and calculate minimum k-nearest spatiotemporal Hausdorff distance δiand decision value γi.

    Step 3.Arrange the decision value γiof the filtered trajectories in descending order and define curve as l1, where num is the number of filtered trajectories and numirepresents the sequence number of trajectory triafter arranged.According to the search range, define the other line l2:γ′i=a ?numi+b,where.

    Step 4.For all filtered trajectories, calculate the difference between l1and l2:

    Find the decision value γiof the trajectory tricorresponding to the maximum value of Δγi, and set this γias a threshold Y.Finally, determine the trajectories with decision value greater than Y as the center trajectories:

    Algorithm 2.FE-CTD.Input: 1.Trajectory dataset TR 2.K-nearest neighbor parameter k Output: Center trajectories TRc1.for each tri;trj?TR^i≠j do 2.λ i←HSTtri;NN(tri;k))(3.Nk(tri)← trj?TR■■HSTtri;trj( )≤λi{}4.δi←min {( )}j:λj<λiHSTtri;trj5.γi←δi/λi6.ωi←λi/ min trj?Nk(tri)HSTtrj;NN (trj;k))}{(7.end for 8.num ←count tri?TR■ωi≤1}{num-1,b ←max {γi}-a 10.for each tri?TR^ωi≤1 in γidescending order do 11.Δγi←a ?numi+b-γi12.if Δγiis the maximum then 13.Y ←γi14.end if 15.end for 16.TRc← tri?TR■γi>Y{}9.a ←min {γi}-max {γi}

    3.3.Trajectory clustering

    The detailed steps of trajectory clustering are shown as follows:

    Step 1.Eliminate the outlier trajectories.

    In practical application scenarios, in addition to normal behavior patterns, trajectory dataset usually has a large number of irregular behaviors.Therefore, in order to analyze frequent behavior patterns of targets more accurately, a large number of outlier trajectories need to be removed.In traditional DPC and its improved algorithms, the removal of outliers usually requires human intervention.To solve this problem, we set a reasonable outlier threshold based on the center trajectory.Set the minimum spatiotemporal Hausdorff distance among all center trajectories as a threshold.

    If the k-nearest spatiotemporal Hausdorff distance of trajectory triis greater than the threshold Λ, it is judged to be an outlier trajectory and stored in the abnormal trajectory set, and does not participate in clustering.

    Step 2.Allocate the trajectory clusters according to the center trajectories.

    Taking the center trajectories as the clustering center,r trajectory clusters will be obtained as.

    where clusterID represents the number of the trajectory clusters, and clusterIDirepresents the number of the trajectory cluster where triis located.

    Step 3.Allocate the remaining trajectories.

    According to Definitions 4 and 5, the trajectory with the minimum k-nearest spatiotemporal Hausdorff distance in TR must be a center trajectory and occupy a trajectory cluster in Step 2.In order to ensure that all remaining trajectories can be allocated, carry out the remaining trajectories in knearest temporal Hausdorff distance ascending order.Select a trajectory triand find the closest trajectory trjfrom the trajectories whose k-nearest temporal Hausdorff distance is smaller than λi.Then, assign trito the trajectory cluster where trjis located.

    Step 4.Detect and eliminate the suspicious trajectories from the trajectory clusters.

    After clustering, a trajectory triis assigned to a trajectory cluster CclusterID,but if there is a trajectory trjin Nk(tri)belonging to other trajectory cluster, trajectory triwill be detected and eliminated as a suspicious trajectory.

    Compared with the traditional trajectory clustering algorithm, the advantages of MIF-STKNNDC are given as follows:

    (1)FE-CTD is introduced to determine the number of clusters and center trajectories adaptively from mass trajectories,which solves the problem that DPC needs to choose the clustering center manually.

    (2) Parameter setting is simpler than DBSCAN.MIFSTKNNDC has only one parameter, which is easy to adjust for different application scenarios.However, DBSCAN has two parameters, which is complicated in different application scenarios.

    (3) MIF-STKNNDC (see Algorithm 3) can cluster the trajectory data with large density distribution differences.In addition, the adaptive outlier threshold can better improve the compactness of the trajectory cluster.

