• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Alarm Correlation Rules Generation Algorithm Based on Confidence Covered Value

    2015-12-20 09:14:18LITongyan李彤巖
    關(guān)鍵詞:李彤

    LI Tong-yan(李彤巖)

    Meteorological Information and Signal Processing Key Laboratory of Sichuan Higher Education Institutes,Chengdu University of Information Technology,Chengdu 610225,China

    Introduction

    Recent global expansion in the demand for telecommunication services has resulted in a considerable growth of networks in terms of size,complexity and bandwidth.Networks often consist of hundreds or even thousands of interconnected nodes from different manufacturers using various transport mediums and systems.As a result,when a network problem or failure occurs,it is possible that a very large volume of alarms are generated.These alarms describe lots of detailed but very fragmented information about the problems.Typically,alarm flow is useful to find and isolate faults.However,it is also very difficult to determine the root cause of the faults.As we know,alarm correlation is used to help the faults diagnosis and localization[1-3].In the past,the knowledge of alarm correlation was mainly obtained by network experts.With the development of telecommunication networks,it is now much more difficult for the experts to keep up with the rapid change of networks and discover the real useful knowledge from the alarms.Therefore,researchers have adopted many advanced methods including association rules mining to analyze the alarm correlation in order to resolve this problem.Data mining is a science of extracting implicit,previously unknown,and potentially useful information from large data sets or databases,and is also known as knowledge discovery in databases(KDD).The problem of discovering association rules was introduced in Refs.[4-6].Nowadays,alarm correlation analysis based on association rules mining is playing an important part in current research and drawing more and more attentions.

    Alarm association rules mining usually includes two steps:frequent patterns mining and association rules generation.The first step is how to find weighted frequent patterns(WFPs)from the alarm data,and then the final realization is how to generate frequent patterns based on these WFPs.Rule itself reflects the correlation between alarm messages.Mining useful rules accurately are important for network ex-pert to find the root cause and locate the fault quickly.

    Association rules are generated according to the two criteria of support threshold and confidence threshold[7-9].A classical algorithm of rules generation is a recursive depth first search (DFS)method proposed in Refs.[10-11].However,efficiency of this method is very low,for it must test all frequent patterns as well as their parameters one by one to generate association rules.Meanwhile,the number of frequent patterns is too large to mine efficiently,resulting in that there are too many redundant rules to accurately reflect the relationship between the rules of alarms.For instance,some rules have redundant information with the same meaning in different rules;some rules which meet both support threshold and confidence threshold cannot fully represent implication relations,sometimes they only represent a complicated relationship.In this case,it is not enough to generate association rules with those two criteria in some specific applications.

    In this paper,a weighted frequent pattern based rules generation(WFP-RG)method is proposed for the condition of unequal telecommunication alarm transactions.And then a confidence covered value based rules generation method will be proposed,and finally the tests give the realization of association rule mining system and the results.

    The rest of this paper is organized as follows:section 1 shows the method of rules generation,section 2 gives the treatment of the rules including how to generate and reduce the rules,section 3shows a series of experiments and their simulation results,and finally a conclusion is made in section 4.

    1 Rules Generation Method

    Traditional rules generation algorithms are on the condition of equal itemsets.However,communication alarm itemsets are usually unequal;the rules generated objects are all the WFPs.For some WFPs,their sub-pattern may not be weighted frequently.Obviously,the non-weighted frequent itemsets can not appear in the rules,and we must delete all the non-weighted frequent itemsets from the subsets of WFPs.In this paper,a rules generation based on WFP method is proposed(shown in Algorithm 1).The depth-first algorithm is based on the improved recursive algorithm,making that the rules generation algorithm can not only maintain high efficiency,but also be adapt to the specific requirements of alarm data from communication networks.

    Algorithm 1 WFP-RG algorithm

    Input:all the weighted frequent itemsets WL,the maximum frequent itemsets MWL, confidence threshold minconf;

    Output:strong association rules.

