• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Alarm Correlation Rules Generation Algorithm Based on Confidence Covered Value

    2015-12-20 09:14:18LITongyan李彤巖
    關(guān)鍵詞:李彤

    LI Tong-yan(李彤巖)

    Meteorological Information and Signal Processing Key Laboratory of Sichuan Higher Education Institutes,Chengdu University of Information Technology,Chengdu 610225,China

    Introduction

    Recent global expansion in the demand for telecommunication services has resulted in a considerable growth of networks in terms of size,complexity and bandwidth.Networks often consist of hundreds or even thousands of interconnected nodes from different manufacturers using various transport mediums and systems.As a result,when a network problem or failure occurs,it is possible that a very large volume of alarms are generated.These alarms describe lots of detailed but very fragmented information about the problems.Typically,alarm flow is useful to find and isolate faults.However,it is also very difficult to determine the root cause of the faults.As we know,alarm correlation is used to help the faults diagnosis and localization[1-3].In the past,the knowledge of alarm correlation was mainly obtained by network experts.With the development of telecommunication networks,it is now much more difficult for the experts to keep up with the rapid change of networks and discover the real useful knowledge from the alarms.Therefore,researchers have adopted many advanced methods including association rules mining to analyze the alarm correlation in order to resolve this problem.Data mining is a science of extracting implicit,previously unknown,and potentially useful information from large data sets or databases,and is also known as knowledge discovery in databases(KDD).The problem of discovering association rules was introduced in Refs.[4-6].Nowadays,alarm correlation analysis based on association rules mining is playing an important part in current research and drawing more and more attentions.

    Alarm association rules mining usually includes two steps:frequent patterns mining and association rules generation.The first step is how to find weighted frequent patterns(WFPs)from the alarm data,and then the final realization is how to generate frequent patterns based on these WFPs.Rule itself reflects the correlation between alarm messages.Mining useful rules accurately are important for network ex-pert to find the root cause and locate the fault quickly.

    Association rules are generated according to the two criteria of support threshold and confidence threshold[7-9].A classical algorithm of rules generation is a recursive depth first search (DFS)method proposed in Refs.[10-11].However,efficiency of this method is very low,for it must test all frequent patterns as well as their parameters one by one to generate association rules.Meanwhile,the number of frequent patterns is too large to mine efficiently,resulting in that there are too many redundant rules to accurately reflect the relationship between the rules of alarms.For instance,some rules have redundant information with the same meaning in different rules;some rules which meet both support threshold and confidence threshold cannot fully represent implication relations,sometimes they only represent a complicated relationship.In this case,it is not enough to generate association rules with those two criteria in some specific applications.

    In this paper,a weighted frequent pattern based rules generation(WFP-RG)method is proposed for the condition of unequal telecommunication alarm transactions.And then a confidence covered value based rules generation method will be proposed,and finally the tests give the realization of association rule mining system and the results.

    The rest of this paper is organized as follows:section 1 shows the method of rules generation,section 2 gives the treatment of the rules including how to generate and reduce the rules,section 3shows a series of experiments and their simulation results,and finally a conclusion is made in section 4.

    1 Rules Generation Method

    Traditional rules generation algorithms are on the condition of equal itemsets.However,communication alarm itemsets are usually unequal;the rules generated objects are all the WFPs.For some WFPs,their sub-pattern may not be weighted frequently.Obviously,the non-weighted frequent itemsets can not appear in the rules,and we must delete all the non-weighted frequent itemsets from the subsets of WFPs.In this paper,a rules generation based on WFP method is proposed(shown in Algorithm 1).The depth-first algorithm is based on the improved recursive algorithm,making that the rules generation algorithm can not only maintain high efficiency,but also be adapt to the specific requirements of alarm data from communication networks.

    Algorithm 1 WFP-RG algorithm

    Input:all the weighted frequent itemsets WL,the maximum frequent itemsets MWL, confidence threshold minconf;

    Output:strong association rules.

