Review Topical Sections

Review of adaptive protection methods for microgrids

  • Microgrids have gathered a significant amount of attention within the past decade and becoming an essential asset in the energy industry. The ability to integrate sustainable energy generation methods into the distribution network is one of the main reasons for microgrids popularity. A wide variety of Distributed Generation (DG) including wind and other micro-turbine generation, photovoltaic generation along with energy storage, makes the microgrid viable in both grid-connected and islanded modes while reducing the power losses. There are various technical challenges to be tackled in order to harvest the full potential of microgrids, and protection is one of them. Various solutions were introduced, driven by the development of protection techniques. One of the most promising approaches for microgrid protection is adaptive protection. This paper contains a systematic review on adaptive protection of microgrids, including a wide range of applicability variants, their strengths, and drawbacks. It also explores the state-of-the-art researches that utilize computational intelligence to achieve adaptive protection. These solutions are currently at the verge of totally redefining protection solutions with a more flexible and reliable system that will be applied globally.

    Citation: T S S Senarathna, K T M Udayanga Hemapala. Review of adaptive protection methods for microgrids[J]. AIMS Energy, 2019, 7(5): 557-578. doi: 10.3934/energy.2019.5.557

    Related Papers:

    [1] Deniz Sevinç . Volatility spillovers among MIST stock markets. Data Science in Finance and Economics, 2022, 2(2): 80-95. doi: 10.3934/DSFE.2022004
    [2] Nurun Najwa Bahari, Hafizah Bahaludin, Munira Ismail, Fatimah Abdul Razak . Network, correlation, and community structure of the financial sector of Bursa Malaysia before, during, and after COVID-19. Data Science in Finance and Economics, 2024, 4(3): 362-387. doi: 10.3934/DSFE.2024016
    [3] Moses Khumalo, Hopolang Mashele, Modisane Seitshiro . Quantification of the stock market value at risk by using FIAPARCH, HYGARCH and FIGARCH models. Data Science in Finance and Economics, 2023, 3(4): 380-400. doi: 10.3934/DSFE.2023022
    [4] Jiamin Cheng, Yuanying Jiang . How can carbon markets drive the development of renewable energy sector? Empirical evidence from China. Data Science in Finance and Economics, 2024, 4(2): 249-269. doi: 10.3934/DSFE.2024010
    [5] Kuo-Shing Chen . Interlinkages between Bitcoin, green financial assets, oil, and emerging stock markets. Data Science in Finance and Economics, 2024, 4(1): 160-187. doi: 10.3934/DSFE.2024006
    [6] Dachen Sheng, Opale Guyot . Market power, internal and external monitoring, and firm distress in the Chinese market. Data Science in Finance and Economics, 2024, 4(2): 285-308. doi: 10.3934/DSFE.2024012
    [7] Zimei Huang, Zhenghui Li . What reflects investor sentiment? Empirical evidence from China. Data Science in Finance and Economics, 2021, 1(3): 235-252. doi: 10.3934/DSFE.2021013
    [8] Katleho Makatjane, Ntebogang Moroke . Examining stylized facts and trends of FTSE/JSE TOP40: a parametric and Non-Parametric approach. Data Science in Finance and Economics, 2022, 2(3): 294-320. doi: 10.3934/DSFE.2022015
    [9] Samuel Asante Gyamerah, Collins Abaitey . Modelling and forecasting the volatility of bitcoin futures: the role of distributional assumption in GARCH models. Data Science in Finance and Economics, 2022, 2(3): 321-334. doi: 10.3934/DSFE.2022016
    [10] Nitesha Dwarika . The risk-return relationship in South Africa: tail optimization of the GARCH-M approach. Data Science in Finance and Economics, 2022, 2(4): 391-415. doi: 10.3934/DSFE.2022020
  • Microgrids have gathered a significant amount of attention within the past decade and becoming an essential asset in the energy industry. The ability to integrate sustainable energy generation methods into the distribution network is one of the main reasons for microgrids popularity. A wide variety of Distributed Generation (DG) including wind and other micro-turbine generation, photovoltaic generation along with energy storage, makes the microgrid viable in both grid-connected and islanded modes while reducing the power losses. There are various technical challenges to be tackled in order to harvest the full potential of microgrids, and protection is one of them. Various solutions were introduced, driven by the development of protection techniques. One of the most promising approaches for microgrid protection is adaptive protection. This paper contains a systematic review on adaptive protection of microgrids, including a wide range of applicability variants, their strengths, and drawbacks. It also explores the state-of-the-art researches that utilize computational intelligence to achieve adaptive protection. These solutions are currently at the verge of totally redefining protection solutions with a more flexible and reliable system that will be applied globally.


    When searching the literature, we noticed that several propositions have been made by several researchers to find kernels that can be used to obtain fractional differential operators. The main reason for this is that, real world problems show signs of processes resembling behaviors of some mathematical functions. Riemann, Liouville, Cauchy and Abel works have led to a fractional calculus with a power law kernel. Their work was later modified by Caputo; this version has been used in many fields of science because of its ability to allow classical initial conditions [1]. Prabhakar suggested a different kernel as a product of power-law and the generalized Mittag-Leffler function with three parameters. This version has also attracted the attention of many researchers, studies have been done on theory as well as on applications. Indeed, the two kernels have their specific values, for example, power-law helps only to replicate processes exhibiting power-law behavior, while the product of the power-law and the generalized three-parameters Mittag-Leffler has also its field of application [2]. As nature is complex, a new kernel was suggested by Caputo and Fabrizio, a special exponential kernel with Delta Dirac properties. A differential operator that is in fashion nowadays due to its ability to replicate processes following fading memory. Indeed, this kernel brought a new shift into fractional calculus, as the concept of the fractional derivative with a non-singular kernel was introduced [3]. A point made by some researcher about the non-fractionality of the kernel led to a new kernel, the generalized Mittag-Leffler function with one parameter. This version was suggested by Atangana and Baleanu, constituting another new step forward in the field of fractional calculus. The operators have been used in several fields of studies with great success [4]. In [5], the basic theory of fractional differentiation, existence-uniqueness theorems and analytical numerical methods of solution of fractional differential equations are presented. In [6], the authors examined Noether's theorems of fractional generalized Birkhoffian systems in terms of classical and combined Caputo derivatives. The development of the time-fractional damage model for hyperelastic body is considered in [7]. While looking at nature and its complexities, one can with no doubt conclude that these suggested kernels are not enough to predict all complex behaviors of our universe. On this note, one will proceed to search for a different kernel or modified kernel, or a class of functions that will be used to introduce new differential operators. Sabatier recently presented some variants of kernels that will also open new doors for investigation [8]. In addition to these outstanding contributions, several other ideas have been suggested, for example the concept of short memory was suggested and a fractional derivative in the Caputo sense has been defined for different values of fractional orders. The idea is to have a different type of variable-order derivative unlike the well-known version that considers a fractional orders. The idea is initiated to have a different type of variable order derivative unlike the well-known version that considers a fractional-order to be a function of time. This case was suggested by Wu et al. [9] and applied in chaos. On the other hand, researchers have noticed that several real-world problems exhibit processes with different behaviors as a function of time and space. A particular case is a passage from deterministic to stochastic, or from power law to exponential decay. It was noted that existing differential operators may not be able to account for these behaviors, thus piecewise differential and integral operators were introduced to deal with problems exhibiting crossover behaviors [10]. The main aim of this note is to provide a critical analysis of the possible applications, advantages, and disadvantages of these two concepts.