    WFP-RG algorithm generates association rules from the maximum weighted frequent itemsets,which is different from traditional methods.In addition,WFP-RG algorithm increases the judgment whether the subsets of the maximum weighted frequent itemsets are frequent or not.Idea of this method is this:if the left side of the rule which shows that some subsets of the maximum weighted frequent itemsets is infrequent,then this subset will be deleted directly,without generating association rules;if the right side of the rule which shows that some subsets of the maximum weighted frequent itemsets is infrequent,then this subset will be deleted directly,without generating association rules;only when both the left and right sides of the rule are frequent,confidence threshold may be considered to judge whether the rule is strong;if the right of rule is a subset of some strong association rules,then this rule will be deleted as redundant rules.After judging with above conditions,strong rules that meet the condition of weighted frequent itemsets will be generated,without producing a large number of redundant rules.This method can reduce the number of rules and recursion,which is more suitable for generating rules with larger number and longer pattern.It proves that this method has more advantages in time complexity and space complexity.

    2 Treatment of the Rules

    WFP-RG algorithm can effectively find the rules which meet the support threshold and confidence threshold in an alarm transaction database.Meanwhile a large number of redundant rules may be removed during the process of rule generation.However,there are also some redundant rules,for these different rules express the same meaning.Additionally,although some rules meet the requirements of weighted support and confidence,they can not really express the relationship between faults;sometimes they only show a complicated relationship between alarms.Such a rule is meaningless for finding the root cause of fault.Reference[12]described an example of concurrency alarm situation in a communication network(shown in Fig.1).In Fig.1,NMS means network management system,MSC means mobile switching center,and BSC means base system controller.And we can see that a series of alarm are concurrent alarms,for they are triggered by a root alarm.Rules generated by these concurrent alarms are redundant for the root fault.

    Fig.1 An example of communication network

    The purpose of rule treatment is to improve the efficiency and provide useful knowledge for finding the root cause of fault by reducing the meaningless and redundant rules.For communication network alarms,this paper proposes a rule producing method based on the confidence covered value.The confidence covered value is defined as follows.

    Definition 1Confidence covered value:suppose R1is A?C,then the confidence isα(0≤α≤1);rule R2is B?C,confidence isβ(0≤β≤1);if A ?Band(β-α)≤θmin,then θminis called the confidence covered value,which is a positive value of 0and 1.

    Confidence covered value is a basis of judging whether a rule is redundant or not.If the left of a rule adds an antecedent constraint,but it can not guarantee a certain degree of confidence increased by a certain covered value,then this rule is considered as a redundant rule to be removed.

    After the rule is generated,if using the confidence covered value to judge at first,a large number of redundant rules can be deleted,so as to preserve the more valuable rule information.Secondly,the rules will be classified in order to discover the root causes of failure.Regular basis of classification is based on the topology correlation clustering into the network element with a group.If the right of a rule is from the same network group,they will be linked by a chain.Obviously,the rules with the same right part will be linked by a chain.The way of linking rules is shown in Fig.2.In Fig.2,M and AB describe the right side of a rule;meanwhile,N,A &B &AB,and X &Y present the left side of the rule.

    Fig.2 The way of linking rules

    Based on the linked method,we proposed a new rule produced algorithm as follows.

    Algorithm 2The rule produced algorithm

    Input:the original rules sets R1,the confidence covered valueθmin;

    Output:the produced rule sets R2.

    According to the confidence covered value,the rules may be generated.Algorithm 2 gives the method that how to produce rule sets.

    3 Simulation Results and Analyses

    A series of experiments have been done to show the performance of our algorithms.We collect original alarm data from telecommunication network in a city.Parameters of alarms are shown in Fig.3.

    Fig.3 Original alarm data

    We test three groups of original alarm data using the mining system,and the result is shown in Table 1.As can be seen,the generating number of rules is influenced by the factors of the alarm number,the alarm type,the minimum support and the minimum confidence.For example,we test the third group of data,which includes 7 190alarm transactions and 126different types,and the number of WFPs is 165.The wminsupis set to 0.025%and minconf is set to 60%.Running with the algorithm WFP-RG,48rules are generated,in which only 2rules meet 100%confidence,for example,one rule is 0x01 0xff 0xff 0xff 0xff &0x0b0xff 0xff 0xff 0xff=>0x07 0xff 0xff 0xff 0xff &0x06 0xff 0xff 0xff 0xff &0x05 0xff 0xff 0xff0xff.According to the network topology,we can easily find where may have failures.Similarly,it is possible to find rules that meet a high degree of confidence,and experts may find some useful information from these rules.