    WFP-RG algorithm generates association rules from the maximum weighted frequent itemsets,which is different from traditional methods.In addition,WFP-RG algorithm increases the judgment whether the subsets of the maximum weighted frequent itemsets are frequent or not.Idea of this method is this:if the left side of the rule which shows that some subsets of the maximum weighted frequent itemsets is infrequent,then this subset will be deleted directly,without generating association rules;if the right side of the rule which shows that some subsets of the maximum weighted frequent itemsets is infrequent,then this subset will be deleted directly,without generating association rules;only when both the left and right sides of the rule are frequent,confidence threshold may be considered to judge whether the rule is strong;if the right of rule is a subset of some strong association rules,then this rule will be deleted as redundant rules.After judging with above conditions,strong rules that meet the condition of weighted frequent itemsets will be generated,without producing a large number of redundant rules.This method can reduce the number of rules and recursion,which is more suitable for generating rules with larger number and longer pattern.It proves that this method has more advantages in time complexity and space complexity.

    2 Treatment of the Rules

    WFP-RG algorithm can effectively find the rules which meet the support threshold and confidence threshold in an alarm transaction database.Meanwhile a large number of redundant rules may be removed during the process of rule generation.However,there are also some redundant rules,for these different rules express the same meaning.Additionally,although some rules meet the requirements of weighted support and confidence,they can not really express the relationship between faults;sometimes they only show a complicated relationship between alarms.Such a rule is meaningless for finding the root cause of fault.Reference[12]described an example of concurrency alarm situation in a communication network(shown in Fig.1).In Fig.1,NMS means network management system,MSC means mobile switching center,and BSC means base system controller.And we can see that a series of alarm are concurrent alarms,for they are triggered by a root alarm.Rules generated by these concurrent alarms are redundant for the root fault.

    Fig.1 An example of communication network

    The purpose of rule treatment is to improve the efficiency and provide useful knowledge for finding the root cause of fault by reducing the meaningless and redundant rules.For communication network alarms,this paper proposes a rule producing method based on the confidence covered value.The confidence covered value is defined as follows.

    Definition 1Confidence covered value:suppose R1is A?C,then the confidence isα(0≤α≤1);rule R2is B?C,confidence isβ(0≤β≤1);if A ?Band(β-α)≤θmin,then θminis called the confidence covered value,which is a positive value of 0and 1.

    Confidence covered value is a basis of judging whether a rule is redundant or not.If the left of a rule adds an antecedent constraint,but it can not guarantee a certain degree of confidence increased by a certain covered value,then this rule is considered as a redundant rule to be removed.

    After the rule is generated,if using the confidence covered value to judge at first,a large number of redundant rules can be deleted,so as to preserve the more valuable rule information.Secondly,the rules will be classified in order to discover the root causes of failure.Regular basis of classification is based on the topology correlation clustering into the network element with a group.If the right of a rule is from the same network group,they will be linked by a chain.Obviously,the rules with the same right part will be linked by a chain.The way of linking rules is shown in Fig.2.In Fig.2,M and AB describe the right side of a rule;meanwhile,N,A &B &AB,and X &Y present the left side of the rule.

    Fig.2 The way of linking rules

    Based on the linked method,we proposed a new rule produced algorithm as follows.

    Algorithm 2The rule produced algorithm

    Input:the original rules sets R1,the confidence covered valueθmin;

    Output:the produced rule sets R2.

    According to the confidence covered value,the rules may be generated.Algorithm 2 gives the method that how to produce rule sets.

    3 Simulation Results and Analyses

    A series of experiments have been done to show the performance of our algorithms.We collect original alarm data from telecommunication network in a city.Parameters of alarms are shown in Fig.3.

    Fig.3 Original alarm data

    We test three groups of original alarm data using the mining system,and the result is shown in Table 1.As can be seen,the generating number of rules is influenced by the factors of the alarm number,the alarm type,the minimum support and the minimum confidence.For example,we test the third group of data,which includes 7 190alarm transactions and 126different types,and the number of WFPs is 165.The wminsupis set to 0.025%and minconf is set to 60%.Running with the algorithm WFP-RG,48rules are generated,in which only 2rules meet 100%confidence,for example,one rule is 0x01 0xff 0xff 0xff 0xff &0x0b0xff 0xff 0xff 0xff=>0x07 0xff 0xff 0xff 0xff &0x06 0xff 0xff 0xff 0xff &0x05 0xff 0xff 0xff0xff.According to the network topology,we can easily find where may have failures.Similarly,it is possible to find rules that meet a high degree of confidence,and experts may find some useful information from these rules.

