• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    For LEO Satellite Networks: Intelligent Interference Sensing and Signal Reconstruction Based on Blind Separation Technology

    2024-03-11 06:28:06ChengjieLiLidongZhuZhenZhang
    China Communications 2024年2期

    Chengjie Li ,Lidong Zhu ,Zhen Zhang

    1 The Key Laboratory for Computer Systems of State Ethnic Affairs Commission,School of Computer Science and Technology(Southwest Minzu University),Chengdu 610000,China

    2 National Key Laboratory of Science and Technology on Communications(University of Electronic Science and Technology of China),Chengdu 610000,China

    3 College of Computer Science(Sichuan University),Chengdu 610000,China

    Abstract: In LEO satellite communication networks,the number of satellites has increased sharply,the relative velocity of satellites is very fast,then electronic signal aliasing occurs from time to time.Those aliasing signals make the receiving ability of the signal receiver worse,the signal processing ability weaker,and the anti-interference ability of the communication system lower.Aiming at the above problems,to save communication resources and improve communication efficiency,and considering the irregularity of interference signals,the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario.In order to improve the stability of source signal separation and the security of information transmission,a greedy optimization algorithm can be executed.At the same time,to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima,delete low-energy points during each iteration process.Ultimately,simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system,achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system.

    Keywords: blind source separation;greedy optimization algorithm;interference sensing;LEO satellite communication networks;signal reconstruction

    I.INTRODUCTION

    In recent years,the integrated space-ground network has been rapidly developing,and the Low Earth Orbit(LEO) satellite communication networks has gained increasing attention.However,its shortcomings have also become evident.Such as due to the satellite movement speed is fast and the openness of communication channels,the phenomenon of electronic signal aliasing is also common,as described in Figure 1.These aliasing signals make the receiving ability of the signal receiver worse,signal separation and processing ability weaker,and the anti-interference ability of the communication system lower.The deterioration of this communication environment reduces communication efficiency and the security and confidentiality of network communication.Moreover,to optimize the transmission efficiency of the network transmission system while maintaining the security of the communication system,a configuration is employed where the number of receiving antennas is smaller than the number of source signals.then the number of rows in the matrix receiving the mixed signals is less than the number of columns.In light of this scenario,Blind Source Separation(BSS)technology can significantly enhance the processing performance and efficiency of the system[1,2].

    To tackle the intricacies of the mentioned scenarios,experts and scholars have put forward the application of Blind Source Separation (BSS) theory to enhance the system’s electronic signal alignment performance.In 1986,P.Comon proposed a new BSS theoretical framework,which was based on output power error separation,resulting in a significant improvement in signal transmission performance[3].In 1989,Olivier Rossetto utilized a neural network for the BSS algorithm,further enhancing the accuracy of the technology [4].O.Yilmaz and S.Rickard were the first to employ binary time-frequency masks for blind separation [5].Anthony J.Bell introduced a self-organized blind separation algorithm,which maintains the maximization of information within the nonlinear unit network during implementation,ensuring statistical independence between signals and resulting in an effective separation [6].For sub Gaussian and super Gaussian mixed signals,T.Lee extended the Infomax algorithm to separate mixed signals,and effectively processed high-dimensional EEG data,separating brain command signals from line noise [7].BSS models are referred to as overdetermined,positivedetermined,and underdetermined when the observed signal number is greater than,equal to,or less than the source signal number,respectively [8].Most existing BSS algorithms,such as independent component analysis (ICA),assume that BSS models is positive-determined.However,in practice,underdetermined BSS problems frequently arise[9].As an illconditioned problem,underdetermined BSS has become a challenging issue in the field of blind signal processing[10].Currently,the solution to underdetermined BSS is typically based on the‘two-step method’concept,first estimating the mixing matrix from the observation signal,and then combining the estimated matrix with an optimization algorithm for source signal separation.The“two-step method”streamlines the research process and has significantly advanced the development of underdetermined BSS algorithms[8].In this paper,we aim to transforming the BSS problem into a sampling point data clustering problem,by exploiting the sparsity of signals.The greedy algorithm will be employed in this algorithm..

    The greedy algorithm tends to converge towards a local optimum solution during the iterative process.J.A.Tropp has addressed the challenge of obtaining the global optimum solution from multiple local optimum solutions,but this approach is not suitable for wireless signal aliasing scenarios[11].The effectiveness of the greedy algorithm is greatly influenced by the choice of greedy strategy [12].Improving the performance of the greedy algorithm and the processing capacity of the system through the selection of an appropriate greedy strategy is a crucial aspect to consider in this paper.

    The structure of this paper consists of six sections.The first section provides an overview of Sparse Component Analysis(SCA)method,along with its underlying principles of vector representation,and the evaluation metrics for the algorithm’s performance etc..Section II delves into the theoretical foundation of sparse signals and mathematical model of BSS.In Section III,the proposed sparse signals underdetermined greedy blind separation scheme is presented,including the details of theSCA,cost function construction,and sparse signals underdetermined greedy blind separation.Section IV focuses on the simulation analysis and the algorithm performance analysis,including performance discussion on signal processing and the low earth orbit satellite communication network security.Finally,in Section V,a summary is provided,along with objective and reasonable conclusions drawn for the algorithms proposed in this research.