    Algorithm 3.MIF-STKNNDC.Input: 1.Trajectory dataset TR 2.Time window parameter ξ 3.K-nearest neighbor parameter k Output: Trajectory clusters C1;C2;???;CclusterID;???;Cr{}1.for each tri;trj?TR^i≠j do 2.calculate HSTtri;trj( )by Algorithm 1 3.end for 4.Determine TRcby Algorithm 2 5.Λ ← min {( )}tri;trj?TRcHSTtri;trj6.for clusterID ←1 to r do 7.for each tri?TRcdo 8.clusterIDi←clusterID 9.end for 10.end for 11.for each tri?TR^?TRcin λiascending order do 12.if λi≤Λ then 13.for each trj?TR^λj≤λido 14.if HSTtri;trj( )is the minimum then 15.clusterIDi←clusterIDj16.end if 17.end for(continued on next page)

    a (continued)

    4.Experiments

    4.1.Simulation scene experiments and analysis

    The experiment is carried out in a simulated spatiotemporal trajectory dataset, which simulates the behavior of unknown targets in an early warning and surveillance area.We implement the proposed algorithm on the dataset, and the experimental results are analysed and discussed in detail.

    4.1.1.Dataset

    In this section, the experimental dataset is generated based on the trajectory generation program published by Piciarelli et al.37The program can generate cluster trajectories and random outlier trajectories, and can set the number of trajectory clusters, the number of trajectories of each cluster, trajectory distribution parameters, the number of information points of each trajectory,the number of abnormal trajectories and other parameters.On this basis,we add the time,velocity and course information in the information data points.There are 2000 spatiotemporal trajectories in this dataset, each of which contains 12 to 36 information data points.A total of 15 behavior patterns of the target are set in an early warning and surveillance area,that is,there are 15 trajectory clusters.Fig.6 shows the plot of the 2000 trajectories.

    Fig.6 Plot of 2000 trajectories.

    The specific information of the dataset is shown below.In order to prove the ability of the proposed algorithm to mine multidimensional feature of trajectories,four trajectory clusters are generated at location 1:each cluster has 150 trajectories,including one cluster of standard behavior,one cluster of twice velocity,one cluster of three times velocity and one cluster of opposite course, and the trajectory distribution parameters are 0.5.In order to prove the ability of the proposed algorithm to mine low-density behaviors from high-density behaviors,firstly,two clusters of trajectories are generated at position 2:one has 300 trajectories whose moving speed is velocity 2, and the other has 100 trajectories whose moving speed is twice of velocity 2.Then, two clusters of trajectories are generated at position 3:one has 200 trajectories and the other has 50 trajectories, and they move in opposite course.In order to prove the mining ability of the proposed algorithm for trajectory clusters with complex distribution, seven trajectory clusters with different number of trajectories and distribution parameters are generated at positions 4–10,whose specific parameters are shown in Table 1.In addition,200 random outlier trajectories are added to increase the complexity of the target behavior.

    4.1.2.Experimental design

    We implement the proposed algorithm on this simulation dataset, and specific experimental projects and design ideas are shown as follows:

    (1) Set the optimal parameter combination ξ = 2 and k = 5.The process and results of mining target behavior by MIF-STKNNDC are visualized.

    (2) In order to prove the advantage of STHD in trajectory similarity measure, it is compared with traditional HD, and two recently proposed trajectory multi-feature similarity measurement methods: MFHD28and MFTSM.29Combine them with the classical clustering algorithms.Silhouette coefficient,accuracy and running time are used to evaluate the algorithms.

    (3)In order to prove the benefit of MIF-STKNNDC in trajectory behavior pattern mining, it is compared with three existing advanced behavior pattern mining algorithms: STTRACLUS,27MTCA28and TC_MFTSM.29Silhouette coefficient and running time are used to evaluate the algorithms.

    (4) Two important parameters of the algorithm are discussed and the performance of the algorithm under different dataset sizes is studied.

    4.1.3.Result and discussion

    In the above experiment, we set the parameters ξ = 2 and k = 5.Fig.8 shows the distribution of the entire dataset in λ - δ coordinates, where colored points represent the corresponding trajectory clustering and black points represent outlier trajectories.Fig.9 shows the descending ordering of all trajectory decision values and the decision-making process of center trajectory.The fifteen center trajectories obtained by FE-CTD are marked with colored points.

    For the compared trajectory similarity measure algorithms,we cluster trajectories using four classical clustering algorithms: K-medoids, SC, DBSCAN and DPC.Experiments are repeated with different parameters, and the optimal value of the results of many tests is taken as the final results, as shown in Table 2.

    Table 1 Simulation dataset.

    Fig.7 Plot of 15 behavior patterns.

    Silhouette coefficient is an intrinsic evaluation method,which can reflect the compactness of the cluster.The larger the contour coefficient is, the more similar the target behavior is in the same cluster,and the less similar the target behavior is in different clusters.Accuracy is an external evaluation method, which refers to the proportion of the trajectory consistent with the trajectory cluster determined by the benchmark in the simulation dataset to all the trajectory in the clustering result cluster in the same cluster.