    Table 1 Results of association rules mining

    Then we test the efficiency of our algorithm WFP-RG and traditional rules generation method depth first searchrules generation(DFS-RG).Figures 4and 5show the flex performances of the two algorithms in running time and memory occupied rate.The minimum support is fixed up to 0.25.From the figures,although running time and memory occupied rate of the two algorithms increase with the number of alarms linearly,WFP-RG increases more slowly than DFS-RG,and it has better flex performance than DFS-RG.

    Fig.4 Running time changes with the number of alarms

    Fig.5 Memory occupied changes with the number of alarms

    4 Conclusions

    The most important step of association rules mining is how to generate and produce rules efficiently.This paper presents a rules generation algorithm WFP-RG based on the characteristic of alarm data.For there are a lot of redundant rules and non-covered rules,we propose a novel rule processing method to resolve these problems.Finally,the mining system is used to test and verify the efficiency of WFPRG algorithm.

    [1]Koca F,S?zer H,Abreu R.Spectrum-Based Fault Localization for Diagnosing Concurrency Faults[J].Testing Software and Systems,2013,8254:239-254.

    [2]Estima J O,Marques Cardoso A J.A New Approach for Real-Time Multiple Open-Circuit Fault Diagnosis in Voltage-Source Inverters[J].IEEE Transactions on Industry Applications,2011,47(6):2487-2494.

    [3]Tang Y N,Al-Shaer E,Boutaba R.Efficient Fault Diagnosis Using Incremental Alarm Correlation and Active Investigation for Internet and Overlay Networks[J].IEEE Transactions on Network and Service Management,2008,5(1):36-49.

    [4]Agrawal R,Srikant R.Fast Algorithm for Mining Association Rules[C].Proceedings of the 20th VLDB Conference,Santiago,Chile,1994:487-499.

    [5]Brauckhoff D,Dimitropoulos X,Wagner A,et al.Anomaly Extraction in Backbone Networks Using Association Rules[J].IEEE/ACM Transactions on Networking (TON),2012,20(6):1788-1799.

    [6]Li T Y,Li X M.IULFP:an Efficient Incremental Updating Algorithm Based on LFP-tree for Mining Association Rules[C].Proceedings of the International Conference ICCASM 2010,Taiyuan,China,2010:426-430.

    [7]Bayaedo R J,Agrawal R.Mining the Most Interesting Rulesz[C].Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,San Diego,1999:145-154.

    [8]Huang Z,Lu X,Duan H.Mining Association Rules to Support Resource Allocation in Business Process Management[J].Expert Systems with Applications,2011,38(8):9483-9490.

    [9]Li T Y,Li X M.Novel Alarm Correlation Analysis System Based on Association Rules Mining in Telecommunication Networks[J].Information Sciences,2010,180:2960-2978.

    [10]Li A,Pu J Y.Optimization of Ship Field Repair Scheduling Based on Depth First Search Method[J].Applied Mechanics and Materials,2013,321/322/323/324:2152-2156.

    [11]Duhamel C,Lacomme P,Prodhon C.AHybrid Evolutionary Local Search with Depth First Search Split Procedure for the Heterogeneous Vehicle Routing Problems[J].Engineering Applications of Artificial Intelligence,2012,25(2):345-358.

    [12]Xu Q F.Alarm Correlation Analysis Based on Data Mining[M].Beijing:Beijing University of Post and Telecommunication,2007.(in Chinese)

