Abstract
This paper investigates the problem of networked load frequency control (LFC) of power systems (PSs) against deception attacks. To lighten the load of the communication network, a new adaptive event-triggered scheme (ETS) is developed on the premise of maintaining a certain control performance of LFC systems. Compared with the existing ETSs, the proposed adaptive ETS can adjust the number of triggering packets, along with the state changes in the presence of deception attacks, which can reduce the average data-releasing rate. In addition, sufficient conditions can be derived, providing a trade-off between the limited network communication resources and the desired control performance of PSs. Finally, an application case is presented for the PSs to demonstrate the advantages of the proposed approach.
Keywords: load frequency control (LFC), deception attacks, adaptive event-triggered scheme (ETS), power systems (PSs)
1. Introduction
It is known that load frequency control (LFC) is a core component of PSs, which governs the system frequency and power exchange between regions in an optimally scheduled way [1,2,3]. Proportional-integral (PI) control has been widely utilized as a common control strategy in LFC [4,5,6]. For example, the authors in [6] studied the area LFC problem using fuzzy gain scheduling with a PI controller. With the development of the PSs, control signals are transmitted via a special power channel and an networked communication infrastructure, which brings new challenges to the PI controller design of LFC. Recently, a lot of the published literature [7,8,9,10,11] has concerned networked LFC. For instance, in [8], an active interference suppression control method was proposed for interconnected LFC systems.
Since the control signals of PSs are transmitted through the communication network, the potential risks of LFC systems increases, such as cyber attacks [12,13,14,15,16,17]. Cyber-attacks have receieved great attention in recent years [1,2]. Usually, cyber-attacks discussed in the literature include denial of service (DoS) attacks and deception attacks. The deception attackers launch a attack by destroying data integrity, such as tampering or replacing transmitted data. In [18], a new control method was proposed in distributed networks subject to deception attacks. The DoS attacks prevent data transmission by occupying the shared network channel, thereby degrading the system performance. A resilient ETS was well-designed in [19] for LFC systems under DoS attacks. In [14], the event-triggered control was studied for multi-agent systems under DoS attacks.
In NCS, the time-triggered scheme (TTS) is widely used to obtain the system information through the sampler, under which a fixed sampling interval can guarantee the desired performance even if there are uncertainties, time-delays, external disturbances, etc. [20,21]. However, too many “unnecessary” sampling signals are transmitted via the network, which leads to a waste of resources [22,23]. To deal with these shortcomings, an event-triggered scheme (ETS) has been widely applied to ease the network burden in recent decades. Compared to the TTS, the sampling data packets are released only when an event generated by some elaborate condition occurs, which can effectively improve resource utilization while ensuring a satisfied system performance [24,25,26,27]. However, due to the complexity of the system and the contradiction between better system performance and a lower data transmission rate, it is usually difficult to design the threshold of event-triggered conditions in the practical application system. Therefore, some state-of-the-art ETSs have been proposed, such as memory-based ETS and adaptive ETS. The authors in [28] proposed a memory-based ETS for T-S fuzzy systems, wherein some historical triggered data were utilized in the ETS so that the control performance can be ensured. The authors in [29,30] proposed an adaptive ETS for nonlinear systems, wherein the threshold can be adjusted with the system states. However, the problem of -based LFC for network-based PSs under deception attacks by adopting adaptive ETS has not yet been reported, which prompted this study.
In sum, the goal of this work is to design an adaptive event-triggered controller for LFC systems subject to deception attacks. Differing from the existing ETS with a preset threshold, the improved adaptive ETS can adjust the number of triggering packets along with the state changes, under which the transmission rate can be cut down while maintaining the desired frequency performance of LFC systems under deception attacks.
2. Problem Formulation
Figure 1 displays a block diagram of a single-area LFC power system, where the area control error is presumed to be transmitted to the PI controller via a shared communication network.
Figure 1.
Structure of the LFC system with adaptive ETS.
2.1. Description of the LFC Systems
As shown in Figure 1, the model of the LFC systems can be indicated as follows [31]
| (1) |
where the symbols of the LFC system are listed in Table 1 [2].
Table 1.
