• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Integrated Clustering and Routing Design and Triangle Path Optimization for UAV-Assisted Wireless Sensor Networks

    2024-04-28 11:59:42ShaoLiweiQianLipingWuMengruWuYuan
    China Communications 2024年4期

    Shao Liwei ,Qian Liping,* ,Wu Mengru ,Wu Yuan

    1 College of Information Engineering,Zhejiang University of Technology,Hangzhou 310014,China

    2 State Key Laboratory of Internet of Things for Smart City,University of Macau,Macau,China

    3 Department of Computer and Information Science,University of Macau,Macau,China

    Abstract: With the development of the Internet of Things (IoT),it requires better performance from wireless sensor networks(WSNs),such as larger coverage,longer lifetime,and lower latency.However,a large amount of data generated from monitoring and long-distance transmission places a heavy burden on sensor nodes with the limited battery power.For this,we investigate an unmanned aerial vehicles assisted mobile wireless sensor network(UAV-assisted WSN)to prolong the network lifetime in this paper.Specifically,we use UAVs to assist the WSN in collecting data.In the current UAV-assisted WSN,the clustering and routing schemes are determined sequentially.However,such a separate consideration might not maximize the lifetime of the whole WSN due to the mutual coupling of clustering and routing.To effciiently prolong the lifetime of the WSN,we propose an integrated clustering and routing scheme that jointly optimizes the clustering and routing together.In the whole network space,it is intractable to effciiently obtain the optimal integrated clustering and routing scheme.Therefore,we propose the Monte-Las search strategy based on Monte Carlo and Las Vegas ideas,which can generate the chain matrix to guide the algorithm to fnid the solution faster.Unnecessary point-to-point collection leads to long collection paths,so a triangle optimization strategy is then proposed that fnids a compromise path to shorten the collection path based on the geometric distribution and energy of sensor nodes.To avoid the coverage hole caused by the death of sensor nodes,the deployment of mobile sensor nodes and the preventive mechanism design are indispensable.An emergency data transmission mechanism is further proposed to reduce the latency of collecting the latency-sensitive data due to the absence of UAVs.Compared with the existing schemes,the proposed scheme can prolong the lifetime of the UAVassisted WSN at least by 360%,and shorten the collection path of UAVs by 56.24%.

    Keywords: Monte-Las search strategy;triangle path optimization;unmanned aerial vehicles;wireless sensor networks

    I.INTRODUCTION

    In unmanned monitoring scenarios,WSNs play a critical role as sensing actors in IoT systems,to provide the information of interest to network users for the decision-making[1,2].Because sensor nodes are inexpensive,compact,environmentally tolerant,and adaptable,they can be easily deployed in a variety of environments(e.g.,the physical world,biological systems) for different applications (e.g.,agriculture,industry,smart cities,military,medical monitoring,environmental monitoring,etc.) [3-5].Big data applications have been widely deployed in various real-time data environments[6],and WSNs have become an important provider of big data[7].However,considering the inflexible energy replenishment and limited spectrum resources,it is challenging for WSNs to deal with the transmission of a massive amount of sensing data in an energy-effciient and low-latency way.

    With the proposal and development of 6G networks,the Space-Air-Ground Integrated Network (SAGIN)has received much attention from researchers [8-11].As one of the key technologies of the emerging 6G networks,the SAGIN provides ubiquitous and seamless network connectivity and services by deploying communication platforms(e.g.,satellite networks,airborne networks,and terrestrial networks) at different altitudes [12,13].Driven by this,many researchers have proposed UAV-assisted WSNs for the collection of sensing data due to UAV’s beneftis of mobility,flexibility,and maneuverability [14].This type of data collection has the following advantages,and has also been proven to be an effective strategy [15]:1) Compared to traditional WSNs,UAVs can reduce the energy waste due to multi-hop communication,2)The distance over which sensor nodes transmit data is shortened,thus reducing the energy consumption of sensor nodes,and 3)UAVs can establish line-of-sight(LOS) links with sensor nodes with a high probability,thus having a better quality of the communication channel.

    There have been previous protocols for wireless sensor networks [3,16-23],in which the network schemes can be broadly categorized into clustering schemes [17,24] and routing schemes [25,26].The introduction of UAVs has given the network more options for selecting cluster heads and transmitting data compared to traditional clustered networks.In the clustering phase of UAV-assisted WSNs,UAVs can assist the network in electing cluster heads.Compared to centralized cluster-based networks[24,27,28],UAVs can directly collect various data from sensor nodes about cluster head election,which greatly reduces the amount of data sent over the network and thus reduces the energy consumed by sensor nodes when rotating cluster heads.Work[29]proposed a data collection algorithm that leverages both the UAV and mobile agents to autonomously collect and process data when considering the density of network sensor nodes,the speed of UAVs,and data transmission conflicts.Nguyen et al.[30] derived a theoretical lower bound on the energy consumption of sensor nodes for transmitting data to the cluster head in uniform and normal deployments.Ebrahimi et al.[31]proposed the use of projection-based Compressive Data Gathering(CDG)in dense WSNs using UAVs as a new solution to reduce the energy consumption of the network.In addition,the UAV technology can improve the network deployment,e.g.,Pullwitt et al.[32]used UAVs to measure the coverage of wireless links and deploy WSNs accordingly.

    In the current UAV-assisted WSNs,the clustering and routing schemes are determined sequentially.However,the two schemes are coupled,and the determination of one scheme would affect the setting of the other,so the sequential optimization scheme cannot fnid the optimal scheme of the lifetime as a whole.The lack of coverage due to the death of sensor nodes is instantaneous,but the recovery of mobile sensor nodes needs to take some time.Although its signifciance,the time difference between instantaneous death and delayed mobile recovery is rarely studied.In addition,some sensing data generated in the monitoring area is latency-sensitive,and thus its transmission would be delayed if waiting for the UAV to collect them.To avoid this issue,we need to design a mechanism for tight data transmission.In this paper,we aim to minimize the energy consumption of the network through shortening the path length of the UAV.The main contributions of this paper are as follows:

    1.Considering the mutual coupling of clustering and routing,we design an integrated clustering and routing scheme.To reduce the computational complexity of integrated clustering and routing,we further propose the Monte-Las search strategy based on Monte Carlo and Las Vegas ideas.This proposed strategy can reduce the searching space of clustering and routing by generating the chain matrix to guide the algorithm to fnid the solution faster.