    It can be seen from Table 2 that, compared with HD and MFTSM, STHD has the best overall performance in different trajectory clustering algorithms.From the perspective of trajectory clustering algorithms, compared with K-Medoids,SC, DBSCAN and DPC, trajectory clusters obtained by MIF-STKNNDC are more compact.From the perspective of algorithm accuracy, the combined performance of STHD and MIF-STKNNDC proposed in this paper is the best.MIF-STKNNDC is more suitable for complex datasets with large trajectory density changes than DBSCAN.The accuracy of K-Medoids algorithm is not high because the initial cluster center is random and the outlier trajectories cannot be detected.Similarly, SC has low overall performance because it needs to set the number of clusters in advance and is greatly affected by outliers.DPC requires manual operation in the selection of cluster center,which introduces subjectivity.Hausdorff can only measure the location information between trajectories, but not the speed and heading information, so the accuracy of the overall mining algorithm is not high.From the perspective of algorithm running time, except that kmedoids clustering iteration consumes a lot of time,other time is mainly spent on trajectory similarity measurement.STHD is lower than MFHD and Hausdorff in algorithm complexity,avoiding unnecessary information point distance operation and greatly reducing the running time of the whole algorithm.

    Fig.8 Distribution of trajectories in λ - δ coordinates.

    Table 3 shows the performance of MIF-STKNNDC and three existing advanced behavior pattern mining algorithms:ST-TRACLUS, MTCA and TC_MFTSM on this trajectory dataset.It can be seen from the experimental results that the overall effect of MIF-STKNNDC is optimal.Among the three algorithms compared, the essence of MTCA is an improved DBSCAN algorithm.Although it can cluster the multidimensional features of trajectories,the effect of DBSCAN is slightly lower than MIF-STKNNDC because DBSCAN cannot cluster the data with uneven density very well.The essence of TC_MFTSM is an improved K-means algorithm,and its clustering results depend on the preset number of track clusters.Although its clustering result is good, it is based on several attempts of clustering parameters.ST-TRACLUS has the function of mining multidimensional features of trajectories,but it is mainly applied to the clustering of trajectory segments,so it does not perform well in the scene of this paper.

    Fig.9 FE-CTD determines 15 center trajectories.

    MIF-STKNNDC has two parameters ξ and k.We scaled up and down the dataset and studied the performance of different parameters in the dataset of different sizes.

    Fig.10 shows the running time of the trajectory similarity measure when STHD parameter ξ = 2–6.Compared with STHD and Hausdorff, the results show that STHD is much less than STHD and Hausdorff in computing overhead, and the calculation efficiency is the highest when ξ = 2.

    Fig.11 shows the accuracy of trajectory clustering when MIF-STKNNDC parameter k = 3–8.As can be seen from the figure, parameter k and dataset size have a certain impact on algorithm performance.When the size of the dataset is small, the smaller parameter k has better performance.With the increase of the data size, the performance of the larger parameter k becomes better, while the performance of the smaller parameter k decreases.The results show that when the data size is less than 4000,k=5 has a good performance,and when the data size is larger, a larger k may be required.

    Fig.10 Running time of different similarity measure in data of different sizes.

    4.2.Actual scene experiment verification

    The experiment is carried out in a radar-measured spatiotemporal trajectory dataset, which records the flight behaviors of flights in an airfield.We implemented MIF-STKNNDC on this dataset, and proved the practicality of the algorithm.

    4.2.1.Dataset

    This dataset contains the records of all the flights in the Northern California TRACON, which is provided by the aircraft noise abatement office of San Francisco International Airport(SFO) available online at https://c3.nasa.gov/dashlink/resources/132/.Each record contains some information about the flight and a sequence of 3D position and estimated speed.We selected some flight data for a period of time in January 2006.After data cleaning, some invalid trajectories are removed, and there are 2991 usable flight trajectories in total,which are shown in Fig.12.

    Table 2 Comparison of similarity measure algorithms’performance in different clustering algorithms.

    Table 3 Comparison of performance among behavior pattern mining algorithms.

    Fig.11 Accuracy of different k in data of different sizes.

    4.2.2.Result and discussion

    We implement MIF-STKNNDC on this dataset and seventeen trajectory clusters are obtained as{C1;C2;???;C17}.In order to clearly represent the behavior patterns of the flights, we select the center trajectories as the representative to display in Fig.13, where the arrows in the figure represent the direction of movement.It is very difficult for us to discover the target behavior patterns in Fig.12.However,seventeen behavior patterns are intuitively shown in Fig.13.

    Fig.12 Plot of 2991 trajectories in 2D and 3D coordinate system.