Meanings of the symbols for the LFC system.
| Symbol | Meaning |
|---|---|
| Time constant of governor | |
| Mechanical output of the generator | |
| External interference | |
| Control output | |
| Area control error | |
| Generator damping coefficient | |
| Moment of inertia of the generator | |
| Frequency deviation | |
| Frequency bias factor | |
| Speed drop | |
| Time constant of turbine | |
| Position deviation of the valve |
By applying the inverse Laplace transform to (1), it can be obtained that
| (2) |
Similar to [10], we can obtain the state-space representation for LFC systems, as follows
| (3) |
where , , and
2.2. Adaptive ETS Controller Design
Simular to [10], the PI control strategy of the LFC systems is designed as
| (4) |
where denotes proportional gain and stands for integral gain.
For convenience of obtaining the controller gains, we transform the above PI control form into the output feedback problem. Then, we redefine the output variables
Define , and we can rewrite (4) as
| (5) |
However, the sampled signal of of networked LFC systems will only be released to the PI controller via the network when the preset condition is satisfied [20]. To adjust the number of triggering packets in the LFC system, along with the state changes under deception attacks, an improved adaptive ETS is put forward, as follows:
| (6) |
where h is the sampling period, is a positive symmetric matrix to be designed, is the data-releasing instant, , , and
| (7) |
wherein is the upper bound of , and are given positive constants.
Remark 1.
It can be seen from (7) that can adaptively adjusted to the system states by a arctangent function, which is different from the existing ETS with a constant threshold. When the system states fluctuate, will be adaptively adjusted to a lower value, by which more packets with the system information can be released to the controller. When the system is stable, will be automatically adjusted to a larger value to decrease the release rate of sampled packets.
Based on the condition (6), one can obtain that
| (8) |
Since the communication network is vulnerable to cyber attacks, the transmission signal can be written as
| (9) |
where the Bernoulli variable is introduced to characterize the behavior of random deception attacks, , and the nonlinear attack signal satisfies
| (10) |
where is a known matrix with appropriate dimension.
Remark 2.
Cyber-attack has receieved great attention in recent years since it is one of the major threats to system stability [1,2,19]. Usually, cyber-attacks discussed in the literature include DoS attacks and deception attacks. The DoS attacks prevent data transmission by occupying the shared network channel, thereby degrading system performance. The deception attackers launch an attack by destroying data integrity, such as tampering with or replacing transmitted data. In this paper, we consider a kind of deception attack when investigating the LFC problem of PSs.
Remark 3.
When , the true measurement data are replaced with the data of deception attacks. Otherwise, the true measurement data can be transmitted to the controller.
Considering the deception attacks, the output of the controller in (5) can be rewritten as
| (11) |
2.3. Closed-Loop Control of LFC Systems
According to the adaptive ETS in (6), the current signal is maintained by the zero-order holder (ZOH) until the next packet is transmitted. Therefore, we need to divide the interval = [) into pieces, where , . The network-induced delay at instant is denoted by and the holding interval can be divided into
| (12) |
where
Define
where , , . Then, can be represented by
| (13) |
for
Redefining new variables . Combine (4)–(13), the LFC systems (3) with an adaptive event-triggered PI controller against deception attacks can be formulated as
| (14) |
where
The purpose of this article is to design the adaptive event-triggered PI controller subject to deception attacks, while ensuring that holds with zero initial state conditions when , and the LFC system (14) could achieve stability with .
3. Main Results
In this section, we use the Lyapunov–Krasovskii function method to derive the stability criteria of the LFC system. Then, the weight matrix of adaptive ETS and the controller gain will be calculated by LMIs. The statement of sufficient conditions for the LFC system are shown in the following.
Theorem 1.
For given scalars , , norm bound γ, and matrix , the system (14) is asymptotically stable, if there exist matrices and a matrix such that
(15)
(16) where
Proof.
Construct a Lyapunov–Krasovskii function in [31] for the system (14) as
(17) Define ; then, the following results can be derived from (17),
(18) where
From the adaptive ETS (6), one can obtain
(19) According to inequality (10), it has
(20) where is a positive symmetric matrix.