    2.Unnecessary point-to-point collection leads to long collection paths,so a triangle optimization strategy is then proposed that fnids a compromise path to shorten the collection path based on the geometric distribution and energy of sensor nodes.To avoid the coverage hole caused by the death of sensor nodes,the deployment of mobile sensor nodes and the preventive mechanism design are indispensable.An emergency data transmission mechanism is further proposed to reduce the latency of collecting the latency-sensitive data due to the absence of UAVs.

    3.For performance evaluation,we conduct a simulation experiment with a highly realistic environment using pipeline monitoring in a community in Shenzhen,China as an application scenario.We simulate the deployment of UAVs and sensor nodes to monitor the pipelines in the area and compare the results with traditional WSN and UAV-assisted WSNs.

    The rest of the paper is organized as follows.Section II presents the system model and the problem description.Section III presents the algorithm for solving the optimization problem and describes the system implementation.The performance evaluation is presented in Section IV.Finally,the conclusions are given in Section V.

    II.SYSTEM MODEL

    2.1 Network Model

    A wireless sensor network-based monitoring system can be roughly divided into two subsystems,the sensing system and the transmission system,where the sensing system is sensor nodes and the transmission system is the wireless sensor network composed of sensor nodes.To further improve the scalability and applicability of wireless sensor networks,this paper considers a UAV-assisted mobile WSN IoT framework,as shown in Figure 1.

    Figure 1.The architecture of proposed UAV-assisted mobile WSN.

    Taking the example of a sewage pipe monitoring system in a community in Shenzhen,China,the sensing system consists ofNmobile sensor nodes deployed in the community,which is to sense and collect information of interest to the users(such as the water level in the pipe,blockage,and pipe wall condition).The wireless sensor network composed of isomorphic sensor nodes is the transmission system,which is to process and transmit the collected data to the Internet access points(ISP,such as base stations and Sinks).In large-site application scenarios,relying solely on sensor nodes to transmit data can lead to rapid node energy consumption.To alleviate this situation,UAVs as part of the transmission system would assist the network in transmitting data.

    As shown in Figure 1,we usesito denote theithsensor node with the 2D spatial coordinates being(xi,yi).The set of sensor nodes in the network is denoted as

    The Euclidean distance between the sensor nodessiandsjcan be expressed as

    In addition,the proposed UAV-assisted mobile WSN has the following properties:

    ? The sensor nodes in the network are divided into clusters.In each cluster,a sensor node is chosen as the cluster head to gather data from the other sensor nodes in the cluster and forward it to the ISP.Non-cluster-head nodes cannot communicate directly with the ISP and cluster heads of other clusters.Inter-cluster heads can use multihop communication to transmit data to the ISP.

    ? During each data collection cycle,the UAV gathers data from cluster heads along a pre-confgiured route.As this data collection is not real-time,the WSN can transmit data via communication between cluster heads when an emergency occurs.

    ? The clusters and cluster heads of are updated according to the status of sensor nodes in the network,and locations of sensor nodes can also be dynamically adjusted.

    2.2 Energy Consumption Model

    The energy consumption for sending and receiving data during wireless communication is considered.We adopt the radio energy dissipation model proposed in[18]to evaluate the energy consumption,as illustrated in Figure 2.Assuming transmittingl-bitdata,the energy consumption of the transmitter consists of the energy needed for encapsulating and transmittingl-bitdata,and the energy consumption of the receiver corresponds to the energy needed for de-encapsulatingl-bitdata.Letdenote the power consumption of processing 1-bitdata at the transmitter and receiver,respectively.Suppose that the distance between the transmitter and receiver isd.Therefore,the energy consumption at the transmitter can be expressed as

    Figure 2.Radio energy dissipation model.

    wherefmmeans the fading coeffciient.The energy consumption at the receiver can be expressed as

    The energy consumption for aggregating eachl-bitdata,denoted byEDF,is expressed as

    whereEDAmeans the power consumption of aggregating 1-bitdata.The main target of this paper is to minimize the network energy consumption,and meanwhile design a shortest data collection path for UAVs.Considering the mobile sensor nodes are deployed,we have to design the mobility scheme to avoid the coverage hole.Therefore,the Optimal Data Collection Path(ODCP) problem can be combined as Optimal Data Collection,Coverage,and Communication Problems(ODCCP).

    III.PROPOSED PROTOCOL

    In the proposed protocol,our objective is to determine an optimal network communication scheme among interconnected modules involving UAV paths,network coverage,movement distance of sensor nodes,clustering,and routing within the network.Specifcially,we propose a methodology named Integrated Solutions to jointly address these interdependent sub-problems.Meanwhile,we propose the Triangle Path Optimization strategy to reduce the length of UAV paths within the network.Additionally,we propose a novel strategy for generating chain matrices and for leveraging reinforcement learning (RL) to jointly accelerate metaalgorithms’search speed within the high-dimensional solution space.Furthermore,we design protective mechanisms for emergency transmissions and potential network coverage to ensure high-quality monitoring.

    3.1 Protocol Model

    As shown in Figure 3,the protocol model comprises several key components: solution design,Monte-Las Search Strategy,a Meta-heuristic algorithm based on RL,and protection mechanisms.Among these components,the solution design plays a pivotal role,delineating optimized collection paths for UAVs and communication schemes for WSNs.For the optimization of collection paths,we propose the Triangle Path Optimization strategy(TPO)as a secondary optimization to reduce redundant paths during pre-path planning.In the communication schemes of WSNs,the Integrated Solutions(IS)is proposed to jointly optimize coupling schemes.Subsequently,pending solutions are input into the encoding part and resolved by a Solver (a Meta-heuristic algorithm based on RL).Within the encoding part,we propose a Monte-Las search strategy(MLS)that amalgamates Monte Carlo(MC)with Las Vegas (LV) ideas to generate chain matrices.In the solver,we enhance the performance of meta-heuristic algorithms by utilizing RL to adjust fxied parameters within these algorithms.These two strategies can help algorithms quickly fnid a excellent communication scheme.Furthermore,we propose the emergency data transmission mechanism and preventive replenishment mechanism as protective measures to ensure high-quality monitoring and further refnie the communication scheme of the UAV-assisted mobile WSN.Finally,we analyze the convergence and computational complexity of the proposed strategies.

    Figure 3.The relationship between different designs.

    3.2 Solution Design

    In this subsection,we introduce TPO and IS in detail.TPO aims to shorten the collection path of UAVs,while IS provides a methodology for solving coupled problems.