    猜你喜歡
    李彤
    rSIG/A在急診創(chuàng)傷中的應(yīng)用
    謫仙記
    起死回生的植物朋友
    關(guān)注虛假陳述司法解釋
    關(guān)注北交所之交易規(guī)則知多少
    我家的“小王爺”
    賣根雕
    李彤作品
    藝術(shù)家(2019年7期)2019-12-16 16:10:18
    賣根雕
    李彤:只是做了點“小事”
    文史博覽(2016年2期)2016-03-23 09:12:09
    日本 av在线| 久久精品综合一区二区三区| 亚洲国产精品成人综合色| 成人性生交大片免费视频hd| 午夜精品一区二区三区免费看| 国产免费男女视频| 亚洲成人精品中文字幕电影| 激情 狠狠 欧美| 可以在线观看的亚洲视频| 亚洲av不卡在线观看| 欧美高清成人免费视频www| 全区人妻精品视频| 少妇丰满av| 18禁在线播放成人免费| 少妇熟女欧美另类| 久久久久久久久中文| 日本黄大片高清| 91麻豆精品激情在线观看国产| 卡戴珊不雅视频在线播放| 99热全是精品| 欧美日本视频| av中文乱码字幕在线| 国国产精品蜜臀av免费| 午夜激情欧美在线| 麻豆一二三区av精品| 精品一区二区三区人妻视频| 国产欧美日韩精品亚洲av| 亚洲精品国产av成人精品 | 国产高潮美女av| 99久久中文字幕三级久久日本| 日韩av在线大香蕉| 一卡2卡三卡四卡精品乱码亚洲| 尾随美女入室| av在线播放精品| 欧美xxxx性猛交bbbb| 午夜精品一区二区三区免费看| 国产熟女欧美一区二区| 天堂动漫精品| 乱系列少妇在线播放| 日韩大尺度精品在线看网址| 日本免费一区二区三区高清不卡| 国产精品爽爽va在线观看网站| 乱系列少妇在线播放| 亚洲丝袜综合中文字幕| 久久久午夜欧美精品| 一级毛片电影观看 | 国产av不卡久久| 午夜福利视频1000在线观看| 国产欧美日韩精品一区二区| 婷婷精品国产亚洲av在线| 丰满乱子伦码专区| 久久久国产成人精品二区| 在线播放无遮挡| 日韩一本色道免费dvd| 色哟哟·www| 久99久视频精品免费| 成人一区二区视频在线观看| 亚洲成人久久性| 久久精品国产亚洲av香蕉五月| а√天堂www在线а√下载| 可以在线观看的亚洲视频| 亚洲人成网站高清观看| 国产精品综合久久久久久久免费| 久久久久久久久久黄片| 欧美成人一区二区免费高清观看| av黄色大香蕉| 日本成人三级电影网站| 色吧在线观看| 69av精品久久久久久| 在线看三级毛片| av专区在线播放| 国产午夜福利久久久久久| www日本黄色视频网| 中国国产av一级| av女优亚洲男人天堂| 久久精品国产鲁丝片午夜精品| 人妻制服诱惑在线中文字幕| 欧美bdsm另类| 欧美在线一区亚洲| 国产av一区在线观看免费| 黄色配什么色好看| 午夜a级毛片| 一级毛片久久久久久久久女| 99久国产av精品| av在线亚洲专区| 日韩一本色道免费dvd| 日韩三级伦理在线观看| 插阴视频在线观看视频| 精品一区二区三区av网在线观看| 日本黄大片高清| 美女高潮的动态| 欧美激情国产日韩精品一区| 18禁黄网站禁片免费观看直播| 亚洲性夜色夜夜综合| 日本一二三区视频观看| 欧美一级a爱片免费观看看| 国产极品精品免费视频能看的| 日本色播在线视频| 夜夜爽天天搞| 又爽又黄a免费视频| 国产精品国产高清国产av| 欧美日本亚洲视频在线播放| 亚洲七黄色美女视频| 免费看av在线观看网站| 色综合色国产| 亚洲美女黄片视频| 亚洲精品久久国产高清桃花| 久久久久久久久久久丰满| av福利片在线观看| 