• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Using Metaheuristic OFA Algorithm for Service Placement in Fog Computing

    2024-01-12 03:45:38RizaAltunayandOmerFarukBay
    Computers Materials&Continua 2023年12期

    Riza Altunay and Omer Faruk Bay

    1Department of Information Systems,Gazi University,Ankara,06680,Turkey

    2Department of Computer Technologies,Ondokuz Mayis University,Samsun,55100,Turkey

    3Department of Electrical-Electronics Engineering,Gazi University,Ankara,06560,Turkey

    ABSTRACT The use of fog computing in the Internet of Things(IoT)has emerged as a crucial solution,bringing cloud services closer to end users to process large amounts of data generated within the system.Despite its advantages,the increasing task demands from IoT objects often overload fog devices with limited resources,resulting in system delays,high network usage,and increased energy consumption.One of the major challenges in fog computing for IoT applications is the efficient deployment of services between fog clouds.To address this challenge,we propose a novel Optimal Foraging Algorithm (OFA) for task placement on appropriate fog devices,taking into account the limited resources of each fog node.The OFA algorithm optimizes task sharing between fog devices by evaluating incoming task requests based on their types and allocating the services to the most suitable fog nodes.In our study,we compare the performance of the OFA algorithm with two other popular algorithms:Genetic Algorithm(GA)and Randomized Search Algorithm(RA).Through extensive simulation experiments,our findings demonstrate significant improvements achieved by the OFA algorithm.Specifically,it leads to up to 39.06%reduction in energy consumption for the Elektroensefalografi(EEG)application,up to 25.86%decrease in CPU utilization for the Intelligent surveillance through distributed camera networks(DCNS)application,up to 57.94%reduction in network utilization,and up to 23.83%improvement in runtime,outperforming other algorithms.As a result,the proposed OFA algorithm enhances the system’s efficiency by effectively allocating incoming task requests to the appropriate fog devices,mitigating the challenges posed by resource limitations and contributing to a more optimized IoT ecosystem.

    KEYWORDS Internet of Things;cloud computing;fog computing

    1 Introduction

    With the rapid proliferation of technology,encompassing smartphones,wearable devices,industrial tools,and various other domains,the number of internet-connected devices has experienced significant growth.This surge in interconnectedness has given rise to the concept of the IoT,which was initially introduced by a group of academics in 1991.As IoT devices often face processing capacity and resource limitations,the adoption of cloud services has become a necessity [1].Nevertheless,the escalating utilization of cloud services and devices has brought forth challenges,including issues related to distributed data arising from diverse geographical locations,increased bandwidth usage,and end-to-end delays.To effectively tackle these challenges,fog computing has emerged as a viable solution[2].Fog computing is strategically positioned between the cloud and IoT devices,serving as a decentralized infrastructure comprised of diverse fog nodes that offer management,storage,and communication capabilities [3].Moreover,fog computing brings additional advantages,including data protection and secure communication [4,5].However,due to the heterogeneity and limited resources of fog nodes,achieving effective service placement poses a significant challenge.In response to this issue,several metaheuristic algorithms have been proposed to address task scheduling in the IoT system.These algorithms encompass the Fireworks Algorithm (FWA) [6],Marine Predators Algorithm(MPA)[7],Bee Algorithm(BA)[8],Particle Swarm Optimization(PSO)[9],and Genetic Algorithm(GA)[10].Abohamama et al.proposed a semi-dynamic real-time task scheduling algorithm that leverages a modified version of the genetic algorithm to optimize task scheduling[11].Ghobaei-Arani et al.utilized the meta-intuitive whale optimization algorithm to allocate tasks on fog devices and enhance service quality[12].On the other hand,Dubey et al.introduced a fog device framework that improves delays,computational costs,load balancing,and energy consumption in the IoT system,utilizing Cuckoo and PSO algorithms[13].Maiti et al.proposed a fog node layout to minimize delays using algorithms such as Simulated Annealing (SA),Genetic Algorithm (GA),and Particle Swarm Optimization(PSO).Their findings indicated that the GA-SA algorithm proved to be the most efficient in minimizing delays[14].

    In their study on service placement,Mohamed et al.[15] combined two distinct algorithms to determine the most optimal and shortest path while selecting the nearest fog node for users.Their approach resulted in successful improvements in network usage,distance optimization,load balancing,and data transmission.Zare et al.[16] employed the Asynchronous Advantage Actor-Critic (A3C)algorithm,developed in the field of deep and reinforcement learning,to ensure high-quality service delivery.Skarlat et al.[17] used the Genetic Algorithm (GA) to showcase the efficient utilization of fog resources,leading to reductions in communication delays within the network.Additionally,Saif et al.[18] employed the Grey Wolf Optimizer algorithm to address energy consumption and minimize delays in the system.The literature review highlights that fog computing is adopted to address the growing number of objects and their demands in cloud computing.However,due to the limited resources of fog clouds,they are unable to accommodate all requests.As a result,the increasing number of requests adversely impacts bandwidth usage,energy consumption,processing costs,and operation time.To tackle these challenges,numerous studies have been conducted,focusing on areas such as resource sharing,task scheduling,and load balancing to mitigate the issues associated with limited fog cloud resources.In current studies,the service placement problem remains a critical issue that requires improvement,particularly concerning the placement of applications from objects onto fog clouds with limited resources.The primary objective of this study is to implement the Optimal Foraging Algorithm (OFA) to efficiently allocate services onto application modules.The proposed Optimal Foraging Algorithm (OFA) has been subjected to comparison with various algorithms,focusing on basic comparison functions and optimization problems [19].The algorithm’s strong performance in optimization problems,its novelty in IoT applications,and its promising potential for success due to its unique structure were regarded as a novel perspective,leading to its application in this study.The working logic and pseudo code of the algorithm are elaborated upon in Section 3.In the deployment of IoT applications on fog nodes,it is crucial to ascertain the requirements of the applications and the desired service quality to ensure compatibility with the existing fog nodes and applications.During the service distribution stage,where services are allocated to suitable fog clouds based on application types,the OFA metaheuristic algorithm is employed to generate appropriate solutions[19].