    Table 1 Results of association rules mining

    Then we test the efficiency of our algorithm WFP-RG and traditional rules generation method depth first searchrules generation(DFS-RG).Figures 4and 5show the flex performances of the two algorithms in running time and memory occupied rate.The minimum support is fixed up to 0.25.From the figures,although running time and memory occupied rate of the two algorithms increase with the number of alarms linearly,WFP-RG increases more slowly than DFS-RG,and it has better flex performance than DFS-RG.

    Fig.4 Running time changes with the number of alarms

    Fig.5 Memory occupied changes with the number of alarms

    4 Conclusions

    The most important step of association rules mining is how to generate and produce rules efficiently.This paper presents a rules generation algorithm WFP-RG based on the characteristic of alarm data.For there are a lot of redundant rules and non-covered rules,we propose a novel rule processing method to resolve these problems.Finally,the mining system is used to test and verify the efficiency of WFPRG algorithm.

    [1]Koca F,S?zer H,Abreu R.Spectrum-Based Fault Localization for Diagnosing Concurrency Faults[J].Testing Software and Systems,2013,8254:239-254.

    [2]Estima J O,Marques Cardoso A J.A New Approach for Real-Time Multiple Open-Circuit Fault Diagnosis in Voltage-Source Inverters[J].IEEE Transactions on Industry Applications,2011,47(6):2487-2494.

    [3]Tang Y N,Al-Shaer E,Boutaba R.Efficient Fault Diagnosis Using Incremental Alarm Correlation and Active Investigation for Internet and Overlay Networks[J].IEEE Transactions on Network and Service Management,2008,5(1):36-49.

    [4]Agrawal R,Srikant R.Fast Algorithm for Mining Association Rules[C].Proceedings of the 20th VLDB Conference,Santiago,Chile,1994:487-499.

    [5]Brauckhoff D,Dimitropoulos X,Wagner A,et al.Anomaly Extraction in Backbone Networks Using Association Rules[J].IEEE/ACM Transactions on Networking (TON),2012,20(6):1788-1799.

    [6]Li T Y,Li X M.IULFP:an Efficient Incremental Updating Algorithm Based on LFP-tree for Mining Association Rules[C].Proceedings of the International Conference ICCASM 2010,Taiyuan,China,2010:426-430.

    [7]Bayaedo R J,Agrawal R.Mining the Most Interesting Rulesz[C].Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,San Diego,1999:145-154.

    [8]Huang Z,Lu X,Duan H.Mining Association Rules to Support Resource Allocation in Business Process Management[J].Expert Systems with Applications,2011,38(8):9483-9490.

    [9]Li T Y,Li X M.Novel Alarm Correlation Analysis System Based on Association Rules Mining in Telecommunication Networks[J].Information Sciences,2010,180:2960-2978.

    [10]Li A,Pu J Y.Optimization of Ship Field Repair Scheduling Based on Depth First Search Method[J].Applied Mechanics and Materials,2013,321/322/323/324:2152-2156.

    [11]Duhamel C,Lacomme P,Prodhon C.AHybrid Evolutionary Local Search with Depth First Search Split Procedure for the Heterogeneous Vehicle Routing Problems[J].Engineering Applications of Artificial Intelligence,2012,25(2):345-358.

    [12]Xu Q F.Alarm Correlation Analysis Based on Data Mining[M].Beijing:Beijing University of Post and Telecommunication,2007.(in Chinese)

