• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Combat utility prediction

    2016-12-27 01:08:07StanislasGABROVSEKIanCOLWILLEliasSTIPIDIS
    Defence Technology 2016年6期

    Stanislas GABROVSEK,Ian COLWILL,Elias STIPIDIS

    Vetronics Research Centre,University of Brighton,Lewes road,Brighton,UK

    Combat utility prediction

    Stanislas GABROVSEK*,Ian COLWILL,Elias STIPIDIS

    Vetronics Research Centre,University of Brighton,Lewes road,Brighton,UK

    The majority of allied casualties from recent conflicts were caused by blast wave and fragments perforation damage from Improvised Explosive Devices.Survivability to this type of threat is a critical factor to consider for land platform design.This paper proposes an original approach to platform survivability assessment using a combination ofAgent-Based(AB)simulation and FaultTreeAnalysis(FTA)to predict the consequences of IED fragment impacts on the platform operational status.As a demonstration,this approach is applied to the comparison of different platform architectures to gain insight into the optimisation of the platform component topology.

    Mission;Survivability;Simulation;Agent-based;Fault-tree analysis;Platform architecture

    1.Introduction

    Since 2001,Improvised Explosive Devices(IEDs)have been responsible for over 50%of the coalition soldiers’deaths,and IEDs dangerousness continues to intensify[1].IEDs are made of explosive material(typically discarded artillery ammunition) connected to a triggering system.The explosion of such a weapon generates blast wave(primary effect),fragments(secondary effect)and heat that interact with critical components or crew to incapacitate a platform.The interaction may be direct or indirect as in the case of Behind Armour Debris(BADs)generated by impacting fragments.

    Add-on solutions that offer increased protection from IED effects such as slat armour and anti-BAD liners exist,but further benefit can be achieved through optimisation of the platform architecture itself.Simulation tools are ideal for modelling and testing architecture topology improvements as part of the platform architecture design process.A wide range of vulnerability modelling and simulation tools are available,with approaches that each provides a specific level of insight. For example,war-gaming techniques provide exploitable insights regarding platform usage doctrine while Finite Element Analysis(FEA)provides detailed analysis of specific component resistance to perforation.

    This paper proposes an original approach to platform damage assessment analysis that can be applied from the fleet down to the component level,with benefits in terms of scalability,modularity and reusability of the developed models.Among other IED effects,this paper focuses mainly on the fragments’impacts on structures but the application of the approach to blast damage and shockwave transmission is also under study. Platform crew is not particularly considered either,while the method could be easily extended to human occupants,by considering appropriate fatality energy levels.As a demonstration of the benefits of this approach a comparison of different future platform architectures from their survivability to IED fragments point of view is presented.

    2.Background

    An existing standard for description of system vulnerability analysis is theVulnerability/Lethality(V/L)Taxonomy1[2]represented in Fig.1.Level 1 describes the initial state of thesystem before the attack.Level 2 describes the status of the components after the attack,with regard to the damage criteria. Level 3 describes the platform remaining capability at the functions level while level 4 describes the platform mission remaining effectiveness.Using a different terminology,the“platform incapacitation process”described in Ref.[3]refers to the same stages.

    Fig.1.The V/L taxonomy.

    2.1.Threat/target interactions prediction

    Three types of techniques are commonly used to predict the effects of a given threat on systems:

    1)Knowledge-based methods:this approach of survivability assessment is based on human estimation of damage resulting from empirical experiments or“after-action reviews”of enemy contact.This knowledge can then be implemented in“survivability tables”for simulation wargames[4]or in a database for survivability assessment expert-systems[5].

    2)Analytical methods:in this approach,the physical reality of the battlefield damage is described by mathematical formulas.Mathematical equations are essentially correlations with experimental data(e.g.THOR equations). Semi-empirical equations are simplified models of physical phenomena[6].Both empirical and semi-empirical approaches are used extensively in vulnerability and technical-operational studies[2].Analytical methods are usually coupled with target geometry ray-tracing analysis to determine which parts of the system have been hit by the threat[7].

    3)Numerical methods:this approach uses subdivision to model macro level problems using numerous small domains (nodes)with individualsolutions (Finite Element Analysis).Then,numerical techniques are used to find approximate solutions to each node.FEA provides improved accuracy at the component level,but requires detailed information about the structure to be modelled and is computationally intensive[8].

    2.2.Damage assessment criteria

    As depicted in chapter 1,platform components(including crew)can be damaged by different types of weapon effects. This paper considers the damage due to Kinetic Energy(KE) projectiles such as bullets and fragments.Possible metrics to estimate the kill probability Pk of a component after damage are reviewed in Ref.[9](Table 1).As detailed information regarding component kill probability is often classified,there is little publically available data.Piecemeal information on criti-cal levels of deposited energy was found in Refs.[10](Table 2) and[11](Table 3).Some data about critical levels of impact energy per area unit were found in Ref.[12](Table 4).

    Table 1 Possible metrics for kill criteria when a component is hit by KE projectiles of fragments[9].

    Table 3 Critical levels of deposited energy for platforms[11].

    2.3.Combat utility estimation

    The ability of a vehicle to successfully perform its mission is called the mission survivability[13],or combat utility[2].It is based on the different capabilities of the platform and its crewwhich are typically categorised as mobility,firepower,C4ISR2Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance.and protection.The combat utility of the platform is reduced if any of these capabilities are lost or degraded due to damage to the vehicle or crew(platform susceptibility3The probability of being hit.and recoverability4The probability of restoring mission capability through reconfiguration or repair.aspects are not considered here).So doing,most of the combat utility prediction techniques are based on:

    Table 4 Critical levels of energy per area unit[12].

    Fig.2.Examples of deactivation,RBD and FT diagrams of a DC power supply.

    1)A list of individual equipment or subsystems critical to the operation of the platform capabilities(Standard Damage Assessment List).

    2)The results of the criticality analysis,as a series of logic diagrams that present the contribution of critical components to the different platform capabilities.

    There are three major formalisms for these logic diagrams, which are illustrated in the simple example of Fig.2.

    1)Deactivation diagrams present the operational relationship between critical components and each capability.As long as an unbroken path can be traced through the diagram,no platform capability has been lost[2].

    2)Reliability Block Diagrams(RBD)represent the critical subsystems or components connected according to their function or reliability relationship.They are“mission success”oriented[14].

    3)Fault Trees(FT)show which combinations of the components failures will result in a system failure.It is composed of a Top Event(TE)that represents the most undesired event and lower level logical“AND”and“OR”gates or Basic Events(BE)that define the combinations of components failures leading to the occurrence of the TE[15].

    2.4.Existing work

    While existing implementations of the Agent Based(AB) approach for modelling battlefield complexity are numerous, existing applications that assess vulnerability at the component level are rare.In Ref.[16],anAB approach is used to model the effect of an anti-tank projectile on an AFV.Provided results generally concur with experimental data,but unfortunately no information is given about component damage assessment and no extension to the platform and fleet level vulnerability level is described.A similar approach is used in Ref.[17]to model the BAD generated by a missile explosion close to a military aircraft fuselage.The focus is the relative accuracy of the BAD modelling,but without considering the damage they create on components.

