• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Metaheuristic post-optimization of the NIST repository of covering arrays

    2017-05-16 10:26:43JoseTorresJimenezArturoRodriguezCristerna

    Jose Torres-Jimenez,Arturo Rodriguez-Cristerna

    CINVESTAV-Tamaulipas,Information Technology Laboratory,Km.5.5 Carretera Cd.,Victoria,Tamaulipas,Mexico

    Original article

    Metaheuristic post-optimization of the NIST repository of covering arrays

    Jose Torres-Jimenez*,Arturo Rodriguez-Cristerna

    CINVESTAV-Tamaulipas,Information Technology Laboratory,Km.5.5 Carretera Cd.,Victoria,Tamaulipas,Mexico

    A R T I C L E I N F O

    Article history:

    Received 19 September 2016

    Accepted 25 December 2016

    Available online 16 February 2017

    Covering arrays

    Construction of Covering Arrays(CA)with minimum possible number of rows is challenging.Often the available CA have redundant combinatorial interaction that could be removed to reduce the number of rows.This paper addresses the problem of removing redundancy of CA using a metaheuristic postoptimization(MPO)approach.Our approach consists of three main components:a redundancy detector(RD);a row reducer(RR);and a missing-combinations reducer(MCR).The MCR is a metaheuristic component implemented using a simulated annealing algorithm.MPO was instantiated with 21,964 CA taken from the National Institute of Standards and Technology(NIST)repository.It is a remarkable result that this instantiation of MPO has delivered 349 new upper bounds for these CA.

    ?2017 Chongqing University of Technology.Production and hosting by Elsevier B.V.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/).

    1.Introduction

    The use of software has permeated many areas of human activity,so the reliability of software has become important worldwide.It is estimated that software testing consumes about 50%of the cost of developing a new piece of software.A 2002 NIST report [23]indicates that the cost of an inadequate infrastructure for software testing was in the range of$22.2 to$59.5 billion(US dollars).Reducing this cost is notonly important but the design and implementation of adequate software testing procedures is critical for the reliability of many electronic and mechanical systems,even more so in complex and important systems,such as space shuttles Lions and et al.[16].

    According to Myers et al.[17]functional software testing methods may be divided into two main categories:white-box testing and black-box testing.The design of white-box testing suites requires source code of the software under examination. Some testing strategies based on the white-box approach are: statement coverage,decision coverage,condition coverage, decision-condition coverage and multiple-condition coverage.The building of test suites using white-box strategies is more challenging than for black-box strategies,since white-box strategies are based on knowledge of the internal structure of the system. Furthermore,if the system is modi fied,then tests must be redesigned to satisfy the new version of the system.On the other hand, the design of black box testing suites does not require source code of the software under examination.It compares actual behaviour against expected behaviour based on the functionality and the speci fication of the software system under examination.Some black-box testing strategies are:exhaustive input testing,equivalence partitioning,boundary-value analysis,cause-effect graphing, error guessing,andcombinatorial interaction testing.

    It is easy to construct test suites using a random black-box approach,but they rarely cover a large percentage of the functionality of the system under examination.A black-box approach that covers 100 percent of the functionality is the exhaustive approach,but it is impractical in most cases because too many tests are required.As an example:if we need to design a test suite for a system that has 20 parameters and each parameter has 10 possible values,it would require 1020tests;however,using a combinatorial interaction testing approach that covers the combinations of all pairs of parameter values,the test suite will require only 155 tests. The number of tests required with combinatorial interaction testing grows logarithmically according to the number of parameters[11]. Empirical studies in software testing have shown that combinatorial interaction testing is a useful approach Kuhn et al.[14],Bell[4]. The mathematical objects that support combinatorial interactiontesting are Covering Arrays(CA)and Mixed Covering Arrays(MCA).

    CA and MCA are combinatorial structures that have been used successfully in various areas.The most reported application of CA and MCA is in the design of test suites for software combinatorial interaction testing[7,8]which is based on the concept that software faults are caused by unexpected combinatorial interactions of certain size between components.Another application is found in the field of parameter fine-tuning of metaheuristic algorithms [12,19,21,22].

    A CA,denoted by CA(N;t,k,v),is an N×k array,where every entry of the array takes values from a set of symbols of sizev,such that every N×t sub-array contains at least once all possible vtttuples of symbols.An MCA is a generalization of a CA where the alphabets of the columns could have different cardinalities.The test cases are represented by the rows,the parameters are represented by the columns,the parameter values are taken from the set {0,1…,v-1}which is called the alphabet,and t is the strength or combinatorial interaction degree between parameters covered by the CA.Fig.1 shows an example of a CA(9;2,4,3),and an MCA(6; 2,4,3123)is shown in Fig.2.

    The Covering Array Number(CAN)is the minimum N such that for fixed k,v,and t a CA exists.The CAN is denoted by CAN(t,k,v). The construction of CA with N=CAN(t,k,v)is a challenging problem whether we use mathematical structures or metaheuristic algorithms.

    When we have non-optimal CA(i.e.a CAwith N>CAN(t,k,v)),it usually has many t-tuples that are covered more than once.This fact presents the opportunity to reduce number of rows of CA,given that it may then be possible to identify redundant rows[18]that can be removed.