Define ; then, combining (15)–(20), and using Schur complement lemma and the method in [31] follows:
(21) where
According to (15) and (16), we can conclude that , which means that
(22) Taking the integration on both sides for (22) from 0 to , we have
(23) The LFC systems (14) are asymptotically stable with zero initial conditions when , and when . The proof is complete. □
Theorem 2.
For given scalars , , norm bound γ, the system (14) is asymptotically stable, if there are symmetric and positive definite matrices , , matrices and with appropriate dimensions, such that the following linear matrix inequalities hold:
(24)
(25)
(26) where
Then, the controller gain is derived by .
Proof.
Define , appropriate dimension matrix .
Using pre- and post-multiplying (15) with and pre- and post-multiplying (16) with , one can see that (25) and (27) hold, where = diag , = diag .
(27) where
Noting that , , it is easy to see that . Define and . By using and instead of and , and pre- and post-multiplying (27) with and , respectively, one can obtain that the inequality (26) holds. This ends the proof. □
To solve the problem of equality (24) in Theorem 2, we use the optimization algorithm in [32], which can be expressed as
| (28) |
where is a small enough constant. Furthermore, the controller gain could be calculated by (25), (26) and (28).
4. Simulation Examples
An application example of LFC systems in [33,34] is given to verify the efficacy of the method, whose nominal values are listed in Table 2.
Table 2.
System parameters utilized in simulintion section.
| Physical Quantity | (kgm) | (Hz p.u. MW) | (s) | (s) | ||
|---|---|---|---|---|---|---|
| Values | 0.1667 | 2.4 | 0.08 | 0.3 | 0.425 | 0.0083 |
Select the attack function = −tanh [2] and = diag. The mathematic expectation of the deception attack is given as . The disturbance is chosen as
Next, two cases are utilized to manifest the proposed method for LFC systems.
Case 1: The impact of deception attacks is not considered in the controller design in this case. Give the parameters . Choose the adaptive law parameters , , sampling period , the upper bound of network-induced delay , and performance index . Then, the controller gain and weighting matrix can be figured out by Theorem 2 as follows
It is assumed that the initial condition of system is . The results are obtained in Figure 2, Figure 3, Figure 4 and Figure 5. The state responses of the LFC system in Case 1 are shown in Figure 2, which indicates that the LFC system is stable after 60 s. Figure 3 illustrates the responses of control input. The adaptive law is shown in Figure 4, where the curve finally converges to the upper bound , which indicates that the amount of transmitted signals is greatly reduced when the system is stable. Figure 5 illustrates the deception attack signals of simulation.
Figure 2.
State responses of the LFC system in Case 1.
Figure 3.
Control input of LFC systems in Case 1.
Figure 4.
The threshold of the LFC system with the adaptive ETS in Case 1.
Figure 5.
Deception attacks with .
Case 2: The impact of deception attacks in the design process of the controller is considered, and the mathematic expectation of the deception attack is given as . The other parameters are the same as those in Case 1. Then, we can obtain the controller gain and weighting matrix by Theorem 2 as follows
The simulated results of Case 2 are shown in Figure 6, Figure 7 and Figure 8. Figure 6 depicts the system state trajectories, from which one can see that the state response curves of the turbine output power and frequency deviation of the closed-loop system subjected to changes in load demand. Compared to Figure 2 in Case 1, the turbine output power and the system frequency deviation approach zero in a shorter time, which indicates the use of controller in Case 2 can better mitigate the impact of deception attacks and suppress the fluctuations in system frequency and restore the stability of the system. The control input of the LFC system based on adaptive ETS are displayed in Figure 7.
Figure 6.
State responses of the LFC system based on the adaptive ETS in Case 2.
Figure 7.
Control input of the LFC system based on the adaptive ETS in Case 2.
Figure 8.
The threshold of the system with the adaptive ETS in Case 2.
Figure 8 exhibits the threshold of the system with adaptive ETS, where the triggering threshold is automatically adjusted even if the system suffers from the disturbance. When the system is stable, the adaptive threshold converges to a constant.
To reflect the merits of the proposed method in saving the network bandwidth, we compare the adaptive ETS with the conventional ETS as follows:
-
(i)
Consider in adaptive ETS (6) with the parameters .