    Fig.13 Plot of 17 behavior patterns in 2D and 3D coordinate system.

    Fig.14 Distribution of trajectories in λ - δ coordinates.

    Fig.15 FE-CTD determines 17 center trajectories.

    In the above experiment, we set the parameters ξ = 2 and k = 10.Fig.14 shows the distribution of the entire trajectory dataset in λ - δ coordinates,where the colored points represent the trajectory clustered and black points represent outlier trajectories and suspicious trajectories.Fig.15 shows the descending ordering of all trajectory decision values and the decisionmaking process of the seventeen center trajectories which are marked with colored points.

    In order to evaluate the practicality of MIF-STKNNDC,we match the mined flight behaviors with the airport records that we queried.It is found that these regular behaviors are closely related to the main flight courses of SFO, Oakland International Airport (OAK), San Jose International Airport(SJC) and other airports.These relationships mean that MIF-STKNNDC has a good performance in mining behavior patterns of unknown targets in early warning and surveillance scenarios.The results of experiment indicate that MIFSTKNNDC has a good application value in civil aviation surveillance system, which is helpful to improve the intelligent level of civil aviation surveillance system.

    5.Conclusions

    (1) A target behavior pattern mining method based on spatiotemporal trajectory multidimensional information fusion is proposed in this work.

    (2) STHD can measure multidimensional feature differences of spatiotemporal trajectory using only time and location information, and the algorithm complexity is better than that of MFHD and HD.

    (3) MIF-STKNNDC can mine target behavior patterns from the trajectory data with complex distribution, and is superior to traditional trajectory clustering algorithms in accuracy, silhouette coefficient and running time.

    (4)In the next work,experiments on larger scale spatiotemporal trajectory datasets such as AIS and ADS-B systems will be implemented.Based on this work,online methods of target behavior patterns mining will be studied in the future.

    Declaration of Competing Interest

    The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

    Acknowledgements

    This study was co-supported by the National Key R&D Program of China (No.2021YFA0715202), the National Natural Science Foundation of China (Nos.62022092, 61790550 and 62171453) and the Outstanding Youth Innovation Team Program of University in Shandong Province, China (No.2021KJ005).