    3.Combat utility prediction methodology

    In order to predict the impact of IED fragments on platform combat utility,we use a combination of two techniques(Fig.3):

    1)Agent-Based modelling is used to simulate the threatplatform interactions,as agents are well adapted to model battlefield complexity,meaning that with a large number of elements in interaction.The“deposited energy criteria”(chapter 0)is used to estimate the damage(probabilities of kill)on individual components.

    2)Probabilities of kill of individual components are used in the platform combat utility Fault-Tree to determine how the platform capabilities have been affected by the threat and the probability to perform the mission.

    3.1.Agent-Based modelling of the threat–target interactions

    This approach uses agents to model the physical representation of objects such as IEDs,fragments and platform components with a 3D space.In contrast to the existing attempts in thisdomain,this work aims to generalise the AB approach to every level of the battlefield(fleet down to component),with expected improvements in terms of:

    Fig.3.Graphic illustration of the modelling approach.

    1)Abstraction range,from the component survivability level up to the system of system survivability.

    2)Arbitraryandappropriate level of fidelity from acommon approach.

    3)Modularity,by favouring the development of ready-touse threats,components and platforms libraries.

    Agent properties describe critical(in terms of the simulation) dimensions of its existence.For example,at a given instant a fragment agent is described by its position,mass and velocity.

    Internally the agents implement appropriate empirical and semi-empirical methods to describe their behaviour and interaction with other agents.Four types of agents are used to represent the problem(Fig.4):

    1)An IED agent models the threat and the characteristics of the fragments that are generated by the explosion.

    2)Fragment agents model all the fragments.Some of them are going to impact the target.

    3)Component agents represent the platform components, with geometric and material characteristics attached.

    4)Collision agents are used to detect the position and the angle of incidences of fragment impacts on the platform components.

    3.1.1.IED agent model

    Upon detonation the IED generates a number of Fragment agents with initial parameters that depend on the IED characteristics.For fragmentation,Mott’s formula(1)generates the average fragment mass,considering the explosive and case parameters,leading to consider a certain number of fragments. Held’s formula(2)provides prediction of the distribution of fragments size and mass,while Gurney’s formula(3)predicts the initial velocity of fragments.

    Fig.4.The way the 4 types of agents interact in the model.

    n:Fragments number,beginning with the heaviest.

    B:Empirical constant(≈10-2),function of

    λ:Empirical constant(≈2/3)

    M:IED body mass(kg)

    3.1.2.Fragment agent model

    Fragment agents emanate radially from the IED agent and follow straight trajectories(gravity can be neglected for lowmass/high-speed fragments).Fragment agent velocity is calculated from an initial velocity and transmission medium (typically air)using the drag force equation(4).

    ρfragment shape,1.5 for cubic shape) :Air density(≈1.2 kg/m3)

    l:Fragment distance to explosion(m)

    Real experiments[18]have shown that initial velocity is slightly different according to the fragment initial position (Fig.5)and projection angle(Fig.6)because of the common cylindrical shape of the IED casing,which would not be the case for an ideal semi-spherical casing.But the consideration of individual fragment initial position makes the equations much more complex without significant benefits in terms of fidelity of the prediction.For simplification reasons,this phenomenon is not consideredinthe current research.So,the fragment velocity is considered as uniform inside the solid angle of influence of the IED(Fig.6).

    In the event of collision with a Collision agent,the Fragment agent transmits some of its energy to the Collision agent impactedandadaptsitsvelocityandmassaccordingtotheresult ofthecollision computation,considering fourpossible situations described in Table 5 and two fragment velocity thresholds:

    Fig.5.Variation of fragment initial velocity as a function of its initial position for a 105 mm shell IED[18]and simplification considered in the current research(blue plot).

    1)The ballistic limit velocity,under which the projectile does not perforate the target,

    2)The shattering limit velocity,over which the target shatters into multiple Behind Armour Debris.

    The ballistic limit velocity is approximated using the Brown equation(5)from Ref.[2]while the shattering limit velocity (Table 6)is based on experimental results related in Refs.[20] and[21].

    h:Target thickness(cm)

    m:Fragment mass(grams)

    θ:Angle of impact(rad)

    γ:Empirical constant(0.327 for RHA steel,-0.361 for Aluminium 2024)

    Eventhoughthesefoursimplecasesgloballyreflectthedifferent mechanismsobservedduringprojectilepenetration[2],theydonot consider more complex phenomena(e.g.projectile erosion).

    As mentioned in chapter 3,deposited energy is the criterion used to estimate the damage to individual components.This iscalculated by considering the different distributions of the projectile kinetic energy detailed in Table 8.

    Fig.6.Example of fragment velocity versus projection angle for 105 mm and 155 mm shell IEDs[19]and estimation considered in the current research(blue plot).

    Table 5 The 4 impact situations considered.

    Table 6 Shattering limit velocities according to different sources.

    Table 7 Empirical constants of the target material[2].

    In case of target material shattering(Fig.7),the number of generated BADs is estimated on the base of experimental data [22]approximated by the empirical formula(6),assuming that the BADs are all the same mass.

    Table 8 Distribution of the projectile kinetic energy versus different impact situations.

    Fig.7.Model of the BAD generation process.

    Finally,BADs spray is characterized by a maximal angle calculated in equation(7).Individual BAD velocity is calculated with equation(8)with angular deviation following a Weibull distribution,according to Ref.[20](Fig.8).

    C:Stress wave speed in target(m.s-1,4.61.103for steel)

    Fig.8.Direction of the BAD spray.

    θ:Angle of debris with the normal(rad)

    3.1.3.Component agent model

    As a compromise between complex computation and the targeted level of fidelity,components’geometries are bounded with Axis-Aligned Bounding Boxes(cuboids).For cylindrical and complex-shaped components like wheels or pipes,this approximation leads to slightly overestimate the probability of a hit,which is not the case for other platform components,most often cuboid.Components are also assumed to be hollow in order to support typical platform nested components configurations(Fig.9).Hardness and thickness parameters are attached to every component to calculate the fragment impact situation as developed in chapter 3.1.2).

    3.1.4.Collision agent model

    Collisions between fragments and components are usually detected using ray-tracing techniques[7,23].In order to maintain the agent modelling approach of encapsulating functionality and subsequent problem scalability,our approach uses Collision agents which are generated at the surface of component agents to detect impacts through efficient agent 3D proximity algorithms.This approach allows the collision detection resolution,and consequently the range of the combat utility prediction,to be controlled by the number and size of collision agents without changing the methodology(Fig.10).

    Fig.9.Example of nested components configuration.

    Fig.10.Different Collision agents(transparent boxes)according to the level of survivability analysis.

    3.2.Fault-Tree analysis

    We use the Fault-Tree diagram formalism presented in chapter 0 to model the system-under-study architecture(whatever level it is)and the way components contribute to every capability of the system.The Top Event(TE)of the Fault Tree diagram is the system mission failure,meaning the total loss of the platform combat utility.Basic Events(BA)are represented by the physical components of the system,using the same breakdown developed in the agent-based model of the system. So,there is direct correspondence between the Component agents in the AB model and the Basic Events used in the FTA, as illustrated in Fig.11.

    Probabilities individual component kills generated by the AB model are used as failure rates for the Basic Events.During the simulation and fragments impacts,failure rates are updated and propagated through the system capabilities up to the top of the Fault-Tree.Note that only static Fault-Tree mechanisms have been implemented at this stage and so-doing sequential relationships among component failures or components recovery modes are not possible.Implementation of Dynamic Fault Tree description has been identified as a possible future development of the method.