-
(ii)The ETS in (6) with a fixed threshold is considered, which is reduced to a conventional ETS. Without loss of generality, the threshold is selected to be an average value that can be calculated by
where , denotes the -th the triggering threshold in adaptive ETS (6) at the -th sampling instant, and NDS is the number of data samplings.(29)
Using LMIs, one can obtain the controller gains of two ETSs, which are listed in Table 3. The event-triggered constant is calculated by (29) within 60 s.
Table 3.
Controller gains of two ETSs.
| Schemes | Controller Gains |
|---|---|
| General ETS with fixed threshold ( = 0.7) | [0.0393 0.5584] |
| This work | [0.0374 0.5270] |
Figure 9 and Figure 10 plot the triggering and releasing intervals of the discussed system under two schemes, in which fewer sampling packets are released over the network under the adaptive ETS. For better analysis, the statistical results of the NDS, and the packet-releasing (NPR) and data-releasing rate (DRR) for two ETSs are written in Table 4, wherein .
Figure 9.
Release instants and release intervals with = 0.7.
Figure 10.
Release instants and release intervals with the adaptive ETS.
Table 4.
The number of packets transmitted in 60 s with sampling period .
| Schemes | NDS | NPR | DRR |
|---|---|---|---|
| General ETS with fixed threshold ( = 0.7) | 1200 | 43 | 3.58% |
| This work | 1200 | 31 | 2.58% |
As shown in Table 4, the number of sampling data is 1200 within 60 s. Under the adaptive ETS (6) proposed in this paper, the number of released packets is 31, and the DRR is 2.58%. Compared to the DRR = 3.58% of the conventional ETS, the proposed adaptive ETS can significantly reduce the transmission of unnecessary packets. This indicates that more communication resources can be saved by utilizing our developed adaptive ETS.
5. Conclusions
The problem of LFC has been addressed for LFC systems under deception attacks by applying the developed adaptive ETS in this paper. To solve the issues of limited communication resources and deception attacks, a new adaptive ETS has been proposed, by which the thresholds for event-triggered conditions could be adapted to the changes in the system state under deception attacks. Based on the adaptive ETS, the average data released are lower than under the conventional ETS, and the perfomance of LFC systems subject to deception attacks can be guaranteed. Finally, the simulation results demonstrate the reliability of our proposed scheme. In future research, actuator saturation for LFC systems under cyber attacks will be worth consideration under the proposed adaptive ETS.
Author Contributions
All of the authors contributed substantially to this work: Conceptualization, X.Z. and X.S.; Methodology, F.Y. and X.Z.; Software, X.Z. and X.S.; Formal Analysis, X.Z.; Investigation, F.Y. and X.S.; Resources, F.Y.; Data Curation, X.Z.; Writing-Original Draft Preparation, Review and Editing, X.Z., F.Y. and X.S.; Project Administration, F.Y.; Funding Acquisition, F.Y. and X.S. All authors have read and agreed to the published version of the manuscript.