    We will illustrate the motivation with some examples.

    Death body decay in different temperatures. Consider a corpse found in a snowy place, and assume that such body has been found after 20 days. The corpse is taken and brought to the house and kept in a normal temperature for a few days and later put in a mortuary and buried. The main aim here is to replicate the process of decay. The first part will provide a very low decay. The second part will provide a fast decay, the third part will again be a fast process and finally, a slow process. Indeed, slow and fast processes can be characterized by some mathematical functions. The power-law function is

    tα. (2.1)

    The exponential decay function with a Dirac delta property is

    11αexp[α1αt]. (2.2)

    However, a crossover from fast to slow decay processes can be modeled using the following Mittag-Leffler function with Delta-Dirac property

    11αEα[α1αtα]. (2.3)

    The process can be divided into several intervals to capture each behavior. In the first part, one can have

    C0Dαty(t)=λ1y(t)if0<tT1. (2.4)

    The second processes can be

    CFT1Dαty(t)=λ2y(t)ifT1<tT2. (2.5)

    The two last parts will be characterized by

    ABCT2Dαty(t)=λ3y(t)ifT2<tT. (2.6)

    Thus the whole process will be a system with the following crossover behaviors

    {C0Dαty(t)=λ1y(t)if0<tT1,CFT1Dαty(t)=λ2y(t)ifT1<tT2,ABCT2Dαty(t)=λ3y(t)ifT2<tT. (2.7)

    Therefore in general the concept of piecewise derivative has been introduced.

    In this section, we present the definitions of both short memory and piecewise differentiation. For the short memory case, the idea has already been discussed; for example a paper published by Deng in 2007 has already discussed the short memory principle [11], which has also been called the fixed memory principle and logarithmic memory principle. Wu et al. [9] presented the concept of a fractional variable-order derivative where the fractional order changes within an interval. The suggested definition is given below as:

    {Ct0Dα0ty(t)=f(y,t) for t[t0,t1],Ct1Dα1ty(t)=f(y,t) for t[t1,t2],Ct2Dα2ty(t)=f(y,t) for t[t2,t3]. (3.1)

    Here Caputo power law derivative is used, which is known to have a singularity at the origin for a class of functions. The author did not give explicitly space of the functions as the derivative was defined in general, therefore, if we assume a class of the functions for which dydt is continuous then at each t=ti, f(y,t) should be zero.

    On the other hand, the piecewise concept is defined as follows.

    1) A piecewise derivative of f with classical, power-law and stochastic processes is given by

    {Dy(t)=f(t,y(t))if0<tt1,Ct1Dαty(t)=f(t,y(t))ift1<tt2,dy(t)=f(t,y(t))dt+σy(t)dB(t)ift2<tt3. (3.2)

    2) A piecewise derivative of f with power, exponential and Mittag-Leffler laws is given as

    {C0Dαty(t)=f(t,y(t))if0<tt1,CFt1Dαty(t)=f(t,y(t))ift1<tt2,ABCt1Dαty(t)=f(t,y(t))ift2<tt3. (3.3)

    Several definitions can be found in [10].

    In the next section, we will provide a deep analysis of these concepts.The aim of the section is to present advantages and disadvantages of these two independent concepts. We note that

    C0Dαtf(t)=1Γ(1α)t0ddτf(τ)(tτ)αdτ,  (3.4)
    CF0Dαtf(t)=11αt0ddτf(τ)exp[α1α(tτ)]dτ, (3.5)
    ABC0Dαtf(t)=11αt0ddτf(τ)Eα[α1α(tτ)α]dτ. (3.6)

    Here, we present a deep analysis that will help the readers to see the difference between the two concepts. Let us start with short memory. A deep look inside the short memory concept defined by gives the following:

    1) The short memory principle considers a change in constant variable order; however, it uses a single kernel. Indeed, this can be viewed as variable order where the order is changed within shorter intervals. Nonetheless, it describes some process and in the case of Caputo derivation, this process will only describe a power-law process that is, this process will not have crossover behavior.

    2) The concept is unable to capture classical processes because the fractional order should change in each interval.

    On a serious note, however, if we have f(t,y(t))0,t[0,T]. So at each tj

    limttjCtjDαty(t)=f(t,y(t))t=tj. (4.1)

    Sincedydt is continuous,

    limttjCtjDαty(t)=f(tj,y(tj))0. (4.2)

    However the right hand side produces f(t,y(t))0, which is a contradiction. It infers that f(tj,y(tj))=0. This may be used to explain the process with a renewal force that follows the power-law process. For example, the trajectory of a flea with a constant jump. There are fewest real world problems that present these behaviors. However, due to the power-law singularity the definition suggested by Wu may have some problems at the boundaries. Nonetheless, as a result of using non-singular kernels, the concept of short memory will be well-posed since the conditions at the boundaries will be well controlled and the renewal processes would be well-posed

    On the other hand, however, the concept of piecewise was introduced for different purposes. The following example will give light to the situation. We consider evaluating the velocity of water within a geological formation with fractures. We record the velocity as a function of time. The velocity will obviously be low in the rock's matrix; however as the water reaches the fracture, there will be a crossover behavior because the velocity will suddenly increase. The first part of this process follows behaviors resembling a declining process and, later, an almost constant high velocity. Now if one was to withdraw water from such a geological formation and record the water level, one will observe a fading groundwater level in earlier times; then when water is being taken from the fracture, we observe a steady groundwater level. Thus, there is a crossover behavior from the fading process to long range, which can be captured using an exponential function, then the power law. Therefore, the differential operator able to replicate this process is

    {C0Dαth(r,t)=f(t,r,h(r,t))if0<tT1,CFT1Dαth(r,t)=f1(t,r,h(r,t))ifT1<tT. (4.3)

    Therefore, one can see a clear difference and objectives of both concepts. Piecewise differential operators are thus conceived to capture processes exhibiting different patterns, or crossover behaviors. Here the order does not change within an interval as changing order does not change the process but only the memory with the same pattern, rather, the kernels change to bring into the mathematical formulation the crossover behaviors by each kernel.