    3.2.1 Triangle Path Optimization

    In this subsection,we propose the triangle path optimization strategy to shorten UAV’s data collection path.As shown in Figure 4(a),assuming the existence of two cluster headsA,B,and a base station.The UAV departs from the base station,gathers data from sensor nodes,and returns to the base station.The conventional path is shown as the red line:UAV →A →B →BS.In practice,the UAV can communicate simply by stopping within the communication range of cluster heads,without the need for the UAV to be positioned above cluster heads to communicate.Therefore,it can fly to the midpointDof the line connecting two cluster heads to collect the data,with the path shown as the yellow line:UAV →D →BS.The path of the second is much shorter than the frist.Consider the case where there are three cluster heads,as shown in Figure 4(b).The red line still indicates the traditional path:UAV →A →B →C →BS.This path has the lowest energy consumption for cluster heads,but there is room for optimization for the path and the timeliness of the data.Instead of hovering above cluster heads to collect the data,the UAV can plan a shorter path,as shown by the yellow line:UAV →D →E →BS.

    Figure 4.Path planning environment.

    According to the preliminary path scheme,the TPO strategy is based on the idea of partitioning to fnid a straight line in the geometric distribution of each cluster head as a collection path to avoid unnecessary point-to-point collection.Considering UAVs alone,then the paths of UAVs can be reduced to very short ones as they do not need to fly for remote sensor nodes anymore.In practice,there are problems in the application.For example,simply reducing the flight path of the UAV may result in high transmission energy consumption for sensor nodes,which deviates from the original purpose of introducing the UAV to collect data.Therefore,TPO also needs to consider energy consumption of sensor nodes when optimizing the path.In summary,we can derive the triangle path optimization formula(TPOF):

    whereηrepresents a TPO-optimized path planning scheme,andCHrepresents the set of cluster heads in the network.α,β,andδare the weighting factor,andEiis the residual energy of theithnode.ECiis the transmission energy consumption of theithnode.L(η) represents the flight length of the UAV inη.It is noteworthy that cluster heads may exhibit different energy behaviors for distinct path schemes.TPOF aims to fnid an optimization scheme that balances both the flight path and the energy consumption of sensor nodes,with the energy balance of sensor nodes being the key concern.TPO explicitly reduces the path,so it is crucial to ensure the energy consumption of sensor nodes as much as possible.Therefore,sensor nodes are considered in the second half of the TPOF and this is used to set the degree of inclination of the UAV’s flight path towards sensor nodes.For low-energy sensor nodes,the UAV also ensure point-to-point collection to save the energy of sensor nodes.

    3.2.2 Integrated Solutions

    The objective of IS is to adopt a parallel and unifeid solution when solving problems that are coupled or interconnected,thus avoiding sequential solving or fragmented optimization that can result in sub-optimal solutions.Figure 5 illustrates the difference between the two solutions.Taking ODCCP as an example in this work,when considering the deployment of sensor nodes,the stability of the network after the deployment is completed needs to be considered at the same time,and stability metrics include,but are not limited to,the network energy consumption and the size of coverage holes resulting from the death of sensor nodes.When considering the network communication scheme,clustering and routing in the protocol are considered as two aspects of a single problem at the same time.In this work,the coverage of sensor nodes and movement paths are integrated into an optimization schemeISCM,and clustering and routing of the network are integrated into the schemeISCR.

    Figure 5.Difference between integrated and normal solutions.

    3.3 Monte-Las Search Strategy

    IS inevitably leads to a larger solution space,therefore we propose a Monte-Las search strategy that combines Monte Carlo ideas with Las Vegas ideas to accelerate meta-algorithms’ search speed within the highdimensional solution space.The search strategy has two phases.In the frist phase,a basic solution matrixMTotalis constructed according to LV.This process involves the meta-heuristic algorithm generating a solution matrixM1based on a requirementR1in Integrated Solutions.Subsequently,it generates a solution matrixM2requiringR2for each solution vectorinM1.If the solution matrix ofRiis not generated,a solution matrixMiis generated for each vectorinMi-1.After updating and evaluating matrixMTotal,the meta-heuristic algorithm obtains the synthetically optimal solution vectorvBest.In the second phase,following the MC,the meta-heuristic algorithm optimizes the solution vectorvBestand obtains the f-i nal solution vectorvFinal.The construction process of the chain matrix is illustrated in Figure 6.

    Figure 6.Construction process of the chain matrix.

    In the frist phase,LV ignores the fnial size of the solution matrix,but in reality,given the effciiency of the algorithm’s execution,the later the requirementRiis considered,the smaller the solution matrixMibecomes.

    3.4 Parameters Selection Based on Reinforcement Learning

    In the traditional genetic algorithm (GA),the crossover probabilitypcand the mutation probabilitypmare typically set as fxied values,which can compromise the effciiency of the algorithm.Therefore,in this paper,RL is applied to govern trends ofpcandpm.Each parameter has two trends,and their equations are expressed as follows:

    In the above equations,αc,αm,βc,andβmare the fxied parameter affecting the basic step size of the change in the probability of both.itis the current number of iterations of the algorithm,andMax_Itis the maximum number of iterations.The above parameters together determine the change of thepcandpm.

    Figure 7 illustrates the basic structure of RL.In this work,the Agent needs to fnid the most effective parameter update method to help the algorithm fnid the solution with a better ftiness value.The objective of maximizing the cumulative return of learning can be expressed as:

    Figure 7.The basic structure of reinforcement learning.

    whereγis denoted as the discount rate,andRt+kis the reward at timet+k.We can obtain the following updated formulation:

    whereλis the learning rate,andγis the discount rate.st,st+1are the states at timet,t+1,respectively.atandat+1are the actions selected at the timet,t+1,respectively.R(st,at) is an immediate reward.Furthermore,the Agent’s strategy when taking action isε-greedy strategy.In this paper,the purpose of RL is to enable the algorithm to select parameters that are more benefciial for its population update,similar to a multi-armed slot machine in RL.Specifcially,the environment is the ftiness function,reward is the difference of the optimal ftiness value of the scheme before and after the update,and the actions are update equations chosen by the meta-heuristic algorithm for certain parameters (e.g.,(6) and (7)).The state are trends of parameters(e.g.,whetherpmandpcare increasing or decreasing).

    In addition,parameters of RL change adaptively as the algorithm proceeds.Inε-greedy,the update formula ofεis

    whereε0is the initial value,andεmaxis the maximum value.The update formula ofλis

    whereλ0is the initial value,andλmaxis the maximum value.The update formula ofγis

    whereγ0is the initial value,andγmaxis the maximum value.In the above three equations,theCε,Cλ,andCγare constant to control the learning time.The purpose of setting these parameters is to leave a stable time for the GA to fnid the best solution.countis the counter when reward is 0,which also controls the rate of change of the three parameters.Max_Itis the maximum number of iterations.