Funding
This research is supported by National Natural Science Foundation of China Grant No. 52005266, No. 62103193 and Postgraduate Research & Practice Innovation Program of Jiangsu Province Grant No. KYCX20_0855.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Footnotes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Hossain M.M., Chen P. Observer-based event triggering H∞ LFC for multi-area power systems under DoS attacks. Inf. Sci. 2021;543:437–453. doi: 10.1016/j.ins.2020.07.042. [DOI] [Google Scholar]
- 2.Liu J., Gu Y., Zha L., Liu Y., Cao J. Event-triggered H∞ load frequency control for multiarea power systems under hybrid cyber attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019;49:1665–1678. doi: 10.1109/TSMC.2019.2895060. [DOI] [Google Scholar]
- 3.Zhang C.K., Jiang L., Wu Q., He Y., Wu M. Delay-dependent robust load frequency control for time delay power systems. IEEE Trans. Power Syst. 2013;28:2192–2201. doi: 10.1109/TPWRS.2012.2228281. [DOI] [Google Scholar]
- 4.Pappachen A., Fathima A.P. Critical research areas on load frequency control issues in a deregulated power system: A state-of-the-art-of-review. Renew. Sustain. Energy Rev. 2017;72:163–177. doi: 10.1016/j.rser.2017.01.053. [DOI] [Google Scholar]
- 5.Tang Y., He H., Wen J., Liu J. Power system stability control for a wind farm based on adaptive dynamic programming. IEEE Trans. Smart Grid. 2017;6:166–177. doi: 10.1109/TSG.2014.2346740. [DOI] [Google Scholar]
- 6.Chang C., Fu W. Area load frequency control using fuzzy gain scheduling of PI controllers. Electr. Power Syst. Res. 1997;42:145–152. doi: 10.1016/S0378-7796(96)01199-6. [DOI] [Google Scholar]
- 7.Liao K., Xu Y. A robust load frequency control scheme for power systems based on second-order sliding mode and extended disturbance observer. IEEE Trans. Ind. Inf. 2017;14:3076–3086. doi: 10.1109/TII.2017.2771487. [DOI] [Google Scholar]
- 8.Liu F., Li Y., Cao Y., She J., Wu M. A two-layer active disturbance rejection controller design for load frequency control of interconnected power system. IEEE Trans. Power Syst. 2015;31:3320–3321. doi: 10.1109/TPWRS.2015.2480005. [DOI] [Google Scholar]
- 9.Liu X., Su X., Yang R. Event-triggered sliding-mode control for multi-area power systems. IEEE Trans. Ind. Electron. 2017;64:6732–6741. [Google Scholar]
- 10.Wen S., Yu X., Zeng Z., Wang J. Event-triggering load frequency control for multiarea power systems with communication delays. IEEE Trans. Ind. Electron. 2016;63:1308–1317. doi: 10.1109/TIE.2015.2399394. [DOI] [Google Scholar]
- 11.Liu S., Liu P.X. Distributed model-based control and scheduling for load frequency regulation of smart grids over limited bandwidth networks. IEEE Trans. Ind. Inf. 2017;14:1814–1823. doi: 10.1109/TII.2017.2766666. [DOI] [Google Scholar]
- 12.Basomingera R., Choi Y.J. Learning from routing information for detecting routing misbehavior in ad hoc networks. Sensors. 2020;20:6275. doi: 10.3390/s20216275. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 13.Gu Z., Park J.H., Yue D., Wu Z.G., Xie X.P. Event-triggered security output feedback control for networked interconnected systems subject to cyber-attacks. IEEE Trans. Syst. Man Cybern. Syst. 2020 doi: 10.1109/TSMC.2019.2960115. [DOI] [Google Scholar]
- 14.Peng C., Yue D., Tian E., Gu Z. Observer-based fault detection for networked control systems with network quality of services. Appl. Math. Modell. 2010;34:1653–1661. doi: 10.1016/j.apm.2009.09.014. [DOI] [Google Scholar]
- 15.Junior L., Cristino W., Moraes D., Coreixas C. A triggering mechanism for cyber-attacks in naval sensors and systems. Sensors. 2021;21:3195. doi: 10.3390/s21093195. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 16.Fantacci R., Nizzi F., Pecorella T., Pierucci L., Roveri M. False data detection for fog and internet of things networks. Sensors. 2019;19:4235. doi: 10.3390/s19194235. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 17.Yan S., Gu Z., Park J.H. Memory-event-triggered H∞ load frequency control of multi-area power systems with cyber-attacks and communication delays. IEEE Trans. Netw. Sci. Eng. 2021;8:1571–1583. doi: 10.1109/TNSE.2021.3064933. [DOI] [Google Scholar]