    The obtained solutions are first internally compared using various metrics and subsequently pitted against the GA and RA algorithms in terms of energy consumption,bandwidth usage,processing cost,and execution time.Through these comparisons,the advantages of the proposed algorithm are demonstrated.

    The contributions of this study to the literature can be summarized as follows:(1)Optimization of efficient service placement between fog devices in fog cloud-based IoT using a three-layer architecture;(2) Introduction of the Optimal Foraging Algorithm (OFA) for service placement,marking its application for the first time in IoT;(3)Demonstration through simulation results that the proposed algorithm outperforms other algorithms in terms of energy consumption,CPU usage,bandwidth usage,and runtime.The study is structured into six parts.The first part introduces the topic and provides a comprehensive literature review.The second part presents detailed information about the system architecture and formulates the problem being addressed.In the third part,the proposed optimization algorithm is thoroughly explained,along with its operational principles.The fourth part showcases the performance values obtained from the experimentation.In the fifth part,a numerical analysis of the algorithm is presented,including relevant data and insights.Finally,the sixth part concludes the study,summarizing the findings and discussing the overall status of the manuscript.

    2 System Architecture and Problem Formulation

    The system operates on a layered architecture as shown in Fig.1.The highest layer is referred to as the cloud layer,which is a distributed data center accessible to all internet-connected devices and not used at a specific location [20].The middle layer,on the other hand,is where fog computing is implemented,and where fog devices are located,providing real-time computing that considers current operations [21].The bottom layer is where various smart and non-smart objects with a distributed structure,such as computers,smartphones,and machines,are connected[22].

    In IoT applications,the limited resources and distributed nature of the heterogeneous and decentralized fog nodes,as well as their changing processing capacities over time,pose challenges in the service placement stage.To determine when and where services will be placed,service placement is required.The proposed algorithm addresses these challenges and enables the efficient allocation of application modules to fog nodes.The architecture used in the system includes entities and services.Entities are composed of components such as cloud,client,and fog nodes,while services are application modules that are received from objects to be run in the system.The system possesses all the necessary information about fog clouds and incoming mission requests during its operation.As a result,the services are efficiently directed to the relevant fog cloud.Each node runs the tasks assigned by the system.Applications can be sent to fog nodes as modules or sets of modules.Each application module has properties such as processing power,memory,storage,bandwidth,etc.Service modules are categorized into three different types:client,global,and regular modules.Client modules can only be processed on client nodes,while global modules can be processed on nodes other than client nodes.Modules other than these can be processed on both types of nodes.The proposed decisionmaking algorithm in the system aims to improve system performance by placing services on nodes with limited hardware capabilities under a certain service quality constraint.In this study,energy consumption,processing cost,bandwidth,and execution time are determined as performance criteria.These performance criteria and the quality of service are formulated and calculated separately as shown below.

    Figure 1:System architecture

    2.1 Quality of Service

    After including application cycles in the system,it is checked if the task is completed on time while providing Quality of Service(QoS).Operation delays and transmission delays that arise while transferring the application between two nodes are calculated during this process.The importance of service quality has increased due to the growing number of devices and the emergence of diverse services [23].QoS is considered to be fulfilled if the application cycles are processed and their tasks are completed.Eq.(1) is used to calculate QoS,when representing the cost of CQperformance,Q,denotes the total number of application loops.represents each loop within the application,andshows the completion times of tasks in the application.q refers to the total delay in application loops,indicates the total processing delays between two nodes,andrepresents the total transmission delays between two nodes.By taking these delays into account,it is checked whether QoS is ensured during the transfer of an application between two nodes[24].

    2.2 Power Cost

    The equation in Eq.(2)is used to calculate the cost of energy consumption by taking into account the transaction cost used during the application and the cost spent on network transmission.It is important to note that in fog computing,sending data to distant clouds can lead to excessive energy consumption[25].The power consumption cost(CPw)is obtained by summing up the processing cost(CP)and the transmission cost(CB).To calculate CP,the difference between the power consumption while active (fbPw) and the power consumption while idle (fiPw) is multiplied by the connection usage percentage.To calculate CB,the power consumption is multiplied by the connection usage percentage at full transmission capacity(fTx)[24].

    2.3 Processing Cost

    The system’s processing capacity is increased by using a low-cost processor.When operating the system,it is important to consider the processing capacity used by each resource and to take processing costs into account when allocating tasks [26].Eq.(3) calculates the processing cost (CP) is the sum of the ratio of the total amount of processing capacity to the utilized capacity multiplied byPn×mMipsrepresents the total amount of processing capacity required for all modules placed in node n.ap×indicates the capacity utilised by multiplying the processing capacity of node n by the resource utilisation percentage(ap).f Fogindicates whether the node is a fog node.If n=0,it is a client node[24].

    2.4 Bandwidth Cost

    2.5 Execution Time

    It is the time in milliseconds from the start of the system to the completion of the optimization phase.

    3 Proposed Optimization Algorithm

    OFA is a global optimization algorithm that monitors the foraging behaviour of animals and determines their position accordingly.In addition,the OFA algorithm is used to solve optimization problems in many fields such as classification and regression problems [28],ranking problems in industry [29],and healthcare [30,31].It is a known fact that animals in nature need food in order to survive and continue their generations.Foraging is a fairly common phenomenon to meet these needs.Animals consider three situations while foraging [19].Where to look for food,When to look for new food,What type of food to choose? In the proposed algorithm,individuals prefer foraging areas according to the rules they have determined.When an area is determined,the first thing to consider is how valuable the food is.If the food found is valuable,more individuals in the community move there.The search for valuable food continues as long as they live.When the OFA algorithm is summarized mathematically,the following stages emerge.