    3.5 Protection Mechanisms

    This subsection discusses protection mechanisms for WSNs to ensure high-quality monitoring.The main designs include the emergency data transmission mechanism and the preventive replenishment mechanism.

    3.5.1 Emergency Data Transmission Mechanism

    In UAV-assisted WSNs,it is diffciult for UAVs to collect data in real-time,which is unacceptable for some critical monitoring environments.Therefore,in this section,a transmission mechanism for emergency data is proposed.When an emergency occurs in the monitoring environment of a node,it can determine the message delivery method based on the status of the UAV.Figure 8 illustrates the transmission mechanism for three different states.

    Figure 8.Emergency transmission mechanism.

    In the UAV-assisted mobile WSN,it can be categorized into the following three states according to whether the UAV has completed data collection on sensor nodes or not: waiting,collecting,and completed.Nodes in different states have different transmission methods for emergency information:

    ?Waiting:When the nodesiwaiting for the UAV to collect data.sitransmits the data towards a relay node close to the base station.

    ?Collecting: When a nodesireceives an emergency message,it sends a request message to the UAV.At this point,after receiving the message,the UAV determines whether the nodesicontinues to transmit and its propagation route is reliable or not.If it is reliable,the nodesisend the message to its relay node.Otherwise,the UAV receives the emergency message and returns to the base station.

    ?Completed: When nodesireceives an emergency message,it sends it according to the relay node in the propagation direction that the UAV has set for it.

    In this emergency transmission mechanism,the focus is on accuracy,real-time,and guaranteed arrival of messages.Therefore,when the UAV gather data,it sets a pre-arranged reliable propagation route for nodes.Given the limited storage capacity of sensor nodes,the UAV only determines relay nodes for sensor nodes.

    3.5.2 Preventive Replenishment Mechanism

    In the network,as surrounding sensor nodes dead,mobile sensor nodes in the network can redeploy sensor nodes to flil the coverage hole.There is a neglected time difference between death of sensor nodes,which creates an instantaneous coverage hole,and the redeployment of mobile sensor nodes,which takes a certain amount of time: the Time Difference between Instantaneous Death-Mobile Recovery(TDIM).

    The preventive replenishment mechanism is shown in Figure 9.This work identifeis this problem and proposes a preventive replenishment mechanism.The preventive aspects of this mechanism are as follows:The base station periodically monitors the network.If the predicted future energy level of a sensor node falls below the warning energy thresholdEth,the base station will initiate measures to reduce the energy consumption of that sensor node.This is accomplished by relocating the node to an alternative location,preventing it from functioning as either a cluster head or a key routing location.In addition,before a node is about to run out of energy,the network redistributes the surrounding sensor nodes in advance to reduce the TDIM.For sensor nodes that are in critical positions of routing,sensor nodes with high energy levels are preferred to avoid network partitioning due to premature death.Preventive operations can signifciantly delay the death of sensor nodes,but scheduling sensor nodes to further postpone their demise becomes challenging when all the nodes in the network have low energy levels.

    Figure 9.Preventive replenishment mechanism.

    3.6 Performance Analysis of Strategies

    This section analyzes the computational complexity and convergence performance of proposed strategies(MLS and TPO).AssumingYrequirements exist,theythrequirement generates a solution vector of sizePyusing MLS,resulti ng in the size of the chain matrix can be obtained asThe computational complexity of the GA isO(PgZ),wherePdenotes the population size,gdenotes the number of operations executed on the population in each evolution,andZdenotes the number of evolutions.Then the computational complexity of the GA with MLS can be calculated aswhereZ1andZ2denote the number of evolutions for the completion of the frist and second search phases,respectively.

    The TPO proposed in this work is solved using GA.IfQclusters are divided into the network,the problem size becomesSubsequently,the computational complexity of resolving TPO with GA isis the population size generated based on the problem size.

    The convergence performance of proposed strategies is depicted in Figure 10.ISCR,ISCM,andTPOare solved using GA.Typically,TPOconverges in 130 iterations,ISCRin 180 iterations,andISCMin 250 iterations.This demonstrates the excellent convergence performance of proposed strategies.

    Figure 10.Convergence curve.

    IV.PERFORMANCE EVALUATION

    The application scenario of this experiment is pipeline monitoring within a community in Shenzhen,China,and the community is shown in Figure 11.The distribution of the pipeline is represented by two lines:green lines depict primary pipelines and orange lines represent sub-pipelines.The entire length of pipelines spans approximately 3418m.All the experiments are conducted in MATLAB 2021 environment.The base station is located at (450,450),which is shown as a blue dot in Figure 11.The 200 sensor nodes are distributed near the pipelines to monitor pipelines’ conditions.The initial battery energy of sensor nodes is 0.4J,the packet length is 4000 bits.The simulation parameters are shown in Table 1.

    Table 1.Simulation parameter values.

    Figure 11.Experimental environment.

    The main experimental evaluation indicators in this work include:

    ? Network lifetime: Network lifetime depends on the time to frist death of sensor nodes(FND),and FND is used as an important index of performance in this paper.

    ? UAV flight length: UAV flight length is defnied as the length that the UAV needs to fly to complete one round of data collection,which largely represents the information delay of UAV-assisted WSNs and the energy consumption of the UAV.

    ? Performance of TPO:Based on whether it is optimized by the TPO,it is defnied as the unoptimized flight length (UFL),the optimized flight length(OFL),the length difference value between them(DVBT),and the average optimization difference value(ADV),which represents whether the TPO is effective.The formula for calculating the average optimization difference value(ADV)is as follows:

    whereOPcountis the number of optimizations,Distanceunis the flight distance before optimization,andDistanceopis the optimized flight distance.

    To verify the effect of different parameters on TPO,we conduct experiments on different parameter combinations,and the specifci parameter combinations are shown in Table 2.αdenotes the degree to which the network prioritizes the shortest route.A lower value ofαindicates less emphasis on it.βrepresents the network’s energy strategy.A lower value ofβresults in a tendency for the network to employ a low-latency cycle for data collection,while a higher value ofβprioritizes protecting sensor nodes.

    Table 2.Triangle optimization parameter combinations.