    4.Validation

    While basic information regarding principles and technologies developed to improve system survivability can be found in open literature,defence system vulnerability information and particularly experimental results remain highly restricted, significantly complicating the validation of modelling and simulation approaches.The approach used here is to partly validate the models with piecemeal information available on components vulnerability,and to compare the results obtained at the component level with other available simulation results.

    For individual component vulnerability assessment,various simulation runs of this model with varying projectile-threat configurations have been conducted and analysed in Ref.[24]. Fig.12 shows an example of such a configuration and results obtained(angular dispersion of BADs).

    A set of platform configurations has been tested for vulnerability in Ref.[24],with positive results.Fig.13 is an example of results obtained when exposing a simple platform to IED fragments.Energy absorbed predictions match with the type of damage reported in after-action feedbacks[1]and other modelling methods[16].

    Fig.11.Example of system breakdown into Component agents(left)and FTA basic events(right).Only the observation sub-system capability branch is developed here.

    Fig.12.Example of individual components configuration tested in[24]and results obtained(angular dispersion of BADs)compared to the reality.

    Validation is confirmed as the predicted energy accumulated by individual components was comparable to those observed in real world experiments,proving appropriate implementation of the equations.Further validation requires that the high sensitivity of the results to slight changes in the target parameters, especially the shatter limit velocity of which estimation is further investigated.

    On the basis of these preliminary conclusions,further investigations on more complex platform configurations were conducted.

    5.Implementation and results

    The modelling approach is implemented in Anylogic software and is applied to the assessment of the influence of platform architecture modularity on mission survivability.

    Initially,three different architecture concepts were defined, on the basis of an original approach of platform modularity (chapter 5.1).The FaultTreeAnalysis of these architectures led to preliminary conclusions about their respective intrinsic vulnerability(chapters 5.2.5,5.3.5 and 5.4.5).

    Fig.13.Example of platform configuration tested in[24]and results obtained.Dashed lines represent the critical absorbed energy levels leading to light damages, from Tables 2 and 3.

    The architecture options were modelled using the approach presented and were exposed to a HE105 M1 shell IED threat. Predictions of combat utility resulting from numerous runs were compared and analysed(chapter 5.5).

    5.1.Platform modularity

    A platform architecture intended for reconnaissance mission (no offensive capabilities)is described in terms of three axes:

    1)The mechanical architecture,of which roles are:

    -To insure the contact of the platform with the ground, providing suspension,power transmission,braking and steering capabilities.

    -To provide the mechanical mountings for every platform component.

    -To protect the platform inner components and crew from external aggression.

    2)The energy(or power)architecture,of which roles are:

    -To generate the necessary electric energy for powering the platform components.

    -To distribute the electric energy in the platform.

    -To transform the electric energy into the mechanical energy required for motion.

    3)The C4I(or vetronic)architecture,of which roles are:

    -To support the data communications between the UGV and its remote command and control station(e.g. HF radio transmitter).

    -To acquire all the information required by the remote operation(e.g.driving camera)and by the mission(e.g.tactical awareness camera mounted on a turret).

    -To process the information on-board to facilitate its transmission or its interpretation by the distant UGV operator(e.g.video compression software running on an embedded computer).

    -To support the exchange of data between the platform components(e.g.CAN utility data bus).

    A module is defined as a component of a larger system that operates within this system independently from the operations of the other components.Modularity is a set of properties that support that independence of operations[25].

    We make the assumption that an architecture design is purely modular or purely monolithic,whereas in reality a more graduated degree of modularity is likely.

    This leads to the definition of 23=8 possible designs described in Table 9.Three architectures were selected for further survivability investigations,as the most representative of current design options for military land platforms:

    1)The “monolithic”platform isthemostcommon architecture in low-range land systems:functions are supported by unique and dedicated components that cannot reconfigure.Some components support multiple functions.

    2)The“digitalised”platform represents the current trend in land systems architectures.Digitalnetworking of components and intelligent power management allow implementing redundancy mechanisms to improve the system availability.

    Fig.14.Illustration of monolithic mechanical architecture with example of existing implementation(Amstaff UGV-Isra?l).

    3)The“extreme modular”platform is an illustration of a possible future modular platform,made of identical modules that can re-arrange autonomously.

    5.2.“Monolithic”platform concept

    Most of the legacy low-range civil and military vehicles are based on this design concept.It is also a usual type of design for disposable UGVs as it is reliable and relatively not expensive to produce(Fig.14).

    5.2.1.Mechanical architecture

    The chassis is a solid case mostly made of rigidly assembled parts.Optional parts such as the observation turret can be temporarily mounted.In the implementation(Fig.14),the contact with ground is insured by a 2×3 wheel and rubber tyre configuration.It is assumed that a damaged wheel is ripped off the platform and does not hamper the remaining wheels. Change of direction is affected by skid-steering.Steering is therefore reliant upon two operational wheel trains.

    5.2.2.Power architecture

    Propulsion energy is provided by a single battery that supplies the motors via a dual Motor Controller Unit(MCU).This unit receives commands from the ECU via an I2C data link. Two mechanical transmissions transmit motor torque to the left and right side drive wheels.Another battery is used to supply the C4I equipment(Fig.15).

    5.2.3.C4I architecture

    A radio receiver unit receives control signals and in turn sends command frames to the ECU.The ECU checks the integrity of the frames and generates commands to be sent to the appropriate equipment through dedicated point-to-point links. Analogue images are acquired by the 2 cameras and compressed by the ECU before being sent to the radio.Additional sensor data(compass,GPS,battery charge)are formatted bythe ECU and transmitted to the radio for communication to the remote control station(Fig.16).

    Fig.15.Illustration of the monolithic power architecture design.

    Table 9 The same platform with various modularity considered.Architectures investigated are shaded in grey.

    5.2.4.Damage assessment Agent-Based model

    As explained in chapter 3.1.3,platform components agents geometries are modelled as cuboids.These cuboids are positioned in the 3D model according to their position in the platform as shown in Fig.17.Agent parameters are set according to the different materials and thicknesses of components cases. Components colours refer to the mechanical(grey),power(red) and C4I architectures(blue)they belong to.

    5.2.5.Combat utility Fault-Tree model

    Fig.16.Illustration of a monolithic C4I architecture design.

    Fig.17.Geometry and position of Component agents in the damage assessment model of the monolithic platform.

    The least desirable event(Top Event)is the platform mission withdrawal,which can result from mobility(propulsion/ steering),observation or communication function failures as shown in Fig.18.These intermediate events have been refined down to the component level as explained in chapter 3.2.

    Once the fault tree diagram of the system has been defined, minimal cut sets can be used to understand the structural vulnerability of the system.Cut sets are defined as the unique combinations of component failures that can cause the topevent to occur.Specifically,a cut set is said to be a Minimal Cut Set(MCS)when any basic event is removed from the set,the remaining events are no longer a cut set.The minimal cut sets can be seen as“critical paths”leading to the mission failure. The order of the cut set is the length of the path that leads to the undesirable event.So,the order of the MCS reflects the vulnerability of the whole system.