    II.BASIC MATHEMATICAL KNOWLEDGE RELATED TO THE ALGORITHM

    In order to provide the rationality of the algorithm from a theoretical perspective,the mathematical model of the SCA method will be presented in this section.Firstly,the sparsity of the source signals is essential to ensure optimal separation performance.In cases where the signals are not sparse,they can be made so using a STFT,which is the Short-time Fourier Transform.Then,the theory of BSS is introduced as a statistical signal processing technique to separate mixed signals.The mathematical theory of BSS is detailed in Section B of this section.Finally,performance indices,including the “correlation coefficient” and“PI”,are introduced to measure the algorithm’s performance.These performance indices will be used in the later sections of the paper to measure the effectiveness and superiority of the proposed algorithm.

    2.1 Sparse Representation Method(SRM)

    SRM is a common step for dealing with underdetermined BSS.The mathematical expression of the SRM model is as follows,

    in the above formula (1),εis a reconstruction error,Y={y1,y2,···yM} ∈Rn×Mis the matrix composed of original signals,X={x1,x2,···,xM}T ∈RK×Mis the matrix composed of sparse coefficients,‖xi‖0is the sparseness degree ofxi,is a dictionary,is the atom.In order to find a more suitable sparse matrix more easily,the dictionary usually uses an overcomplete dictionary,that is,,at this time,the equation is either infinite solution(Discriminant Theory of System of linear equations)[13].

    In this article,Matching Pursuit (MP) algorithm is used to solve sparse coefficientsxi.AssumeD={d1,d2,d3}is the dictionary,-→OAis the original signal,the process of that is as follows,

    (1) Project -→OAtod1,d2andd3respectively,and select the largest projectionis the residual vector,assumethe iteration ends,perform the second step(2);

    According to the step(1)(2),the original signalis sparsely represented,τis the residual vector.The geometric framework of sparse representation is given in Figure 2.

    Figure 2.Geometric framework of sparse representation.

    2.2 Mathematical Model of BSS

    The primary benefit of BSS technology lies in its capability to extract the original source signal solely from the mixed signal,even in situations where the parameters of both the source signal and transmission channel remain unknown.

    Next,the principles of BSS technology will be elucidated from a theoretical standpoint.ConsiderNstatistically independent signals,their matrix representation isS(t)=[s1(t),···,sN(t)]T,transmitted through an unknown channelA,andMsensors that detect the observed signals,their matrix representation isX(t)=[x1(t),···,xM(t)]T.Then theS(t)is the source signal,theX(t) is the observed mixed signals.The mathematical representation of the entire transmission process is as follows:

    In formula (3),X(t)=[x1(t),···,xM(t)]Tis aM-dimensional observed signal,which is a mixture ofNsource signals.S(t)=[s1(t),···,sN(t)]Tis anN-dimensional unknown source signal,N(t)=[n1(t),···,nM(t)]Tis aM-dimensional channel noise,andAis theM×Ndimensional transfer function matrix,which is determined by the communication channel.The Flow chart of BSS is given in Figure 3.

    Figure 3.Flow chart of BSS.

    The primary aim of BSS is to estimate the separation matrixWin situations with limited prior information,the mathematical model is as follows,

    In the above formula (3),Y(t) is a matrix composed of estimated signals from the source signal (transmit signals),expressed asY(t)=[y1(t),···,yM(t)]T,which is aM-dimensional,and the process of BSS is finished.

    2.3 Performance Index of Blind Separation Algorithm

    In this paper,there are two indexes to measure signal processing;one is “correlation coefficient” (cc),and the other is“PI”.In the following section,we will briefly introduce these two performance indicators.

    (1)correlation coefficient(cc)

    To assess the advantages of a BSS algorithm,the“cc”is commonly used as a benchmark for evaluating its performance.The aim is to determine the proximity between the estimated separated source signal sample points and the actual source signal sample points[14].The“cc”is defined as follows,

    In formula(4),yian estimated separated signal,sjis a actual source signal.

    (2)PI

    AssumeG=WA,as expressed in formula(3),Ais theM×Ndimensional transfer function matrix,Wis the calculated separation matrix.To evaluate the separation effect,the channel interference measurement error criterion is built base on the global performance estimation matrixG.The mathematical model of“PI”is as follows[15],

    in formula (5),thegijis the (i,j)th element of the global performance estimation matrixG.

    III.INTERFERENCE SENSING AND SIGNAL RECONSTRUCTION BASED ON BSS

    According to the characteristics of wireless network signal transmission,we aim to solve the problem of wireless network signal transmission from the physical layer,improve signal processing efficiency,and enhance wireless network security.

    3.1 Optimized Sparse Principal Component Analysis(Optimized-SPCA)

    Sparse Principal Component Analysis(SPCA)is proposed to address the disadvantage of Principal Component Analysis (PCA) in which it is unable to explain the features corresponding to each principal component.In this paper,by sparsifying the principal component coefficients in PCA,the main components are highlighted.The original variables are approximated using linear regression,andL1andL2regularization terms are added on top of the approximating function to obtain sparse loadings.The specific cost function is as follows[16]:

    in formula(6),‖?‖F(xiàn)representsFrobenius-norm,‖?‖prepresentsLp-norm,andkis the number of principal components,A ∈Rp×krepresents nonsparse loadings.