    For example, using the piecewise derivative the decay equation

    {y(t)=λy(t)if0<tT1,CT1Dαty(t)=λy(t)ifT1<tT2,dy(t)=λy(t)dt+σy(t)dB(t)ifT2<tT (4.4)

    which will lead to decay with crossover behaviors. From 0<t<T1, we shall observe a normal decay process. From T1<t<T2, we shall observe power-law decay or the Mittag-Leffler decay. From T2<t<T, we shall observe decay with randomness. On the other hand, with the short memory

    {C0Dα1ty(t)=λy(t)if0<tT1,CT1Dα2ty(t)=λy(t)ifT1<tT2,CT2Dα3ty(t)=λy(t)ifT2<tT (4.5)

    which leads only to a power-law process or the Mittag-Leffler process.

    In this section, we shall present clearly the difference between the two concepts by applying them to some problems. We shall start with a simple problem about the decay problem with two intervals.

    Example 1. We consider a simple decay model within [0,T1] and [T1,T2]. In the case of short memory, we have

    {C0Dα1ty(t)=λy(t)ift[0,T1],CT1Dα2ty(t)=λy(t)ift[T1,T2]. (5.1)

    In the case of piecewise, we can consider the following

    {dy(t)dt=λy(t)ift[0,T1],CT1Dαty(t)=λy(t)ift[T1,T2] (5.2)

    or

    {ABC0Dαty(t)=λy(t)ift[0,T1],dy(t)dt=λy(t)ift[T1,T2] (5.3)

    or

    {CF0Dαty(t)=λy(t)ift[0,T1],CT1Dαty(t)=λy(t)ift[T1,T2]. (5.4)

    Using the Laplace transform on the above system yields in the case of short memory

    {y(t)=y(0)Eα1[λtα1]ift[0,T1],y(t)=y(T1)Eα2[λ(tT1)α2]ift[T1,T2]. (5.5)

    In the case of piecewise, we have the following solution

    {y(t)=y(0)exp[λt]ift[0,T1],y(t)=y(T1)Eα[λ(tT1)α]ift[T1,T2] (5.6)

    or

    {y(t)=y(0)ift=0,y(t)=y(0)1+λ(1α)Eα[λα1+λ(1α)tα]bift]0,T1],y(t)=y(T1)exp[λ(tT1)]ift[T1,T2] (5.7)

    or

    {y(t)=y(0)ift=0,y(t)=y(0)1+λ(1α)exp[λα1+λ(1α)tα]bift]0,T1],y(t)=y(T1)Eα[λ(tT1)α]ift[T1,T2]. (5.8)

    T1=1 where the crossover occurs and T2=2.4 is the final time. The numerical simulations are presented in Figures 14 below.

    Figure 1.  Decay model with short memory for λ=3,α1=0.9 and α2=0.6.
    Figure 2.  Decay model with piecewise derivative for λ=3.
    Figure 3.  Decay model with piecewise derivative for λ=3.
    Figure 4.  Decay model with piecewise derivative for λ=3.

    Example 2. We consider the spread of an infectious disease. We consider a Susceptible, Exposed, Infected and Recovered (SEIR) model. It was proven by Atangana and Seda that such a model may not be able to predict waves [12]. Thus to introduce waves, in particular two waves, we consider the spread to be in the periods [0,T1] and [T1,T2]. In the case of short memory, we have

    {C0DαtS=μNμSβSINC0DαtE=βSIN(μ+a)EC0DαtI=aE(γ+μ)IC0DαtR=γIμRift[0,T1],{CT1DβtS=μNμSβSINCT1DβtE=βSIN(μ+a)ECT1DβtI=aE(γ+μ)ICT1DβtR=γIμRift[T1,T2]. (5.9)

    In the case of piecewise several scenarios can be obtained. So we can have

    {S=μNμSβSINE=βSIN(μ+a)EI=aE(γ+μ)IR=γIμRift[0,T1],{dS=(μNμSβSIN)dt+σ1SdB1(t)dE=(βSIN(μ+a)E)dt+σ2EdB2(t)dI=(aE(γ+μ)I)dt+σ3IdB3(t)dR=(γIμR)dt+σ4RdB4(t)ift[T1,T2] (5.10)

    or

    {dS=(μNμSβSIN)dt+σ1SdB1(t)dE=(βSIN(μ+a)E)dt+σ2EdB2(t)dI=(aE(γ+μ)I)dt+σ3IdB3(t)dR=(γIμR)dt+σ4RdB4(t)ift[0,T1],{CT1DαtS=μNμSβSINCT1DαtE=βSIN(μ+a)ECT1DαtI=aE(γ+μ)ICT1DαtR=γIμRift[T1,T2]. (5.11)

    Noting that several more scenarios can be considered, however, we will only consider these two in the case of piecewise. Before proceeding with the analysis of these models, we shall first provide an interpolation of each case in terms of wave behaviors. In the case of short memory, the first and second waves show the non-Gaussian distribution associated to the power-law variables tα1 and tα2. Therefore, one will observe different long tails for tα1 and tα2. On the other hand, however, the first considered model shows that the first wave has a normal distribution, while the second wave has random behavior. The second model shows that the first wave has a long tail spread while the second has random behavior.