    The results of the calculation of the MCS for the“Monolithic”architecture are summarised in Table 10.An important observation is that 8 single different components failures(cut sets of order 1)lead to mission failure,which makes the monolithic architecture intrinsically vulnerable to any damage to its components.

    5.3.“Digitalised”platform concept

    The second design modelled is named“Digitalised Platform”.Many current AFVs in development are based on this architecture,and a lotofeffortis focussed on the standardisation of the mechanical,power and vetronics interfaces(NGVA,Victory[26])with expected benefits in terms of development,operation,maintenance and upgrade costs.

    5.3.1.Mechanical architecture

    The chassis is not fundamentally different from the monolithic mechanical architecture.The only difference is the con-sequence of the higher number of inner components that significantly increases the volume of the body,offering a larger apparent surface to fragments.

    Table 10 Minimal cut sets for the monolithic architecture platform.

    5.3.2.Power architecture

    Two energy sources deliver electric energy required by the platform components.The energy is produced and stored on-board by micro-generators combined with batteries or fuel cells.Power redundancy is provided through dual power circuits,providing a dual redundant supply for all equipment. Power management for improved silent watch and intelligent power balance can be realised by a dedicated computer(Energy Management Unit)and monitoring capability in all electrical consumers.Wheels are direct-driven by individual electric motors which are controlled by individual control devices (Fig.19).

    5.3.3.C4I architecture

    The electronic architecture of the digitalised platform is organised around 2 communications buses.The utility bus is dedicated to the platform command and control while the multimedia bus is dedicated to video data communications.Possible technologies for the utility bus are CAN and MilCAN standards,while multimedia communications can be supported by Gigabit Ethernet technology(Fig.20).

    Fig.18.Possible causes of the platform mission withdrawal(first level of the FT only).

    Fig.19.Illustration of the digitalised power architecture design.

    In a normal mode,control and command information is received from the HF radio and transmitted to ECU1 and ECU2 through the utility bus.ECU1 and ECU2 operate in a parallel redundancy mode.Command frames are decoded,integrity is checked and appropriate data frames are sent to the motor controllers to affect mobility according to command laws and sensors feedback.The 2 digital cameras transmit compressed video frames on the multimedia data bus to the ECUs and the VHF radio transmitter(wireless video link).

    If the HF radio transmitter gets damaged,control and command frames can still be sent through theVHF radio transmitter.If the VHF radio transmitter is damaged,low-data-rate pictures can be sent after compression by the ECUs to the remote station via the HF radio transmitter.

    5.3.4.Damage assessment Agent-Based model

    The assumption is made that the motor controllers are mounted next to the motors they control.The space between each pair of motors is used to install the computer units and the batteries.The individual equipment size is the same as for the monolithic architecture(Fig.21).

    5.3.5.Combat utility Fault-Tree model

    The minimal cut sets(MCS)analysis yields the events described in Table 11.The minimal cut sets order has been set to 2 to limit the size of the table.The results provide the following insights:

    1)There is only one MCS event of order 1(EMU damaged), making the EMU component very critical in the digitalised architecture.

    2)The criticality of the mechanical components(no MCS≤2) has been transferred to the vetronic architecture.

    3)Digital utility and multimedia networking support redundancies between vetronic components(MCS=2).

    Table 11 Minimal cut sets(limited to order 2)for the digitalised architecture platform.

    5.4.“Extreme modular”platform concept

    This“extreme modular”platform architecture is made of several modules that each provide a set common critical capabilities.This means that they are able to re-arrange themselves depending on the mission to realize and according to their current operational status.Specialised sensors and actuators can be mounted on the modules through a generic interface. This is a futuristic architecture as the required technologies are not all available yet.Some partial implementations exist (Fig.22).

    5.4.1.Mechanical architecture

    The platform chassis is made of identical modules that mount together with quick link interfaces.These modules can be arranged before the mission according to different configurations,or they can replace each other dynamically in case of module failure.Links between modules can be rigid or flexible, acting as articulations or dampers.

    5.4.2.Power architecture

    Each module is able to provide its own energy as well as energy to adjacent modules if required regardless of module organisation.Power transmission between the modules is insured by dedicated power plugs of different sides of the module.

    5.4.3.C4I architecture

    All modules communicate via redundant data networks. Connections with sensors and actuators mounted on modules are insured by multiple pins connectors.In case of connector damage,information and power are transmitted by remaining operational sockets(Fig.23).

    Fig.20.Illustration of a digitalised C4I architecture design.

    Fig.21.Geometry and position of Component agents in the damage assessment model of the digitalised platform.

    5.4.4.Damage assessment Agent-Based model

    To be able to compare the survivability of the three architectures,equipment size must remain the same,as well as the platform dimensions.Battery size is divided by the number of modules to still have the same UGV range.A drawback of the modularity is the multiplication of components and a particular effort has to be put on the integration of these components into the modules as shown in Fig.24.

    5.4.5.Combat utility Fault-Tree model

    Fig.22.Illustration of“extreme modular”architecture and example of existing implementation(Roburoc UGV from Robosoft,France).

    Fig.23.Illustration of the“extreme modular”C4I and power architecture design.

    Fig.24.Geometry and position of Component agents in the damage assessment model of the“extreme modular”platform.

    In the“extreme modular”architecture fault tree decomposition,we assume that the mechanical modules have been configured before the mission and they cannot reconfigure in response to damage.This ignores a substantial expected benefit from this“extreme”modular architecture and highlights a limitation of the static fault-tree analysis approach that does not support sequential relationships among component failures. Consequently,some additional assumptions had to be introduced to simulate the re-configurability of the architecture:

    1)Two batteries are enough to supply the rest of the architecture in energy in recovery mode,so that the mission can still be completed,

    2)A minimum of three wheels are necessary to preserve mobility.We make the assumption that the modules can reconfigure if the undamaged wheels are all on one side.

    3)Two operational modules are enough to move and steer the rest of the platform.

    4)The observation camera is mounted on the top of one of the modules while the driving video is always provided by the front module camera.

    5)One ECU and one radio can support the data processing and communications for the whole platform in a recovery mode.

    Analysis revealed no MCS of order less than four(Table 12). The modularity and reconfiguration capabilities of the platform dictate that a minimum of four components(wheels)need to be simultaneously damaged to foil the mission.

    5.5.Combat utility prediction

    The FTA of the three platform designs provides a means to compare the intrinsic vulnerability of the architectures.As expected,the“extreme modular”architecture is more resilient to individual internal components failures.

    Table 12 Total number of MCS per order for the“extreme modular”architecture.

    Fig.25.Top view of the target-threat(“extreme modular”)configuration att=to+2.6 ms.

    Considering external threats, the MCS calculated from FTA is not a sufficient reflection of the platform survivability,as FTA does not consider the platform design nor the way the platform components interact together to reinforce(BADs generation)or to mitigate(shield effect)the threat.

    In order to get a more valid estimation of their relative vulnerability to IEDs,we applied the combat utility assessment approach described in chapter 3 to the three platform concepts described in chapters 5.2,5.3 and 5.4.They were exposed to the same representative IED threat(HE 105 M1 IED)in the configuration of Fig.25.Fig.26 is a 3D view of the IED fragments impacting the platform.