    在线播放无遮挡| 深夜精品福利| ponron亚洲| 国产免费男女视频| 国产乱人伦免费视频| 国产激情偷乱视频一区二区| 精品无人区乱码1区二区| 国产成人欧美在线观看| 中文字幕免费在线视频6| 久久精品国产亚洲av天美| 九色国产91popny在线| 脱女人内裤的视频| 免费一级毛片在线播放高清视频| 色5月婷婷丁香| 国产精品一区二区三区四区免费观看 | 亚洲成人久久性| 热99在线观看视频| 搡老妇女老女人老熟妇| 热99re8久久精品国产| 国产成人a区在线观看| 亚洲国产精品合色在线| 亚洲片人在线观看| 欧美xxxx黑人xx丫x性爽| 欧美极品一区二区三区四区| 看十八女毛片水多多多| 97人妻精品一区二区三区麻豆| 色综合站精品国产| 国产人妻一区二区三区在| 九色国产91popny在线| 又紧又爽又黄一区二区| 97超视频在线观看视频| 午夜老司机福利剧场| 亚洲人成网站在线播| 伊人久久精品亚洲午夜| 国内揄拍国产精品人妻在线| 两个人视频免费观看高清| bbb黄色大片| 欧美最黄视频在线播放免费| 大型黄色视频在线免费观看| 99国产综合亚洲精品| 亚洲人成伊人成综合网2020| 少妇的逼水好多| 成人毛片a级毛片在线播放| 亚洲自偷自拍三级| 一级作爱视频免费观看| 欧美高清成人免费视频www| 一进一出抽搐gif免费好疼| 88av欧美| 可以在线观看的亚洲视频| 欧美最黄视频在线播放免费| 午夜免费成人在线视频| 久久久精品欧美日韩精品| 久99久视频精品免费| 国产欧美日韩精品一区二区| 人人妻,人人澡人人爽秒播| 琪琪午夜伦伦电影理论片6080| 男人的好看免费观看在线视频| 99久久成人亚洲精品观看| 婷婷精品国产亚洲av| 在线观看一区二区三区| 欧美激情在线99| 极品教师在线视频| 在线十欧美十亚洲十日本专区| 亚洲欧美日韩无卡精品| 国产高清有码在线观看视频| 日韩欧美国产在线观看| 99久久久亚洲精品蜜臀av| 他把我摸到了高潮在线观看| 精品午夜福利在线看| 亚洲久久久久久中文字幕| 欧美xxxx性猛交bbbb| 久久午夜亚洲精品久久| 嫁个100分男人电影在线观看| 亚洲精华国产精华精| 亚洲精品久久国产高清桃花| 国产精品美女特级片免费视频播放器| 婷婷丁香在线五月| 国产在线精品亚洲第一网站| 久久久久免费精品人妻一区二区| 欧美日韩综合久久久久久 | 日韩欧美国产在线观看| 好看av亚洲va欧美ⅴa在| 欧美日韩综合久久久久久 | av天堂中文字幕网| 在线免费观看的www视频| a在线观看视频网站| 国产aⅴ精品一区二区三区波| 亚洲成人免费电影在线观看| 琪琪午夜伦伦电影理论片6080| 午夜激情欧美在线| 欧美激情国产日韩精品一区| 他把我摸到了高潮在线观看| 桃红色精品国产亚洲av| 成人精品一区二区免费| 精品久久久久久久久亚洲 | 内地一区二区视频在线| 国产午夜福利久久久久久| 亚洲精品色激情综合| 好男人在线观看高清免费视频| 看免费av毛片| av在线观看视频网站免费| 男女之事视频高清在线观看| 老司机福利观看| 99久久精品一区二区三区| 午夜久久久久精精品| 亚洲人成电影免费在线| 午夜精品在线福利| 麻豆av噜噜一区二区三区| 久久伊人香网站| 亚洲无线观看免费| 亚洲av成人不卡在线观看播放网| 美女黄网站色视频| 欧美在线一区亚洲| 久99久视频精品免费| 十八禁国产超污无遮挡网站| 一级黄色大片毛片| av国产免费在线观看| 色综合站精品国产| 嫩草影院精品99| 嫁个100分男人电影在线观看| 免费看日本二区| 国产精品人妻久久久久久| 国产毛片a区久久久久| 欧美三级亚洲精品| 成年版毛片免费区| 成人av一区二区三区在线看| 99久久精品热视频| 国产精品女同一区二区软件 | 国内毛片毛片毛片毛片毛片| 国产美女午夜福利| 啦啦啦观看免费观看视频高清| 国产精品98久久久久久宅男小说| 亚洲国产精品sss在线观看| 国产精品一区二区三区四区久久| 九九热线精品视视频播放| 亚洲av熟女| 狂野欧美白嫩少妇大欣赏| 又黄又爽又刺激的免费视频.