    3.1 OFA Algorithm Steps

    First of all,for the d-dimensional array in N number of food-seeking individuals and R constraint space,each individual is specified as X=[x1,x2,x3,...,xd]T.In this direction,the objective function is defined as in Eq.(5)[19].

    F(x),objective function value and F(×?)is the optimal objective function value,x?is the optimal vector.Here,maximum optimization problem of F(x) is equivalent to the minimum optimization problem of-F(x),withlower and upper limit values,respectively.In order to create individuals,N number of individuals are produced by using Eq.(6)[19].

    When the recurrence rates are accepted as t for the current number and as t+1 for the next iteration,the best individuals are shown with Eq.(7) and the remaining individuals are shown with Eq.(8).k variable is shown as k=t/tmax,t shows the number of valid iterations,tmaxshows the maximum number of iteration,shows the randomly selected individual,shows the worst individual of the population,r1iand r2ishow the random numbers distributed between 0 and 1[19].

    While individuals are deciding on whether to update their current location,they use prey selection model[32].Prey energy uses,advantageous prey energy usesvariables.In Eq.(9),t and t+1 positions are compared from each iteration result,if it is efficient,the current position is changed and if it is not,it continues a new iteration with the current position[19].

    3.2 OFA Algorithm Pseudo Code

    General operation logic of the algorithm is given above and the pseudo-code is shown in Algorithm 1.

    Firstly,a population is created,consisting of a specific number of individuals.For each individual in the population,a random solution is generated.Subsequently,a module placement map is created,indicating feasible locations for modules within the solution.Based on this map,a tuple routing map and a module transition map are established,facilitating node selection for transferring modules to their destination nodes.The solutions obtained for each individual are then ranked according to their costs,with the individual having the lowest cost selected as the best solution.When creating a new individual,each one tends to move towards the best position.As individuals search for solutions close to their current location,the newly produced solutions remain in proximity to the previous ones.Each new solution is compared with the previous best solution.Following the comparison,if the location(i.e.,the cost)of the newly generated individual is better than the previous best solution,the next search continues with that solution.Conversely,if the generated solution is worse than the previous one,the current solution is retained.In this manner,solutions are generated for a number of iterations,and each time,the best solutions are compared with the previous one.Once the specified iteration is completed,the best solution obtained is selected as the final best solution.The simulation is then initiated,and the results are obtained and evaluated based on the chosen final best solution.

    4 Performance Evaluation

    There are entities consisting of cloud and fog nodes on physical topology in the operation of the system.Devices such as sensors and actuators that can receive data and apply the result after processing can be connected to these nodes.After the system is installed,the control unit performs the necessary checks and the system operates.Application packages sent on the system are distributed among the existing fog nodes with the proposed algorithm as data bundles and the system is operated.Each node has its properties.

    4.1 Components of the System

    During the system setup,there is one cloud,a proxy connected to the cloud,a varying number of fog nodes connected to the proxy,and objects have been used.The numbers used have been explicitly specified during the comparison stage.The processing capacities that can be used for all devices on the system,the idle power consumed by the nodes,and the amount of power consumed during operation are defined in Table 1.The results obtained during the operation of the system are produced based on these values.To evaluate the proposed system,a fog computing environment was created and simulated using the iFogSim[33]simulator,which is commonly used in academic publications.The algorithm was coded using the Java programming language.The experiments were conducted on a desktop computer with an Intel Core i7-6700 processor with a clock speed of 3.40 GHz and 8 GB of memory,using the EEG and DCNS,which are commonly used in academic publications.

    Table 1:Components of the system

    4.1.1 EEG Beam Tractor Game

    EEG Beam Tractor Game is a type of game that takes place between two humans and uses augmented brain-computer interaction.The players’brain activities are measured using EEG devices and these measurements are transferred to a computer program that allows the players to play the game.Thus,players’brain activities enable them to control the objects in the game.The application consists of 5 modules:EEG sensor,screen,client,concentration calculator,and coordinator[34].EEG parameters are shown in Table 2.

    Table 2:Application edges of the EEG tractor beam game

    Many experiments have been performed using the OFA algorithm on EEG with systems containing different numbers of fog clouds.The results of the experiments are shown in Table 3.In Table 3,the Area column shows the number of fog clouds connected to the Proxy,the Device column shows the number of devices connected to the fog clouds,and the Fog Node column shows the total number of nodes on the system.Respectively,Energy(J)indicates the amount of energy consumed by the system,processed(MI)indicates the amount of data processed through the system,transferred(B)indicates the bandwidth used by the system,and Execution time(ms)indicates the operating time of the system.

    Table 3:EEG simulation results

    The horizontal axes of Fig.2 show the total number of nodes.In Fig.2a,the energy consumed by the system exhibits a linear increase.While Figs.2b–2d also show a general linear increase,there is a noticeable decrease in the values when the number of fog nodes is 17 and 22.This decrease,as observed in Table 3 in the Area domain,occurs due to an initial increase in the number of optimized fog clouds.The rise in the number of fog nodes results in additional resources for distributing services,thereby leading to these reductions.This increase has a positive impact on the system’s CPU usage,network usage,and runtime performance.

    Figure 2:(a)Energy consumption(b)CPU usage(c)Network usage(d)Execution time

    4.1.2 DCNS(Intelligent Surveillance through Distributed Camera Networks)

    DCNS refers to the deployment of multiple cameras across an area to monitor and analyze activities in real-time.The cameras capture video footage and detect moving objects by analyzing the images.A designated object is tracked by PTZ cameras and the images are transmitted to the user over the internet.The application consists of 5 modules: Motion Detector,Object Detector,Object Tracker,PTZ Control,and User Interface[33].DCNS parameters are shown in Table 4.The results of the experiments with the OFA algorithm on DCNS are shown in Table 5.