    For each platform concept,a set of 50 simulation runs (Monte-Carlo analysis)with the same target and threat configuration and fragment Weibullangulardistribution resulted in the individual components kill probabilities presented in Figs.27–29.Error brackets correspond to the standard deviation for each probability of kill.

    We can observe that:

    1)The most impacted parts are the left wheels and the motors driver modules(~50%of kill probability),as they are the most exposed to fragments.

    2)Predictions of the wheels kill probabilities do not vary in the three platform concepts,as the same components are used.

    The real-time injection of these individual probabilities of kill in every architecture fault-tree(see Fig.30)provides additional results regarding the robustness of the architectures to individual components failures.

    Fig.31 synthesizes the capabilities and combat utility predictions for the three concepts under study.

    It can be observed that:

    1)The“extreme modular”architecture is three times less vulnerable to the IED fragments than the“monolithic”architecture in terms of damage causing mission failure, highlighting the potential of modular architecture design for survivability.

    2)The mobility capability is the most sensitive to the IED fragments for all architecture concepts,indicating thatparticular effortshould be placed on the design of this function,in this particular IED-threat configuration

    Fig.26.Example of 3D view of the IED fragments impacts on the“monolithic”architecture at t=to+11.5 ms.Penetrating collisions are coloured in red,BAD impacts are coloured in orange.

    Fig.27.Probabilities of the“monolithic”architecture components for being killed by IED fragments.

    6.Conclusion and future work

    IEDs will remain one of the most lethal threats to future land engagements while existing defensive aids are not sufficient enough to fully protect the vehicle,crew and equipment.Meanwhile,the optimisation of the internal platform design remains a critical factor in limiting the impact of IEDs effects on the platform combat utility.

    The modelling and simulation approach described in this paper first aims to predict the damage caused by primary and secondary fragments impacts on internal platform components.

    ThisAgent-Based method has been validated on elementary plates by comparison with existing experimental results or other simulation techniques predictions.

    In a second step and as a demonstration,the approach was applied to the comparison of combat utility of three representative types of platform designs,by injecting component damage into the fault-tree diagrams of the architectures.

    Fig.28.Probabilities of the“digitalized”architecture components for being killed by IED fragments.

    Fig.29.Probabilities of the“extreme modular”architecture components for being killed by IED fragments.

    Fig.30.Animated Fault-Tree diagram for the“monolithic”architecture focused on probabilities of right and left propulsion failures.Other functions are masked for clarity.

    Fig.31.Prediction of capability and combat utility failure probabilities for the 3 architectures tested.

    In this case,results obtained show the benefit of modularity (threetimesmoresurvivablecomparedtothesamplemonolithic architecture)without considering dynamic reconfiguration capabilities that are expected to further increase survivability.

    This application also demonstrates the scalability,modularity and reusability of the developed approaches to vulnerability assessment.This approach enables the rapid generation of quantitative results describing platform combat utility.

    Future work will consider the thorough analysis of the vulnerability of modular platform,the modelling of IED blast effect and shockwave damage due to components mechanical interfaces as well as platform reconfiguration capabilities through Dynamic Fault-Tree implementation in the modelling environment.

    [1]Centre de Doctrine d’Emploi des Forces.La lutte contre les engins explosifs improvisés.Les cahiers du retex 2010.

    [2]Deitz PH,Reed HL,Klopcic JT,Walbert JN.Fundamentals of ground combat system ballistic vulnerability/lethality.Progress in astronautics and aeronautics.Arlington:American Institute of Aeronautics and Astronautics;2009.

    [3]Gavril F.A synthesis of methods for simulating vulnerability of armored vehicles.Naval Res Logistics 1995;42:247–65.

    [4]Kennedy E.A short report on the manual wargaming of three UGV concepts issued from previous FGMC studies,UK MOD/DSTL, Technical Report 2009.

    [5]Helfman RA,Saccenti JC,Kinsler RE,Suckling JR.An expert system for predicting component kill probabilities.Aberdeen(MD):1985.

    [6]Ackland K,Buckland M,Thorn V,Van der Schaaf P.A review of battle damageprediction and vulnerability reduction methods,DefenceScience and Technology Organisation,Victoria,Australia,Public report DSTO-GD-0620;2010.

    [7]Hou Y,Wang K,Jin T.A simulation system of ship vulnerability to fragment damage.J Inf Comput Sci 2014;11(12):4415–25.

    [8]MannJ,FisherD,KrausM,LowndesE,YorkA.Ananalysisofengagement algorithms for real-time weapons effects.JDMS 2006;3(3):189–201.

    [9]Hartmann M.Component kill criteria,Defence&Security,Systems and technology,FOI,Swedish Defence Research Agency,SE-164 90 Stockholm,FOI-R-2829-SE;2009.

    [10]Singh VP,Singh Y.Generalised model for aircraft vulnerability by different weapon systems.Def Sci J 2000;50:12–23.

    [11]Hall J.In:United States Naval Academy,editor.Principles of naval weapons systems.Dubuque(IA):Kendall/Hunt;2000.

    [12]Colwill I,Gabrovsek S,Webber T,Watts I,Duncan A,Diskett D,et al. Super-hardened unmanned ground vehicle,Vetronics Research Centre, Brighton,UK,Technical Report RT/COM/4/5008;2012.

    [13]Schofield J.Survivability assessment from concept to operational support, Qinetiq,Fife,Technical report Qinetiq/09/00063;2009.

    [14]Distefano S,Puliafito A.Dynamic reliability block diagramsVS Dynamic fault trees.In:Reliability and maintainability symposium,2007.RAMS‘07.Annual.Orlando:2007.

    [15]Lee WS,Grosh DL,Tillman FA,Lie CH.Fault tree analysis,methods, and applications–a review.IEEE Trans Reliab 1985;34(3):194–202.

    [16]Chen Y,Xiao S,Song H,Zhang Y.Agent based modelling of the equipment battle damage.J Comput 2013;8(2):334–40.

    [17]Bova MJ,Ciarallo FW,Hill RR.Development of an agent-based model for the secondary threat resulting from a ballistic impact event.J Simulat 2015;10(1):24–35.

    [18]Zecevic B,Terzic J,Catovic A,Kadic S.Characterization of distribution parameters of fragment mass and number for conventional projectiles. New Trends in Research of Energetic Materials;December 2011.

    [19]Hazell PJ.Armour materials,theory and design.New York(NY):CRC Press;2015.

    [20]Verolme JL.Behind-armour debris modelling for high-velocity fragment impact(part2),TNO,PML 1997;1997.

    [21]Rosenberg Z,Dekel E.In:Springer,editor.Terminal ballistics.Haifa, Israel:Springer;2012.

    [22]Baillargeon Y,Dinovitzer A.Modelling of behind-armour debris with the DeCaM software package,Weapons Effects Section–DRDC–Valcartier, Courcelette,Canada,Technical Report 5070C-2.FR;2004.

    [23]Roybal LG,Jeffers RF,McGillivary KE,Paul TD,Jacobson R.Modelling and simulating blast effects on electric substations.In:IEEE international conference on technologies for homeland security.Boston(MA):2009.p. 351–7.

    [24]Gabrovsek S,Colwill I,Stipidis E.Agents-Based Simulation of improvised explosive device fragment damage on individual components. JDMS 2016;13(4):399–413.

    [25]Nelson EM.Open architectures technical principles and guidelines V1.5.8,IBM Federal CTO Office,Technical Report 2008.