    猜你喜歡
    李彤
    rSIG/A在急診創(chuàng)傷中的應(yīng)用
    謫仙記
    起死回生的植物朋友
    關(guān)注虛假陳述司法解釋
    關(guān)注北交所之交易規(guī)則知多少
    我家的“小王爺”
    賣根雕
    李彤作品
    藝術(shù)家(2019年7期)2019-12-16 16:10:18
    賣根雕
    李彤:只是做了點“小事”
    文史博覽(2016年2期)2016-03-23 09:12:09
    国产成人精品久久二区二区91| 这个男人来自地球电影免费观看| 老汉色∧v一级毛片| 国产区一区二久久| 90打野战视频偷拍视频| 免费在线观看完整版高清| 婷婷成人精品国产| 女同久久另类99精品国产91| 女人精品久久久久毛片| 91成年电影在线观看| 99精品欧美一区二区三区四区| 欧美精品高潮呻吟av久久| 亚洲va日本ⅴa欧美va伊人久久| 精品一区二区三区av网在线观看 | tocl精华| 国产一区二区激情短视频| 免费看a级黄色片| 欧美精品啪啪一区二区三区| 777米奇影视久久| 成人亚洲精品一区在线观看| 99re6热这里在线精品视频| 免费少妇av软件| 亚洲av成人不卡在线观看播放网| 在线观看免费视频日本深夜| 亚洲色图av天堂| 9热在线视频观看99| 亚洲中文日韩欧美视频| 日日摸夜夜添夜夜添小说| 亚洲情色 制服丝袜| 欧美成人免费av一区二区三区 | 在线观看www视频免费| 无限看片的www在线观看| 脱女人内裤的视频| 国产精品一区二区免费欧美| 欧美日韩亚洲国产一区二区在线观看 | 男女高潮啪啪啪动态图| 色婷婷av一区二区三区视频| 最黄视频免费看| 99热国产这里只有精品6| av网站免费在线观看视频| 久久人妻福利社区极品人妻图片| 国产在线视频一区二区| 国产伦理片在线播放av一区| 国产伦理片在线播放av一区| 18禁国产床啪视频网站| 亚洲国产看品久久| 国产亚洲精品第一综合不卡| 亚洲全国av大片| 好男人电影高清在线观看| 亚洲精品中文字幕在线视频| 日韩中文字幕欧美一区二区| 久久国产精品影院| 老熟妇乱子伦视频在线观看| 国产成人精品久久二区二区免费| 91精品国产国语对白视频| 国产成人免费无遮挡视频| 成人18禁高潮啪啪吃奶动态图| 国产高清videossex| 亚洲免费av在线视频| 国产av又大| 中文欧美无线码| 久久精品91无色码中文字幕| 91av网站免费观看| 91成年电影在线观看| 亚洲av日韩精品久久久久久密| 五月开心婷婷网| 日韩视频在线欧美| 欧美久久黑人一区二区| 18禁裸乳无遮挡动漫免费视频| 国产一区二区三区综合在线观看| 超色免费av| 99精国产麻豆久久婷婷| 国产精品久久电影中文字幕 | 国产精品亚洲一级av第二区| 在线十欧美十亚洲十日本专区| 免费日韩欧美在线观看| 欧美日韩精品网址| 不卡一级毛片| 三上悠亚av全集在线观看| 欧美+亚洲+日韩+国产| 色在线成人网| 国产不卡一卡二| 一区二区日韩欧美中文字幕| av视频免费观看在线观看| 宅男免费午夜| 精品少妇黑人巨大在线播放| 国产一区二区激情短视频| 国产精品一区二区在线观看99| 久久国产精品大桥未久av| 中文字幕另类日韩欧美亚洲嫩草| 精品免费久久久久久久清纯 | 中文字幕人妻丝袜制服| 久久人妻熟女aⅴ| 亚洲精品中文字幕一二三四区 | 9191精品国产免费久久| 一边摸一边抽搐一进一出视频| 亚洲va日本ⅴa欧美va伊人久久| 亚洲欧美精品综合一区二区三区| 黑人巨大精品欧美一区二区mp4| 少妇 在线观看| 一边摸一边做爽爽视频免费| 亚洲精品一卡2卡三卡4卡5卡| 侵犯人妻中文字幕一二三四区| 