    We now present the numerical solutions of the considered models. We shall consider the numerical scheme suggested by Ghanbari et al. [13] for fractional cases. The short memory case can be simplified to

    {C0Dαtyi(t)=Fi(t,yi(t))ift[0,T1],CT1Dβtyi(t)=Fi(t,yi(t))ift[T1,T2]. (5.12)

    Applying the Ghanbari method yields

    {yn1i=yi(0)+hα(˜a(α)n1Fi(t0,yi(t0))+n1k=2˜a(α)n1kFi(tk,yi(tk)))ift[0,T1],yn2i=yi(T1)+hβ(˜a(β)n2Fi(T1,yi(T1))+n2j=n1+2a(β)n2jFi(tj,yi(tj)))ift[T1,T2] (5.13)

    where

    ˜a(α)n1=(n11)α+1nα1(n1α1)Γ(α+2),a(β)n2={1Γ(β+2)ifn=0,(n21)β+12nβ+12+(n2+1)β+1Γ(β+2)ifn1. (5.14)

    and

    ˜a(β)n2=(n21)β+1nβ2(n2β1)Γ(β+2),θ(β)k=(k1)β+12kβ+1+(k+1)β+1Γ(β+2) if k=n1+1,,..,n21. (5.15)

    In the case of the piecewise first model, we have

    {yn1i=yi(0)+n1j=2[2312Fi(tj,yi(tj))Δt43Fi(tj1,yi(tj1))Δt+512Fi(tj2,yi(tj2))Δt] if t[0,T1],{yn2i=y(T1)+n2j=n1+3[2312Fi(tj,yi(tj))Δt43Fi(tj1,yi(tj1))Δt+512Fi(tj2,yi(tj2))Δt] if t[T1,T2].+σiyi(Bn2+1iBn2i) (5.16)

    For Case 2, we obtain

    {{yn1i=yi(0)+n1j=2[2312Fi(tj,yi(tj))Δt43Fi(tj1,yi(tj1))Δt+512Fi(tj2,yi(tj2))Δt]+σin1j=1yj(BjiBj1i)ift[0,T1],yn2i=yi(T1)+hα(˜a(α)n1Fi(tn1,yi(tn1))+n2k=0˜a(α)n1+kFi(tk,yi(tk)))ift[T1,T2]. (5.17)

    The numerical solutions for short memory are depicted in Figure 5 with the following parameters

    N=1000,μ=0.01,β=0.6,a=0.2,γ=0.03, (5.18)
    Figure 5.  Numerical solutions of Covid-19 model with short memory for α1=0.95,α2=0.75.

    and the following initial conditions

    S(0)=1000,E(0)=25,I(50)=22,R(50)=5,S(50)=39E(50)=67,I(50)=505,R(50)=390 (5.19)

    The numerical solutions for Cases 1 and 2 are respectively depicted in Figures 6 and 7 with the following parameters

    N=1000,μ=0.01,β=0.6,a=0.2,γ=0.03, (5.20)
    Figure 6.  Numerical solutions of Covid-19 model under the conditions of Case 1 σ1=0.000005,σ2=0.008,σ3=0.0021,σ4=0.009 and α=0.7.
    Figure 7.  Numerical solutions of Covid-19 model under the conditions of Case 2 σ1=0.17,σ2=0.25,σ3=0.21,σ4=0.19 and α=0.7.

    and the following initial conditions

    S(0)=1000,E(0)=25,I(50)=22,R(50)=5,S(50)=35E(50)=44,I(50)=424,R(50)=527,α=0.7 (5.21)

    Figure 5 demonstrates the short memory effect, where the first and second parts present different long tails behaviors characterized by α1 and α2; however, both clearly depict the same process which is the power law process. On the other hand, Figures 6 and 7 show the clear effects of the piecewise differential operators; the first part in Figure 6 shows normal distribution, which is characteristic of the classical differential operator, while the second part clearly shows the effect of randomness. The complete model therefore shows crossover behavior from deterministic to stochastic with no steady state. In Figure 6, the process is different. We start with randomness then end up with long tail behaviors as a result of the power law kernel.

    Example 3. We now consider a chaotic problem in particular the 8-wing attractor [14]. This model has been studied by several researchers [15], the model is given as

    x=a(yx)+f(t)yzy=cx+dyxzz=bz+xy (5.22)

    where the function f(t)=M sgn(sin(wt))+K. The constant w is known to be a switch frequency and M and K are constant parameters.

    In the case of short memory, we have

    {C0Dα1tx=a(yx)+f(t)yzC0Dα1ty=cx+dyxzC0Dα1tz=bz+xyift[0,T1],{CT1Dα2tx=a(yx)+f(t)yzCT1Dα2ty=cx+dyxzCT1Dα2tz=bz+xyift[T1,T2]. (5.23)

    In the case of piecewise, we can consider three cases. For Case 1, we can write

    {ABC0Dαtx=a(yx)+f(t)yzABC0Dαty=cx+dyxzABC0Dαtz=bz+xyift[0,T1],{dx=(a(yx)+f(t)yz)dt+σ1xdB1(t)dy=(cx+dyxz)dt+σ2ydB2(t)dz=(bz+xy)dt+σ3zdB3(t)ift[T1,T2]. (5.24)

    For Case 2, we have

    {C0Dαtx=a(yx)+f(t)yzC0Dαty=cx+dyxzC0Dαtz=bz+xyift[0,T1],{dx=(a(yx)+f(t)yz)dt+σ1xdB1(t)dy=(cx+dyxz)dt+σ2ydB2(t)dz=(bz+xy)dt+σ3zdB3(t)ift[T1,T2]. (5.25)

    For Case 3, we can get

    {x=a(yx)+f(t)yzy=cx+dyxzz=bz+xyift[0,T1],{dx=(a(yx)+f(t)yz)dt+σ1xdB1(t)dy=(cx+dyxz)dt+σ2ydB2(t)dz=(bz+xy)dt+σ3zdB3(t)ift[T1,T2]. (5.26)

    We shall now present the numerical solution of each case. In the case of short memory, one can use the numerical method based on Lagrange interpolation [16]. We can first simplify the model as follows.