    In this paper we introduce a Metaheuristic Post-Optimization (MPO)approach to reduce the size of a CA by exploiting redundant elements in CA.MPO is composed of three main components: a)a redundancy detector(RD);a row reducer(RR);and a missingcombination reducer(MCR)implemented using a simulated annealing algorithm(the metaheuristic component of our approach).MPO was extensively tested using 21,964 CA(taken from the CA NIST repository).We have improved almost all 21,964 CA,but the most remarkable result is that MPO has set 349 new upper bounds for these CA.

    The remaining of the paper is structured in three sections.In section 2 we present in detail MPO approach giving details of the redundancy detector,row reducer and missing-combination reducer components.In section 3 we present the results of instantiating the MPO with the whole National Institute of Standards and Technology repository of covering arrays.Finally in section 4 we present some conclusions.

    Fig.1.Transposed matrix of a CA(9;2,4,3).

    Fig.2.Transposed matrix of an MCA(6;2,4,3123).

    2.Metaheuristic post-optimization(MPO)

    In this section we present implementation details of the MPO approach.We firstly give an overview of the whole process of MPO, secondly,we present details of each of the components RD,RR, MCR.

    2.1.Design of MPO approach

    The design and implementation of MPO approach is brie fly described in algorithm 1,where it can be observed that it has three components and two main loops.The inner loop executes the components:Redundancy Detector(RD)andRow Reducer(RR).After the inner loop is executed,theMissing-Combinations Reducer(MCR) runs.When the MCR(implemented with a simulated annealing (SA)algorithm)is not able to make the number of missing combinations equal to zero,MPO ends.

    MPO(algorithm 1)receives as input A=CA(N;t,k,v)and gives as output B=CA(N’;t,k,v)with N’≤N and no missing t-wise combinations.The functionτcomputes the number of missing twise combinations of the parameter passed to it.τhas temporal complexity(a more detailed description of how to compute the missing interactions for CA was presented by Avila-George et al.[2].

    2.2.Redundancy detector(RD)

    The goal of the Redundancy Detector(RD)algorithm is to find alarge number of redundant entries in the CA given as input.RD does its job by doing three scans of the input,the first two scans visiting all t-wise combinations of the matrix(each scan with temporal complexitythe third scan visiting all elements of the matrix,searching for rows that are totally redundant(with temporal complexityO(Nk)).The total temporal complexity is

    The purpose of the first scan is to set as‘Fixed Symbol’(FS)cells that participate in t-wise combinations covered only once,and as‘Possible Redundant Cell’(PRC)all other cells.The second scan works with cells marked as PRC and decides which cells transform to the status of FS,while making sure coverage property(all t-wise combinations must be covered at least once)is satis fied,and number of cells with status of PRC is maximized.The third scan removes all rows in which all elements have status of PRC.

    2.3.Row reducer(RR)

    The Row Reducer algorithm receives as input a CA and works in a greedy manner searching for a rowisuch that its removal minimizes missing combinations.In the worst case RR tests all rows of CA,but when a row with no missing t-wise combinations is found RR ends.If this is not the case the row removed is the one that gives the fewest number of missing t-wise combinations.

    The logic of the operation of the RR algorithm is simple:replace the FS cells of thei-th row in all PRC cells of remaining rows,and then verify number of missing t-wise combinations(after removal of rowi).RR removes the first row that minimizes missing t-wise combinations.The worst case temporal complexity of the algorithm isfor the determination of row to be removed, andO(Nk)for the removal of the row.Then the total temporal complexity of the RR algorithm is

    2.4.Missing-combinations reducer(MCR)

    The MCR component of MPO is in charge of reducing to zero the number of missing t-tuples of the input parameter(a matrix with missing combinations).We decided to implement MCR using a simulated annealing(SA)algorithm given that SA has been applied successfully for solving related problems[3,6,20,24].The core elements of the SA are:the neighbourhood functions F F;and the cooling schedule.

    We used two neighbourhood functions N F1and N F2.N F1searches for a random missing t-tuple and sets one such tuple in every row,selecting the row that gives the fewest number of missing t-wise combinations.N F2selects t cells in a row(cells and rows are selected randomly)then tests every vtpossible t-tuple in those cells,and selects combination that gives the lower number of missing t-wise combinations.SA uses a mixture of the two neighbourhood functions in such a way that N F1is applied with a probabilityprand consequently N F2is applied with a probability 1-pr.

    The cooling schedule con figuration in SA involves[1,15]:(a)an initial temperature(temp0);(b)a decreasing function to reduce the temperature value;(c)an ending temperature(tempf);and(d)a finite number of iterations of the local search at the same temperature(L)(L size of a Markov chain[5].The parameters of the cooling schedule control the behaviour of the algorithm and therefore affect drastically the quality of the final solution.We selected static geometric cooling schedule controlled by a parameterα.The parameter L is static during execution of the algorithm [3,20].Also a parameter called frozen factor(ff)was added to control number of temperature reductions without improvement towards solution,which works as an alternative termination criterion that is triggered when search stagnates.

    SA algorithm(algorithm 2)is based on de finition given by Kirkpatrick et al.[13].Parameter values were selected after a parameter fine-tuning,and they are:temp0=1;α=0.99; L=Nkv2;pr=0.5;tempf=1×10-14;andff=11.