国产日韩欧美视频二区| 妹子高潮喷水视频| 成人国产一区最新在线观看| 人人妻,人人澡人人爽秒播| videos熟女内射| 日本欧美视频一区| 国产91精品成人一区二区三区 | 午夜成年电影在线免费观看| 人妻久久中文字幕网| 国产成人啪精品午夜网站| 欧美大码av| 99精品在免费线老司机午夜| 大片免费播放器 马上看| 黑人操中国人逼视频| 久久精品亚洲熟妇少妇任你| 亚洲精品一卡2卡三卡4卡5卡| 又紧又爽又黄一区二区| 悠悠久久av| 国产亚洲一区二区精品| 欧美亚洲日本最大视频资源| 在线亚洲精品国产二区图片欧美| 国产精品久久久av美女十八| 人妻 亚洲 视频| 国产在线视频一区二区| 欧美日韩中文字幕国产精品一区二区三区 | 男女高潮啪啪啪动态图| 高清在线国产一区| 最新美女视频免费是黄的| 真人做人爱边吃奶动态| 一本综合久久免费| 国产精品98久久久久久宅男小说| 精品一区二区三区视频在线观看免费 | 日日摸夜夜添夜夜添小说| 精品少妇内射三级| 亚洲色图av天堂| 欧美精品亚洲一区二区| 建设人人有责人人尽责人人享有的| 欧美亚洲日本最大视频资源| 午夜免费成人在线视频| av天堂在线播放| 国产精品香港三级国产av潘金莲| 岛国毛片在线播放| 成在线人永久免费视频| 夜夜爽天天搞| 欧美乱妇无乱码| 69精品国产乱码久久久| 精品国产一区二区久久| 国产精品免费大片| av国产精品久久久久影院| 国产精品久久久久久精品电影小说| 午夜精品国产一区二区电影| 久久人人97超碰香蕉20202| 国产精品麻豆人妻色哟哟久久| 国产91精品成人一区二区三区 | 一级毛片女人18水好多| 咕卡用的链子| 少妇粗大呻吟视频| 嫩草影视91久久| 大码成人一级视频| 天天影视国产精品| 人妻一区二区av| 日韩视频一区二区在线观看| 50天的宝宝边吃奶边哭怎么回事| www.精华液| 两个人看的免费小视频| 夜夜骑夜夜射夜夜干| 动漫黄色视频在线观看| 97在线人人人人妻| 欧美老熟妇乱子伦牲交| 叶爱在线成人免费视频播放| 黄片大片在线免费观看| 国产成人免费观看mmmm| 91老司机精品| av电影中文网址| 成人特级黄色片久久久久久久 | 国产日韩欧美视频二区| 韩国精品一区二区三区| 国产精品久久久人人做人人爽| 老司机影院毛片| 国产黄色免费在线视频| 国产极品粉嫩免费观看在线| 久久久精品94久久精品| 一本大道久久a久久精品| 成人av一区二区三区在线看| 在线观看一区二区三区激情| 99国产精品免费福利视频| 国产免费福利视频在线观看| 国产欧美日韩一区二区精品| 熟女少妇亚洲综合色aaa.| 五月天丁香电影| 国产野战对白在线观看| 久久久国产精品麻豆| 亚洲黑人精品在线| aaaaa片日本免费| 人人澡人人妻人| 欧美精品亚洲一区二区| 午夜免费成人在线视频| 久久精品熟女亚洲av麻豆精品| av视频免费观看在线观看| 国内毛片毛片毛片毛片毛片| 亚洲一区二区三区欧美精品| 两人在一起打扑克的视频| 免费在线观看日本一区| 亚洲专区国产一区二区| 午夜福利视频在线观看免费| 女性生殖器流出的白浆| 成人黄色视频免费在线看| 大码成人一级视频| xxxhd国产人妻xxx| 侵犯人妻中文字幕一二三四区| 国产一区有黄有色的免费视频| 十八禁网站免费在线| 狠狠狠狠99中文字幕| 国产精品美女特级片免费视频播放器 | 欧美性长视频在线观看| 在线观看www视频免费| 久久狼人影院| 久久人妻福利社区极品人妻图片| 中文字幕人妻熟女乱码| 在线播放国产精品三级| 欧美乱码精品一区二区三区| 黄色 视频免费看| 亚洲视频免费观看视频| 国产亚洲精品久久久久5区| 18禁黄网站禁片午夜丰满| 黑人欧美特级aaaaaa片| 色老头精品视频在线观看| 