    [26]Hee YS,Phoon KK,Ang JY.Interoperable open architecture for land platforms.DSTA 2013.

    Received 26 June 2016;revised 23 September 2016;accepted 10 October 2016 Available online 24 October 2016

    Peer review under responsibility of China Ordnance Society.

    *Corresponding author.Tel.:+33687146672.

    E-mail address:s.gabrovsek@vetronics.org(S.GABROVSEK).

    1There is a close mapping between the V/L taxonomy levels and the more complex Missions and Means Framework(MMF)extensively used in military operations research analysis.

    http://dx.doi.org/10.1016/j.dt.2016.10.002

    2214-9147/?2016 The Authors.Production and hosting by Elsevier B.V.on behalf of China Ordnance Society.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/).

    ?2016 The Authors.Production and hosting by Elsevier B.V.on behalf of China Ordnance Society.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/).

    午夜福利网站1000一区二区三区| 国产精品1区2区在线观看.| 丝瓜视频免费看黄片| 亚洲精品中文字幕在线视频 | 日韩欧美精品v在线| 男人舔奶头视频| 国产亚洲5aaaaa淫片| 日韩欧美精品v在线| 少妇丰满av| 男人舔奶头视频| 自拍偷自拍亚洲精品老妇| 亚洲熟女精品中文字幕| 亚洲欧美日韩无卡精品| 久久热精品热| 日韩av在线免费看完整版不卡| 在线播放无遮挡| 成人美女网站在线观看视频| 国产色爽女视频免费观看| 啦啦啦韩国在线观看视频| 国产欧美日韩精品一区二区| 啦啦啦韩国在线观看视频| 亚洲国产日韩欧美精品在线观看| av专区在线播放| 久久亚洲国产成人精品v| 天堂av国产一区二区熟女人妻| 黄色欧美视频在线观看| 中文字幕久久专区| 久久精品熟女亚洲av麻豆精品 | 你懂的网址亚洲精品在线观看| 肉色欧美久久久久久久蜜桃 | 岛国毛片在线播放| 成人亚洲精品一区在线观看 | 男女边吃奶边做爰视频| 国产精品久久久久久精品电影| 亚洲av成人精品一二三区| 少妇被粗大猛烈的视频| 国产精品无大码| 久久99精品国语久久久| 我的老师免费观看完整版| 日韩av不卡免费在线播放| 午夜福利在线在线| 在线观看av片永久免费下载| h日本视频在线播放| 女人久久www免费人成看片| 看免费成人av毛片| 看十八女毛片水多多多| 免费av不卡在线播放| 一区二区三区高清视频在线| 亚洲精品自拍成人| 国产精品福利在线免费观看| 久久精品国产自在天天线| 男女下面进入的视频免费午夜| 精品久久久久久久久亚洲| 男人舔奶头视频| 免费观看a级毛片全部| 日韩中字成人| 久久精品夜夜夜夜夜久久蜜豆| 久久这里只有精品中国| 久久这里只有精品中国| 免费不卡的大黄色大毛片视频在线观看 | 国产爱豆传媒在线观看| 人妻少妇偷人精品九色| 精品久久久久久久久av| 亚洲精品国产成人久久av| 欧美成人一区二区免费高清观看| 国产精品久久视频播放| 国产精品熟女久久久久浪| 亚洲人与动物交配视频| 国产精品国产三级国产专区5o| 中文字幕制服av| 精品99又大又爽又粗少妇毛片| 中文在线观看免费www的网站| 国产日韩欧美在线精品| 国产精品人妻久久久久久| 看免费成人av毛片| 国产精品一区二区在线观看99 | 国产成人精品婷婷| 青春草亚洲视频在线观看| 免费观看无遮挡的男女| 成人性生交大片免费视频hd| 免费黄色在线免费观看| 国产精品久久久久久久久免| 免费黄频网站在线观看国产| 99久久精品一区二区三区| 联通29元200g的流量卡| 久久久精品免费免费高清| 亚洲精华国产精华液的使用体验| 午夜视频国产福利| 免费看光身美女| 国产白丝娇喘喷水9色精品| 欧美最新免费一区二区三区| 寂寞人妻少妇视频99o| 婷婷色综合大香蕉| 我的女老师完整版在线观看| 精品久久国产蜜桃| 日本av手机在线免费观看| 最后的刺客免费高清国语| 国产片特级美女逼逼视频| 亚洲国产精品成人久久小说| 中文字幕亚洲精品专区| av线在线观看网站| 一级爰片在线观看| av在线亚洲专区| 永久网站在线| 91aial.com中文字幕在线观看| 亚洲一级一片aⅴ在线观看| 麻豆国产97在线/欧美| 成人无遮挡网站| 久久国内精品自在自线图片| 亚洲人与动物交配视频| 欧美高清性xxxxhd video| 欧美97在线视频| 可以在线观看毛片的网站| 色综合色国产| 午夜福利高清视频| 人人妻人人澡欧美一区二区| 日韩大片免费观看网站| 听说在线观看完整版免费高清| 午夜福利视频精品| 亚洲欧美一区二区三区国产| 中文字幕制服av| 欧美潮喷喷水| 99re6热这里在线精品视频| 国产毛片a区久久久久| 亚洲第一区二区三区不卡| 国产爱豆传媒在线观看| 亚洲欧洲国产日韩| 亚洲精品国产成人久久av| 国模一区二区三区四区视频| 青春草国产在线视频| av黄色大香蕉| 成人一区二区视频在线观看| 久久久久国产网址| 大陆偷拍与自拍| 麻豆久久精品国产亚洲av| 黄片wwwwww| 国产成人精品婷婷| 青青草视频在线视频观看| 插阴视频在线观看视频| 久久久久性生活片| 久久精品国产鲁丝片午夜精品| 精品久久久久久久人妻蜜臀av| 三级男女做爰猛烈吃奶摸视频| 午夜日本视频在线| eeuss影院久久| 有码 亚洲区| 精品久久久久久久末码| 人妻系列 视频| 尤物成人国产欧美一区二区三区| 赤兔流量卡办理| 人体艺术视频欧美日本| 国产 一区精品| 国产一区亚洲一区在线观看| 日本免费a在线| 亚洲精品日本国产第一区| 亚洲国产成人一精品久久久| 国产激情偷乱视频一区二区| 三级经典国产精品| freevideosex欧美| 美女黄网站色视频| 一个人免费在线观看电影| 插阴视频在线观看视频| 午夜精品国产一区二区电影 | 成人av在线播放网站| 蜜桃久久精品国产亚洲av| 亚洲国产日韩欧美精品在线观看| 国产精品一区二区在线观看99 | 久久久精品欧美日韩精品| 能在线免费看毛片的网站| 久久精品久久久久久久性| 99久久人妻综合| 亚洲,欧美,日韩| 久久精品人妻少妇| 亚洲一级一片aⅴ在线观看| 日本爱情动作片www.