    ?

    Table 1 Results of MPO algorithm after processing entire repository[10].Information is organized in triplets containing:average percentage reduction of rows(Υ);average time in minutes(Γ);and number of instances(I)(Continues in Table 2).

    Table 2 (Continued from Table 1)Results of MPO algorithm after processing entire repository[10].Information is organized in triplets containing:average percentage reduction of rows(Υ);average time in minutes(Γ);and number of instances(I).

    2.5.Implementation note

    The proposed algorithms were coded using C language and compiled with GCC 4.3.5 with-O3 optimization flag,and run in cores of the type AMD?8435(2.6 Ghz).

    3.Results

    To measure the effectiveness of MPO,the NIST repository of CA [10]was processed.NIST repository of CA consists of 21,964 CAwith v∈{2,…,6}andt∈{2,…,6}.For each instance we report:average percentage reduction of rows(Υ),average time in minutes(Γ),and number of instances(I).

    Tables 1 and 2 summarize the results of processing NIST repository[10].Information is organized in triplets containing:Υ,Γ, andI.It is shown that many instances were optimized,resulting in the construction of 349 state of the art upper bounds for CA by using MPO algorithm.The comparison between the MPO new upper bounds and the IPOG-F bounds is shown in Tables 3-5.Resultsare shown in Figs.3-7 where instances are grouped by combinatorial interaction coverage degree(t).

    Table 3 New best upper bounds constructed with MPO algorithm.Part 1 of 3.

    Table 3 (continued)

    Table 4 New best upper bounds constructed with MPO algorithm.Part 2 of 3.

    4.Conclusions

    In this paper we have presented a Metaheuristic Post-

    Optimization(MPO)approach to reduce the cardinality of Covering Arrays.MPO was implemented using three components:a redundancy detector,a row reducer,and a missing-combination reducer.The redundancy detector has the mission of detecting elements in CA that could be changed without affecting degree of coverage of CA.The row reducer takes advantage of redundant elements of CA to reduce number of rows.When the removal of a row produces missing combinations,then control is given to the missing-combination reducer.The missing-combination reducer is implemented with simulated annealing(the metaheuristic component of MPO)and tries to make the number of missing combinations equal to zero.Even though all three components are key to the success of MPO,we believe metaheuristic component is the most important part of MPO,given that through its use it is possible to reduce iteratively number of rows of CA.

    Table 5 New best upper bounds constructed with MPO algorithm.Part 3 of 3.

    Fig.3.Results of MPO after processing instances of repository[10]with t=2. (-Δ=N-N′).

    Fig.4.Results of MPO after processing instances of repository[10]with t=3. (-Δ=N-N′).

    Fig.5.Results of MPO after processing instances of repository[10]with t=4. (-Δ=N-N′).

    Fig.6.Results of MPO after processing instances of repository[10]with t=5. (-Δ=N-N′).

    Fig.7.Results of MPO after processing instances of repository[10]with t=6. (-Δ=N-N′).

    We have conducted big-scale experimentation through instantiation of MPO with the whole NIST repository of CA.NIST repository consists of 21,964 CA,and while improving almost all CA in repository,the most remarkable result is that we have set 349 new upper bounds for these CA.All CA are available at http://www. tamps.cinvestav.mx/~oc/.

    Disclaimer

    Any mention of commercial products in this paper is for information only;it does not imply recommendation or endorsement by NIST.

    Acknowledgements

    The authors acknowledge”Xiuhcoatl”-CGSTIC of CINVESTAV and ABACUS-CINVESTAV,CONACYT grant EDOMEX-2011-COI-165873,for providing access to high performance computing.This research was partially funded by the project:CONACyT 238469-M′etodos Exactos para Construir Covering Arrays.Part of this paper was written during first author's research stay at NIST in 2014-2015.

    [1]E.Aarts,J.Lenstra,Local Search in Combinatorial Optimization,Princeton Univ Pr,2003.ISBN:0691115222.

    [2]H.Avila-George,J.Torres-Jimenez,L.V.H.Gonzalez-Hernandez,Metaheuristic approach for constructing functional test-suites,IET Softw.7(2)(2013) 104-117.

    [3]H.Avila-George,J.Torres-Jimenez,V.Hern′andez,L.Gonzalez-Hernandez, Simulated annealing for constructing mixed covering arrays,in:Proceedings of the 9th International Symposium on Distributed Computing and Arti ficial Intelligence-DCAI.Vol.151 of Advances in Intelligent and Soft Computing. Springer Berlin/Heidelberg,Salamanca,Spain,from 28th to 30th March,2012, pp.657-664.

    [4]K.Bell,Optimizing Effectiveness and Ef ficiency of Software Testing:a Hybrid Approach.Ph.D.Thesis,North Carolina State University,2006.

    [5]D.Bertsimas,J.Tsitsiklis,Simulated annealing,Stat.Sci.8(1)(1993)10-15.

    [6]M.Cohen,C.Colbourn,A.Ling,Augmenting simulated annealing to build interaction test suites,in:Software Reliability Engineering,2003.ISSRE 2003. 14th International Symposium on,Nov.2003,pp.394-405.