久久久国产欧美日韩av| 欧美日本中文国产一区发布| 青草久久国产| 夫妻午夜视频| av不卡在线播放| 国产在线一区二区三区精| videosex国产| 99热国产这里只有精品6| 91老司机精品| 侵犯人妻中文字幕一二三四区| 精品国产一区二区三区四区第35| 女性生殖器流出的白浆| tocl精华| 最新美女视频免费是黄的| 五月天丁香电影| 亚洲全国av大片| 一本一本久久a久久精品综合妖精| 99国产精品一区二区蜜桃av | 99久久国产精品久久久| 日本av手机在线免费观看| 一边摸一边做爽爽视频免费| 欧美黑人精品巨大| 精品国产乱码久久久久久男人| 成人国语在线视频| 757午夜福利合集在线观看| 免费少妇av软件| 久久人妻福利社区极品人妻图片| 国产精品秋霞免费鲁丝片| 久久国产亚洲av麻豆专区| 人人妻,人人澡人人爽秒播| 大香蕉久久网| 黄色片一级片一级黄色片| 黑人操中国人逼视频| 自线自在国产av| 国产一区二区三区综合在线观看| 亚洲五月婷婷丁香| 91大片在线观看| 女同久久另类99精品国产91| 99国产精品免费福利视频| 99香蕉大伊视频| 亚洲精品av麻豆狂野| 男人舔女人的私密视频| 成年人免费黄色播放视频| 午夜精品久久久久久毛片777| 色视频在线一区二区三区| 侵犯人妻中文字幕一二三四区| 欧美黑人精品巨大| 天天操日日干夜夜撸| 大片电影免费在线观看免费| 亚洲一区中文字幕在线| 涩涩av久久男人的天堂| 国产伦人伦偷精品视频| av又黄又爽大尺度在线免费看| 超碰成人久久| videos熟女内射| 女性生殖器流出的白浆| 国产精品美女特级片免费视频播放器 | 国产又爽黄色视频| 香蕉丝袜av| 大码成人一级视频| 国产精品99久久99久久久不卡| 国产一卡二卡三卡精品| 国产成人影院久久av| 欧美久久黑人一区二区| 国产无遮挡羞羞视频在线观看| 国产一区二区三区综合在线观看| 美女主播在线视频| 国产av国产精品国产| 999久久久国产精品视频| 视频区欧美日本亚洲| 女警被强在线播放| 成人精品一区二区免费| 久久久久久久大尺度免费视频| 老汉色av国产亚洲站长工具| 欧美精品一区二区免费开放| 午夜免费鲁丝| 亚洲国产欧美日韩在线播放| 国产精品二区激情视频| 麻豆av在线久日| 国产亚洲欧美精品永久| 五月天丁香电影| 蜜桃在线观看..| 久久香蕉激情| 中文字幕高清在线视频| av线在线观看网站| 亚洲视频免费观看视频| 亚洲欧美一区二区三区黑人| 婷婷丁香在线五月| 老司机在亚洲福利影院| 久久久欧美国产精品| 亚洲五月婷婷丁香| xxxhd国产人妻xxx| www.自偷自拍.com| 国产一区二区三区在线臀色熟女 | 黄网站色视频无遮挡免费观看| 久久av网站| 美女主播在线视频| 午夜日韩欧美国产| 色在线成人网| 99国产精品一区二区蜜桃av | 久久国产精品人妻蜜桃| 亚洲国产成人一精品久久久| 亚洲av电影在线进入| 亚洲成a人片在线一区二区| 欧美人与性动交α欧美软件| 国产精品香港三级国产av潘金莲| 欧美精品人与动牲交sv欧美| 午夜久久久在线观看| 一边摸一边做爽爽视频免费| 久久久久精品人妻al黑| 国产国语露脸激情在线看| 国产在视频线精品| tube8黄色片| 久久精品成人免费网站| 午夜成年电影在线免费观看| 丰满饥渴人妻一区二区三| 亚洲中文av在线| av片东京热男人的天堂| 热99国产精品久久久久久7| 欧美黑人精品巨大| 黄片大片在线免费观看| 看免费av毛片| 国产精品影院久久| 一个人免费在线观看的高清视频| 亚洲国产欧美在线一区| 欧美 亚洲 国产 日韩一| 两个人免费观看高清视频| 国产av又大| 久久精品国产综合久久久| 国产日韩欧美在线精品| 这个男人来自地球电影免费观看| 