| 欧美绝顶高潮抽搐喷水| av中文乱码字幕在线| 丰满的人妻完整版| 69人妻影院| 国内毛片毛片毛片毛片毛片| 久久九九热精品免费| 极品教师在线视频| 在线播放无遮挡| 一进一出抽搐gif免费好疼| 国产精品一及| 国产高清有码在线观看视频| 一级黄片播放器| 欧美一级a爱片免费观看看| 看十八女毛片水多多多| 日韩成人在线观看一区二区三区| a级毛片免费高清观看在线播放| 十八禁人妻一区二区| 国产精品久久久久久久久免 | 人妻夜夜爽99麻豆av| 久久这里只有精品中国| 成人午夜高清在线视频| 在线免费观看不下载黄p国产 | 亚洲成av人片在线播放无| 身体一侧抽搐| 宅男免费午夜| 免费搜索国产男女视频| 日本黄色片子视频| 看黄色毛片网站| 国产精品综合久久久久久久免费| 丰满人妻一区二区三区视频av| 两个人视频免费观看高清| 日本黄色片子视频| 色综合婷婷激情| 亚洲一区二区三区色噜噜| 欧美精品国产亚洲| 男插女下体视频免费在线播放| 精品无人区乱码1区二区| 女人被狂操c到高潮| 老司机午夜福利在线观看视频| 首页视频小说图片口味搜索| 免费在线观看成人毛片| 99精品在免费线老司机午夜| 日本三级黄在线观看| 欧美黑人巨大hd| 美女 人体艺术 gogo| 99热精品在线国产| 91九色精品人成在线观看| 中文亚洲av片在线观看爽| 97碰自拍视频| 有码 亚洲区| 久久久色成人| 99热这里只有是精品50| 麻豆成人av在线观看| 久久精品国产亚洲av香蕉五月| 少妇裸体淫交视频免费看高清| 国产成人av教育| 国产在线男女| 悠悠久久av| 久久精品影院6| 久9热在线精品视频| av在线老鸭窝| 国产一区二区三区视频了| 欧美午夜高清在线| а√天堂www在线а√下载| 国产成人欧美在线观看| 精品不卡国产一区二区三区| 午夜福利免费观看在线| 亚洲不卡免费看| 久久精品人妻少妇| 女人十人毛片免费观看3o分钟| 免费观看精品视频网站| 亚洲第一区二区三区不卡| 国产黄片美女视频| 亚洲一区高清亚洲精品| 十八禁国产超污无遮挡网站| 国产探花极品一区二区| 国产高清激情床上av| 一区二区三区免费毛片| 中文字幕人妻熟人妻熟丝袜美| 免费在线观看影片大全网站| 久久人人爽人人爽人人片va | 久久精品人妻少妇| 久久精品久久久久久噜噜老黄 | 长腿黑丝高跟| xxxwww97欧美| 成人高潮视频无遮挡免费网站| 免费av毛片视频| 亚洲国产精品成人综合色| 亚洲国产色片| 国产v大片淫在线免费观看| 精品人妻一区二区三区麻豆 | 一本精品99久久精品77| 精品99又大又爽又粗少妇毛片 | 午夜老司机福利剧场| 久久九九热精品免费| 日本撒尿小便嘘嘘汇集6| 欧美成人免费av一区二区三区| 日本撒尿小便嘘嘘汇集6| 99久久精品国产亚洲精品| 日本黄色片子视频| 欧美中文日本在线观看视频| 国产v大片淫在线免费观看| 在线播放国产精品三级| 午夜精品一区二区三区免费看| 国产精品人妻久久久久久| 少妇熟女aⅴ在线视频| 亚洲色图av天堂| 亚洲精品在线美女| 日本五十路高清| 长腿黑丝高跟| 亚洲激情在线av| av天堂在线播放| 宅男免费午夜| 女人十人毛片免费观看3o分钟| 午夜精品在线福利| 欧美极品一区二区三区四区| 午夜免费男女啪啪视频观看 | 给我免费播放毛片高清在线观看| 国产aⅴ精品一区二区三区波| 熟女电影av网| 五月玫瑰六月丁香| 国产麻豆成人av免费视频| 国产在线男女| 亚洲精品在线观看二区| 99国产综合亚洲精品| 久久久国产成人精品二区| 天天一区二区日本电影三级| 一二三四社区在线视频社区8| 中文字幕免费在线视频6| 波多野结衣高清无吗| 免费观看的影片在线观看| 99国产精品一区二区三区| 国产三级黄色录像| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 在线观看午夜福利视频| 老司机深夜福利视频在线观看| 亚洲自偷自拍三级| 欧美高清性xxxxhd video| 国产精品久久久久久亚洲av鲁大| 在线观看午夜福利视频| 日本熟妇午夜| 亚洲av日韩精品久久久久久密| 在线播放国产精品三级| 无遮挡黄片免费观看| 日韩有码中文字幕| av天堂中文字幕网| 亚洲av第一区精品v没综合| 国产在线男女| 精品午夜福利在线看| 欧美极品一区二区三区四区| 99国产极品粉嫩在线观看| 美女cb高潮喷水在线观看| 欧美不卡视频在线免费观看| 亚洲性夜色夜夜综合| 国产成人a区在线观看| 最新中文字幕久久久久| xxxwww97欧美| 一区二区三区高清视频在线| 十八禁人妻一区二区| 亚洲欧美日韩东京热| 亚洲av日韩精品久久久久久密| 国产在线精品亚洲第一网站| 热99在线观看视频| 亚洲av成人精品一区久久| 搡老岳熟女国产| 一进一出抽搐动态| 