    Table 4:Application edges of the DCNS

    Table 5:DCNS simulation results

    The horizontal axes of Fig.3 show the total number of nodes.In Figs.3a and 3c,a linear increase in energy consumption and network usage on the system is observed as the number of fog nodes increases.However,in Figs.3b and 3d,a decrease is noticed when the number of fog nodes is 17 and 22.This decrease is evident in Table 5,which corresponds to the optimization of fog nodes and occurs when the number of fog nodes is initially increased.The increase in the number of fog nodes provides additional resources for distributing services,resulting in positive effects on CPU usage and system runtime.

    Figure 3:(a)Energy consumption(b)CPU usage(c)Network usage(d)Execution time

    4.2 Algorithm Comparison

    The EEG and DCNS were run on a layered architecture with the OFA algorithm,GA,and RA algorithms,respectively.Comparisons were made over values such as energy consumption,operation costs,bandwidth cost and execution time.Parameter settings determined for each algorithm to be run on the system are shown in Table 6 below.

    Table 6:Algorithm parameters

    4.2.1 Genetic Algorithm

    Initially,a random population is generated.The genetic algorithm generates heuristic solutions using the previously generated solution information.In each iteration,the number of convergence is checked and new individuals are created according to the situation.The new individual formation is performed using three genetic operators.The first one is the selection operator,which controls fitness and ensures that the genes are transferred to the next generation.In this way,it transfers a certain percentage of genes of the best individuals to the next generation.Secondly,the crossover operator performs the process of crossing the two best individuals selected by the selection operator,and finally,new individuals are produced by adding random genes by the mutation operator in order not to produce the same solutions.The process is continued for the number of iterations and the best solution is obtained.

    4.2.2 Random Algorithm

    The RA algorithm generates random solutions without using the values generated in the previous solution for the specified number of iterations.The first generated solution is taken as the best solution.Each generated solution is compared with the best solution and if it is better,the better solution is selected as the best solution.On the other hand,if a certain number of identical solutions are generated by the convergence number,the loop is broken and the best solution is selected.Table 7 shows the EEG results.

    Table 7:Simulation results in EEG

    Fig.4 shows the comparison of energy consumption,processing costs,bandwidth cost and execution time of OFA algorithm with other algorithms.In the comparisons made on systems with different numbers of fog devices;Fig.4a shows that in terms of energy consumption,it improves 6%,0.5%,and 6% compared to the GA algorithm,6%,0.1%,39% compared to RA respectively in the experiment using 14,20,26 fog devices.Fig.4b shows that in the experiment using 14,20,26 fog devices,there is an increase of 0.06%,-0.1%,1%,respectively,in terms of cpu usage compared to GA,and an improvement of 4%,0.6%,4%,respectively,compared to RA.Fig.4c shows that the bandwidth usage using 14,20,and 26 fog devices improved by 6%,-8%,and 1%compared to GA,16%,16%,and 20% compared to RA,respectively.Fig.4d shows that in the experiment performed using 14,20,and 26 fog devices on the runtimes,it has improved by-6%,3%,-0.4%according to GA,8%,0.08%,13%according to RA,respectively.The experiments conducted on the EEG application demonstrate that the OFA algorithm outperforms both the GA and RA algorithms in terms of energy consumption,bandwidth usage,CPU usage,and runtime.

    Figure 4:(a)Energy consumption(b)CPU usage(c)Network usage(d)Execution time

    However,in certain trials,the OFA algorithm shows a slight lag compared to the GA algorithm.Table 8 shows the DCNS results.

    Table 8:Simulation results in DCNS

    Fig.5 shows the comparison of energy consumption,operation costs,bandwidth cost,and execution time of the OFA algorithm with other algorithms.In DCNS,the OFA algorithm has better results than the others.In the comparisons made on systems with different numbers of fog devices;Fig.5a shows that the OFA algorithm consumes less energy than other algorithms,even if it is a small amount.Fig.5b shows that the OFA algorithm improves the CPU usage by 12%,15%,and 2%compared to GA and 25%,12%,and 10%compared to RA in the experiments with 14,20,and 26 fog devices,respectively.Fig.5c shows that the bandwidth usage improved by 86%,5%,15%according to GA,47%,57%,and 19%according to RA,respectively,in the experiment using 14,20,26 fog devices.Fig.5d shows that it improves 6%,11%,0.14%compared to GA,-7%,23%,and 8%compared to RA,respectively,in the experiment using 14,20,26 fog devices on run times.As a result,it is shown that the OFA algorithm is more efficient than both GA and RA in terms of energy consumption,bandwidth usage,and runtime,while it is slightly behind the RA algorithm in the experiment using 26 devices only in runtimes.

    Figure 5:(a)Energy consumption(b)CPU usage(c)Network usage(d)Execution time

    5 Discussion

    The proposed algorithm is compared with the study conducted by Arora and Singh [32],where heterogeneous modules were sent to fog devices in the network.The comparison is made on the“Intelligent Surveillance” application using the same configuration settings in the iFogSim [29]environment,with results presented in Table 9.The findings indicate that the average network usage improved by 36%in MB,and the average runtime improved by 37%in milisecond.In another study by Gavaber and Rajabzadeh[35],which focused on the efficiency of the system by adding fog devices in the fog layer,a comparison was made on the “EEG” application in terms of average energy consumption and application cycle delay.The results showed that the average energy consumption was reduced by 71% in MJ,and the application cycle delay decreased by 69% in milisecond.These values are also presented in detail in Table 9.It is evident that the proposed algorithm consistently reduces network usage across different applications,contributing to energy consumption reduction and affecting runtime positively.However,it is important to note that the increase in the number of nodes can lead to higher overall consumption values in any system.Since the constraints of the system used have not been tested in real-life scenarios,the extent to which it may impact the results differently remains unknown.Nevertheless,the authors state that future studies will include real-world trials.