    Equation (6) represents the cost function of the algorithm.To obtain its optimal solution,an alternative algorithm is used,that is,first fixAto solveB,and then fixBto solveA.Given any matrixA,AAT=I,andis orthogonal matrix,then

    assume theAis confirmed,substitute the formula(7)into the formula (6),then the formula (6) can be expressed as the follows[17],

    3.2 Construct Cost Function of Intelligent Interference Sensing

    In low orbit satellite communication networks,the presence of numerous satellites,high mobility,and the openness of satellite communication channels make interference detection a challenging task.This paper builds two cost functions to accomplish the goal mentioned above.Those two cost function pairs form a two-dimensional coordinate system in which the mixed signal is separable.

    We calculate two cost functions for each sample data,which are defined as follows[18].

    (1)Construct Cost Functionρi

    The Construct Cost Functionρiis defined as

    In this research,the symboldijrepresents the Euclidean distance calculated between the sample pointsiandj.Thedcis the cutoff distance,which satisfies the following formula,

    then,according to the formula (9) and formula (10),the value ofρican be calculated.

    (2)Construct Cost Functionδi

    The Construct Cost Functionδiis defined as

    whereδirepresents the minimum distance separating sample pointifrom any other sample points with higher density.

    (3)Construct Cost Functionxi

    After the definitions ofρiandδi,xiis defined based onρiandδi.usingxias the training data set of a greedy algorithm can better realize the optimization performance of a greedy algorithm,that is,xiis the ratio ofρiandδi,

    then,the valuexiis the objective value of the greedy algorithm.

    3.3 Greedy Blind Source Separation Algorithm(GBSSA)

    Derived from the execution process of the algorithm presented in partA,the sparse representation of the mixed signals is obtained.Similarly,following the execution process of the algorithm in partB,the classification results of the sampled points of the mixed sparse signals are obtained.Next,the GBSSA will be executed.Assume that the sampling point set of sparse signals isN,N={N1,...,Nr}andN1∪N2∪...∪Nr=N,Ni ∩Nj=?(i=j).In each data setNi,i=1,2,...,r,theGAwill be executed[19].With the objective of discovering the optimal solution,the following cost functions will be iterated[19],

    In eachNi,according to the formula(13),the optimal solution will be given,but it is only local optimal.To ensure the attainment of the global optimal solution,the algorithm incorporates the K-means algorithm for reclassification after every 10 iterations,preventing the risk of being trapped in local optimality.At last,the global optimal solution will be found inNi(Ni ?N),and

    IV.SIMULATION RESULTS

    The preceding content proposes a novel intelligencedriven blind separation algorithm for the LEO satellite communication networks.The above processing process ensures the security and privacy of the wireless networks.The proposed algorithm’s performance will be presented in the following sections.

    In the simulation experiments of this paper,the parameter settings are based on Hongyan LEO satellite system,with an orbital altitude of approximately 1100 kilometers.In order to assess the algorithm’s feasibility,UBSS is conducted on experimentally generated frequency hopping signals that exhibit sparsity.

    4.1 Signal Processing Performance

    The performance of signal processing will be verified in this subsection.The following are the experiment’s parameters[20].

    In the case of underdetermined blind separation,there are three source signals and two receiving antennas;based on the actual transmission scenario,the parameter settings for the communication system are presented in Table 1,

    Table 1.Simulation parameters.

    This proposed algorithm in Section III can solve the UBSS problem.From the Table 1,the mixed signal consists of three transmitted signals,with a total of two receiving antennas.The waveform of the transmitted signals is partitioned into three segments,as depicted in Figure 4.The objective of this algorithm is to effectively extract the individual signals from the mixed signals in a wireless network system,subsequent to their transmission through the actual communication channel.As a result of having two receiving antennas,the temporal representation of the mixed signals upon reception is divided into two segments,which are illustrated in Figure 5.

    Figure 4.The primary signals.

    Figure 5.The received signals.

    Once the set of sampling points for the mixed signals is obtained,the novel GBSSA described in Section III will be applied.This algorithm aims to restore the mixed signals depicted in Figure 5 into three distinct signals,as shown in Figure 6.As anticipated,the waveforms displayed in Figure 4 exhibit a high degree of similarity to those depicted in Figure 6.

    Figure 6.The separated signals.

    4.2 Performance Discussion on Signal Processing

    The proposed algorithm is an optimized version of the greedy algorithm,addressing the limitation of the original greedy algorithm’s tendency to converge to local optima.This enhanced algorithm has been success-fully applied in the BSS process,demonstrating its effectiveness.To assess the efficiency of the algorithm put forward in this research,the “cc” and “PI” are employed as evaluation metrics.The mathematical expressions for these metrics are provided in equations(4)and(5)within the paper[21,22].

    Figure 7 shows the experimental results using the correlation coefficient to measure mixed signal separation performance.According to Figure 7,the separation performance of mixed signals improves as SNR increases.When SNR is equal to 10,the separation performance has been significantly improved.Consequently,it can be inferred that the algorithm put forward in this research exhibits a significant capability for signal separation.Simultaneously,our algorithm surpasses theK-means BSS algorithm in terms of separation performance,and it also demonstrates enhanced stability compared to the algorithm presented in this paper[23-25].