免费在线观看日本一区| 亚洲伊人色综图| 美女高潮喷水抽搐中文字幕| 午夜福利在线观看吧| 黄色丝袜av网址大全| 精品卡一卡二卡四卡免费| 丁香欧美五月| 免费看十八禁软件| 精品国内亚洲2022精品成人 | 亚洲欧美一区二区三区久久| 欧美精品高潮呻吟av久久| 天堂中文最新版在线下载| av一本久久久久| 中文字幕制服av| 狠狠婷婷综合久久久久久88av| 国产成人啪精品午夜网站| 999精品在线视频| 日韩视频一区二区在线观看| 成人三级做爰电影| 亚洲欧美日韩另类电影网站| 十八禁网站网址无遮挡| av福利片在线| 老司机亚洲免费影院| 久久中文看片网| 夜夜夜夜夜久久久久| 精品少妇一区二区三区视频日本电影| 一二三四社区在线视频社区8| 日韩一卡2卡3卡4卡2021年| 久久久久网色| 国产精品免费一区二区三区在线 | 国产精品一区二区在线观看99| 黑人猛操日本美女一级片| 纯流量卡能插随身wifi吗| 久久99一区二区三区| 人人妻人人添人人爽欧美一区卜| 午夜视频精品福利| 欧美日韩亚洲综合一区二区三区_| 亚洲国产中文字幕在线视频| 麻豆乱淫一区二区| 国产男女超爽视频在线观看| 亚洲成a人片在线一区二区| 欧美久久黑人一区二区| 一区二区av电影网| 亚洲国产欧美一区二区综合| 国产又爽黄色视频| 在线观看一区二区三区激情| 精品人妻1区二区| 亚洲 国产 在线| 亚洲av日韩精品久久久久久密| 女人精品久久久久毛片| 中文亚洲av片在线观看爽 | 亚洲av日韩精品久久久久久密| 欧美成人免费av一区二区三区 | 一区二区三区国产精品乱码| 男女无遮挡免费网站观看| 桃红色精品国产亚洲av| 91九色精品人成在线观看| 久久天堂一区二区三区四区| 精品久久久久久电影网| 侵犯人妻中文字幕一二三四区| 亚洲人成77777在线视频| 亚洲国产中文字幕在线视频| 久久婷婷成人综合色麻豆| 久久久久久久精品吃奶| 精品国产乱子伦一区二区三区| 午夜免费成人在线视频| 最新的欧美精品一区二区| 啦啦啦在线免费观看视频4| 啦啦啦免费观看视频1| 久9热在线精品视频| 免费在线观看视频国产中文字幕亚洲| kizo精华| 老司机福利观看| 12—13女人毛片做爰片一| 亚洲性夜色夜夜综合| 国产高清国产精品国产三级| 新久久久久国产一级毛片| 超碰成人久久| 亚洲av成人一区二区三| 国产91精品成人一区二区三区 | 成人国产一区最新在线观看| av网站免费在线观看视频| 色综合婷婷激情| 蜜桃在线观看..| 成年女人毛片免费观看观看9 | 美女福利国产在线| 久久精品aⅴ一区二区三区四区| 日本一区二区免费在线视频| 在线观看免费视频日本深夜| 免费观看av网站的网址| 淫妇啪啪啪对白视频| 久久狼人影院| 日本vs欧美在线观看视频| 一区二区三区激情视频| 国产成人精品无人区| 中文字幕高清在线视频| 1024香蕉在线观看| 久久精品国产99精品国产亚洲性色 | 久久久久国产一级毛片高清牌| 天堂俺去俺来也www色官网| 久久人妻熟女aⅴ| 啦啦啦视频在线资源免费观看| 久久毛片免费看一区二区三区| 国产精品亚洲av一区麻豆| 亚洲国产成人一精品久久久| 麻豆av在线久日| 久久精品亚洲熟妇少妇任你| 国产一区二区激情短视频| 成人18禁高潮啪啪吃奶动态图| 男女无遮挡免费网站观看| aaaaa片日本免费| 欧美日韩亚洲高清精品| 欧美亚洲 丝袜 人妻 在线| 两性午夜刺激爽爽歪歪视频在线观看 | 91成人精品电影| 亚洲天堂av无毛| 在线 av 中文字幕| 天天添夜夜摸| 精品国内亚洲2022精品成人 | 欧美日韩亚洲高清精品| 久久久久国内视频| 老司机深夜福利视频在线观看| 久久久国产精品麻豆| 午夜免费鲁丝| 亚洲成人国产一区在线观看| 