    Table 9:Literature comparisons

    6 Conclusion

    In this study,the OFA algorithm is proposed to facilitate efficient service placement in a fog computing network.The algorithm achieves an effective distribution of applications among fog nodes based on their respective application types.The main objective of this research is to enhance the system’s performance in terms of energy consumption,network usage,processing cost,and runtime.To evaluate the proposed algorithm,comparative analyses were conducted with the GA and RA algorithms using the iFogSim simulation tool.Two different configurations were simulated to assess the algorithm’s performance comprehensively.The results obtained through simulations demonstrate the effectiveness and significance of the proposed algorithm in outperforming the alternatives concerning energy consumption,network usage,processing cost,and runtime.The algorithm exhibits stability and maintains its efficiency even as workloads increase,displaying linear growth patterns.This study showcases the promising performance and capabilities of the proposed algorithm in the context of service placement within the fog computing environment.Future work aims to assess the algorithm’s real-world application performance and further enhance the system’s data security to ensure the confidentiality and integrity of shared data.

    Acknowledgement:As author,I would like to thank my Ph.D.advisor of Gazi University and his advisory is Prof.Dr.Omer Faruk Bay for their support and assistance.This research has been produced from a part of Riza Altunay’s Ph.D.dissertation in Gazi University,Institute of Informatics,and Department of Information Systems.

    Funding Statement:The authors received no specific funding for this study.