    Figure 7.The separation performance experiment 1.

    To provide a comprehensive evaluation of the algorithm’s performance in this research,the PI is employed as an additional metric for measuring the separation performance.During the course of this simulation experiment,a comparison is made between the proposed algorithm and the DBSCAN BSS algorithm.The experimental results,depicted in Figure 8,illustrate the outcomes of this comparative analysis.The algorithm’s efficacy in signal separation put forth in this paper exhibited superior results compared to the DBSCAN BSS algorithm(Figure 8)[26-28].Furthermore,our proposed algorithm exhibits an enhanced convergence speed,achieving faster convergence compared to DBSCAN BSS.

    Figure 8.The Separation Performance Experiment 2.

    4.3 Performance Discussion on the LEO Satellite Communication Network Security

    The algorithm presented in this paper can potentially improve signal processing performance and network transmission security.Consequently,the LEO satellite communication network security will be discussed in this subsection.Additionally,an encryption algorithm is used in the signal transmission process to improve network communication security[29].

    The test environment is the server virtualization platform,and the hardware configuration of the virtual environment is given as follows[30].In addition to the parameters set at the signal physical layer,the parameters in Table 1 are set during wireless signal transmission net.

    (1)Throughput

    Throughput refers to the quantity of data that can be successfully transmitted within a specific time frame.It serves as a crucial metric for evaluating network performance.The magnitude of throughput is primarily influenced by the network equipment’s internal and external hardware capabilities,as well as the efficiency of the algorithm employed.In cases where the internal and external network hardware of the network equipment remains constant,the efficiency of the algorithm becomes a crucial factor affecting the network throughput[30,31].

    This subsection involves conducting two sets of experiments,wherein the internal and external network hardware remains consistent across both groups.The sole distinction between these experiments lies in the choice of algorithms employed.

    In Figure 9,the solid red line indicates the throughput over time with the algorithm put forth in this paper,and the blue dotted line indicates the throughput over time without the proposed algorithm.From Figure 8,after using the algorithm in this paper,the algorithm’s convergence speed is faster than without the proposed algorithm,and throughput has also been improved.In other words,the network’s throughput is not reduced while improving the signal processing capacity,improving the system’s spectral efficiency.

    Figure 9.Throughput over time.

    (2)Invulnerability analysis of the wireless network

    The ability of the network to resist attacks is another critical indicator to measure the network.The standard method to measure the invulnerability of the network is whether the network can generally communicate when the network node is attacked.Parameter settings are shown in Table 2.

    Table 2.Simulation parameters.

    After improving wireless networks’signal processing capability,network invulnerability has also improved in this paper.In other words,it increases network processing capacity and ensures wireless net-work security.To measure the invulnerability of the wireless network,the connectivity performance analysis of network(E)is used.The formula ofEis given in formula(14),

    wherelijis the shortest path between nodeiand nodej,and the above formula can measure the overall network connectivity when the network is attacked in any case[14].

    The experimental results are shown in Figure 10.In Figure 10,the solid red line indicates the response of wireless networks without any optimization algorithm of signal processing when attacked.The network performance declines rapidly after being attacked.The blue dotted line indicates that the DE (Differential Evolution) algorithm is used in signal processing.The pink dotted line indicates that the PSO (Particle Swarm Optimization) algorithm is used in signal processing.The presence of the black dotted line on the graph serves as an indicator that the algorithm put forth in this paper leads to an improvement in wireless network performance[32].From Figure 10,the invulnerability of the wireless network with the algorithm put forth in this paper is significantly improved and is better than the DE algorithm and PSO algorithm.

    Figure 10.Figure.10 Invulnerability analysis of the wireless network.

    From Figure 9 and Figure 10,the algorithm put forth in this paper not only improves the throughput of the wireless network but also improves the invulnerability of the wireless network,which is very valuable.

    V.CONCLUSION

    We have proposed to improve the capability of interference sensing and signal reconstruction in the LEO satellite communication networks by using the greedy sparse optimization UBSS in this paper.The algorithm in this paper solves the problem of signal aliasing from the physical layer,which improves the efficiency of signal transmission,and the security of wireless networks.Moreover,the approach demonstrates commendable performance with limited prior information,successfully achieving the objective of conserving network resources.In the initial stage,we provide a comprehensive overview of the signal thinning technique,encompassing the categorization and practical implementation of clustering algorithms.Following that,we delve into the principle of UBSS and the model utilized for achieving satisfaction of sparse signals.In conclusion,leveraging the inherent traits of wireless networks,a greedy sparse UBSS technique is employed to effectively separate sparse signals even in uncertain conditions.The effectiveness demonstrated by this approach is subsequently evaluated to assess its effectiveness.Ultimately,the simulation outcomes demonstrate the commendable performance and practicality of the algorithm proposed in this paper.

    ACKNOWLEDGEMENT

    This work is supported by National Natural Science Foundation of China (62171390),Central Universities of Southwest Minzu University (ZYN2022032,2023NYXXS034) and the State Scholarship Fund of the China Scholarship Council(NO.202008510081).