    [7]M.Cohen,P.Gibbons,W.Mugridge,C.Colbourn,Constructing test suites for interaction testing,in:Proceedings of the 25th International Conference on Software Engineering.Portland,Oregon,USA,May 2003,pp.38-48.

    [8]M.B.Cohen,Designing Test Suites for Software Interaction Testing.Ph.D. Thesis,University of Auckland,2004.

    [9]M.Forbes,J.Lawrence,Y.Lei,R.Kacker,D.Kuhn,Re fining the in-parameterorder strategy for constructing covering arrays,J.Res.Natl.Inst.Stand. Technol.113(5)(2008)287-297.

    [10]M.Forbes,J.Lawrence,Y.Lei,R.Kacker,D.Kuhn,Repository of CAs.Last Access September,2014.URL,http://math.nist.gov/coveringarrays/ipof/ipofresults.html.

    [11]A.Hedayat,N.Sloane,J.Stufken,Orthogonal Arrays:Theory and Applications, Springer Verlag,1999.ISBN:0-387-98766-5.

    [12]A.Jose-Garcia,H.Romero-Monsivais,C.Hernandez-Morales,A.Rodriguez-Cristerna,I.Rivera-Islas,J.Torres-Jimenez,A simulated annealing algorithm for the problem of minimal addition chains,in:Progress in Arti ficial Intelligence.Vol.7026 of Lecture Notes in Computer Science.Springer Berlin/Heidelberg,2011,pp.311-325.

    [13]S.Kirkpatrick,C.Gelatt Jr.,M.Vecchi,Optimization by simulated annealing, science 220(4598)(1983)671-680.

    [14]D.Kuhn,D.Wallace,A.Gallo Jr.,Software fault interactions and implications for software testing,IEEE Trans.Softw.Eng.30(6)(2004)418-421.

    [15]J.Lam,An Ef ficient Simulated Annealing Schedule.Ph.D.Thesis,Yale University New Haven CT,1988.

    [16]J.Lions,et al.,Ariane 5 Flight 501 Failure,Accesed 2014-09.Tech.Rep,09 2014.http://www.di.unito.it/damiani/ariane5rep.htm.

    [17]G.Myers,C.Sandler,T.Badgett,T.Thomas,The Art of Software Testing,second ed.,John Wiley&Sons Inc,2004.ISBN:0471469122.

    [18]P.Nayeri,C.Colbourn,G.Konjevod,Randomized postoptimization of covering arrays,in:Combinatorial Algorithms.Vol.5874 of Lecture Notes in Computer Science.Springer Berlin/Heidelberg,2009,pp.408-419.

    [19]N.Rangel-Valdez,J.Torres-Jim′enez,J.Bracho-R?os,P.Quiz-Ramos,Problem and algorithm fine-tuning-a case of study using bridge club and simulated annealing,in:A.Dourado,A.C.Rosa,K.Madani(Eds.),IJCCI.IJCCI 2009-Proceedings of the International Joint Conference on Computational Intelligence, Funchal,Madeira,Portugal,October 5-7,2009,INSTICC Press,2009,pp. 302-305.

    [20]A.Rodriguez-Cristerna,J.Torres-Jimenez,A simulated annealing with variable neighborhood search approach to construct mixed covering arrays,Electron. Notes Discrete Math.39(0)(2012)249-256(eURO Mini Conference).

    [21]A.Rodriguez-Cristerna,J.Torres-Jimenez,A genetic algorithm for the problem of minimal brauer chains for large exponents,in:Soft Computing Applications in Optimization,Control,and Recognition,Springer,2013,pp.27-51.

    [22]A.Rodriguez-Cristerna,J.Torres-Jimnez,I.Rivera-Islas,C.Hernandez-Morales, H.Romero-Monsivais,A.Jose-Garcia,A mutation-selection algorithm for the problem of minimum brauer chains,in:I.Batyrshin,G.Sidorov(Eds.),Advances in Soft Computing.Vol.7095 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg,2011,pp.107-118.

    [23]G.Tassey,The Economic Impacts of Inadequate Infrastructure for Software Testing.Tech.Rep,Research Triangle Institute,National Institute of Standards and Technology,U.S.Deparment of Commerce,05 2002.

    [24]J.Torres-Jimenez,E.Rodriguez-Tello,New bounds for binary covering arrays using simulated annealing,Inf.Sci.185(1)(Feb.2012)137-152.

    *Corresponding author.

    E-mail addresses:jtj@cinvestav.mx(J.Torres-Jimenez),arodriguez@tamps. cinvestav.mx(A.Rodriguez-Cristerna).

    Peer review under responsibility of Chongqing University of Technology.

    http://dx.doi.org/10.1016/j.trit.2016.12.006

    2468-2322/?2017 Chongqing University of Technology.Production and hosting by Elsevier B.V.This is an open access article under the CC BY-NC-ND license(http:// creativecommons.org/licenses/by-nc-nd/4.0/).