高清av免费在线| 久久久国产欧美日韩av| 国产成人一区二区三区免费视频网站| 另类精品久久| 又大又爽又粗| 欧美日韩精品网址| 午夜福利免费观看在线| 怎么达到女性高潮| 久久久欧美国产精品| 亚洲国产中文字幕在线视频| 91成人精品电影| 国产精品亚洲av一区麻豆| 国产深夜福利视频在线观看| 亚洲天堂av无毛| 黄网站色视频无遮挡免费观看| 日韩人妻精品一区2区三区| a级毛片黄视频| 高清黄色对白视频在线免费看| 一本久久精品| 国产精品av久久久久免费| 男男h啪啪无遮挡| 日本精品一区二区三区蜜桃| 91大片在线观看| 日韩欧美一区视频在线观看| 可以免费在线观看a视频的电影网站| 亚洲av成人不卡在线观看播放网| 欧美成狂野欧美在线观看| 动漫黄色视频在线观看| a级毛片在线看网站| 色老头精品视频在线观看| 国产亚洲精品久久久久5区| 精品卡一卡二卡四卡免费| 欧美日韩中文字幕国产精品一区二区三区 | 国产在线视频一区二区| 丰满迷人的少妇在线观看| 亚洲第一青青草原| www.熟女人妻精品国产| 国产av一区二区精品久久| 熟女少妇亚洲综合色aaa.| 国产不卡一卡二| 可以免费在线观看a视频的电影网站| 少妇精品久久久久久久| 大码成人一级视频| 国产又色又爽无遮挡免费看| 色尼玛亚洲综合影院| 欧美午夜高清在线| 国产一区二区 视频在线| 亚洲成av片中文字幕在线观看| 国产片内射在线| 国产免费av片在线观看野外av| 国产精品久久电影中文字幕 | 水蜜桃什么品种好| 亚洲av日韩在线播放| 欧美国产精品va在线观看不卡| 国产男女超爽视频在线观看| 久久国产亚洲av麻豆专区| 亚洲中文av在线| 91精品国产国语对白视频| 亚洲中文av在线| 精品少妇久久久久久888优播| 蜜桃在线观看..| 国产aⅴ精品一区二区三区波| 久久久欧美国产精品| 国产成人啪精品午夜网站| 久久久精品免费免费高清| 国产精品 欧美亚洲| 久久毛片免费看一区二区三区| 国产高清videossex| 国产91精品成人一区二区三区 | 80岁老熟妇乱子伦牲交| 成人18禁在线播放| 久久天堂一区二区三区四区| 欧美久久黑人一区二区| 宅男免费午夜| 青青草视频在线视频观看| 91精品三级在线观看| 一级毛片精品| 日本黄色日本黄色录像| 免费一级毛片在线播放高清视频 | 成人亚洲精品一区在线观看| 亚洲国产欧美网| 国产男女超爽视频在线观看| 咕卡用的链子| 免费女性裸体啪啪无遮挡网站| 午夜福利影视在线免费观看| 肉色欧美久久久久久久蜜桃| 免费日韩欧美在线观看| 亚洲av欧美aⅴ国产| 久久国产精品影院| 欧美亚洲 丝袜 人妻 在线| 亚洲熟女毛片儿| 男人操女人黄网站| 久久久久久久大尺度免费视频| 国产精品美女特级片免费视频播放器 | 久久九九热精品免费| 悠悠久久av| 亚洲人成伊人成综合网2020| 亚洲精品在线观看二区| 99热国产这里只有精品6| 狠狠精品人妻久久久久久综合| 亚洲国产av新网站| 在线观看人妻少妇| 可以免费在线观看a视频的电影网站| tube8黄色片| 色老头精品视频在线观看| 亚洲精华国产精华精| 国产日韩欧美视频二区| 制服诱惑二区| 激情视频va一区二区三区| 香蕉国产在线看| 每晚都被弄得嗷嗷叫到高潮| 中文字幕人妻熟女乱码| 亚洲专区中文字幕在线| 免费不卡黄色视频| 国产日韩欧美在线精品| 亚洲欧洲精品一区二区精品久久久| 1024香蕉在线观看| 免费在线观看日本一区| 久久久久精品人妻al黑| 精品高清国产在线一区| 精品国产乱码久久久久久男人| 女性被躁到高潮视频| 免费看十八禁软件| 超碰97精品在线观看| 操出白浆在线播放| 女人高潮潮喷娇喘18禁视频| 在线av久久热| 国产精品久久久人人做人人爽| 午夜免费鲁丝|