    国产麻豆成人av免费视频| 嫩草影院新地址| 美女cb高潮喷水在线观看| 首页视频小说图片口味搜索| 国产伦在线观看视频一区| 亚洲精品在线美女| 搡女人真爽免费视频火全软件 | 国产 一区 欧美 日韩| 欧美+日韩+精品| 嫩草影视91久久| 在线免费观看的www视频| 欧美在线一区亚洲| 精品久久久久久成人av| 好看av亚洲va欧美ⅴa在| 久久热精品热| 久久久久久大精品| 日本撒尿小便嘘嘘汇集6| 日本在线视频免费播放| 看片在线看免费视频| 在线天堂最新版资源| 久久精品夜夜夜夜夜久久蜜豆| 欧美黑人欧美精品刺激| 欧美激情在线99| 日韩欧美精品免费久久 | 无人区码免费观看不卡| 一进一出好大好爽视频| 91麻豆精品激情在线观看国产| 久久精品综合一区二区三区| 国产一区二区在线av高清观看| 亚洲av.av天堂| 草草在线视频免费看| 3wmmmm亚洲av在线观看| 国产私拍福利视频在线观看| 精品久久国产蜜桃| 欧美日韩中文字幕国产精品一区二区三区| 欧美不卡视频在线免费观看| 国产精品人妻久久久久久| 国产又黄又爽又无遮挡在线| 亚洲成av人片在线播放无| 亚洲国产日韩欧美精品在线观看| 国产亚洲精品av在线| a级一级毛片免费在线观看| 国产精品野战在线观看| 亚洲三级黄色毛片| av在线老鸭窝| 久久国产精品人妻蜜桃| 亚洲欧美日韩高清在线视频| 99热这里只有是精品50| 美女被艹到高潮喷水动态| 国产精品亚洲美女久久久| 欧美精品啪啪一区二区三区| 小说图片视频综合网站| 国产精品一区二区性色av| 日韩精品青青久久久久久| 亚洲国产精品999在线| 久久婷婷人人爽人人干人人爱| www.色视频.com| 精品久久国产蜜桃| 淫秽高清视频在线观看| 我的女老师完整版在线观看| 久久久久精品国产欧美久久久| 首页视频小说图片口味搜索| 久久99热6这里只有精品| 麻豆av噜噜一区二区三区| aaaaa片日本免费| 欧美另类亚洲清纯唯美| 亚洲第一电影网av| 乱码一卡2卡4卡精品| 成人精品一区二区免费| 国产熟女xx| 国语自产精品视频在线第100页| 麻豆久久精品国产亚洲av| 日韩精品青青久久久久久| 欧美bdsm另类| 琪琪午夜伦伦电影理论片6080| 超碰av人人做人人爽久久| 99久久精品国产亚洲精品| 99热精品在线国产| 欧美不卡视频在线免费观看| 我要看日韩黄色一级片| 国产野战对白在线观看| 一进一出好大好爽视频| 国产精品三级大全| 久久精品夜夜夜夜夜久久蜜豆| 国产精品久久久久久亚洲av鲁大| av中文乱码字幕在线| 男人舔女人下体高潮全视频| 丰满的人妻完整版| 日本精品一区二区三区蜜桃| 欧美黑人欧美精品刺激| 亚洲av一区综合| 欧美xxxx黑人xx丫x性爽| 精品午夜福利视频在线观看一区| 国产单亲对白刺激| 国产激情偷乱视频一区二区| 一本综合久久免费| 亚洲国产高清在线一区二区三| 自拍偷自拍亚洲精品老妇| 美女xxoo啪啪120秒动态图 | 1000部很黄的大片| 一级毛片久久久久久久久女| www.熟女人妻精品国产| 日本黄大片高清| 哪里可以看免费的av片| 国产69精品久久久久777片| 内射极品少妇av片p| 亚洲成人中文字幕在线播放| 嫁个100分男人电影在线观看| 啦啦啦观看免费观看视频高清| 91字幕亚洲| 亚洲最大成人av| 亚洲欧美激情综合另类| 少妇熟女aⅴ在线视频| 少妇丰满av| 99久久无色码亚洲精品果冻| 精品久久久久久久久久免费视频| 久久久久久九九精品二区国产| a级毛片免费高清观看在线播放| 一级黄片播放器| 成人永久免费在线观看视频| 国产精品,欧美在线| 99在线视频只有这里精品首页| 中文字幕av在线有码专区| 亚洲乱码一区二区免费版| 成人午夜高清在线视频| www.