    Figure 12 shows network lifetime of different combinations.It can be seen thatC2 has the best network lifetime,C4 has the worst network lifetime,andC1 andC3 are in the middle.The fnidings reveal an objective correlation betweenα,βand network lifetime.Increasingαand decreasingβgradually delays the time of FND.Whenβincreases from 0.5 to 0.7,the increase rate of FND is much faster than the increase from 0.7 to 1.This indicates that althoughβhas a guiding effect on the energy strategy of the network,the effect is weakened when the value of FND is high.The reason for this phenomenon may be that the order of magnitude difference between path length and energy is too large,and the trade-off parameter is not completely suitable for every parameter combination.On the other hand,as the ascent ofαincreases,the path taken by the UAV for collection is shorten gradually,resulting in a continued increase in the communication energy consumption of the node.This is comparable to the transfer of the UAV’s flight energy consumption to the node.C2has a slightly higherβthanC3,which makes the design of the network communication scheme slightly more focused on protecting the energy of sensor nodes,and therefore its FND is slightly better thanC3.

    Figure 12.The number of alive sensor nodes per round.

    Figure 13 compares flight paths under varying parameters.AsαinC4 is the largest,the TPO plans a shorter path for the UAV,resulting in the shortest flight path during its lifetime.C2 has a longer collection path due to its smallerα.The path length ofC3 is in the middle of the four combinations.In short,paths ofC2,C3,andC4 meet the original intention of settingαandβ.Due to the over-protection of node energy,C1 displays a highly unstable curve,resulting in the longest flight distance during the later stages.

    Figure 13.Comparison of flight path lengths.

    Figure 14 illustrates influence of parameter values on TPO.The UFL ofC3 is long,which indicates that the death rate of network sensor nodes is slow and the UAV collects more rounds,which also indicates that this parameter combination is reasonable.Meanwhile,for the ADV indicator,C3 is optimal,which indicates that the algorithm is more sensitive to the search of the shortest path under this parameter combination.

    Figure 14.Comparison of triangle optimization parameter combinations.

    Furthermore,the proposed scheme is compared with other schemes:

    ? GATERP(WSN)[22]: In this scheme,the WSN transmits data to the BS through sensor nodes.Furthermore,clustering and routing schemes are determined sequentially.

    ? UAV-assisted GATERP (UAV-WSN): In this scheme,a UAV can gather data from cluster heads in the WSN and transmit the data to the BS.Furthermore,clustering and routing schemes are determined sequentially.

    ? Proposed GATERP-based UAV-assisted mobile WSN (C1,C3,andC4): The scheme is derived by addressing ODCCP.

    Figure 15 displays the fluctuations in the quantity of death of sensor nodes in each network architecture throughout the course of this situation.In large-scale environmental monitoring,traditional WSNs without UAV assistance show great limitations,as nodes die in the frist round.Furthermore,in comparison with a non-integrated solution for the UAV-assisted WSN,proposed solutions have the ability to fnid the most comprehensive network communication schemes.As a result,network stability periods forC1,C3,andC4 are more improved than that of other schemes.Additionally,the preventive replenishment mechanism can actively and dynamically adjust node positions,thereby prolonging network stability periods.

    Figure 15.The number of alive sensor nodes per round.

    Figure 16 shows path lengths of UAVs in different schemes.It is obvious that the path collection length without TPO is much higher than that of proposed network schemes,which indicates two points: 1) The data collection period in the network is longer and the effectiveness of the information is reduced.2)The energy consumption of the UAV is higher.

    Figure 16.Comparison of flight path lengths.

    V.CONCLUSION

    In this paper,we propose the Integrate Solutions framework for the ODCCP and applied it to generate the network communication scheme.Considering the challenge of a larger solution space resulting from integration,we propose the MLS strategy and GA based on RL to expedite the search process.For TDIM,we propose a preventive replenishment mechanism to delay death of sensor nodes.For UAV’s collection paths,a triangle optimization strategy is proposed,which considers the geometric distribution of sensor nodes and residual energy to optimize the collection path.

    In the future work,we will improve the negative effects of the TPO.Although it can signifciantly shorten the path length,there is a large uncertainty in the choice of parameters.We will optimize the heuristic formula of the strategy to reduce this uncertainty.In Integrated Solutions,although the chain matrix can reduce the search pressure,it still has great limitations for the Integrated Solution combining multiple problems,so it is necessary to explore more suitable and better search strategies.

    ACKNOWLEDGEMENT

    This work was supported in part by National Natural Science Foundation of China under Grants 62122069,62071431,62072490 and 62301490,in part by Science and Technology Development Fund of Macau SAR,China under Grant 0158/2022/A,in part by the Guangdong Basic and Applied Basic Research Foundation (2022A1515011287),in part by MYRG2020-00107-IOTSC,and in part by FDCT SKL-IOTSC(UM)-2021-2023.