亚洲自偷自拍三级| 午夜爱爱视频在线播放| 欧美日韩国产亚洲二区| 久久精品久久久久久噜噜老黄 | 中文亚洲av片在线观看爽| 国产高清激情床上av| 国产黄色小视频在线观看| 99热全是精品| 人人妻人人看人人澡| av天堂在线播放| 色在线成人网| 日本精品一区二区三区蜜桃| 人妻少妇偷人精品九色| 97超碰精品成人国产| 婷婷精品国产亚洲av| 亚洲精品在线观看二区| 热99在线观看视频| 听说在线观看完整版免费高清| 国产黄色视频一区二区在线观看 | 99九九线精品视频在线观看视频| 99热全是精品| 少妇熟女aⅴ在线视频| 免费看a级黄色片| 成人漫画全彩无遮挡| 久久人人爽人人片av| 成人精品一区二区免费| 3wmmmm亚洲av在线观看| 99久久无色码亚洲精品果冻| 最近最新中文字幕大全电影3| 精品福利观看| 97超视频在线观看视频| 国产真实乱freesex| 精品久久久久久久人妻蜜臀av| 免费看a级黄色片| 亚洲aⅴ乱码一区二区在线播放| 国产精品永久免费网站| 22中文网久久字幕| 女人十人毛片免费观看3o分钟| 在线播放国产精品三级| av天堂在线播放| 丝袜美腿在线中文| 啦啦啦韩国在线观看视频| 婷婷亚洲欧美| 美女大奶头视频| 18禁在线播放成人免费| 亚洲美女搞黄在线观看 | 麻豆精品久久久久久蜜桃| 久久精品国产亚洲av涩爱 | 俺也久久电影网| 国产欧美日韩精品一区二区| 国内揄拍国产精品人妻在线| 色视频www国产| 欧美高清成人免费视频www| 久久精品国产自在天天线| 一边摸一边抽搐一进一小说| 日韩欧美在线乱码| 高清日韩中文字幕在线| 国产69精品久久久久777片| 老熟妇乱子伦视频在线观看| 亚洲精品粉嫩美女一区| 免费黄网站久久成人精品| av.在线天堂| 九九热线精品视视频播放| 午夜福利成人在线免费观看| 国产精品综合久久久久久久免费| 天天躁日日操中文字幕| 波多野结衣巨乳人妻| 欧美日韩在线观看h| 欧美zozozo另类| 国产高清三级在线| 午夜影院日韩av| 亚洲婷婷狠狠爱综合网| 美女被艹到高潮喷水动态| 自拍偷自拍亚洲精品老妇| 美女内射精品一级片tv| 色5月婷婷丁香| 日韩精品有码人妻一区| 国产欧美日韩一区二区精品| 天天一区二区日本电影三级| 国产私拍福利视频在线观看| 中出人妻视频一区二区| 大型黄色视频在线免费观看| 欧美成人一区二区免费高清观看| 国产伦一二天堂av在线观看| 国产蜜桃级精品一区二区三区| 能在线免费观看的黄片| 三级男女做爰猛烈吃奶摸视频| 亚洲熟妇熟女久久| 亚洲国产精品久久男人天堂| 日产精品乱码卡一卡2卡三| 男女视频在线观看网站免费| 午夜视频国产福利| 香蕉av资源在线| 午夜激情福利司机影院| 国产熟女欧美一区二区| 欧美zozozo另类| 久久久久久久亚洲中文字幕| 97人妻精品一区二区三区麻豆| 最近手机中文字幕大全| 天天一区二区日本电影三级| 狂野欧美激情性xxxx在线观看| 免费黄网站久久成人精品| ponron亚洲| 亚洲欧美日韩卡通动漫| a级一级毛片免费在线观看| 国产三级中文精品| 禁无遮挡网站| 精品福利观看| 淫秽高清视频在线观看| 观看免费一级毛片| 日韩中字成人| 少妇人妻精品综合一区二区 | 国产免费一级a男人的天堂| 综合色丁香网| 成人一区二区视频在线观看| 在线观看一区二区三区| 97超级碰碰碰精品色视频在线观看| 国语自产精品视频在线第100页| 成人特级av手机在线观看| 九九爱精品视频在线观看| 亚洲精品亚洲一区二区| 午夜免费激情av| 日韩成人伦理影院| 日本精品一区二区三区蜜桃| 久久久久久久久久久丰满| 人人妻,人人澡人人爽秒播| 