    {C0Dα1tMi(t)=Π(t,Mi(t))ift[0,T1],CT1Dα2tMi(t)=Π(t,Mi(t))ift[T1,T2]. (5.27)

    Thus, applying such method to the above system yields

    {Mn1i=Mi(0)+[(Δt)α1Γ(α1+2)n1q=0Π(tq,Mqi)×[(n1q+1)α1(n1q+2+α1)(n1q)α1(n1q+2+2α1)](Δt)α1Γ(α1+2)n1q=1Π(tq1,Mq1i)×[(n1q+1)α1+1(n1q)α1(n1q+1+α1)]]ift[0,T1],Mn2i=Mi(T1)+[(Δt)α2Γ(α2+2)n2k=n1+1Π(tk,Mki)×[(n2q+1)α2(n2q+2+α2)(n2q)α2(n2q+2+2α2)](Δt)α2Γ(α2+2)n2k=n1+2Π(tk1,Mk1i)×[(n2q+1)α2+1(n2q)α2(n2q+1+α2)]]ift[T1,T2]. (5.28)

    With the piecewise case, we obtain the following numerical solution by using a scheme based on Newton polynomial interpolation [17]. Also, we simplify the model as follows.

    {ABC0Dα1tMi(t)=Π(t,Mi(t))ift[0,T1],dMi(t)=Π(t,Mi(t))dt+σiMidBi(t)ift[T1,T2]. (5.29)

    Then applying this method yields

    Mn1i=Mi(0)+1αAB(α)Π(tn1,Mn1i)+α(Δt)αAB(α)Γ(α+1)n1k=2Π(tk2,Mk2i)×{(n1k+1)α(n1k)α}+α(Δt)αAB(α)Γ(α+2)n1k=2[Π(tk1,Mk1i)Π(tk2,Mk2i)]×{(n1k+1)α(n1k+3+2α)(n1k)α(n1k+3+3α)}+α(Δt)α2AB(α)Γ(α+3)n1k=2[Π(tk,Mki)2Π(tk1,Mk1i)+Π(tk2,Mk2i)]×{(n1k+1)α[2(n1k)2+(3α+10)(n1k)+2α2+9α+12](n1k)α[2(n1k)2+(5α+10)(n1k)+6α2+18α+12]},0tT1Mn2+4i=Mn2+3i+n3j3=n1+3[2312Π(tn2+3,Mn2+3i)43Π(tn2+2,Mn2+2i)+512Π(tn2+1,Mn2+1i)]Δt+σiMn2i(Bn2+1iBn2+1i),T1tT2 (5.30)

    For Case 2, we again apply the scheme with the Newton polynomial to obtain

    {Mn1i=Mi(0)+(Δt)αΓ(α+1)n1k=2Π(tk2,Mk2i)×{(n1k+1)α(n1k)α}+(Δt)αΓ(α+2)n1k=2[Π(tk1,Mk1i)Π(tk2,Mk2i)],×{(n1k+1)α(n1k+3+2α)(n1k)α(n1k+3+3α)}+(Δt)α2Γ(α+3)n1k=2[Π(tk,Mki)2Π(tk1,Mk1i)+Π(tk2,Mk2i)]×{(n1k+1)α[2(n1k)2+(3α+10)(n1k)+2α2+9α+12](n1k)α[2(n1k)2+(5α+10)(n1k)+6α2+18α+12]},0tT1Mn2+4i=Mn2+3i+n3j3=n2+3[2312Π(tn2+3,Mn2+3i)43Π(tn2+2,Mn2+2i)+512Π(tn2+1,Mn2+1i)]Δt+σiMi(Cn2)(Bn2+1iBn2+1i),T1tT2 (5.31)

    where Cn2[tn2+4,tn2+3]. For Case 3, we use the simple Adams-Bashforth methods as follows

    {Mn2+3i=Mn2+2i+[2312Π(tn2+2,Mn2+2i)43Π(tn2+1,Mn2+1i)+512Π(tn2,Mn2i)]Δt,0tT1Mn2+4i=Mn2+3i+[2312Π(tn2+3,Mn2+3i)43Π(tn2+2,Mn2+2i)+512Π(tn2+1,Mn2+1i)]Δt+σiMi(Cn2)(Bn2+1iBn2i),T1tT2 (5.32)

    where Cn2[tn2+4,tn2+3].

    Numerical solutions are obtained for the following parameters

    a=14,b=43,c=1,d=16,M=9,K=10,w=2π50. (5.33)

    The numerical solutions for short memory are depicted in Figure 8 for the initial data x(0)=22.3,y(0)=4.9 and z(0)=2.6.

    Figure 8.  Numerical solutions for 8-wing attractor with short memory for α1=0.96 and α2=0.98.

    For piecewise, we consider the following stochastic-deterministic problem with power-law and Mittag-Leffler kernels:

    {C0Dαtx=a(yx)+f(t)yz+σ1xB1(t)C0Dαty=cx+dyxz+σ2yB2(t)C0Dαtz=bz+xy+σ3zB3(t)ift[0,T1],{ABCT1Dαtx=a(yx)+f(t)yzABCT1Dαty=cx+dyxzABCT1Dαtz=bz+xyift[T1,T2] (5.34)

    with the stochastic constants

    σ1=0.031;σ2=0.035;σ3=0.032. (5.35)

    The numerical simulation for such a problem can be performed as illustrated in Figure 9 by using the same initial data and parameters.

    Figure 9.  Stochastic-deterministic 8-wing attractor with piecewise derivative for α=0.99.

    For piecewise, we consider the following stochastic-deterministic problem with power-law and Mittag-Leffler kernels:

    {ABC0Dαtx=a(yx)+f(t)yz+σ1xB1(t)ABC0Dαty=cx+dyxz+σ2yB2(t)ABC0Dαtz=bz+xy+σ3zB3(t)ift[0,T1],{CT1Dαtx=a(yx)+f(t)yzCT1Dαty=cx+dyxzCT1Dαtz=bz+xyift[T1,T2] (5.36)

    with the following stochastic constants

    σ1=0.031;σ2=0.035;σ3=0.032. (5.37)

    The numerical simulation for such a problem can be performed as shown in Figure 10 by using the same initial data and parameters.

    Figure 10.  Stochastic-deterministic 8-wing attractor with piecewise derivative for α=0.94.

    Also, we consider the following deterministic-stochastic problem with power-law and Mittag-Leffler kernels:

    {C0Dαtx=a(yx)+f(t)yzC0Dαty=cx+dyxzC0Dαtz=bz+xyift[0,T1],{ABCT1Dαtx=a(yx)+f(t)yz+σ1xB1(t)ABCT1Dαty=cx+dyxz+σ2yB2(t)ABCT1Dαtz=bz+xy+σ3zB3(t)ift[T1,T2] (5.38)

    with the following stochastic constants:

    σ1=0.02;σ2=0.012;σ3=0.021. (5.39)

    The numerical solutions for the above problem can be depicted as shown in Figure 11 using same initial data and parameters.