    NIST repository of covering arrays

    Metaheuristic post-processing algorithms

    久久亚洲国产成人精品v| 欧美成人午夜免费资源| 亚洲国产精品成人久久小说| 亚洲精品av麻豆狂野| 国产精品一区二区在线不卡| 久久久久国产一级毛片高清牌| 午夜激情久久久久久久| 美女大奶头黄色视频| 两性夫妻黄色片| 超色免费av| 国产精品国产三级专区第一集| 可以免费在线观看a视频的电影网站 | 免费播放大片免费观看视频在线观看| 亚洲色图综合在线观看| 中文字幕亚洲精品专区| 女人久久www免费人成看片| 久久99精品国语久久久| 青春草亚洲视频在线观看| 亚洲欧美中文字幕日韩二区| 在线观看一区二区三区激情| 波野结衣二区三区在线| 国产成人91sexporn| 久久97久久精品| 国产精品99久久99久久久不卡 | 亚洲av电影在线进入| 免费人妻精品一区二区三区视频| 青春草亚洲视频在线观看| 一二三四在线观看免费中文在| 免费黄频网站在线观看国产| 一级毛片黄色毛片免费观看视频| 国产97色在线日韩免费| 中文字幕精品免费在线观看视频| 国产免费又黄又爽又色| 天堂中文最新版在线下载| 久久久久久伊人网av| 少妇猛男粗大的猛烈进出视频| 超碰97精品在线观看| 日韩欧美一区视频在线观看| 精品人妻偷拍中文字幕| 亚洲av福利一区| 春色校园在线视频观看| 精品国产一区二区三区四区第35| 免费女性裸体啪啪无遮挡网站| 色婷婷av一区二区三区视频| 夜夜骑夜夜射夜夜干| 精品亚洲乱码少妇综合久久| 最近中文字幕2019免费版| 亚洲美女视频黄频| 美国免费a级毛片| 新久久久久国产一级毛片| 亚洲经典国产精华液单| 日本vs欧美在线观看视频| 啦啦啦视频在线资源免费观看| 999精品在线视频| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 国产精品久久久久久av不卡| 三上悠亚av全集在线观看| 国产探花极品一区二区| 91国产中文字幕| 国产一区二区在线观看av| 女人被躁到高潮嗷嗷叫费观| 丰满少妇做爰视频| 中国三级夫妇交换| 97在线视频观看| 色婷婷av一区二区三区视频| 日韩中字成人| 少妇人妻久久综合中文| 亚洲欧洲国产日韩| 十分钟在线观看高清视频www| 欧美另类一区| 久久人人爽av亚洲精品天堂| 男男h啪啪无遮挡| 欧美人与性动交α欧美软件| 亚洲五月色婷婷综合| 国产欧美日韩一区二区三区在线| 国产免费又黄又爽又色| 日韩在线高清观看一区二区三区| 久久久国产精品麻豆| 你懂的网址亚洲精品在线观看| 成人国产麻豆网| 天堂8中文在线网| 亚洲欧美中文字幕日韩二区| 亚洲人成网站在线观看播放| 国产极品粉嫩免费观看在线| 亚洲成人手机| 青春草视频在线免费观看| 国产免费福利视频在线观看| 国产亚洲欧美精品永久| 国产精品99久久99久久久不卡 | 黑丝袜美女国产一区| 日本vs欧美在线观看视频| 一本久久精品| 久热这里只有精品99| 久久久久久久久久人人人人人人| 有码 亚洲区| a 毛片基地| 久久久精品免费免费高清| 1024视频免费在线观看| 久久青草综合色| 久久久久国产精品人妻一区二区| 尾随美女入室| 久久精品国产自在天天线| 久久午夜综合久久蜜桃| 熟妇人妻不卡中文字幕| 你懂的网址亚洲精品在线观看| 婷婷色综合大香蕉| 婷婷色综合大香蕉| 欧美成人午夜免费资源| 国产一区有黄有色的免费视频| 欧美亚洲日本最大视频资源| 侵犯人妻中文字幕一二三四区| 另类精品久久| 久久精品国产a三级三级三级| 国产不卡av网站在线观看| 国产精品一区二区在线观看99| 亚洲成色77777| 男女免费视频国产| 丝袜人妻中文字幕| 亚洲色图 男人天堂 中文字幕| 日韩av在线免费看完整版不卡| 26uuu在线亚洲综合色| 精品国产乱码久久久久久小说| 成人国语在线视频| 少妇猛男粗大的猛烈进出视频| 热re99久久精品国产66热6| 国产伦理片在线播放av一区| 久久久精品国产亚洲av高清涩受| 曰老女人黄片| 免费看不卡的av| 街头女战士在线观看网站| 久久青草综合色| 亚洲精品一区蜜桃| 亚洲激情五月婷婷啪啪| 一二三四中文在线观看免费高清| 日韩视频在线欧美| 最黄视频免费看| 春色校园在线视频观看| 国产精品二区激情视频| xxx大片免费视频| 777久久人妻少妇嫩草av网站| 1024香蕉在线观看| 亚洲伊人久久精品综合| 五月天丁香电影| 