一边摸一边抽搐一进一小说| 特级一级黄色大片| 国产男人的电影天堂91| 国产精品伦人一区二区| 91午夜精品亚洲一区二区三区| 亚洲精品影视一区二区三区av| 麻豆一二三区av精品| 国内揄拍国产精品人妻在线| 欧美中文日本在线观看视频| 男女啪啪激烈高潮av片| 亚洲av免费高清在线观看| 人妻制服诱惑在线中文字幕| 欧美性猛交╳xxx乱大交人| 国产综合懂色| 嫩草影视91久久| 亚洲高清免费不卡视频| 黄色配什么色好看| 国产一区二区三区在线臀色熟女| 午夜精品一区二区三区免费看| 少妇丰满av| 少妇熟女欧美另类| 在线观看av片永久免费下载| 久久国内精品自在自线图片| 国产黄片美女视频| 最近中文字幕高清免费大全6| 免费人成在线观看视频色| 日韩制服骚丝袜av| 如何舔出高潮| 色在线成人网| a级毛色黄片| 人妻夜夜爽99麻豆av| 欧美zozozo另类| 亚洲精华国产精华液的使用体验 | 一区二区三区免费毛片| 在线a可以看的网站| 亚洲国产欧洲综合997久久,| 又爽又黄a免费视频| 日韩欧美精品v在线| 麻豆成人午夜福利视频| 黄色一级大片看看| 亚洲av一区综合| 日日摸夜夜添夜夜添小说| 亚洲av.av天堂| 老司机午夜福利在线观看视频| 欧美一区二区精品小视频在线| 一级毛片我不卡| 伊人久久精品亚洲午夜| 国产成人福利小说| 欧美一级a爱片免费观看看| 亚洲美女视频黄频| 国产91av在线免费观看| 国产一区二区在线观看日韩| 国产69精品久久久久777片| 成人av一区二区三区在线看| 99久国产av精品国产电影| 99久久九九国产精品国产免费| 色综合站精品国产| 欧美最黄视频在线播放免费| 亚洲熟妇中文字幕五十中出| 九九爱精品视频在线观看| 亚洲美女黄片视频| 免费在线观看成人毛片| 大型黄色视频在线免费观看| 春色校园在线视频观看| 人人妻人人澡人人爽人人夜夜 | 免费黄网站久久成人精品| av中文乱码字幕在线| 亚洲国产精品成人久久小说 | 深夜精品福利| 国产色爽女视频免费观看| 国产高清激情床上av| 国产精品伦人一区二区| 美女大奶头视频| 99热全是精品| 99国产极品粉嫩在线观看| 给我免费播放毛片高清在线观看| 少妇熟女aⅴ在线视频| 听说在线观看完整版免费高清| 国产精品电影一区二区三区| 免费电影在线观看免费观看| 中文字幕免费在线视频6| 免费看a级黄色片| 欧美中文日本在线观看视频| 欧美+亚洲+日韩+国产| 老司机影院成人| 九九在线视频观看精品| 天天躁日日操中文字幕| 国产黄片美女视频| 狠狠狠狠99中文字幕| 内地一区二区视频在线| 97人妻精品一区二区三区麻豆| 午夜激情欧美在线| 熟女电影av网| 成年女人永久免费观看视频| 精品99又大又爽又粗少妇毛片| 婷婷精品国产亚洲av| 精品一区二区三区人妻视频| 女生性感内裤真人,穿戴方法视频| 中出人妻视频一区二区| 国产极品精品免费视频能看的| 综合色丁香网| av在线老鸭窝| 在线观看av片永久免费下载| 成人漫画全彩无遮挡| 麻豆av噜噜一区二区三区| 久久鲁丝午夜福利片| 国产黄a三级三级三级人| 久久人妻av系列| 一进一出好大好爽视频| 中文字幕人妻熟人妻熟丝袜美| 一a级毛片在线观看| 如何舔出高潮| 最新中文字幕久久久久| 别揉我奶头 嗯啊视频| 亚洲欧美日韩无卡精品| 成年免费大片在线观看| 91午夜精品亚洲一区二区三区| 成人性生交大片免费视频hd| 大型黄色视频在线免费观看| 日韩亚洲欧美综合| 国产白丝娇喘喷水9色精品| 亚洲最大成人av| 中文字幕av在线有码专区| 精品久久国产蜜桃| 国产亚洲精品综合一区在线观看| 成人漫画全彩无遮挡| 欧美日本视频| 