- 18.Gu Z., Sun X., Lam H.K., Yue D., Xie X. Event-based secure control of T–S fuzzy based 5-DOF active semi-vehicle suspension systems subject to DoS attacks. IEEE Trans. Fuzzy Syst. 2021 doi: 10.1109/TFUZZ.2021.3073264. [DOI] [Google Scholar]
- 19.Peng C., Li J., Fei M. Resilient event-triggering H∞ load frequency control for multi-area power systems with energy-limited DoS attacks. IEEE Trans. Power Syst. 2017;32:4110–4118. doi: 10.1109/TPWRS.2016.2634122. [DOI] [Google Scholar]
- 20.Yue D., Tian E., Han Q.L. A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control. 2013;58:475–481. doi: 10.1109/TAC.2012.2206694. [DOI] [Google Scholar]
- 21.Gu Z., Yue D., Tian E. On designing of an adaptive event-triggered communication scheme for nonlinear networked interconnected control systems. Inf. Sci. 2018;422:257–270. doi: 10.1016/j.ins.2017.09.005. [DOI] [Google Scholar]
- 22.Yan S., Gu Z., Nguang S.K. Memory-event-triggered H∞ output control of neural networks with mixed delays. IEEE Trans. Neural Netw. Learn. Syst. 2021 doi: 10.1109/TNNLS.2021.3083898. [DOI] [PubMed] [Google Scholar]
- 23.Zhang C., Feng G., Qiu J., Shen Y. Control synthesis for a class of linear network-based systems with communication constraints. IEEE Trans. Ind. Electron. 2013;60:3339–3348. doi: 10.1109/TIE.2012.2200226. [DOI] [Google Scholar]
- 24.Bemani A., Björsell N. Distributed event triggering algorithm for multi-agent system over a packet dropping network. Sensors. 2021;21:4835. doi: 10.3390/s21144835. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 25.Hu S., Yue D., Yin X., Xie X., Ma Y. Adaptive event-triggered control for nonlinear discrete-time systems. Int. J. Robust Nonlinear Control. 2016;26:4104–4125. doi: 10.1002/rnc.3550. [DOI] [Google Scholar]
- 26.Yan S., Shen M., Nguang S.K., Zhang G. Event-triggered H∞ control of networked control systems with distributed transmission delay. IEEE Trans. Autom. Control. 2019;65:4295–4301. doi: 10.1109/TAC.2019.2953460. [DOI] [Google Scholar]
- 27.Liu Y., Chen Y., Li M. Dynamic event-based model predictive load frequency control for power systems under cyber attacks. IEEE Trans. Smart Grid. 2020;12:715–725. doi: 10.1109/TSG.2020.3022094. [DOI] [Google Scholar]
- 28.Gu Z., Shi P., Yue D., Yan S., Xie X. Memory-based continuous event-triggered control for networked T–S fuzzy systems against cyber-attacks. IEEE Trans. Fuzzy Syst. 2020;29:3118–3129. doi: 10.1109/TFUZZ.2020.3012771. [DOI] [Google Scholar]
- 29.Gu Z., Shi P., Yue D., Ding Z. Decentralized adaptive event-triggered H∞ filtering for a class of networked nonlinear interconnected system. IEEE Trans. Cybern. 2018;49:1570–1579. doi: 10.1109/TCYB.2018.2802044. [DOI] [PubMed] [Google Scholar]
- 30.Gu Z., Shi P., Yue D. An adaptive event-triggering scheme for networked interconnected control system with stochastic uncertainty. Int. J. Robust Nonlinear Control. 2017;27:236–251. doi: 10.1002/rnc.3570. [DOI] [Google Scholar]
- 31.Peng C., Zhang J., Yan H. Adaptive event-triggering H∞ load frequency control for network-based power systems. IEEE Trans. Ind. Electron. 2017;65:1685–1694. doi: 10.1109/TIE.2017.2726965. [DOI] [Google Scholar]
- 32.Gu Z., Fei S.M., Zhao Y.Q., Tian E.G. Robust control of automotive active seat-suspension system subject to actuator saturation. J. Dyn. Syst. Meas. Control. 2014;136:041022. doi: 10.1115/1.4026833. [DOI] [Google Scholar]
- 33.Pham T.N., Nahavandi S., Trinh H. Static output feedback frequency stabilization of time-delay power systems with coordinated electric vehicles state of charge control. IEEE Trans. Power Syst. 2016;32:3862–3874. doi: 10.1109/TPWRS.2016.2633540. [DOI] [Google Scholar]
- 34.Tian E., Peng C. Memory-based event-triggering H∞ load frequency control for power systems under deception attacks. IEEE Trans. Cybern. 2020;50:4610–4618. doi: 10.1109/TCYB.2020.2972384. [DOI] [PubMed] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
Not applicable.