一区二区三区激情视频| 亚洲精华国产精华精| 老司机深夜福利视频在线观看| 九九热线精品视视频播放| 精品一区二区三区av网在线观看| 黄色女人牲交| 色av中文字幕| 亚洲自拍偷在线| 美女 人体艺术 gogo| 日本黄大片高清| 最后的刺客免费高清国语| 日本熟妇午夜| 美女xxoo啪啪120秒动态图 | 51午夜福利影视在线观看| 真人做人爱边吃奶动态| 久久久久久久久久黄片| 欧美国产日韩亚洲一区| 精品人妻视频免费看| 免费在线观看成人毛片| 成人毛片a级毛片在线播放| 免费观看的影片在线观看| 亚洲专区国产一区二区| 欧美zozozo另类| 特级一级黄色大片| 听说在线观看完整版免费高清| 精品国内亚洲2022精品成人| 亚洲av.av天堂| 亚洲美女搞黄在线观看 | 国产亚洲精品av在线| 国产av不卡久久| 亚洲人成网站高清观看| www.色视频.com| 免费黄网站久久成人精品 | 男女那种视频在线观看| 草草在线视频免费看| 一级av片app| 日本五十路高清| 午夜激情欧美在线| 久久热精品热| 午夜精品在线福利| 激情在线观看视频在线高清| 啦啦啦观看免费观看视频高清| av在线蜜桃| 国产黄色小视频在线观看| 真人一进一出gif抽搐免费| 国产真实乱freesex| av专区在线播放| 日韩精品青青久久久久久| 女人十人毛片免费观看3o分钟| 人妻丰满熟妇av一区二区三区| 99国产极品粉嫩在线观看| 性插视频无遮挡在线免费观看| 国产精品野战在线观看| av欧美777| 午夜激情欧美在线| 三级男女做爰猛烈吃奶摸视频| 久久久久久国产a免费观看| 午夜福利成人在线免费观看| 日本黄大片高清| 日日干狠狠操夜夜爽| 可以在线观看毛片的网站| 久久精品夜夜夜夜夜久久蜜豆| 麻豆成人午夜福利视频| 免费无遮挡裸体视频| 亚洲av日韩精品久久久久久密| 欧美潮喷喷水| 亚洲国产欧美人成| 99久久精品一区二区三区| АⅤ资源中文在线天堂| 国内精品久久久久精免费| 国产高清视频在线观看网站| 久久久精品大字幕| 十八禁网站免费在线| 啦啦啦观看免费观看视频高清| 十八禁网站免费在线| 脱女人内裤的视频| 麻豆国产97在线/欧美| 国产探花在线观看一区二区| 99在线人妻在线中文字幕| 国产精品电影一区二区三区| 变态另类丝袜制服| 国产伦精品一区二区三区四那| 天堂√8在线中文| 怎么达到女性高潮| www.999成人在线观看| 免费在线观看日本一区| 久久人人爽人人爽人人片va | 黄色女人牲交| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 久久久久性生活片| 自拍偷自拍亚洲精品老妇| 首页视频小说图片口味搜索| 搡老岳熟女国产| 成熟少妇高潮喷水视频| 热99在线观看视频| 国产在视频线在精品| 亚洲av.av天堂| 国产高清三级在线| АⅤ资源中文在线天堂| 国产在线男女| 99国产综合亚洲精品| 搞女人的毛片| 日日干狠狠操夜夜爽| 国产白丝娇喘喷水9色精品| 久久午夜福利片| 国产老妇女一区| 桃红色精品国产亚洲av| 三级国产精品欧美在线观看| 99精品久久久久人妻精品| 一进一出抽搐gif免费好疼| 狂野欧美白嫩少妇大欣赏| av在线观看视频网站免费| 免费看日本二区| 欧美bdsm另类| 国产久久久一区二区三区| 日韩欧美一区二区三区在线观看| 级片在线观看| 十八禁网站免费在线| 国产激情偷乱视频一区二区| 午夜福利免费观看在线| 国产成+人综合+亚洲专区| av视频在线观看入口| 变态另类成人亚洲欧美熟女| 国产亚洲精品久久久com| 国产精品综合久久久久久久免费| 免费在线观看亚洲国产| 少妇人妻一区二区三区视频| 内地一区二区视频在线| 国产精品免费一区二区三区在线| 脱女人内裤的视频| 舔av片在线| 亚洲最大成人中文| 亚洲黑人精品在线| 亚洲成人免费电影在线观看| 国产真实乱freesex| 人人妻,人人澡人人爽秒播| 成年免费大片在线观看| www日本黄色视频网| 色尼玛亚洲综合影院| 丰满人妻一区二区三区视频av| 脱女人内裤的视频| 在线观看66精品国产| 淫秽高清视频在线观看| 欧美一级a爱片免费观看看| 亚洲av二区三区四区| 男人舔奶头视频| 男人的好看免费观看在线视频| 黄色配什么色好看| 亚洲无线在线观看| 天堂影院成人在线观看| av中文乱码字幕在线| 最后的刺客免费高清国语| 久久久久久久久中文| 