深爱激情五月婷婷| 特级一级黄色大片| 69av精品久久久久久| 大香蕉久久网| 国模一区二区三区四区视频| 国产视频一区二区在线看| 性色avwww在线观看| 九九在线视频观看精品| 久久久久九九精品影院| 不卡一级毛片| 一进一出抽搐动态| av在线观看视频网站免费| 麻豆精品久久久久久蜜桃| av在线观看视频网站免费| 97超级碰碰碰精品色视频在线观看| 99国产极品粉嫩在线观看| 麻豆乱淫一区二区| 国产 一区精品| 特大巨黑吊av在线直播| 欧美日韩精品成人综合77777| 男人狂女人下面高潮的视频| 亚洲精品日韩av片在线观看| 蜜桃亚洲精品一区二区三区| 久久精品久久久久久噜噜老黄 | 在线看三级毛片| 午夜影院日韩av| 免费看av在线观看网站| 久久精品国产自在天天线| 成年av动漫网址| 九九久久精品国产亚洲av麻豆| 日本三级黄在线观看| 日本 av在线| 国产乱人偷精品视频| 国产成人91sexporn| 久久人妻av系列| 欧美精品国产亚洲| 天堂av国产一区二区熟女人妻| 成年女人永久免费观看视频| 搡老熟女国产l中国老女人| 日本免费a在线| 久久久久久久久久成人| 丝袜美腿在线中文| 中文亚洲av片在线观看爽| 久久久色成人| 波多野结衣高清无吗| 久久精品国产亚洲网站| 精品久久久久久久久亚洲| 国产久久久一区二区三区| 精品国产三级普通话版| 最近最新中文字幕大全电影3| 国产高清视频在线观看网站| 久久久欧美国产精品| 日韩欧美免费精品| 天天一区二区日本电影三级| 97热精品久久久久久| 日本-黄色视频高清免费观看| 99久久精品国产国产毛片| 国产高潮美女av| 在线免费观看不下载黄p国产| 人人妻,人人澡人人爽秒播| 成人av在线播放网站| 看十八女毛片水多多多| 亚洲av一区综合| 日韩欧美免费精品| 内地一区二区视频在线| 亚洲第一区二区三区不卡| 天天躁日日操中文字幕| 在线国产一区二区在线| www.色视频.com| 国产精品一区www在线观看| 夜夜看夜夜爽夜夜摸| 丝袜美腿在线中文| av在线老鸭窝| 一个人看的www免费观看视频| 啦啦啦韩国在线观看视频| 国产一区二区在线观看日韩| 午夜福利视频1000在线观看| 久久精品国产99精品国产亚洲性色| 亚洲一区高清亚洲精品| 国产在线男女| 亚洲国产精品sss在线观看| 亚洲五月天丁香| 成人精品一区二区免费| 亚洲乱码一区二区免费版| 91在线精品国自产拍蜜月| 国产亚洲欧美98| 成年版毛片免费区| 亚洲精品色激情综合| 18禁裸乳无遮挡免费网站照片| av天堂中文字幕网| 色在线成人网| 亚洲人与动物交配视频| 日本黄色视频三级网站网址| 99久久无色码亚洲精品果冻| 亚洲最大成人中文| 91久久精品国产一区二区三区| 99热这里只有精品一区| 久久人人精品亚洲av| 国产麻豆成人av免费视频| 国产免费一级a男人的天堂| 久久久国产成人免费| 亚洲乱码一区二区免费版| 毛片女人毛片| 看片在线看免费视频| 日韩中字成人| 日本撒尿小便嘘嘘汇集6| 12—13女人毛片做爰片一| 一本久久中文字幕| 免费av不卡在线播放| 少妇裸体淫交视频免费看高清| 午夜视频国产福利| 亚洲18禁久久av| 级片在线观看| 少妇被粗大猛烈的视频| 99热这里只有是精品在线观看| 中文字幕av成人在线电影| 亚洲精品国产av成人精品 | 亚洲国产欧洲综合997久久,| 亚洲国产精品国产精品| www日本黄色视频网| 啦啦啦啦在线视频资源| 欧美+亚洲+日韩+国产| 国产人妻一区二区三区在| 国产老妇女一区| 午夜福利在线观看吧| 午夜福利在线观看免费完整高清在 | 午夜影院日韩av| 