    国产男人的电影天堂91| 精品国产超薄肉色丝袜足j| 中文精品一卡2卡3卡4更新| 欧美黄色片欧美黄色片| 国产免费一区二区三区四区乱码| 国产精品久久久久久人妻精品电影 | 亚洲精品成人av观看孕妇| 看免费av毛片| 五月开心婷婷网| 老司机靠b影院| 高清不卡的av网站| 女人精品久久久久毛片| 久久久久久久久久久久大奶| 久久久精品免费免费高清| 另类精品久久| 国产av国产精品国产| 少妇的丰满在线观看| 久久99一区二区三区| 国产成人一区二区在线| 乱人伦中国视频| 亚洲欧美中文字幕日韩二区| 9色porny在线观看| 亚洲人成电影免费在线| 中文字幕另类日韩欧美亚洲嫩草| 亚洲人成网站在线观看播放| 午夜精品国产一区二区电影| 老司机深夜福利视频在线观看 | 国产亚洲欧美精品永久| 久久九九热精品免费| 妹子高潮喷水视频| 欧美日韩亚洲国产一区二区在线观看 | 咕卡用的链子| 各种免费的搞黄视频| 久久天躁狠狠躁夜夜2o2o | 精品一区二区三区av网在线观看 | 亚洲成人手机| √禁漫天堂资源中文www| 脱女人内裤的视频| 一级毛片 在线播放| 婷婷色麻豆天堂久久| 夫妻性生交免费视频一级片| 久久国产精品男人的天堂亚洲| 久久精品久久久久久久性| 亚洲av片天天在线观看| 美女扒开内裤让男人捅视频| 婷婷色综合大香蕉| 波野结衣二区三区在线| 少妇被粗大的猛进出69影院| 丝瓜视频免费看黄片| 一二三四在线观看免费中文在| 亚洲,一卡二卡三卡| av又黄又爽大尺度在线免费看| 两性夫妻黄色片| 51午夜福利影视在线观看| 久久中文字幕一级| 日韩 欧美 亚洲 中文字幕| 亚洲国产最新在线播放| 中文字幕最新亚洲高清| 日韩一卡2卡3卡4卡2021年| 在线观看免费日韩欧美大片| 中文字幕另类日韩欧美亚洲嫩草| 欧美日本中文国产一区发布| h视频一区二区三区| 亚洲国产精品国产精品| 国产亚洲一区二区精品| 在线 av 中文字幕| 国产成人a∨麻豆精品| 国产精品一区二区在线不卡| 久久久久视频综合| 操出白浆在线播放| 这个男人来自地球电影免费观看| 成人免费观看视频高清| 91麻豆精品激情在线观看国产 | 国产成人a∨麻豆精品| 9色porny在线观看| 夫妻午夜视频| 亚洲免费av在线视频| 久久精品久久久久久噜噜老黄| 男女边摸边吃奶| 免费观看人在逋| 国产亚洲欧美在线一区二区| 黄片小视频在线播放| 人妻 亚洲 视频| 国产日韩欧美亚洲二区| 久久精品国产亚洲av涩爱| 波野结衣二区三区在线| 一二三四社区在线视频社区8| 久久久国产欧美日韩av| 丝袜喷水一区| 国产精品香港三级国产av潘金莲 | 免费观看av网站的网址| 99国产精品免费福利视频| 巨乳人妻的诱惑在线观看| 免费在线观看影片大全网站 | 一个人免费看片子| 婷婷成人精品国产| 下体分泌物呈黄色| 99久久综合免费| 国产高清videossex| 在线av久久热| 亚洲美女黄色视频免费看| 51午夜福利影视在线观看| 国产亚洲精品久久久久5区| 十八禁网站网址无遮挡| videos熟女内射| 一级黄色大片毛片| 啦啦啦在线免费观看视频4| 亚洲精品乱久久久久久| 日韩av在线免费看完整版不卡| www.999成人在线观看| 在线精品无人区一区二区三| 80岁老熟妇乱子伦牲交| 精品少妇久久久久久888优播| 老司机午夜十八禁免费视频| 精品久久久久久电影网| 久久人妻熟女aⅴ| 国产在线免费精品| 蜜桃在线观看..| 老熟女久久久| 亚洲欧美一区二区三区国产| 少妇猛男粗大的猛烈进出视频| 国产亚洲午夜精品一区二区久久| 一区在线观看完整版| 黑丝袜美女国产一区| 国产一区有黄有色的免费视频| 欧美精品亚洲一区二区| 亚洲av片天天在线观看| 男女边吃奶边做爰视频| 又大又黄又爽视频免费| 1024视频免费在线观看| 日韩熟女老妇一区二区性免费视频| 国产淫语在线视频| 国产亚洲精品第一综合不卡| 亚洲少妇的诱惑av| 亚洲国产精品国产精品| 乱人伦中国视频| 自线自在国产av| 国产欧美日韩一区二区三区在线| 亚洲精品国产区一区二| 日韩中文字幕欧美一区二区 | 日韩熟女老妇一区二区性免费视频| 19禁男女啪啪无遮挡网站| 久久精品国产亚洲av涩爱| 一二三四社区在线视频社区8| 一二三四社区在线视频社区8| 亚洲久久久国产精品| 深夜精品福利| 久久亚洲国产成人精品v| 亚洲精品一二三| 国产成人一区二区在线| 欧美激情 高清一区二区三区| 久久天堂一区二区三区四区| 宅男免费午夜| 91麻豆精品激情在线观看国产 | 精品久久久精品久久久| netflix在线观看网站| 少妇猛男粗大的猛烈进出视频| 美女福利国产在线| 亚洲国产最新在线播放| 我要看黄色一级片免费的| 国产在视频线精品| 久久精品亚洲熟妇少妇任你| av不卡在线播放| 亚洲欧美一区二区三区久久| 亚洲国产精品一区三区| av片东京热男人的天堂| 亚洲av国产av综合av卡| 永久免费av网站大全| 欧美精品人与动牲交sv欧美| 婷婷色麻豆天堂久久| 欧美成狂野欧美在线观看| 一区二区av电影网| 亚洲欧美成人综合另类久久久| 校园人妻丝袜中文字幕| 午夜两性在线视频| 亚洲国产毛片av蜜桃av| 国产日韩欧美在线精品| 国产欧美日韩一区二区三 | 91精品伊人久久大香线蕉| 中文字幕精品免费在线观看视频| 女性被躁到高潮视频| 91九色精品人成在线观看| 成年人午夜在线观看视频| 亚洲精品一卡2卡三卡4卡5卡 | 亚洲色图 男人天堂 中文字幕| 国产成人av教育| 自拍欧美九色日韩亚洲蝌蚪91| 91麻豆av在线| 亚洲精品国产色婷婷电影| 少妇猛男粗大的猛烈进出视频| 女性被躁到高潮视频| 麻豆乱淫一区二区| 每晚都被弄得嗷嗷叫到高潮| 黑人巨大精品欧美一区二区蜜桃| 国产日韩欧美亚洲二区| 日韩电影二区| 人妻一区二区av| 午夜福利在线免费观看网站| 国产精品成人在线| 欧美日韩成人在线一区二区| 极品人妻少妇av视频| 亚洲欧洲精品一区二区精品久久久| 