    Figure 11.  Deterministic-stochastic 8-wing attractor with piecewise derivative for α=0.99.

    Figure 7 shows the results obtained by applying the power-law short memory concept. To show the difference within the interval, we have opted to consider the first part of the interval to be in blue and the second to be in red. However, a quick look at the results shows clearly the effect of a power law, no great change from one interval to another is observed since both depict long-tail behaviors as results of the power-law kernel. In this case, there is no crossover behavior, just a repetition of different long tail behaviors. On the other hand, in Figures 8 and 9, there is a clear change in patterns where the first patterns show deterministic behaviors in particular, long-tails due to power law in Figure 8, and the second part shows randomness, there is, therefore, a clear crossover from power law to randomness. While, in Figure 9, we have two crossovers, the first is due to the Mittag-Leffler kernel that shows a change from stretched exponential to power law and the second is stochastic.

    Also, we consider deterministic-stochastic problem with power-law and Mittag-Leffler kernel

    {ABC0Dαtx=a(yx)+f(t)yzABC0Dαty=cx+dyxzABC0Dαtz=bz+xyift[0,T1],{CT1Dαtx=a(yx)+f(t)yz+σ1xB1(t)CT1Dαty=cx+dyxz+σ2yB2(t)CT1Dαtz=bz+xy+σ3zB3(t)ift[T1,T2] (5.40)

    with the following stochastic constants:

    σ1=0.02;σ2=0.012;σ3=0.021. (5.41)

    The numerical solutions for the above problem can be depicted as shown in Figure 12 by using the same initial data and parameters.

    Figure 12.  Deterministic-stochastic 8-Wing attractor with piecewise derivative for α=0.9.

    In the last decades, researchers have devoted their attention to better understanding complex realworld problems even on a small scale. They have therefore developed several methods, different differential, and integral operators. To understand the process by which different long tails occur in different intervals, the concept of short memory was introduced. This concept defines power-law derivatives in different intervals and each interval has its own order. This order accounts for the long tail associated with that interval. However, the process is scale-invariant in terms of patterns. On the other hand, because there are many real-world problems that exhibit passages from one process to another, for example, a passage from power law to randomness, the concept of piecewise was introduced. In this work, a detailed analysis was given to show their different fields of applications and show also, when short memory and piecewise concepts can be applied. This paper thus helps researchers to identify what problem is suitable for short memory and piecewise.

    The authors declare there is no conflict of interest.