国产精品一区二区三区四区久久| 欧美另类亚洲清纯唯美| 波多野结衣高清无吗| 久99久视频精品免费| 亚洲电影在线观看av| 欧美成人一区二区免费高清观看| 日韩国内少妇激情av| 国产精品爽爽va在线观看网站| 99热精品在线国产| 国产高清视频在线观看网站| 老女人水多毛片| 国产精品一及| 亚洲第一电影网av| 日本 av在线| 久久精品国产99精品国产亚洲性色| 波多野结衣高清无吗| 久久久国产成人免费| 久久精品91蜜桃| 亚洲精品久久国产高清桃花| 黄色日韩在线| 免费人成视频x8x8入口观看| 国产精品一区二区三区四区免费观看 | 两性午夜刺激爽爽歪歪视频在线观看| 18禁裸乳无遮挡免费网站照片| 91久久精品电影网| 欧美xxxx性猛交bbbb| 亚洲精品成人久久久久久| 国产又黄又爽又无遮挡在线| 国产一区二区三区在线臀色熟女| 黄色日韩在线| 国产成人aa在线观看| 深夜a级毛片| 乱码一卡2卡4卡精品| a级毛片免费高清观看在线播放| 在线十欧美十亚洲十日本专区| 亚洲欧美清纯卡通| av中文乱码字幕在线| 别揉我奶头 嗯啊视频| 亚洲精品粉嫩美女一区| 天天一区二区日本电影三级| 一本一本综合久久| 亚洲国产精品999在线| 国产综合懂色| 淫秽高清视频在线观看| 国产精品1区2区在线观看.| 简卡轻食公司| 中文字幕人成人乱码亚洲影| 亚洲av成人精品一区久久| av在线天堂中文字幕| 一级黄色大片毛片| 精品无人区乱码1区二区| 国产主播在线观看一区二区| a级一级毛片免费在线观看| 精品免费久久久久久久清纯| 欧美日韩黄片免| 性欧美人与动物交配| 国产欧美日韩一区二区三| 国产探花在线观看一区二区| av中文乱码字幕在线| 老司机午夜十八禁免费视频| 欧美在线黄色| 欧美最黄视频在线播放免费| 69人妻影院| 国产精品一区二区性色av| 久久久国产成人精品二区| 99热只有精品国产| 亚洲无线观看免费| 青草久久国产| 亚洲美女黄片视频| 精品久久久久久久久久免费视频| 一个人免费在线观看电影| 动漫黄色视频在线观看| 欧美3d第一页| 亚洲国产欧洲综合997久久,| 人妻制服诱惑在线中文字幕| 一级作爱视频免费观看| 一a级毛片在线观看| av专区在线播放| 免费人成视频x8x8入口观看| 国产乱人视频| 国产久久久一区二区三区| 丰满乱子伦码专区| 亚洲av二区三区四区| 美女 人体艺术 gogo| 色综合亚洲欧美另类图片| 亚洲中文日韩欧美视频| 一边摸一边抽搐一进一小说| 国产精品久久久久久亚洲av鲁大| 午夜久久久久精精品| 国产精品女同一区二区软件 | 免费av毛片视频| 国产亚洲精品av在线| 午夜免费激情av| 亚洲真实伦在线观看| 久久国产精品人妻蜜桃| 一夜夜www| 亚洲一区二区三区色噜噜| 国产精品久久久久久久久免 | 国产 一区 欧美 日韩| 免费看美女性在线毛片视频| 亚洲一区二区三区色噜噜| 老司机福利观看| 亚洲国产欧美人成| 日本成人三级电影网站| 在线看三级毛片| 亚洲av免费在线观看| 国产探花极品一区二区| 简卡轻食公司| 他把我摸到了高潮在线观看| 国产伦在线观看视频一区| 久久久色成人| 亚洲片人在线观看| 9191精品国产免费久久| 给我免费播放毛片高清在线观看| 日韩中字成人| 看黄色毛片网站| 亚洲欧美清纯卡通| 婷婷色综合大香蕉| 赤兔流量卡办理| 日韩欧美精品免费久久 | 国产aⅴ精品一区二区三区波| 欧美日韩乱码在线| 国产爱豆传媒在线观看| 国产av一区在线观看免费| 日韩欧美免费精品| 一区二区三区高清视频在线| 国产精品永久免费网站| 亚洲狠狠婷婷综合久久图片| 永久网站在线| 欧洲精品卡2卡3卡4卡5卡区| 欧美性猛交╳xxx乱大交人| 动漫黄色视频在线观看| 午夜福利成人在线免费观看| a级毛片a级免费在线| 亚洲第一区二区三区不卡| 校园春色视频在线观看| 嫩草影院精品99| 不卡一级毛片| 久久精品国产亚洲av天美| 国内毛片毛片毛片毛片毛片| 成人av一区二区三区在线看| 久久久久精品国产欧美久久久| 观看美女的网站| 亚洲专区中文字幕在线| 观看免费一级毛片| 久久久久久久精品吃奶| 又粗又爽又猛毛片免费看| 国产在视频线在精品| а√天堂www在线а√下载| 嫩草影视91久久| 精品久久久久久久久久免费视频| 免费搜索国产男女视频| 午夜影院日韩av| av专区在线播放| 亚洲五月婷婷丁香| avwww免费| 亚洲,欧美,日韩| 狂野欧美白嫩少妇大欣赏|