欧美极品一区二区三区四区| 国产精品av视频在线免费观看| 久久精品国产99精品国产亚洲性色| 国产av在哪里看| 最新在线观看一区二区三区| 亚洲精品在线观看二区| 欧美色欧美亚洲另类二区| 国产一区二区三区av在线 | 欧美+日韩+精品| 国产精品精品国产色婷婷| 国产在线男女| a级毛片免费高清观看在线播放| 欧美潮喷喷水| 久久中文看片网| 国产又黄又爽又无遮挡在线| 精华霜和精华液先用哪个| 99热全是精品| 国产乱人视频| 在线免费十八禁| 国内精品美女久久久久久| 国产亚洲av嫩草精品影院| 国产高清不卡午夜福利| 18禁在线无遮挡免费观看视频 | 校园人妻丝袜中文字幕| 国产免费男女视频| 99九九线精品视频在线观看视频| 中文字幕av在线有码专区| 亚洲无线在线观看| 免费一级毛片在线播放高清视频| 十八禁网站免费在线| 级片在线观看| 亚州av有码| 十八禁国产超污无遮挡网站| 日韩三级伦理在线观看| 国产又黄又爽又无遮挡在线| 亚洲一级一片aⅴ在线观看| 国产久久久一区二区三区| 国产精品久久久久久精品电影| 日本在线视频免费播放| 久久精品国产亚洲av香蕉五月| 午夜福利成人在线免费观看| 91av网一区二区| 久久精品国产亚洲网站| 中文字幕av成人在线电影| 少妇猛男粗大的猛烈进出视频 | 国产成人freesex在线 | 婷婷亚洲欧美| 亚洲av第一区精品v没综合| 可以在线观看毛片的网站| 99在线人妻在线中文字幕| av在线老鸭窝| 亚洲一级一片aⅴ在线观看| 免费看av在线观看网站| 精品人妻视频免费看| 男人狂女人下面高潮的视频| 一级a爱片免费观看的视频| 最近的中文字幕免费完整| 国产女主播在线喷水免费视频网站 | 国产精品一区二区三区四区久久| 亚洲三级黄色毛片| 国产av不卡久久| 成人欧美大片| 久久久精品欧美日韩精品| 91在线观看av| 99九九线精品视频在线观看视频| 亚洲性久久影院| 最近中文字幕高清免费大全6| 国产精品亚洲美女久久久| 99九九线精品视频在线观看视频| 桃色一区二区三区在线观看| 国产免费男女视频| 免费无遮挡裸体视频| 国国产精品蜜臀av免费| 国产伦一二天堂av在线观看| 岛国在线免费视频观看| 女同久久另类99精品国产91| 亚洲欧美中文字幕日韩二区| 亚洲真实伦在线观看| 亚洲美女搞黄在线观看 | 免费看日本二区| 香蕉av资源在线| 日韩大尺度精品在线看网址| 俄罗斯特黄特色一大片| 国产精品99久久久久久久久| 99国产精品一区二区蜜桃av| 国语自产精品视频在线第100页| 久久久久久九九精品二区国产| 久久午夜福利片| 99视频精品全部免费 在线| 在线观看午夜福利视频| 亚洲第一区二区三区不卡| 成人av在线播放网站| 亚洲av中文av极速乱| 夜夜夜夜夜久久久久| 久久久成人免费电影| 亚洲三级黄色毛片| 深爱激情五月婷婷| 久久精品国产亚洲av涩爱 | 少妇的逼好多水| 亚洲av中文字字幕乱码综合| 男女边吃奶边做爰视频| 亚洲av中文字字幕乱码综合| 舔av片在线| 人妻制服诱惑在线中文字幕| 国产精品久久视频播放| 三级国产精品欧美在线观看| 可以在线观看的亚洲视频| 婷婷精品国产亚洲av在线| 亚洲av不卡在线观看| 久久久久久久久大av| 一级毛片aaaaaa免费看小| 久久久久久大精品| 欧美人与善性xxx| 国产精品亚洲一级av第二区| 露出奶头的视频| 欧美绝顶高潮抽搐喷水| 99国产精品一区二区蜜桃av| 久久精品91蜜桃| 色视频www国产| 国产 一区精品| 内地一区二区视频在线| 五月玫瑰六月丁香| 久久久a久久爽久久v久久| 长腿黑丝高跟| 日韩一区二区视频免费看| 亚洲熟妇熟女久久|