    Author Contributions:Study conception and design:R.Altunay,O.F.Bay;data collection:R.Altunay;analysis and interpretation of results:R.Altunay,O.F.Bay;draft manuscript preparation:R.Altunay.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Data available within the article or its supplementary materials.The authors confirm that the data supporting the findings of this study are available within the article.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲国产毛片av蜜桃av| 高清不卡的av网站| 哪个播放器可以免费观看大片| 亚洲精品国产av成人精品| 国产精品av久久久久免费| 亚洲四区av| e午夜精品久久久久久久| 咕卡用的链子| 日本爱情动作片www.在线观看| 国产精品一区二区在线观看99| 午夜福利视频在线观看免费| 亚洲婷婷狠狠爱综合网| 国产亚洲欧美精品永久| 人人妻人人澡人人爽人人夜夜| 国产男女内射视频| 99九九在线精品视频| 免费观看a级毛片全部| 久久久欧美国产精品| 老司机亚洲免费影院| 免费久久久久久久精品成人欧美视频| 大片免费播放器 马上看| 久久鲁丝午夜福利片| 日韩精品免费视频一区二区三区| 欧美 亚洲 国产 日韩一| 日韩中文字幕视频在线看片| 免费人妻精品一区二区三区视频| 中文天堂在线官网| 成年动漫av网址| 亚洲少妇的诱惑av| 久久久久久人人人人人| 亚洲,一卡二卡三卡| 免费人妻精品一区二区三区视频| 99久国产av精品国产电影| 色综合欧美亚洲国产小说| 国产精品国产三级专区第一集| 精品福利永久在线观看| 一级,二级,三级黄色视频| 久久久亚洲精品成人影院| 男女边摸边吃奶| 国产熟女午夜一区二区三区| 七月丁香在线播放| 国产人伦9x9x在线观看| 日日爽夜夜爽网站| 免费在线观看视频国产中文字幕亚洲 | 国产高清不卡午夜福利| 国产成人精品久久二区二区91 | 丰满迷人的少妇在线观看| av在线播放精品| 亚洲国产中文字幕在线视频| www.精华液| 国产黄色免费在线视频| 亚洲欧洲日产国产| 亚洲精品一二三| 一区福利在线观看| 捣出白浆h1v1| 亚洲av欧美aⅴ国产| 国产精品国产三级专区第一集| 国产成人精品无人区| 国产爽快片一区二区三区| 午夜福利影视在线免费观看| 人妻人人澡人人爽人人| 国产精品久久久久成人av| 久久精品亚洲熟妇少妇任你| 午夜激情久久久久久久| 美国免费a级毛片| 成人影院久久| 久久人人爽av亚洲精品天堂| 黄片播放在线免费| 熟女少妇亚洲综合色aaa.| 亚洲免费av在线视频| 99国产综合亚洲精品| 国产免费一区二区三区四区乱码| 高清av免费在线| 一本—道久久a久久精品蜜桃钙片| 久久久精品国产亚洲av高清涩受| 久久性视频一级片| 婷婷色麻豆天堂久久| 亚洲av欧美aⅴ国产| 国产福利在线免费观看视频| 黄片小视频在线播放| 两性夫妻黄色片| 永久免费av网站大全| 大香蕉久久网| 波野结衣二区三区在线| 亚洲国产日韩一区二区| 1024香蕉在线观看| 亚洲精品美女久久av网站| 欧美激情 高清一区二区三区| 80岁老熟妇乱子伦牲交| 悠悠久久av| 天天躁夜夜躁狠狠久久av| 久久久久久久久久久免费av| 亚洲国产日韩一区二区| 九草在线视频观看| 80岁老熟妇乱子伦牲交| 日本91视频免费播放| 精品少妇一区二区三区视频日本电影 | 国产伦理片在线播放av一区| 国产色婷婷99| 午夜免费男女啪啪视频观看| 亚洲,欧美精品.| 久久久欧美国产精品| 国产亚洲午夜精品一区二区久久| 久久婷婷青草| 成人亚洲精品一区在线观看| 欧美日本中文国产一区发布| 久久人妻熟女aⅴ| 久久99精品国语久久久| 精品午夜福利在线看| 国产1区2区3区精品| 曰老女人黄片| 在线亚洲精品国产二区图片欧美| 黄片小视频在线播放| 99国产综合亚洲精品| 亚洲精品视频女| av免费观看日本| 中文天堂在线官网| 亚洲精品,欧美精品| 制服丝袜香蕉在线| 国产熟女午夜一区二区三区| 亚洲av电影在线观看一区二区三区| 欧美乱码精品一区二区三区| 五月天丁香电影| 麻豆精品久久久久久蜜桃| 啦啦啦啦在线视频资源| av在线app专区| 国产在线免费精品| 美女主播在线视频| 免费观看性生交大片5| 国产片特级美女逼逼视频| 男女无遮挡免费网站观看| 日本黄色日本黄色录像| 久久99一区二区三区| 大香蕉久久成人网| 最新在线观看一区二区三区 | 97在线人人人人妻| 久久人人爽人人片av| 亚洲美女黄色视频免费看| 自拍欧美九色日韩亚洲蝌蚪91| 欧美日韩视频高清一区二区三区二| 久久久久人妻精品一区果冻| 日韩中文字幕视频在线看片| 80岁老熟妇乱子伦牲交| 国产成人一区二区在线| 性高湖久久久久久久久免费观看| 国产极品天堂在线| 亚洲一级一片aⅴ在线观看| 色视频在线一区二区三区| 免费日韩欧美在线观看| 人人妻,人人澡人人爽秒播 | 午夜精品国产一区二区电影| 国产一卡二卡三卡精品 | 国产精品国产三级专区第一集| 亚洲欧美一区二区三区黑人| 久久免费观看电影| 最新在线观看一区二区三区 | 男女边吃奶边做爰视频| 99久久综合免费| 999久久久国产精品视频| 精品人妻熟女毛片av久久网站| 一级,二级,三级黄色视频| 成人三级做爰电影| 超碰成人久久| 国产一区有黄有色的免费视频| 国产男女超爽视频在线观看| 永久免费av网站大全| 夫妻性生交免费视频一级片| 超碰97精品在线观看| 亚洲国产看品久久| 免费观看人在逋| 国产熟女午夜一区二区三区| 黑人猛操日本美女一级片| 国产精品久久久久成人av| 久久久久久久国产电影| 国产日韩欧美在线精品| 黑人巨大精品欧美一区二区蜜桃| 成年av动漫网址| 