热99久久久久精品小说推荐| 美女国产视频在线观看| 日韩中文字幕欧美一区二区 | 十八禁高潮呻吟视频| 寂寞人妻少妇视频99o| 欧美国产精品一级二级三级| 丝袜在线中文字幕| 90打野战视频偷拍视频| 免费av中文字幕在线| 国产一级毛片在线| 亚洲国产精品一区二区三区在线| 丰满乱子伦码专区| 老熟女久久久| 国产熟女欧美一区二区| 成人漫画全彩无遮挡| 久久久久久久大尺度免费视频| 大陆偷拍与自拍| av网站在线播放免费| 少妇熟女欧美另类| 国产精品av久久久久免费| 国产成人精品婷婷| 中文字幕亚洲精品专区| 中文天堂在线官网| 99九九在线精品视频| 国产xxxxx性猛交| 欧美日韩成人在线一区二区| 午夜91福利影院| 精品视频人人做人人爽| 免费播放大片免费观看视频在线观看| 五月天丁香电影| 人妻一区二区av| 亚洲综合色惰| 婷婷色av中文字幕| 老司机影院毛片| 亚洲内射少妇av| 免费看av在线观看网站| 制服丝袜香蕉在线| 久久久久人妻精品一区果冻| 亚洲国产精品国产精品| 免费高清在线观看视频在线观看| 亚洲av免费高清在线观看| 日韩在线高清观看一区二区三区| 色婷婷av一区二区三区视频| 999精品在线视频| 国产男女超爽视频在线观看| 9色porny在线观看| 亚洲第一av免费看| 国产欧美日韩综合在线一区二区| 国产精品99久久99久久久不卡 | 五月伊人婷婷丁香| 97人妻天天添夜夜摸| 尾随美女入室| 成人国语在线视频| 女人被躁到高潮嗷嗷叫费观| 国产黄色免费在线视频| 又黄又粗又硬又大视频| 国产一区二区三区综合在线观看| 男女国产视频网站| 巨乳人妻的诱惑在线观看| 免费观看av网站的网址| 国产亚洲午夜精品一区二区久久| 亚洲美女搞黄在线观看| 一级,二级,三级黄色视频| 久久综合国产亚洲精品| 久热这里只有精品99| 欧美日韩一级在线毛片| 亚洲成人手机| 韩国精品一区二区三区| 久久av网站| 亚洲国产成人一精品久久久| 日韩熟女老妇一区二区性免费视频| av免费在线看不卡| 老司机影院成人| 热re99久久精品国产66热6| 大香蕉久久网| 日韩三级伦理在线观看| a级毛片黄视频| 国产日韩欧美亚洲二区| 老司机影院毛片| 色婷婷av一区二区三区视频| 最近中文字幕高清免费大全6| 欧美精品亚洲一区二区| 午夜免费观看性视频| 国产成人精品久久久久久| 男人操女人黄网站| 色视频在线一区二区三区| 日韩 亚洲 欧美在线| 国产野战对白在线观看| 成人亚洲欧美一区二区av| 亚洲人成电影观看| 两个人看的免费小视频| 韩国av在线不卡| 80岁老熟妇乱子伦牲交| 中文字幕人妻丝袜制服| 久久精品久久久久久噜噜老黄| 日日摸夜夜添夜夜爱| 97在线人人人人妻| 又大又黄又爽视频免费| 韩国高清视频一区二区三区| 亚洲欧美精品自产自拍| 最近中文字幕高清免费大全6| 久久精品熟女亚洲av麻豆精品| 欧美bdsm另类| 韩国高清视频一区二区三区| 男女边摸边吃奶| 国产免费一区二区三区四区乱码| 免费大片黄手机在线观看| 大码成人一级视频| 国产在线一区二区三区精| 91国产中文字幕| 成年人午夜在线观看视频| 欧美激情极品国产一区二区三区| 制服人妻中文乱码| 伊人久久国产一区二区| 永久免费av网站大全| 国产熟女午夜一区二区三区| 午夜免费男女啪啪视频观看| 午夜福利,免费看| 最新的欧美精品一区二区| 天美传媒精品一区二区| 亚洲三区欧美一区| 国产精品二区激情视频| 久久久精品国产亚洲av高清涩受| 免费在线观看视频国产中文字幕亚洲 | 日韩精品有码人妻一区| 亚洲色图综合在线观看| 极品少妇高潮喷水抽搐| 免费女性裸体啪啪无遮挡网站| 99热国产这里只有精品6| 国产日韩一区二区三区精品不卡| 一级黄片播放器| 久久亚洲国产成人精品v| 成人国产麻豆网| 亚洲国产色片| 欧美老熟妇乱子伦牲交| av免费观看日本| 精品国产国语对白av| 国产精品久久久av美女十八| 熟女av电影| 18在线观看网站| 亚洲情色 制服丝袜| 99九九在线精品视频| av线在线观看网站| 天天操日日干夜夜撸| 一级毛片 在线播放| av不卡在线播放| 男女午夜视频在线观看| 老司机影院毛片| 日韩一卡2卡3卡4卡2021年| 亚洲国产最新在线播放| 久久精品国产鲁丝片午夜精品| 99国产综合亚洲精品| 中国三级夫妇交换| 国产精品久久久久久精品电影小说| av在线老鸭窝| 1024视频免费在线观看| xxxhd国产人妻xxx| 精品一区二区三卡| 少妇的丰满在线观看| 欧美成人午夜免费资源| 国产国语露脸激情在线看| 国产精品久久久久久精品古装| 一级,二级,三级黄色视频| 免费在线观看视频国产中文字幕亚洲 | www.