黄色a级毛片大全视频| 婷婷色av中文字幕| 亚洲精品国产av蜜桃| 亚洲国产毛片av蜜桃av| 国产真人三级小视频在线观看| 久久亚洲国产成人精品v| 国产亚洲欧美在线一区二区| 日本a在线网址| 久久精品亚洲av国产电影网| 免费不卡黄色视频| 精品欧美一区二区三区在线| 婷婷丁香在线五月| 人人妻人人添人人爽欧美一区卜| 午夜日韩欧美国产| 一级黄色大片毛片| 亚洲专区中文字幕在线| 在线观看人妻少妇| 国产一卡二卡三卡精品| 美女脱内裤让男人舔精品视频| 1024视频免费在线观看| 日本午夜av视频| 极品人妻少妇av视频| 久久久精品94久久精品| 一区二区三区四区激情视频| 王馨瑶露胸无遮挡在线观看| 人妻人人澡人人爽人人| 手机成人av网站| 国产高清视频在线播放一区 | 一级a爱视频在线免费观看| 欧美 日韩 精品 国产| 丝袜喷水一区| 国产在线视频一区二区| 美女中出高潮动态图| 1024香蕉在线观看| 久久久国产精品麻豆| 丁香六月天网| 久久久久久久大尺度免费视频| 亚洲精品中文字幕在线视频| 好男人电影高清在线观看| 成人国产一区最新在线观看 | 亚洲黑人精品在线| 亚洲人成电影免费在线| 激情五月婷婷亚洲| 国语对白做爰xxxⅹ性视频网站| 少妇 在线观看| 老熟女久久久| 国产欧美日韩一区二区三 | 国产无遮挡羞羞视频在线观看| 欧美精品高潮呻吟av久久| 欧美黑人欧美精品刺激| 免费女性裸体啪啪无遮挡网站| 91国产中文字幕| 一本色道久久久久久精品综合| 精品高清国产在线一区| 又紧又爽又黄一区二区| 精品亚洲乱码少妇综合久久| 两个人免费观看高清视频| 国产av精品麻豆| 久久精品成人免费网站| av片东京热男人的天堂| av天堂久久9| 看免费av毛片| 九色亚洲精品在线播放| 在线观看www视频免费| 国产野战对白在线观看| 亚洲国产精品999| 国产女主播在线喷水免费视频网站| 久久精品久久久久久噜噜老黄| 熟女少妇亚洲综合色aaa.| 少妇猛男粗大的猛烈进出视频| 国产黄色视频一区二区在线观看| www.自偷自拍.com| a级片在线免费高清观看视频| 免费观看av网站的网址| 成人黄色视频免费在线看| 男女边吃奶边做爰视频| 美国免费a级毛片| 精品亚洲乱码少妇综合久久| 欧美老熟妇乱子伦牲交| 精品免费久久久久久久清纯 | 观看av在线不卡| 中国国产av一级| 99国产精品一区二区三区| 午夜精品国产一区二区电影| 久久天堂一区二区三区四区| 国产免费福利视频在线观看| 国产精品秋霞免费鲁丝片| 亚洲国产精品一区三区| 2021少妇久久久久久久久久久| 在线亚洲精品国产二区图片欧美| 亚洲精品一二三| 天天操日日干夜夜撸| 操美女的视频在线观看| 亚洲国产精品一区三区| 欧美日韩精品网址| 亚洲欧美色中文字幕在线| 别揉我奶头~嗯~啊~动态视频 | e午夜精品久久久久久久| 中文在线观看免费www的网站 | 久热爱精品视频在线9| 婷婷六月久久综合丁香| cao死你这个sao货| 国产日本99.免费观看| 中文字幕av电影在线播放| 国产精品一区二区精品视频观看| 精品人妻1区二区| 满18在线观看网站| 九色国产91popny在线| 嫩草影视91久久| 91成年电影在线观看| 欧美黑人巨大hd| 免费在线观看亚洲国产| 一级毛片女人18水好多| 日本黄色视频三级网站网址| 色综合亚洲欧美另类图片| 亚洲黑人精品在线| 日韩欧美在线二视频| 久热爱精品视频在线9| 午夜免费观看网址| 视频在线观看一区二区三区| √禁漫天堂资源中文www| 国产精品99久久99久久久不卡| 国产免费av片在线观看野外av| 精品久久久久久久末码| 国产久久久一区二区三区| 老熟妇乱子伦视频在线观看| 搡老岳熟女国产| 欧美成人性av电影在线观看| 欧美成人免费av一区二区三区| 天天一区二区日本电影三级| av欧美777| 人成视频在线观看免费观看| 欧美另类亚洲清纯唯美| 国产精品乱码一区二三区的特点| 午夜福利在线在线| 亚洲狠狠婷婷综合久久图片| xxxwww97欧美| 亚洲最大成人中文| 日本 av在线| 中国美女看黄片| 欧美久久黑人一区二区| 日韩欧美 国产精品| 国产av不卡久久| 中文字幕人妻熟女乱码| 精品久久久久久久人妻蜜臀av| 视频区欧美日本亚洲| 91国产中文字幕| 怎么达到女性高潮| 老汉色∧v一级毛片| 女性生殖器流出的白浆| av福利片在线| 99国产精品99久久久久| 老司机靠b影院| 88av欧美| 午夜福利视频1000在线观看| 一级毛片女人18水好多| 91字幕亚洲| 欧美日韩乱码在线| 亚洲国产精品久久男人天堂| 一级a爱视频在线免费观看| 国产av不卡久久| 欧美中文日本在线观看视频| av免费在线观看网站| 18禁国产床啪视频网站| tocl精华| 亚洲av片天天在线观看| 国产又爽黄色视频| 这个男人来自地球电影免费观看| 成人三级做爰电影| 亚洲成人免费电影在线观看| 亚洲精品色激情综合| 午夜精品久久久久久毛片777| 老司机深夜福利视频在线观看| 久热这里只有精品99| 国产成人影院久久av| 脱女人内裤的视频| 婷婷精品国产亚洲av在线| 久久人妻福利社区极品人妻图片| 亚洲精品国产一区二区精华液| 一区二区三区激情视频| 日本免费a在线| 在线看三级毛片| 最近最新中文字幕大全电影3 | 18禁观看日本| 少妇裸体淫交视频免费看高清 | 极品教师在线免费播放| 成年免费大片在线观看| 又黄又爽又免费观看的视频| 黄色女人牲交| 丝袜人妻中文字幕| 夜夜躁狠狠躁天天躁| 亚洲精品在线观看二区| 日韩欧美免费精品| 丰满人妻熟妇乱又伦精品不卡| 欧美三级亚洲精品| 亚洲精品粉嫩美女一区| 久久久精品国产亚洲av高清涩受| 欧美绝顶高潮抽搐喷水| 在线永久观看黄色视频| 后天国语完整版免费观看| 日日爽夜夜爽网站| 欧美+亚洲+日韩+国产| 亚洲欧美一区二区三区黑人| 韩国av一区二区三区四区| a级毛片a级免费在线| 久久久久久久久免费视频了| 97人妻精品一区二区三区麻豆 | 精品久久久久久久久久免费视频| 国产在线观看jvid| 一进一出抽搐动态| 久久国产精品影院| 亚洲中文av在线| 级片在线观看| 国产野战对白在线观看| 大香蕉久久成人网| 亚洲一区二区三区不卡视频| 日韩欧美三级三区| 老司机午夜福利在线观看视频| 神马国产精品三级电影在线观看 | 亚洲精品久久国产高清桃花| 国产1区2区3区精品| 国内揄拍国产精品人妻在线 | 一级毛片高清免费大全| av欧美777| 操出白浆在线播放| 欧美精品啪啪一区二区三区| 久热这里只有精品99| 最近最新免费中文字幕在线| 国产激情欧美一区二区| 在线视频色国产色| 亚洲av熟女| 婷婷丁香在线五月| 在线十欧美十亚洲十日本专区| 天堂动漫精品| 国产精品久久电影中文字幕| 少妇 在线观看| 18禁国产床啪视频网站| 99热6这里只有精品| 久久久久国产精品人妻aⅴ院| 99在线人妻在线中文字幕| 日韩欧美在线二视频| 99国产极品粉嫩在线观看| 嫁个100分男人电影在线观看| 亚洲最大成人中文| 女性生殖器流出的白浆| 成人18禁在线播放| 久久人人精品亚洲av| 欧美zozozo另类| 好看av亚洲va欧美ⅴa在| 国产欧美日韩精品亚洲av| 国产久久久一区二区三区| 国产精品99久久99久久久不卡| 日韩精品青青久久久久久| 黄片大片在线免费观看| 又黄又粗又硬又大视频| 欧美日韩中文字幕国产精品一区二区三区| 99久久综合精品五月天人人| 国产黄色小视频在线观看| 亚洲精品av麻豆狂野| 久久天堂一区二区三区四区| 中出人妻视频一区二区| 亚洲 国产 在线| 桃红色精品国产亚洲av| 午夜激情av网站| 丝袜美腿诱惑在线| 夜夜躁狠狠躁天天躁| 欧美激情 高清一区二区三区| 亚洲国产精品久久男人天堂| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲色图 男人天堂 中文字幕| 美女国产高潮福利片在线看| 精品久久久久久久毛片微露脸| 黑人欧美特级aaaaaa片| 男人舔女人下体高潮全视频| 国产日本99.免费观看| 久久久久久人人人人人| 国产精品 国内视频| 久久国产亚洲av麻豆专区| 亚洲av成人av| 最近最新中文字幕大全电影3 | 黄色视频不卡| 级片在线观看| 久久狼人影院| 欧美黄色淫秽网站| 日韩欧美 国产精品| 大香蕉久久成人网| 国产精品99久久99久久久不卡| 精品久久久久久久毛片微露脸| 日韩大尺度精品在线看网址| 亚洲激情在线av| 亚洲第一欧美日韩一区二区三区| 久久久久久人人人人人| 男人的好看免费观看在线视频 | 白带黄色成豆腐渣| 香蕉丝袜av| 精品高清国产在线一区| 久久精品国产清高在天天线| 亚洲精品国产一区二区精华液| 久久久国产欧美日韩av| x7x7x7水蜜桃| 国产99白浆流出| 国产成人影院久久av| 欧美不卡视频在线免费观看 | 亚洲精品中文字幕一二三四区| 色播在线永久视频| 久久久水蜜桃国产精品网| 两个人看的免费小视频| 日韩欧美一区视频在线观看| 亚洲一区高清亚洲精品| 男人舔女人的私密视频| 真人一进一出gif抽搐免费| 亚洲色图av天堂| 狠狠狠狠99中文字幕| 韩国av一区二区三区四区| 久久久久久久午夜电影| 国产精品电影一区二区三区| 久久久久久久久久黄片| 伦理电影免费视频| 国产高清激情床上av| 精品久久久久久成人av| 巨乳人妻的诱惑在线观看| 国产区一区二久久| 波多野结衣av一区二区av| 在线看三级毛片| 日韩欧美国产一区二区入口| 香蕉国产在线看| 国产亚洲av高清不卡| 18禁裸乳无遮挡免费网站照片 | 午夜福利18| 国产区一区二久久| 午夜福利在线在线| 一进一出抽搐动态| 伊人久久大香线蕉亚洲五| 亚洲成人久久爱视频| 18禁观看日本| av福利片在线| 久久久久久人人人人人| 欧美日韩一级在线毛片| 身体一侧抽搐| 成年人黄色毛片网站| 欧美三级亚洲精品| 久9热在线精品视频| 亚洲精品在线美女| 1024视频免费在线观看| 国产精品免费视频内射| 最近最新中文字幕大全免费视频| 不卡av一区二区三区| 亚洲av熟女| 手机成人av网站| 亚洲aⅴ乱码一区二区在线播放 | 欧美性长视频在线观看| 丝袜美腿诱惑在线| 9191精品国产免费久久| 极品教师在线免费播放| 国产1区2区3区精品| 欧美日韩中文字幕国产精品一区二区三区| 午夜免费鲁丝| АⅤ资源中文在线天堂| 免费观看精品视频网站| 免费在线观看完整版高清| 91成人精品电影| 老司机午夜福利在线观看视频| 亚洲国产毛片av蜜桃av| 欧美成人免费av一区二区三区| av在线播放免费不卡| 国产激情久久老熟女| 日韩欧美一区视频在线观看| 久久伊人香网站| 欧美黑人精品巨大| 国产精品 欧美亚洲| 男女下面进入的视频免费午夜 | 色播在线永久视频| 亚洲av电影在线进入| 91九色精品人成在线观看| 欧美日韩乱码在线| 色婷婷久久久亚洲欧美| 色播亚洲综合网| 久热爱精品视频在线9| 中亚洲国语对白在线视频| 妹子高潮喷水视频| 女警被强在线播放| 亚洲真实伦在线观看| 亚洲成人久久爱视频| 91字幕亚洲| 两人在一起打扑克的视频| 18禁黄网站禁片免费观看直播| 最新在线观看一区二区三区| 99国产极品粉嫩在线观看| 人妻久久中文字幕网| 色综合亚洲欧美另类图片| xxx96com| 老汉色av国产亚洲站长工具| 窝窝影院91人妻| 90打野战视频偷拍视频| 欧美绝顶高潮抽搐喷水| 69av精品久久久久久| 亚洲精品一卡2卡三卡4卡5卡| 给我免费播放毛片高清在线观看| 国产精品综合久久久久久久免费| 99热6这里只有精品| 久久人人精品亚洲av| 国产v大片淫在线免费观看| 草草在线视频免费看| 欧美大码av| 亚洲av成人av| 热re99久久国产66热| 男女之事视频高清在线观看| 国产黄片美女视频| 黄片大片在线免费观看| 一区二区三区高清视频在线| 日本撒尿小便嘘嘘汇集6| 啦啦啦免费观看视频1| 亚洲天堂国产精品一区在线|