男女午夜视频在线观看| 一区福利在线观看| 国产成人精品在线电影| 伊人亚洲综合成人网| 国产精品秋霞免费鲁丝片| 精品第一国产精品| 午夜91福利影院| 亚洲国产欧美日韩在线播放| 熟女av电影| 成人免费观看视频高清| 欧美成人午夜精品| 黄色怎么调成土黄色| 高清欧美精品videossex| 女人被躁到高潮嗷嗷叫费观| 人人妻,人人澡人人爽秒播 | 国产精品免费视频内射| avwww免费| 纵有疾风起免费观看全集完整版| 亚洲国产中文字幕在线视频| 老司机影院成人| 精品亚洲成国产av| 日本黄色日本黄色录像| 欧美日韩视频精品一区| 综合色丁香网| 男人舔女人的私密视频| 亚洲精品美女久久久久99蜜臀 | 欧美日韩综合久久久久久| 久久亚洲国产成人精品v| 五月开心婷婷网| 在线观看免费午夜福利视频| 中文字幕最新亚洲高清| 9热在线视频观看99| 超碰成人久久| 久久精品国产亚洲av涩爱| 夫妻性生交免费视频一级片| 观看av在线不卡| 欧美中文综合在线视频| 国产在视频线精品| 极品少妇高潮喷水抽搐| 久久久久久久大尺度免费视频| 亚洲视频免费观看视频| 黑丝袜美女国产一区| 操出白浆在线播放| 天堂8中文在线网| 麻豆乱淫一区二区| 蜜桃在线观看..| 黄片无遮挡物在线观看| 久久青草综合色| 婷婷成人精品国产| 亚洲成人国产一区在线观看 | 欧美日韩综合久久久久久| 亚洲伊人久久精品综合| 人妻人人澡人人爽人人| 日本欧美视频一区| av.在线天堂| 精品一区二区免费观看| 午夜激情av网站| 亚洲在久久综合| 亚洲成国产人片在线观看| 久久精品久久久久久久性| 制服丝袜香蕉在线| 好男人视频免费观看在线| 日韩欧美一区视频在线观看| 男女下面插进去视频免费观看| 日韩制服骚丝袜av| 十分钟在线观看高清视频www| 免费看不卡的av| 欧美日韩综合久久久久久| 一边亲一边摸免费视频| 在线 av 中文字幕| 精品视频人人做人人爽| 午夜福利网站1000一区二区三区| 久久久国产一区二区| netflix在线观看网站| 国产无遮挡羞羞视频在线观看| kizo精华| 国产精品偷伦视频观看了| 少妇的丰满在线观看| 色视频在线一区二区三区| 国产精品一区二区精品视频观看| 午夜精品国产一区二区电影| tube8黄色片| 满18在线观看网站| 中文字幕人妻熟女乱码| 女人高潮潮喷娇喘18禁视频| 男女床上黄色一级片免费看| 日本av免费视频播放| 亚洲国产欧美在线一区| 热re99久久国产66热| 国产精品久久久久久久久免| 在线天堂中文资源库| 日本wwww免费看| 2021少妇久久久久久久久久久| 少妇被粗大的猛进出69影院| 国产精品一国产av| 日日爽夜夜爽网站| 国产亚洲av片在线观看秒播厂| 天天操日日干夜夜撸| 亚洲情色 制服丝袜| 18禁观看日本| 中文字幕人妻丝袜制服| 夫妻午夜视频| 久久久久久免费高清国产稀缺| 看十八女毛片水多多多| 色吧在线观看| 秋霞在线观看毛片| 午夜福利免费观看在线| www.精华液| 亚洲国产精品国产精品| 天堂中文最新版在线下载| 日本午夜av视频| 啦啦啦视频在线资源免费观看| 97精品久久久久久久久久精品| 天天躁日日躁夜夜躁夜夜| 亚洲欧美一区二区三区久久| 波多野结衣一区麻豆| 国产亚洲欧美精品永久| 精品少妇久久久久久888优播| 天天躁夜夜躁狠狠躁躁| 亚洲欧美一区二区三区黑人| 国产高清国产精品国产三级| 999精品在线视频| 中文字幕人妻丝袜一区二区 | 黄片播放在线免费| 老司机靠b影院| 人人妻人人澡人人爽人人夜夜| 国产激情久久老熟女| 老司机靠b影院| 男女之事视频高清在线观看 | 女性被躁到高潮视频| 黄片小视频在线播放| 免费不卡黄色视频| 亚洲欧美一区二区三区久久| 国产精品久久久av美女十八| 国产av码专区亚洲av| 又粗又硬又长又爽又黄的视频| 国产精品一区二区精品视频观看| 久热这里只有精品99| 国产精品国产三级专区第一集| av在线播放精品| 亚洲成人免费av在线播放| 日韩一本色道免费dvd| 啦啦啦中文免费视频观看日本| 精品亚洲乱码少妇综合久久| 男的添女的下面高潮视频| 国产精品女同一区二区软件| 韩国精品一区二区三区| 亚洲国产欧美一区二区综合| 久久99热这里只频精品6学生| 日日啪夜夜爽| 亚洲av欧美aⅴ国产| 丁香六月欧美| 日韩精品免费视频一区二区三区| 亚洲精品乱久久久久久| 国产乱人偷精品视频| 亚洲天堂av无毛| 大香蕉久久网| 中文字幕高清在线视频| 天天添夜夜摸| 亚洲综合精品二区| 免费观看人在逋| 久久精品国产综合久久久| 成人免费观看视频高清| 久久国产亚洲av麻豆专区| 日韩,欧美,国产一区二区三区| 成人漫画全彩无遮挡| 午夜免费男女啪啪视频观看| 成人18禁高潮啪啪吃奶动态图| 久久天堂一区二区三区四区| 中文字幕最新亚洲高清| 精品视频人人做人人爽| 高清av免费在线| 青春草视频在线免费观看| 亚洲国产欧美在线一区| 在线观看免费视频网站a站| 一级毛片 在线播放| 老熟女久久久| 成人国语在线视频| 亚洲第一av免费看| 国产亚洲午夜精品一区二区久久| 国产午夜精品一二区理论片| 中国国产av一级| 国产一卡二卡三卡精品 | 91成人精品电影| 免费不卡黄色视频| 搡老岳熟女国产| 亚洲伊人久久精品综合| 丝袜喷水一区| av网站在线播放免费| 天天影视国产精品| 欧美中文综合在线视频| 蜜桃在线观看..| 制服人妻中文乱码| 亚洲精品美女久久久久99蜜臀 | 女的被弄到高潮叫床怎么办| 日韩精品有码人妻一区| 女人高潮潮喷娇喘18禁视频| av又黄又爽大尺度在线免费看| 国产成人系列免费观看| 午夜久久久在线观看| 午夜福利乱码中文字幕| 丰满乱子伦码专区| 亚洲第一青青草原| 色视频在线一区二区三区| 国产探花极品一区二区| 男男h啪啪无遮挡| 国产成人精品在线电影| 一级毛片我不卡| 中文字幕人妻丝袜制服| 丝袜脚勾引网站| 久久免费观看电影| 国产亚洲一区二区精品| 人人澡人人妻人| 1024香蕉在线观看| 日本爱情动作片www.