熟女人妻精品国产| 男人舔奶头视频| 欧美一区二区亚洲| 免费黄网站久久成人精品 | 国产精品嫩草影院av在线观看 | 久久久久免费精品人妻一区二区| 久久精品国产亚洲av香蕉五月| 97热精品久久久久久| 国产探花在线观看一区二区| 日韩欧美精品v在线| 啪啪无遮挡十八禁网站| 国产精品野战在线观看| 少妇丰满av| 禁无遮挡网站| 国产伦一二天堂av在线观看| 国产私拍福利视频在线观看| 99热这里只有是精品在线观看 | 免费观看的影片在线观看| 看免费av毛片| 亚洲成人中文字幕在线播放| 色播亚洲综合网| 美女 人体艺术 gogo| 很黄的视频免费| 99久久精品国产亚洲精品| 色视频www国产| 99久久无色码亚洲精品果冻| 国产真实乱freesex| 午夜福利成人在线免费观看| 精品久久久久久久久久免费视频| 国产白丝娇喘喷水9色精品| 小说图片视频综合网站| 精品人妻偷拍中文字幕| 搡老岳熟女国产| 天堂√8在线中文| 久久天躁狠狠躁夜夜2o2o| 亚洲人成伊人成综合网2020| 国产 一区 欧美 日韩| 一本综合久久免费| 身体一侧抽搐| 婷婷六月久久综合丁香| 国产精品精品国产色婷婷| 色精品久久人妻99蜜桃| 国产精品伦人一区二区| 精品国内亚洲2022精品成人| 三级男女做爰猛烈吃奶摸视频| 午夜影院日韩av| 久久精品综合一区二区三区| 内地一区二区视频在线| 日韩欧美国产一区二区入口| 亚洲精品影视一区二区三区av| 成人美女网站在线观看视频| 欧美又色又爽又黄视频| 18禁裸乳无遮挡免费网站照片| 欧美潮喷喷水| av国产免费在线观看| 色精品久久人妻99蜜桃| 免费av观看视频| 亚洲美女视频黄频| 国产中年淑女户外野战色| 婷婷亚洲欧美| a级毛片免费高清观看在线播放| 老司机福利观看| 国产一区二区三区视频了| 免费观看人在逋| 亚洲第一电影网av| 日韩成人在线观看一区二区三区| 成人性生交大片免费视频hd| 在线a可以看的网站| 亚洲av日韩精品久久久久久密| 亚洲久久久久久中文字幕| 亚洲成人久久性| 我要搜黄色片| 看免费av毛片| 亚洲综合色惰| 特大巨黑吊av在线直播| 神马国产精品三级电影在线观看| 精品久久久久久久末码| 亚洲成av人片在线播放无| 精品一区二区免费观看| 性欧美人与动物交配| 动漫黄色视频在线观看| 两个人视频免费观看高清| 亚洲av成人精品一区久久| 无遮挡黄片免费观看| 18禁裸乳无遮挡免费网站照片| 在线播放无遮挡| 精品一区二区免费观看| 真人一进一出gif抽搐免费| 国产精品亚洲av一区麻豆| 国内毛片毛片毛片毛片毛片| 久久久久国内视频| 色综合欧美亚洲国产小说| 波野结衣二区三区在线| 村上凉子中文字幕在线| 欧美性猛交黑人性爽| 国产成人av教育| 国产亚洲精品av在线| 3wmmmm亚洲av在线观看| 观看美女的网站| 国产麻豆成人av免费视频| 黄色丝袜av网址大全| 99久久99久久久精品蜜桃| 伦理电影大哥的女人| 91字幕亚洲| 少妇的逼好多水| 青草久久国产| 国产av一区在线观看免费| 特级一级黄色大片| 波多野结衣高清无吗| 亚洲内射少妇av| 国产成人影院久久av| 欧洲精品卡2卡3卡4卡5卡区| 国产亚洲精品av在线| 亚洲欧美日韩无卡精品| 乱人视频在线观看| 人妻丰满熟妇av一区二区三区| 精品久久久久久,| 在现免费观看毛片| 又紧又爽又黄一区二区| 一区二区三区四区激情视频 | 好男人电影高清在线观看| 18美女黄网站色大片免费观看| 9191精品国产免费久久| 国产成年人精品一区二区| 成人鲁丝片一二三区免费| 日本成人三级电影网站| 99国产精品一区二区蜜桃av| 午夜久久久久精精品| 午夜福利在线观看免费完整高清在 | 搡老岳熟女国产| 亚洲欧美日韩高清专用| 国产老妇女一区| 深爱激情五月婷婷| 国产av麻豆久久久久久久| 国内揄拍国产精品人妻在线| 国产精品亚洲av一区麻豆| 永久网站在线| 亚洲欧美清纯卡通| 亚洲经典国产精华液单 | 亚洲av五月六月丁香网| 亚洲性夜色夜夜综合| 成人美女网站在线观看视频| 他把我摸到了高潮在线观看| 欧洲精品卡2卡3卡4卡5卡区| 18禁黄网站禁片免费观看直播| 国产人妻一区二区三区在| 婷婷精品国产亚洲av| 综合色av麻豆| 成人欧美大片| 天堂动漫精品| 国产av一区在线观看免费| 日韩成人在线观看一区二区三区| 99热6这里只有精品| 精品国产亚洲在线| 欧美zozozo另类| 国产精品人妻久久久久久| 亚洲18禁久久av| 极品教师在线视频| 日本五十路高清| 一本一本综合久久| 亚洲精品在线美女| 18禁裸乳无遮挡免费网站照片| 熟妇人妻久久中文字幕3abv| 少妇的逼好多水| www.