在线观看| 老司机影院成人| 久久久久久久久久久丰满| 亚洲无线观看免费| 国产精品综合久久久久久久免费| 久久久成人免费电影| 深爱激情五月婷婷| 亚洲高清免费不卡视频| 麻豆精品久久久久久蜜桃| 成人综合一区亚洲| 女人久久www免费人成看片| 少妇人妻一区二区三区视频| 日韩欧美三级三区| 一个人观看的视频www高清免费观看| 国产精品国产三级国产专区5o| 欧美97在线视频| 天堂中文最新版在线下载 | 熟女电影av网| 亚洲精品成人久久久久久| 我要看日韩黄色一级片| 亚洲人与动物交配视频| 男人狂女人下面高潮的视频| 国产综合懂色| 夫妻性生交免费视频一级片| 熟妇人妻久久中文字幕3abv| 中国美白少妇内射xxxbb| 高清午夜精品一区二区三区| 在线观看av片永久免费下载| 丰满人妻一区二区三区视频av| 久久99热这里只频精品6学生| 久久久久网色| 极品少妇高潮喷水抽搐| 久久久久久久久久久免费av| 亚洲激情五月婷婷啪啪| 我的女老师完整版在线观看| 一个人观看的视频www高清免费观看| 国产乱来视频区| 老师上课跳d突然被开到最大视频| 天天一区二区日本电影三级| 91午夜精品亚洲一区二区三区| 91av网一区二区| 99九九线精品视频在线观看视频| 最近的中文字幕免费完整| 国产 一区 欧美 日韩| 十八禁网站网址无遮挡 | av福利片在线观看| 亚洲精品日韩av片在线观看| 久久久精品欧美日韩精品| 熟女人妻精品中文字幕| 99热这里只有是精品50| 欧美不卡视频在线免费观看| 国产精品国产三级专区第一集| 日韩欧美三级三区| 午夜福利视频精品| 欧美日韩亚洲高清精品| 久久亚洲国产成人精品v| 边亲边吃奶的免费视频| 免费高清在线观看视频在线观看| 看非洲黑人一级黄片| 亚州av有码| 国产成人精品婷婷| 一本一本综合久久| 丝袜喷水一区| 成年版毛片免费区| 哪个播放器可以免费观看大片| 欧美一区二区亚洲| 51国产日韩欧美| 成人午夜精彩视频在线观看| 精品一区二区三区人妻视频| 日本午夜av视频| 免费观看性生交大片5| 婷婷色av中文字幕| 久久久久久久久久成人| 中文字幕av成人在线电影| 国产一区亚洲一区在线观看| 国产亚洲精品久久久com| 亚洲av电影不卡..在线观看| 三级经典国产精品| 亚洲国产精品专区欧美| 一区二区三区四区激情视频| 欧美xxxx黑人xx丫x性爽| 婷婷色av中文字幕| 色5月婷婷丁香| 97人妻精品一区二区三区麻豆| 亚洲欧美日韩卡通动漫| 欧美日韩亚洲高清精品| 黄色配什么色好看| 国产 一区精品| 校园人妻丝袜中文字幕| 能在线免费观看的黄片| 久久这里有精品视频免费| 欧美xxⅹ黑人| 美女黄网站色视频| 2021少妇久久久久久久久久久| 亚洲人成网站高清观看| 精品熟女少妇av免费看| 我的女老师完整版在线观看| 禁无遮挡网站| 欧美成人午夜免费资源| 白带黄色成豆腐渣| 五月伊人婷婷丁香| 最近中文字幕高清免费大全6| 水蜜桃什么品种好| 中国国产av一级| 久久精品夜色国产| 亚洲丝袜综合中文字幕| 日韩一本色道免费dvd| 久久久久久伊人网av| 国产免费视频播放在线视频 | 中文字幕av成人在线电影| 国产成人福利小说| 国产精品嫩草影院av在线观看| 中文字幕久久专区| 日本黄大片高清| 亚洲18禁久久av| 久久国内精品自在自线图片| 青春草视频在线免费观看| 2021天堂中文幕一二区在线观| 亚洲av成人精品一二三区| 18禁在线无遮挡免费观看视频| 超碰97精品在线观看| 尾随美女入室| 日韩欧美精品v在线| 日日摸夜夜添夜夜爱| 色尼玛亚洲综合影院| 夫妻性生交免费视频一级片| 高清日韩中文字幕在线| 在现免费观看毛片| 欧美3d第一页| 色综合色国产| 婷婷六月久久综合丁香| 能在线免费看毛片的网站| 夜夜爽夜夜爽视频| 国产女主播在线喷水免费视频网站 | 精华霜和精华液先用哪个| 色综合站精品国产| 99热全是精品| 看免费成人av毛片| 九九久久精品国产亚洲av麻豆| 99久国产av精品国产电影| 真实男女啪啪啪动态图| 日韩精品青青久久久久久| 超碰av人人做人人爽久久| 国产精品伦人一区二区| 人妻制服诱惑在线中文字幕| 欧美日韩精品成人综合77777| 国产黄色小视频在线观看| 亚洲av电影不卡..在线观看| 大陆偷拍与自拍| 有码 亚洲区| 日韩一区二区三区影片| 精品少妇黑人巨大在线播放| 美女大奶头视频| 一级毛片久久久久久久久女| 亚洲精品中文字幕在线视频 | 免费少妇av软件| 国内精品美女久久久久久| 淫秽高清视频在线观看| 麻豆乱淫一区二区| 久久鲁丝午夜福利片| 免费不卡的大黄色大毛片视频在线观看 | 亚洲成人久久爱视频| 日韩电影二区| 亚洲国产精品sss在线观看| 国产av国产精品国产| 老师上课跳d突然被开到最大视频| 成人毛片a级毛片在线播放| 超碰av人人做人人爽久久| 特大巨黑吊av在线直播| 小蜜桃在线观看免费完整版高清| 亚洲精品亚洲一区二区| 亚洲精品久久午夜乱码| 又爽又黄a免费视频| 亚洲欧美精品自产自拍| 深爱激情五月婷婷| 亚洲人成网站在线播| 国产成人精品久久久久久| 久久久精品欧美日韩精品| 亚洲精品乱码久久久v下载方式| 美女脱内裤让男人舔精品视频| 亚洲av男天堂| 国产精品久久久久久精品电影小说 | 亚洲美女视频黄频| 毛片女人毛片| 尾随美女入室| 黑人高潮一二区| 99热6这里只有精品| 少妇高潮的动态图| 国产男人的电影天堂91| 在线免费观看不下载黄p国产| 免费看光身美女| 菩萨蛮人人尽说江南好唐韦庄| 免费黄色在线免费观看| 人妻一区二区av| 亚洲伊人久久精品综合| 在线免费观看不下载黄p国产| 亚洲经典国产精华液单| 高清日韩中文字幕在线| 午夜爱爱视频在线播放| 黄色一级大片看看| 国产精品人妻久久久影院| 麻豆精品久久久久久蜜桃| 免费av不卡在线播放| 免费av毛片视频| 97精品久久久久久久久久精品| 国产毛片a区久久久久| 免费不卡的大黄色大毛片视频在线观看 | 亚洲av成人精品一区久久| 国产av在哪里看| 18禁在线无遮挡免费观看视频| 成人午夜精彩视频在线观看| 看非洲黑人一级黄片| 国产淫片久久久久久久久| 亚洲在久久综合| 亚洲18禁久久av| 婷婷色av中文字幕| 天堂中文最新版在线下载 | 搡女人真爽免费视频火全软件| 免费大片18禁| 如何舔出高潮| 国内少妇人妻偷人精品xxx网站| 天美传媒精品一区二区| 日韩欧美国产在线观看| 国产精品福利在线免费观看| 插阴视频在线观看视频| 亚洲性久久影院| 亚州av有码| 国产精品伦人一区二区| 免费观看av网站的网址| 我要看日韩黄色一级片| 乱码一卡2卡4卡精品| 深夜a级毛片| 久久久久精品性色| 国产一区二区三区综合在线观看 | 大片免费播放器 马上看| 免费观看精品视频网站| 日韩中字成人| 亚洲欧美中文字幕日韩二区| 国产精品1区2区在线观看.