精华液| 精品亚洲成a人片在线观看| 99热国产这里只有精品6| 在线观看www视频免费| 最近最新中文字幕大全免费视频 | 黄色毛片三级朝国网站| 国产在线免费精品| 久久精品久久精品一区二区三区| 亚洲精品美女久久av网站| 国产精品一区二区在线不卡| 日韩在线高清观看一区二区三区| 国产亚洲最大av| 波多野结衣av一区二区av| 久久久亚洲精品成人影院| 777米奇影视久久| 日韩精品有码人妻一区| 国产精品熟女久久久久浪| 蜜桃在线观看..| 最新的欧美精品一区二区| 多毛熟女@视频| 黄网站色视频无遮挡免费观看| 亚洲男人天堂网一区| 男女边摸边吃奶| 9色porny在线观看| 日韩一区二区三区影片| 99精国产麻豆久久婷婷| 久久久精品国产亚洲av高清涩受| 久久 成人 亚洲| 午夜福利一区二区在线看| 亚洲av国产av综合av卡| 久久青草综合色| 日韩中文字幕欧美一区二区 | 一二三四中文在线观看免费高清| 99久久人妻综合| 亚洲精品美女久久av网站| 大码成人一级视频| 亚洲欧美一区二区三区国产| 亚洲av电影在线进入| 国产一区亚洲一区在线观看| 国产精品嫩草影院av在线观看| 91久久精品国产一区二区三区| 性色av一级| 欧美日韩一区二区视频在线观看视频在线| 99热网站在线观看| 黄片播放在线免费| 老司机影院成人| h视频一区二区三区| 又大又黄又爽视频免费| 99九九在线精品视频| 久久精品熟女亚洲av麻豆精品| 午夜日本视频在线| av国产久精品久网站免费入址| 丝袜喷水一区| 国产毛片在线视频| 久久久国产一区二区| 久久久久久人妻| 久久久国产精品麻豆| 中国国产av一级| 国产乱人偷精品视频| 不卡视频在线观看欧美| 国产一区亚洲一区在线观看| 久久久久久免费高清国产稀缺| 亚洲,欧美精品.| 亚洲国产av影院在线观看| 成人影院久久| 精品人妻一区二区三区麻豆| 肉色欧美久久久久久久蜜桃| 青春草亚洲视频在线观看| 1024香蕉在线观看| 天美传媒精品一区二区| 国产精品.久久久| 亚洲欧洲精品一区二区精品久久久 | 国产 精品1| 国产成人精品久久二区二区91 | 晚上一个人看的免费电影| 婷婷色综合大香蕉| 亚洲伊人色综图| 99热网站在线观看| 久久国产精品男人的天堂亚洲| 自拍欧美九色日韩亚洲蝌蚪91| videos熟女内射| 色吧在线观看| 在线观看免费视频网站a站| 欧美日韩亚洲国产一区二区在线观看 | 日产精品乱码卡一卡2卡三| 看免费成人av毛片| 中文字幕精品免费在线观看视频| 日韩精品免费视频一区二区三区| 看非洲黑人一级黄片| 亚洲欧洲精品一区二区精品久久久 | 亚洲av中文av极速乱| 久久青草综合色| 一个人免费看片子| 久久精品国产自在天天线| 久久久精品区二区三区| 欧美+日韩+精品| 丰满迷人的少妇在线观看| 少妇被粗大的猛进出69影院| 美女国产视频在线观看| 韩国高清视频一区二区三区| 欧美激情高清一区二区三区 | 国产精品国产三级国产专区5o| 亚洲,欧美精品.| 亚洲欧洲日产国产| 亚洲三级黄色毛片| 爱豆传媒免费全集在线观看| 午夜精品国产一区二区电影| 成年美女黄网站色视频大全免费| 亚洲精品国产色婷婷电影| 国产又爽黄色视频| 精品国产乱码久久久久久小说| 三级国产精品片| 国产免费福利视频在线观看| 最近中文字幕高清免费大全6| 极品少妇高潮喷水抽搐| 五月伊人婷婷丁香| 2021少妇久久久久久久久久久| 久久精品国产亚洲av涩爱| 国产精品免费大片| 免费黄频网站在线观看国产| 国产av精品麻豆| 国产av码专区亚洲av| 97在线视频观看| 亚洲国产精品国产精品| 久久久久久久久久久久大奶| 欧美日韩视频高清一区二区三区二| 伊人久久国产一区二区| 亚洲三区欧美一区| 亚洲第一区二区三区不卡| 亚洲成人手机| 深夜精品福利| 国产精品 欧美亚洲| 亚洲三级黄色毛片| 国产男女内射视频| 寂寞人妻少妇视频99o| 成人18禁高潮啪啪吃奶动态图| 精品国产一区二区三区四区第35| 国产97色在线日韩免费| 熟妇人妻不卡中文字幕| 亚洲美女黄色视频免费看| 又黄又粗又硬又大视频| 亚洲三级黄色毛片| 观看av在线不卡| 亚洲精品中文字幕在线视频| 五月开心婷婷网| 看免费av毛片| 国产成人午夜福利电影在线观看| 国产男人的电影天堂91| 精品亚洲成a人片在线观看| 国产国语露脸激情在线看| 