在线观看| 19禁男女啪啪无遮挡网站| 少妇猛男粗大的猛烈进出视频| videosex国产| 黄片播放在线免费| 午夜福利乱码中文字幕| 波野结衣二区三区在线| 夫妻性生交免费视频一级片| 国产国语露脸激情在线看| 久久精品亚洲熟妇少妇任你| 国产精品久久久人人做人人爽| 午夜老司机福利片| 秋霞在线观看毛片| 精品免费久久久久久久清纯 | 久久99一区二区三区| 亚洲,一卡二卡三卡| 亚洲成人国产一区在线观看 | 久久午夜综合久久蜜桃| 一级爰片在线观看| 99精品久久久久人妻精品| 国产精品免费视频内射| 丝袜美腿诱惑在线| 咕卡用的链子| 欧美精品人与动牲交sv欧美| 国产日韩欧美视频二区| 看非洲黑人一级黄片| 自线自在国产av| 亚洲免费av在线视频| 国产日韩欧美在线精品| 久久ye,这里只有精品| 人妻一区二区av| 日本爱情动作片www.在线观看| 日韩熟女老妇一区二区性免费视频| 欧美日韩国产mv在线观看视频| 亚洲第一区二区三区不卡| av女优亚洲男人天堂| 麻豆av在线久日| 超碰97精品在线观看| 日本一区二区免费在线视频| 男女午夜视频在线观看| 多毛熟女@视频| 午夜福利,免费看| 免费观看性生交大片5| 国产成人精品在线电影| 成年人午夜在线观看视频| 亚洲av中文av极速乱| 999精品在线视频| 精品国产一区二区久久| 久久国产精品男人的天堂亚洲| 国产精品三级大全| 丝袜喷水一区| 少妇人妻久久综合中文| 日韩制服骚丝袜av| 日日爽夜夜爽网站| 1024香蕉在线观看| 国产亚洲欧美精品永久| 久久精品国产a三级三级三级| 日韩精品免费视频一区二区三区| 高清在线视频一区二区三区| av在线观看视频网站免费| 国产精品熟女久久久久浪| 亚洲,欧美精品.| 一级片'在线观看视频| 午夜福利视频在线观看免费| 精品一区二区免费观看| 亚洲av欧美aⅴ国产| 我的亚洲天堂| 成人亚洲欧美一区二区av| 老司机影院成人| 汤姆久久久久久久影院中文字幕| 亚洲专区中文字幕在线 | 伊人久久大香线蕉亚洲五| 爱豆传媒免费全集在线观看| 亚洲人成网站在线观看播放| 黄色毛片三级朝国网站| 在线看a的网站| 日韩中文字幕欧美一区二区 | 午夜91福利影院| 国产有黄有色有爽视频| 亚洲欧美日韩另类电影网站| 久久精品久久久久久噜噜老黄| 一本色道久久久久久精品综合| 日韩视频在线欧美| 久久久久久久久免费视频了| 成人亚洲欧美一区二区av| 亚洲欧美中文字幕日韩二区| 一区在线观看完整版| 国产野战对白在线观看| 男女高潮啪啪啪动态图| 19禁男女啪啪无遮挡网站| 国产精品久久久久成人av| 亚洲精品日韩在线中文字幕| 丝瓜视频免费看黄片| av网站在线播放免费| 亚洲,欧美,日韩| 精品国产国语对白av| 天天操日日干夜夜撸| 亚洲av综合色区一区| 菩萨蛮人人尽说江南好唐韦庄| 在线观看免费视频网站a站| 天美传媒精品一区二区| av.在线天堂| 国产乱来视频区| 国产国语露脸激情在线看| 欧美97在线视频| 综合色丁香网| 久久人妻熟女aⅴ| 国产精品一二三区在线看| 菩萨蛮人人尽说江南好唐韦庄| 日韩一区二区视频免费看| 精品少妇久久久久久888优播| 在线天堂最新版资源| 一级a爱视频在线免费观看| 别揉我奶头~嗯~啊~动态视频 | 亚洲av成人不卡在线观看播放网 | 最新在线观看一区二区三区 | 看免费成人av毛片| 老司机深夜福利视频在线观看 | 日韩一本色道免费dvd| 国产日韩欧美视频二区| 国产精品成人在线| 亚洲婷婷狠狠爱综合网| 亚洲国产欧美日韩在线播放| 欧美亚洲 丝袜 人妻 在线| 亚洲精品日本国产第一区| 天堂中文最新版在线下载| 亚洲国产最新在线播放| 99精国产麻豆久久婷婷| 一区二区三区乱码不卡18| 国产精品av久久久久免费| 中文字幕精品免费在线观看视频| 欧美日韩一区二区视频在线观看视频在线| 我要看黄色一级片免费的| 男女免费视频国产| 国产精品嫩草影院av在线观看| 亚洲七黄色美女视频| 五月天丁香电影| 母亲3免费完整高清在线观看| 亚洲五月色婷婷综合| 久久精品亚洲av国产电影网| 亚洲精品中文字幕在线视频| 国产熟女午夜一区二区三区| 久久久久久人妻| 免费不卡黄色视频| 欧美av亚洲av综合av国产av | 黄色 视频免费看| 日本一区二区免费在线视频| 伊人久久国产一区二区| 久久久久国产一级毛片高清牌| 日韩视频在线欧美| 一级毛片电影观看| 建设人人有责人人尽责人人享有的| 久久久国产精品麻豆| 欧美日韩国产mv在线观看视频| 人成视频在线观看免费观看| 亚洲五月色婷婷综合| 在线观看免费午夜福利视频| 涩涩av久久男人的天堂| 777米奇影视久久| 国产又色又爽无遮挡免| 日韩成人av中文字幕在线观看| 五月开心婷婷网| 亚洲综合精品二区| 51午夜福利影视在线观看| 一级a爱视频在线免费观看| 婷婷色综合大香蕉| 国产乱人偷精品视频| av网站在线播放免费| 欧美黄色片欧美黄色片| 久久国产亚洲av麻豆专区| 免费女性裸体啪啪无遮挡网站| 老司机影院成人| 日韩大码丰满熟妇| 丝袜在线中文字幕| 精品一区二区三区四区五区乱码 | 日本欧美国产在线视频| 亚洲av中文av极速乱| 亚洲国产成人一精品久久久| 爱豆传媒免费全集在线观看| 国产精品久久久人人做人人爽| 我的亚洲天堂| 女人久久www免费人成看片| 9191精品国产免费久久| 男女之事视频高清在线观看 | av在线播放精品| 午夜福利免费观看在线| 亚洲四区av| 日韩大码丰满熟妇| 飞空精品影院首页| 国产成人91sexporn| 亚洲国产看品久久| 国产人伦9x9x在线观看| 欧美日本中文国产一区发布| 国产免费一区二区三区四区乱码| 亚洲欧美一区二区三区黑人| 精品少妇一区二区三区视频日本电影 | 超色免费av| 丝瓜视频免费看黄片| 久久久久视频综合| 午夜福利一区二区在线看| 黄色怎么调成土黄色| 天天添夜夜摸| 老司机在亚洲福利影院| 午夜av观看不卡| 极品少妇高潮喷水抽搐| 国产激情久久老熟女| 男女床上黄色一级片免费看| 美女福利国产在线| 亚洲七黄色美女视频| 色婷婷av一区二区三区视频| 丝瓜视频免费看黄片| 久久久久视频综合| 久久亚洲国产成人精品v| 女人爽到高潮嗷嗷叫在线视频| 丝袜人妻中文字幕| 丝瓜视频免费看黄片| 欧美中文综合在线视频| 19禁男女啪啪无遮挡网站| 夜夜骑夜夜射夜夜干| 只有这里有精品99| 免费黄频网站在线观看国产| 中文字幕色久视频| 捣出白浆h1v1| 啦啦啦在线免费观看视频4|