熟女人妻精品国产| 午夜a级毛片| 在线看三级毛片| 色哟哟哟哟哟哟| 丝袜美腿在线中文| 韩国av一区二区三区四区| 欧美精品国产亚洲| 久久伊人香网站| 波多野结衣高清无吗| 俺也久久电影网| 黄色一级大片看看| 久久久久久久精品吃奶| 欧美+日韩+精品| 哪里可以看免费的av片| 久久久久久久亚洲中文字幕 | av黄色大香蕉| 每晚都被弄得嗷嗷叫到高潮| 天堂网av新在线| 免费av不卡在线播放| 午夜福利在线在线| 一个人免费在线观看电影| xxxwww97欧美| 日日摸夜夜添夜夜添小说| 999久久久精品免费观看国产| 精品乱码久久久久久99久播| 一区二区三区四区激情视频 | 欧美xxxx性猛交bbbb| 免费在线观看日本一区| 一区二区三区激情视频| 日韩欧美三级三区| 午夜精品久久久久久毛片777| 午夜精品一区二区三区免费看| 亚洲一区二区三区色噜噜| 日韩欧美三级三区| 成年人黄色毛片网站| 天堂网av新在线| av中文乱码字幕在线| 久久精品人妻少妇| 国产亚洲精品综合一区在线观看| 亚洲精品一卡2卡三卡4卡5卡| 一区二区三区高清视频在线| 国产av不卡久久| 女人十人毛片免费观看3o分钟| 亚洲精品456在线播放app | 精品久久久久久久久久免费视频| 日本成人三级电影网站| 九九久久精品国产亚洲av麻豆| 亚洲国产精品成人综合色| 亚洲精品乱码久久久v下载方式| 女同久久另类99精品国产91| 国产欧美日韩一区二区三| 最近在线观看免费完整版| 99精品在免费线老司机午夜| 精品人妻偷拍中文字幕| 一个人免费在线观看电影| 国产av麻豆久久久久久久| 丰满的人妻完整版| 97超级碰碰碰精品色视频在线观看| 在线a可以看的网站| 淫秽高清视频在线观看| 精品久久久久久成人av| 悠悠久久av| 变态另类成人亚洲欧美熟女| 久久婷婷人人爽人人干人人爱| 高清毛片免费观看视频网站| 天堂av国产一区二区熟女人妻| 激情在线观看视频在线高清| 久久人人爽人人爽人人片va | 亚洲久久久久久中文字幕| 亚洲中文字幕日韩| 综合色av麻豆| 久久草成人影院| av福利片在线观看| 欧美绝顶高潮抽搐喷水| 五月伊人婷婷丁香| 夜夜爽天天搞| 在线播放国产精品三级| 午夜两性在线视频| 88av欧美| 久久久久性生活片| 精品不卡国产一区二区三区| 国产一区二区三区在线臀色熟女| 又爽又黄a免费视频| 好男人电影高清在线观看| 色精品久久人妻99蜜桃| 亚洲av二区三区四区| 欧美成人a在线观看| 欧美精品啪啪一区二区三区| 国产伦人伦偷精品视频| 久久精品国产亚洲av涩爱 | 国产黄片美女视频| 毛片一级片免费看久久久久 | 99视频精品全部免费 在线| 亚洲欧美日韩卡通动漫| 国产毛片a区久久久久| 亚洲av美国av| 成年免费大片在线观看| 特级一级黄色大片| 3wmmmm亚洲av在线观看| www.www免费av| 赤兔流量卡办理| 亚洲片人在线观看| 麻豆av噜噜一区二区三区| 精品不卡国产一区二区三区| 国产精品女同一区二区软件 | av黄色大香蕉| 国产野战对白在线观看| 精品熟女少妇八av免费久了| 动漫黄色视频在线观看| 极品教师在线免费播放| 国产一区二区在线观看日韩| 高清毛片免费观看视频网站| 国产成+人综合+亚洲专区| 有码 亚洲区| av黄色大香蕉| 丁香欧美五月| 99精品久久久久人妻精品| 看十八女毛片水多多多| 中文字幕熟女人妻在线| 久久久久久久亚洲中文字幕 | 色视频www国产| 每晚都被弄得嗷嗷叫到高潮| 国模一区二区三区四区视频| 国产精品1区2区在线观看.| 国产伦人伦偷精品视频| 亚洲午夜理论影院| 黄片小视频在线播放| 欧美成人免费av一区二区三区| 久久精品人妻少妇| 美女cb高潮喷水在线观看| 看十八女毛片水多多多| 午夜福利免费观看在线| 十八禁国产超污无遮挡网站| 男人舔女人下体高潮全视频| 禁无遮挡网站| .国产精品久久| 观看美女的网站| 波多野结衣巨乳人妻| 在线免费观看的www视频| 色av中文字幕| 人人妻人人澡欧美一区二区| 亚洲最大成人手机在线| 欧美区成人在线视频| 最近最新免费中文字幕在线| 国产精品亚洲美女久久久| 国产av不卡久久| 色av中文字幕| 少妇高潮的动态图| 日韩中文字幕欧美一区二区| 成年女人永久免费观看视频| 欧美另类亚洲清纯唯美| 久久精品91蜜桃| 黄色视频,在线免费观看| 国产成人a区在线观看| 亚洲综合色惰| 亚洲av不卡在线观看| 日本与韩国留学比较| 无人区码免费观看不卡| 身体一侧抽搐| 日韩高清综合在线| 国语自产精品视频在线第100页| 一个人免费在线观看电影| 免费av观看视频| 亚洲av免费在线观看| 一进一出抽搐动态| 日韩欧美国产一区二区入口| 99精品在免费线老司机午夜| 好看av亚洲va欧美ⅴa在| 亚洲美女搞黄在线观看 | 