飞空精品影院首页| 成人手机av| 不卡av一区二区三区| 美女脱内裤让男人舔精品视频| 在线观看免费高清a一片| 亚洲精品美女久久久久99蜜臀 | 久久精品熟女亚洲av麻豆精品| 亚洲精品乱久久久久久| 国产在线一区二区三区精| 日韩精品有码人妻一区| 久久久久久久大尺度免费视频| 日产精品乱码卡一卡2卡三| 最近的中文字幕免费完整| 国产成人精品久久久久久| 一本久久精品| 国产有黄有色有爽视频| 好男人视频免费观看在线| 最近最新中文字幕大全免费视频 | 国产 精品1| 日本av免费视频播放| 高清在线视频一区二区三区| 丰满乱子伦码专区| 亚洲中文av在线| 亚洲av免费高清在线观看| 国产精品国产三级专区第一集| 狠狠精品人妻久久久久久综合| 久久久久视频综合| 国产毛片在线视频| 午夜福利影视在线免费观看| 最新的欧美精品一区二区| 亚洲精品国产av蜜桃| 一本—道久久a久久精品蜜桃钙片| 欧美变态另类bdsm刘玥| 91精品伊人久久大香线蕉| 最近最新中文字幕大全免费视频 | 亚洲精品第二区| 26uuu在线亚洲综合色| 国产日韩欧美在线精品| 国产成人av激情在线播放| 国产av精品麻豆| 少妇人妻精品综合一区二区| 少妇被粗大猛烈的视频| 日韩视频在线欧美| 最近中文字幕高清免费大全6| 在线天堂最新版资源| 久久人人爽人人片av| 搡女人真爽免费视频火全软件| 国产一区有黄有色的免费视频| 成人18禁高潮啪啪吃奶动态图| 国产成人精品在线电影| 国产精品免费视频内射| 国产精品一国产av| 亚洲少妇的诱惑av| 久久午夜综合久久蜜桃| 色网站视频免费| 秋霞在线观看毛片| 国产成人91sexporn| 欧美变态另类bdsm刘玥| 午夜日韩欧美国产| 视频在线观看一区二区三区| 国产深夜福利视频在线观看| 欧美少妇被猛烈插入视频| 伦理电影大哥的女人| 久久久久精品性色| 免费观看a级毛片全部| 老女人水多毛片| 亚洲精品国产色婷婷电影| 人人妻人人澡人人爽人人夜夜| 欧美精品亚洲一区二区| 亚洲美女视频黄频| 免费看不卡的av| 99久久综合免费| 成人毛片a级毛片在线播放| 婷婷成人精品国产| 亚洲av福利一区| 国产在线视频一区二区| a级毛片黄视频| 欧美日韩一级在线毛片| 久久这里有精品视频免费| 国产1区2区3区精品| 美女大奶头黄色视频| 久久人人97超碰香蕉20202| 国产精品欧美亚洲77777| 久久久久久久久久久免费av| 少妇 在线观看| 日本vs欧美在线观看视频| 亚洲欧美成人精品一区二区| 亚洲综合精品二区| 国产一区二区三区av在线| 日本欧美视频一区| 亚洲,一卡二卡三卡| 男的添女的下面高潮视频| 成年av动漫网址| www.熟女人妻精品国产| 99精国产麻豆久久婷婷| 精品国产超薄肉色丝袜足j| 爱豆传媒免费全集在线观看| 欧美成人午夜精品| 日韩人妻精品一区2区三区| 国产欧美日韩一区二区三区在线| 午夜久久久在线观看| 亚洲成色77777| 国产日韩欧美视频二区| 国产国语露脸激情在线看| 另类亚洲欧美激情| 亚洲综合精品二区| 波多野结衣一区麻豆| 国产精品香港三级国产av潘金莲 | 两个人看的免费小视频| 成年美女黄网站色视频大全免费| 晚上一个人看的免费电影| 欧美中文综合在线视频| 国产免费现黄频在线看| 国产日韩欧美视频二区| 成年女人毛片免费观看观看9 | 久久精品国产鲁丝片午夜精品| 在线观看国产h片| 99精国产麻豆久久婷婷| 亚洲成人一二三区av| 一级片'在线观看视频| 日韩,欧美,国产一区二区三区| www日本在线高清视频| 免费观看a级毛片全部| 亚洲精品久久成人aⅴ小说| 卡戴珊不雅视频在线播放| a级毛片在线看网站| videos熟女内射| xxxhd国产人妻xxx| 久久免费观看电影| 国产乱人偷精品视频| 在线观看美女被高潮喷水网站| 天堂中文最新版在线下载| 三上悠亚av全集在线观看| 国产亚洲最大av| 黄频高清免费视频| 久久久久久久国产电影| 欧美另类一区| av.在线天堂| 在线亚洲精品国产二区图片欧美| 伦理电影免费视频| 永久网站在线| 久久久久久久国产电影| av天堂久久9| 在线看a的网站| 18禁观看日本| 国产亚洲最大av| 国产成人精品久久久久久| 伊人久久大香线蕉亚洲五| 国产视频首页在线观看| 一级毛片黄色毛片免费观看视频| 女人被躁到高潮嗷嗷叫费观| 伦理电影免费视频| 久久精品国产亚洲av高清一级| 天堂俺去俺来也www色官网| 亚洲欧洲国产日韩| 一级爰片在线观看| 国产成人91sexporn| 日本欧美视频一区|