    [1] Jenkins N (2008) Embedded Generation. 1st Eds. London: The Institution of Engineering and Technology.
    [2] Hatziargyriou N, Asano H, Iravani R, et al. (2007) Microgrids. IEEE Power and Energy Mag 5: 78–94.
    [3] Ahmed M, Amin U, Aftab S, et al. (2015) Integration of renewable energy resources in microgrid. Energy Power Eng 7: 12–29. doi: 10.4236/epe.2015.71002
    [4] Tanrioven M (2005) Reliability and cost–benefits of adding alternate power sources to an independent micro-grid community. J Power Sources 150: 136–149. doi: 10.1016/j.jpowsour.2005.02.071
    [5] Baker E, Fowlie M, Lemoine D, et al. (2013) The economics of solar electricity. Annu Rev Resour Econ 5: 387–426. doi: 10.1146/annurev-resource-091912-151843
    [6] Renewables Global Status Report-REN21 2018. Available from: http://www.ren21.net/status-of-renewables/global-status-report.
    [7] Lasseter R, Akhil A, Marnay C, et al. (2002) Integration of distributed energy resources. The CERTS Microgrid Concept. Lawrence Berkeley National Lab. (LBNL), Berkeley, CA, United States.
    [8] Kroposki B, Lasseter R, Ise T, et al. (2008) Making microgrids work. IEEE Power Energy Mag 6: 40–53.
    [9] Elgowainy A, Wang MQ (2008) Fuel cycle comparison of distributed power generation technologies. Argonne National Lab. (ANL), Argonne, IL, United States.
    [10] Lopes JAP, Moreira CL, Madureira AG (2006) Defining control strategies for microGrids islanded operation. IEEE Trans Power Syst 21: 916–924. doi: 10.1109/TPWRS.2006.873018
    [11] Mohamed Y, El-Saadany EF (2008) Adaptive decentralized droop controller to preserve power sharing stability of paralleled inverters in distributed generation microgrids.IEEE Trans Power Electron 23: 2806–2816. doi: 10.1109/TPEL.2008.2005100
    [12] Abdelaziz MMA, Farag HE, El-Saadany EF, et al. (2013) A novel and generalized three-phase power flow algorithm for islanded microgrids using a Newton trust region method.IEEE Trans Power Syst 28: 190–201. doi: 10.1109/TPWRS.2012.2195785
    [13] Chamorro HR, Diaz NL (2013) Hierarchical power flow control in low voltage microgrids. 2013 North American Power Symposium (NAPS). 1–5.
    [14] Erseghe T, Tomasin S, Vigato A (2013) Topology estimation for smart micro grids via powerline communications.IEEE Transactions on Signal Processing 61: 3368–3377. doi: 10.1109/TSP.2013.2259826
    [15] Kundur P, Paserba J, Ajjarapu V, et al. (2004) Definition and classification of power system stability IEEE/CIGRE joint task force on stability terms and definitions.IEEE Transactions on Power Systems 19: 1387–1401. doi: 10.1109/TPWRS.2004.825981
    [16] Shuai Z, Sun Y, Shen ZJ, et al. (2016) Microgrid stability: Classification and a review. Renewable Sustainable Energy Rev 58: 167–179. doi: 10.1016/j.rser.2015.12.201
    [17] International Electrotechnical Commission (2008) Electromagnetic compatibility (EMC). Part 3–6: IEC TR 61000-3-6:2008 Limits-Assessment of emission limits for the connection of distorting installations to MV, HV and EHV power systems. Geneva: IEC.
    [18] Micallef A, Apap M, Spiteri-Staines C, et al. (2015) Mitigation of harmonics in grid-connected and islanded microgrids via virtual admittances and impedances.IEEE Trans Smart Grid: 1–11.
    [19] Marzal S, Salas R, González-Medina R, et al. (2018) Current challenges and future trends in the field of communication architectures for microgrids. Renewable Sustainable Energy Rev 82: 3610–3622. doi: 10.1016/j.rser.2017.10.101
    [20] Zeineldin HH, El-saadany EF, Salama MMA (2006) Distributed Generation Micro-Grid Operation: Control and Protection. 2006 Power Systems Conference: Advanced Metering, Protection, Control, Communication, and Distributed Resources. Clemson, SC, USA: IEEE. 105–111.
    [21] Asanol H, Bandol S (2007) Economic analysis of microgrids. 2007 Power Conversion Conference-Nagoya. Nagoya, Japan: IEEE. 654–658.
    [22] Maqbool U, Khan UA (2017) Fault current analysis for grid-connected and Islanded microgrid modes. 2017 13th International Conference on Emerging Technologies (ICET). Islamabad: IEEE. 1–5.
    [23] Overbeeke FV (2009) Fault current source to ensure the fault level in inverter-dominated networks. Proc. 20th International Conference and Exhibition on Electricity Distribution. CIRED. 1–4.
    [24] Chatterjee S, Agarwal M, Sen D (2015) The challenges of protection for Microgrid. International Advanced Research Journal in Science, Engineering and Technology (IARJSET) 2. 155–158.
    [25] Choudhary NK, Mohanty SR, Singh RK (2014) A review on Microgrid protection. 2014 International Electrical Engineering Congress (iEECON). Chonburi, Thailand: IEEE. 1–4.
    [26] Buque C, Chowdhury S, Chowdhury SP (2013) Modelling and simulation of reverse power relay for loss of mains protection of distributed generation in microgrids. 2013 IEEE Power & Energy Society General Meeting. Vancouver, BC: IEEE. 1–5.
    [27] Crolla P, Roscoe AJ, Dysko A, et al. (2011) Methodology for testing loss of mains detection algorithms for microgrids and distributed generation using real-time power hardware-in-the-loop based technique. 8th International Conference on Power Electronics-ECCE Asia. Jeju, Korea (South): IEEE. 833–838.
    [28] Uqaili MA, Sahito AA, Halepoto IA, et al. (2014) Impact of distributed generation on network short circuit level. 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE). Aalborg, Denmark: IEEE. 1–5.
    [29] Brearley BJ, Prabu RR (2017) A review on issues and approaches for microgrid protection.Renewable Sustainable Energy Rev 67: 988–997. doi: 10.1016/j.rser.2016.09.047
    [30] Plet CA, Graovac M, Green TC, et al. (2010) Fault response of grid-connected inverter dominated networks. IEEE PES General Meeting. Minneapolis, MN: IEEE. 1–8.
    [31] Freitas W, Vieira JCM, Morelato A, et al. (2006) Comparative analysis between synchronous and induction machines for distributed generation applications.IEEE Trans Power Syst 21: 301–311. doi: 10.1109/TPWRS.2005.860931
    [32] Nazir MS, Wu Q, Li M, et al. (2017) Symmetrical short circuit parameter differences of double fed induction generator and synchronous generator based wind turbine.Indones J Electr Eng Comput Sci 6: 268. doi: 10.11591/ijeecs.v6.i2.pp268-277
    [33] Che L, Khodayar ME, Shahidehpour M (2014) Adaptive protection system for microgrids: Protection practices of a functional microgrid system. IEEE Electrification Mag 2: 66–80. doi: 10.1109/MELE.2013.2297031
    [34] Akhtar Z, Saqib MA (2016) Microgrids formed by renewable energy integration into power grids pose electrical protection challenges. Renewable Energy 99: 148–157. doi: 10.1016/j.renene.2016.06.053
    [35] Al-Nasseri H, Redfern MA, Li F (2006) A voltage based protection for micro-grids containing power electronic converters. 2006 IEEE Power Engineering Society General Meeting. Montreal, Que., Canada: IEEE.
    [36] Wang X-p, Li Y, Yu Y-y (2011) Research on the relay protection system for a small laboratory-scale microgrid system. 2011 6th IEEE Conference on Industrial Electronics and Applications. Beijing, China: IEEE. 2712–2716.