国产综合懂色| 亚洲最大成人av| 日韩欧美免费精品| 热99re8久久精品国产| 精品一区二区三区av网在线观看| 国产成人a区在线观看| 九九在线视频观看精品| 国产亚洲精品久久久久久毛片| 国产不卡一卡二| 国产成人影院久久av| 男人狂女人下面高潮的视频| 欧美最黄视频在线播放免费| 国产高清激情床上av| 可以在线观看的亚洲视频| 激情在线观看视频在线高清| 国产伦精品一区二区三区四那| 精品不卡国产一区二区三区| 欧美午夜高清在线| 最新在线观看一区二区三区| 91久久精品电影网| 69av精品久久久久久| 中文字幕av在线有码专区| 久久国产乱子伦精品免费另类| 成人无遮挡网站| 可以在线观看毛片的网站| 亚洲精品在线观看二区| 两个人视频免费观看高清| 天堂网av新在线| 久久久成人免费电影| 女人被狂操c到高潮| 久久精品人妻少妇| 男人的好看免费观看在线视频| 亚洲在线观看片| 不卡一级毛片| АⅤ资源中文在线天堂| 日韩有码中文字幕| 久久久久久久久中文| 18禁黄网站禁片免费观看直播| 亚洲精品久久国产高清桃花| 亚洲人成网站高清观看| 久久热精品热| av视频在线观看入口| 中文字幕人妻熟人妻熟丝袜美| 亚洲成人免费电影在线观看| 天堂动漫精品| 老司机午夜福利在线观看视频| 国产老妇女一区| 88av欧美| 非洲黑人性xxxx精品又粗又长| 国产探花极品一区二区| 精品午夜福利在线看| 99久久精品国产亚洲精品| 黄色日韩在线| 国产精品,欧美在线| x7x7x7水蜜桃| 搞女人的毛片| 欧美午夜高清在线| 国产人妻一区二区三区在| 在线国产一区二区在线| 久久国产乱子伦精品免费另类| 亚洲欧美清纯卡通| 国产色婷婷99| 一级a爱片免费观看的视频| 欧美在线一区亚洲| 免费观看精品视频网站| 99国产极品粉嫩在线观看| 老鸭窝网址在线观看| a级一级毛片免费在线观看| 久久国产乱子伦精品免费另类| 日本 欧美在线| av专区在线播放| 亚洲美女黄片视频| 男插女下体视频免费在线播放| 在线国产一区二区在线| 久久99热这里只有精品18| 在现免费观看毛片| 国产成+人综合+亚洲专区| 久久久成人免费电影| 国产成人av教育| 天天一区二区日本电影三级| www.999成人在线观看| 三级毛片av免费| 老司机深夜福利视频在线观看| 精品一区二区免费观看| 午夜精品久久久久久毛片777| 日韩精品中文字幕看吧| 久久精品国产清高在天天线| 简卡轻食公司| 在线十欧美十亚洲十日本专区| 一进一出好大好爽视频| 少妇人妻精品综合一区二区 | 国产成年人精品一区二区| 国产成人aa在线观看| 国产精品乱码一区二三区的特点| 久久中文看片网| 简卡轻食公司| 两个人的视频大全免费| 久久亚洲真实| 91在线观看av| 国产三级黄色录像| 久久久久精品国产欧美久久久| 亚洲精品在线观看二区| 真人一进一出gif抽搐免费| 亚洲av二区三区四区| 欧美性猛交╳xxx乱大交人| 丁香六月欧美| 99久久精品热视频| 女人被狂操c到高潮| 人妻夜夜爽99麻豆av| 天美传媒精品一区二区| 天堂av国产一区二区熟女人妻| 国产欧美日韩一区二区三| 国产成人欧美在线观看| 久久香蕉精品热| 中国美女看黄片| 91狼人影院| 十八禁网站免费在线| 色噜噜av男人的天堂激情| 欧美日韩福利视频一区二区| 婷婷亚洲欧美| 99在线人妻在线中文字幕| 国产精品永久免费网站| 嫩草影视91久久| 成人午夜高清在线视频| 国产伦精品一区二区三区四那| 国产精品av视频在线免费观看| 亚洲精品456在线播放app | 在线国产一区二区在线| 久久久久久久久久黄片| 成人亚洲精品av一区二区| 国产av在哪里看| 亚洲人成电影免费在线| av福利片在线观看| 18禁在线播放成人免费| 窝窝影院91人妻| 亚洲激情在线av| 极品教师在线视频| 午夜两性在线视频| 男女视频在线观看网站免费| 熟妇人妻久久中文字幕3abv| 亚洲狠狠婷婷综合久久图片| 99热这里只有是精品50| 欧美日本亚洲视频在线播放| 国产亚洲av嫩草精品影院| 变态另类成人亚洲欧美熟女| 嫩草影院入口| 久久精品国产亚洲av涩爱 | 日本黄色视频三级网站网址| 欧美激情在线99| 日韩国内少妇激情av| 亚洲性夜色夜夜综合| 国产亚洲精品av在线| 哪里可以看免费的av片| 国产探花在线观看一区二区| 美女高潮喷水抽搐中文字幕| 欧美一级a爱片免费观看看| 变态另类丝袜制服|