| 久久久精品欧美日韩精品| 国产综合懂色| 91aial.com中文字幕在线观看| 国产精品久久久久久精品电影小说 | 一级毛片 在线播放| 欧美xxxx性猛交bbbb| 免费av不卡在线播放| 99九九线精品视频在线观看视频| 国产综合懂色| 国产爱豆传媒在线观看| 亚洲国产最新在线播放| 亚洲在久久综合| 床上黄色一级片| 亚洲久久久久久中文字幕| 亚洲欧美日韩无卡精品| 美女cb高潮喷水在线观看| 天堂av国产一区二区熟女人妻| 国产精品久久久久久精品电影| 免费看日本二区| 天堂中文最新版在线下载 | 色吧在线观看| 欧美成人精品欧美一级黄| 亚洲电影在线观看av| 久久综合国产亚洲精品| 国产高清三级在线| av在线观看视频网站免费| 成年人午夜在线观看视频 | 国产精品久久久久久精品电影| 超碰97精品在线观看| 91久久精品电影网| 18禁裸乳无遮挡免费网站照片| 深爱激情五月婷婷| 黄色配什么色好看| kizo精华| 一级毛片黄色毛片免费观看视频| 久久6这里有精品| 高清视频免费观看一区二区 | 简卡轻食公司| 国产乱人视频| 亚洲国产色片| 国内精品美女久久久久久| 插阴视频在线观看视频| 精品不卡国产一区二区三区| 卡戴珊不雅视频在线播放| 国产成人freesex在线| 国产精品女同一区二区软件| 少妇的逼水好多| 国产精品一区二区三区四区久久| 直男gayav资源| 在线观看一区二区三区| 晚上一个人看的免费电影| 亚洲精品日韩av片在线观看| 亚洲欧美中文字幕日韩二区| 最近中文字幕2019免费版| 我要看日韩黄色一级片| 高清视频免费观看一区二区 | 国产精品1区2区在线观看.| 天天躁日日操中文字幕| 人妻一区二区av| 欧美日韩视频高清一区二区三区二| 日韩电影二区| 国产 亚洲一区二区三区 | 成人无遮挡网站| 色网站视频免费| 日日干狠狠操夜夜爽| 18禁动态无遮挡网站| 亚洲欧美精品专区久久| 99热这里只有是精品在线观看| 欧美精品一区二区大全| 禁无遮挡网站| 久久久久久久久久人人人人人人| 亚洲高清免费不卡视频| 免费看光身美女| 国精品久久久久久国模美| 精品久久久久久久人妻蜜臀av| 中文精品一卡2卡3卡4更新| av在线老鸭窝| 亚洲av免费在线观看| 丰满少妇做爰视频| 成年av动漫网址| 国产三级在线视频| 高清欧美精品videossex| 在线天堂最新版资源| videossex国产| h日本视频在线播放| 国产高清有码在线观看视频| 中文字幕久久专区| 高清av免费在线| 国产成人精品一,二区| 亚洲一级一片aⅴ在线观看| 又黄又爽又刺激的免费视频.| 日韩精品有码人妻一区| 久久久久久久国产电影| 亚洲欧美日韩无卡精品| 久久99热6这里只有精品| 亚洲精品自拍成人| 国产美女午夜福利| 边亲边吃奶的免费视频| 大香蕉97超碰在线| 免费观看av网站的网址| 亚洲综合精品二区| 夜夜看夜夜爽夜夜摸| 亚洲欧美清纯卡通| 寂寞人妻少妇视频99o| 午夜精品在线福利| 免费观看av网站的网址| 高清欧美精品videossex| 成人亚洲精品一区在线观看 | 日日啪夜夜爽| 亚洲美女视频黄频| av线在线观看网站| 十八禁国产超污无遮挡网站| 草草在线视频免费看| 欧美极品一区二区三区四区| av免费观看日本| 91精品国产九色| 26uuu在线亚洲综合色| 亚洲精品乱码久久久v下载方式| 精品一区二区免费观看| 内地一区二区视频在线| 日韩精品有码人妻一区| 直男gayav资源| 日日撸夜夜添| 天堂影院成人在线观看| 精品久久久久久电影网| 直男gayav资源| 久久久久久伊人网av| 亚洲久久久久久中文字幕| 亚洲美女视频黄频| 亚洲精品乱码久久久v下载方式| www.色视频.com| 老女人水多毛片| 午夜激情久久久久久久| 青春草视频在线免费观看| 亚洲国产欧美人成| 日韩欧美一区视频在线观看 | 高清欧美精品videossex| 国产午夜福利久久久久久| 亚洲欧美清纯卡通| 亚洲av日韩在线播放| av女优亚洲男人天堂| 91久久精品电影网| 51国产日韩欧美| 国产亚洲5aaaaa淫片| 成年免费大片在线观看| 街头女战士在线观看网站| 国产亚洲一区二区精品| av播播在线观看一区| 97精品久久久久久久久久精品| 你懂的网址亚洲精品在线观看| 激情五月婷婷亚洲| 亚洲精品一二三| 观看美女的网站| 不卡视频在线观看欧美| 欧美zozozo另类| 国产白丝娇喘喷水9色精品| 国产综合精华液| 久久精品熟女亚洲av麻豆精品 | 床上黄色一级片| 非洲黑人性xxxx精品又粗又长| 网址你懂的国产日韩在线| 国产国拍精品亚洲av在线观看| 亚洲精品中文字幕在线视频 | 日本黄色片子视频| 亚洲真实伦在线观看| 女人被狂操c到高潮| 婷婷六月久久综合丁香| 日本一本二区三区精品| 国产黄a三级三级三级人| 国产伦理片在线播放av一区| 久久精品久久精品一区二区三区| 三级经典国产精品| 亚洲四区av| 天天躁夜夜躁狠狠久久av| 美女高潮的动态| 国内揄拍国产精品人妻在线| 乱码一卡2卡4卡精品| 亚洲av成人av| 午夜视频国产福利| 欧美日韩视频高清一区二区三区二| 国产午夜精品一二区理论片| 久久综合国产亚洲精品| 免费大片黄手机在线观看| 亚洲精品影视一区二区三区av| 亚洲av二区三区四区| 成人无遮挡网站| ponron亚洲| 麻豆精品久久久久久蜜桃| 少妇丰满av| 99热这里只有是精品50| av一本久久久久| 内射极品少妇av片p| 久久午夜福利片| av.在线天堂| 国产中年淑女户外野战色| 精品久久久久久久久亚洲| 中文字幕人妻熟人妻熟丝袜美| 国产黄a三级三级三级人| 男的添女的下面高潮视频| 在线观看免费高清a一片| 少妇熟女aⅴ在线视频| 日本免费a在线|