    [37] Zamani MA, Sidhu TS, Yazdani A (2011) A protection strategy and Microprocessor-Based relay for Low-Voltage microgrids.IEEE Trans Power Delivery 26: 1873–1883. doi: 10.1109/TPWRD.2011.2120628
    [38] Lotfi-fard S, Faiz J, Iravani R (2007) Improved overcurrent protection using symmetrical components.IEEE Trans Power Delivery 22: 843–850. doi: 10.1109/TPWRD.2007.893591
    [39] Nunes JUN, Bretas AS (2011) A impedance-based fault location technique for unbalanced distributed generation systems. 2011 IEEE Trondheim PowerTech. Trondheim: IEEE. 1–7.
    [40] Elkhatib ME, Ellis A (2017) Communication-assisted impedance-based microgrid protection scheme. 2017 IEEE Power & Energy Society General Meeting. Chicago, IL: IEEE. 1–5.
    [41] Dewadasa JM, Ghosh A, Ledwich G (2008) Distance protection solution for a converter controlled microgrid.Fifteenth National Power Systems Conference (NPSC), ⅡT Bombay, 586–591.
    [42] Kar S, Samantaray SR (2014) Time-frequency transform-based differential scheme for microgrid protection. IET Gener, Transm Distrib 8: 310–320. doi: 10.1049/iet-gtd.2013.0180
    [43] Gururani A, Mohanty SR, Mohanta JC (2016) Microgrid protection using Hilbert–Huang transform based-differential scheme. IET Gener, Transm Distrib 10: 3707–3716. doi: 10.1049/iet-gtd.2015.1563
    [44] Cintuglu MH, Ma T, Mohammed OA (2017) Protection of autonomous microgrids using Agent-Based distributed communication.IEEE Trans Power Delivery 32: 351-360. doi: 10.1109/TPWRD.2016.2551368
    [45] Luo L, Tai N, Yang G (2012) Wide-area protection research in the smart grid. Energy Proc 16: 1601–1606. doi: 10.1016/j.egypro.2012.01.249
    [46] Rockefeller G (1969) Fault protection with a digital computer.IEEE Trans Power Appar Syst PAS-88: 438–464.
    [47] Dy Liacco T (1967) The adaptive reliability control system.IEEE Trans Power Appar Syst PAS-86: 517–531. doi: 10.1109/TPAS.1967.291728
    [48] Kumar JA, Venkata SS, Damborg MJ (1989) Adaptive transmission protection: concepts and computational issues. IEEE Trans Power Delivery 4: 177–185. doi: 10.1109/61.19203
    [49] Nikkhajoei H, Lasseter RH (2007) Microgrid protection. 2007 IEEE Power Engineering Society General Meeting. Tampa, FL, USA: IEEE. 1–6.
    [50] Najy WKA, Zeineldin HH, Woon WL (2013) Optimal protection coordination for microgrids with Grid-Connected and islanded capability.IEEE Trans Ind Electron 60: 1668–1677.
    [51] Lu X, Wang J, Guerrero JM, et al. (2018) Virtual-Impedance-Based fault current limiters for inverter dominated AC microgrids.IEEE Trans Smart Grid 9: 1599–1612. doi: 10.1109/TSG.2016.2594811
    [52] Van Overbeeke F (2009) Fault current source to ensure the fault level in inverter-dominated networks. IET Conference Publications. Prague, Czech Republic: IET. 369–369.
    [53] Brahma SM, Girgis AA (2004) Development of adaptive protection scheme for distribution systems with high penetration of distributed generation.IEEE Trans Power Delivery 19: 56–63.
    [54] Oudalov A, Fidigatti A (2009) Adaptive network protection in microgrids. 24 Int J Distrib Energy Resour 5: 201–225.
    [55] Han Y, Hu X, Zhang D (2010) Study of adaptive fault current algorithm for microgrid dominated by inverter based distributed generators. The 2nd International Symposium on Power Electronics for Distributed Generation Systems. Hefei, China: IEEE. 852–854.
    [56] Dang K, He X, Bi D, et al. (2011) An adaptive protection method for the inverter dominated microgrid. 2011 International Conference on Electrical Machines and Systems. Beijing, China: IEEE. 1–5.
    [57] Ustun TS, Ozansoy C, Zayegh A (2011) A microgrid protection system with central protection unit and extensive communication. 2011 10th International Conference on Environment and Electrical Engineering. Rome, Italy: IEEE. 1–4.
    [58] Kauhaniemi K, Voima S (2012) Adaptive relay protection concept for smart grids.Renewable Efficient Energy Ⅱ Conference, Vaasa, Finland.
    [59] Ustun TS, Khan RH, Hadbah A, et al. (2013) An adaptive microgrid protection scheme based on a wide-area smart grid communications network. 2013 IEEE Latin-America Conference on Communications. Santiago, Chile: IEEE. 1–5.
    [60] Kauhaniemi K, Voima S, Laaksonen H (2014) Adaptive protection scheme for smart grids. 12th IET International Conference on Developments in Power System Protection (DPSP 2014). Copenhagen, Denmark: IET. 1–6.
    [61] Lin H, Guerrero JM, Vasquez JC, et al. (2015) Adaptive distance protection for microgrids. IECON 2015-41st Annual Conference of the IEEE Industrial Electronics Society. Yokohama: IEEE. 725–730.
    [62] Sitharthan R, Geethanjali M, Karpaga Senthil Pandy T (2016) Adaptive protection scheme for smart microgrid with electronically coupled distributed generations. Alexandria Eng J 55: 2539–2550. doi: 10.1016/j.aej.2016.06.025
    [63] Zhang Y, Huang T, Bompard EF (2018) Big data analytics in smart grids: a review. Energy Inf 1: 8. doi: 10.1186/s42162-018-0007-5
    [64] Mishra DP, Samantaray SR, Joos G (2016) A combined wavelet and data-mining based intelligent protection scheme for microgrid.IEEE Trans Smart Grid 7: 2295–2304. doi: 10.1109/TSG.2015.2487501
    [65] Tang WJ, Yang HT (2018) Data Mining and Neural Networks Based Self-Adaptive Protection Strategies for Distribution Systems with DGs and FCLs. Energies 11: 426. doi: 10.3390/en11020426
    [66] Hengwei L, Guerrero JM, Chenxi J, et al. (2016) Adaptive overcurrent protection for microgrids in extensive distribution systems. IECON 2016-42nd Annual Conference of the IEEE Industrial Electronics Society. Florence, Italy: IEEE. 4042–4047.
    [67] Chaitanya BK, Soni AK, Yadav A (2018) Communication assisted fuzzy based adaptive protective relaying scheme for microgrid.J Power Technol 98: 57–69.
    [68] Lin H, Sun K, Tan Z-H, et al. (2019) Adaptive protection combined with machine learning for microgrids. IET Gener, Transm Distrib 13: 770–779. doi: 10.1049/iet-gtd.2018.6230
    [69] Srivastava A, Tripathi JM, Mohanty SR, et al. (2016) Optimal over-current relay coordination with distributed generation using hybrid particle swarm optimization–gravitational search algorithm.Electric Power Components Systems 44: 506–517. doi: 10.1080/15325008.2015.1117539
  • This article has been cited by:

    1. Rodrigo Moreira, Larissa Ferreira Rodrigues Moreira, Flávio de Oliveira Silva, Brazilian Selic Rate Forecasting with Deep Neural Networks, 2024, 0927-7099, 10.1007/s10614-024-10597-2
    2. Michele Bufalo, Claudia Ceci, Giuseppe Orlando, Addressing the financial impact of natural disasters in the era of climate change, 2024, 73, 10629408, 102152, 10.1016/j.najef.2024.102152
    3. Guo-Hui Yang, Si-Qi Ma, Xiao-Dong Bian, Jiang-Cheng Li, Pierluigi Vellucci, The roles of liquidity and delay in financial markets based on an optimal forecasting model, 2023, 18, 1932-6203, e0290869, 10.1371/journal.pone.0290869
    4. Giacomo Ascione, Michele Bufalo, Giuseppe Orlando, Modeling volatility of disaster-affected populations: A non-homogeneous geometric-skew Brownian motion approach, 2024, 130, 10075704, 107761, 10.1016/j.cnsns.2023.107761
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(7565) PDF downloads(1885) Cited by(35)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog