Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Exploring Multiple-Objective Optimization for Efficient and Effective Test Paper Design with Dynamic Programming Guided Genetic Algorithm

  • Automatic test paper design is critical in education to reduce workloads for educators and facilitate an efficient teaching process. However, current designs fail to satisfy the realistic teaching requirements of educators, including the consideration of both test quality and efficiency. This is the main reason why teachers still manually construct tests in most teaching environments. In this paper, the quality of tests is quantitatively defined while considering multiple objectives, including a flexible coverage of knowledge points, cognitive levels, and question difficulty. Then, a model based on the technique of linear programming is delicately designed to explore the optimal results for this newly defined problem. However, this technique is not efficient enough, which cannot obtain results in polynomial time. With the consideration of both test quality and generation efficiency, this paper proposes a genetic algorithm (GA) based method, named dynamic programming guided genetic algorithm with adaptive selection (DPGA-AS). In this method, a dynamic programming method is proposed in the population initialization part to improve the efficiency of the genetic algorithm. An adaptive selection method for the GA is designed to avoid prematurely falling into the local optimal for better test quality. The question bank used in our experiments is assembled based on college-level calculus questions from well-known textbooks. The experimental results show that the proposed techniques can construct test papers with both high effectiveness and efficiency. The computation time of the test assembly problem is reduced from 3 hours to 2 seconds for a 5000-size question bank as compared to a linear programming model with similar test quality. The test quality of the proposed method is better than the other baselines.

    Citation: Han Wang, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Jianghua Xia, Rui Xu. Exploring Multiple-Objective Optimization for Efficient and Effective Test Paper Design with Dynamic Programming Guided Genetic Algorithm[J]. Mathematical Biosciences and Engineering, 2024, 21(3): 3668-3694. doi: 10.3934/mbe.2024162

    Related Papers:

    [1] Yujia Xiang, Yuqi Jiao, Xin Wang, Ruizhi Yang . Dynamics of a delayed diffusive predator-prey model with Allee effect and nonlocal competition in prey and hunting cooperation in predator. Electronic Research Archive, 2023, 31(4): 2120-2138. doi: 10.3934/era.2023109
    [2] Xiaowen Zhang, Wufei Huang, Jiaxin Ma, Ruizhi Yang . Hopf bifurcation analysis in a delayed diffusive predator-prey system with nonlocal competition and schooling behavior. Electronic Research Archive, 2022, 30(7): 2510-2523. doi: 10.3934/era.2022128
    [3] Miao Peng, Rui Lin, Zhengdi Zhang, Lei Huang . The dynamics of a delayed predator-prey model with square root functional response and stage structure. Electronic Research Archive, 2024, 32(5): 3275-3298. doi: 10.3934/era.2024150
    [4] Fengrong Zhang, Ruining Chen . Spatiotemporal patterns of a delayed diffusive prey-predator model with prey-taxis. Electronic Research Archive, 2024, 32(7): 4723-4740. doi: 10.3934/era.2024215
    [5] Mengting Sui, Yanfei Du . Bifurcations, stability switches and chaos in a diffusive predator-prey model with fear response delay. Electronic Research Archive, 2023, 31(9): 5124-5150. doi: 10.3934/era.2023262
    [6] Maurıicio F. S. Lima, Jaume Llibre . Hopf bifurcation for a class of predator-prey system with small immigration. Electronic Research Archive, 2024, 32(7): 4604-4613. doi: 10.3934/era.2024209
    [7] Chen Wang, Ruizhi Yang . Hopf bifurcation analysis of a pine wilt disease model with both time delay and an alternative food source. Electronic Research Archive, 2025, 33(5): 2815-2839. doi: 10.3934/era.2025124
    [8] Ruizhi Yang, Dan Jin . Dynamics in a predator-prey model with memory effect in predator and fear effect in prey. Electronic Research Archive, 2022, 30(4): 1322-1339. doi: 10.3934/era.2022069
    [9] Kerioui Nadjah, Abdelouahab Mohammed Salah . Stability and Hopf bifurcation of the coexistence equilibrium for a differential-algebraic biological economic system with predator harvesting. Electronic Research Archive, 2021, 29(1): 1641-1660. doi: 10.3934/era.2020084
    [10] Yichao Shao, Hengguo Yu, Chenglei Jin, Jingzhe Fang, Min Zhao . Dynamics analysis of a predator-prey model with Allee effect and harvesting effort. Electronic Research Archive, 2024, 32(10): 5682-5716. doi: 10.3934/era.2024263
  • Automatic test paper design is critical in education to reduce workloads for educators and facilitate an efficient teaching process. However, current designs fail to satisfy the realistic teaching requirements of educators, including the consideration of both test quality and efficiency. This is the main reason why teachers still manually construct tests in most teaching environments. In this paper, the quality of tests is quantitatively defined while considering multiple objectives, including a flexible coverage of knowledge points, cognitive levels, and question difficulty. Then, a model based on the technique of linear programming is delicately designed to explore the optimal results for this newly defined problem. However, this technique is not efficient enough, which cannot obtain results in polynomial time. With the consideration of both test quality and generation efficiency, this paper proposes a genetic algorithm (GA) based method, named dynamic programming guided genetic algorithm with adaptive selection (DPGA-AS). In this method, a dynamic programming method is proposed in the population initialization part to improve the efficiency of the genetic algorithm. An adaptive selection method for the GA is designed to avoid prematurely falling into the local optimal for better test quality. The question bank used in our experiments is assembled based on college-level calculus questions from well-known textbooks. The experimental results show that the proposed techniques can construct test papers with both high effectiveness and efficiency. The computation time of the test assembly problem is reduced from 3 hours to 2 seconds for a 5000-size question bank as compared to a linear programming model with similar test quality. The test quality of the proposed method is better than the other baselines.



    Dendrolimus is a forest pest with large occurrence and wide damage area. Among them, Dendrolimus superans is mainly distributed in Northeast China, Russia Far East, Japan, and so on. Dendrolimus superans are mainly parasitic on coniferous trees such as Larix gmelinii Kuzen and Pinus tabuliformis Carriere. Their larvae eat a large number of needles, resulting in trees being unable to carry out normal photosynthesis, eventually leading to a wide range of trees being destroyed or killed. Dendrolimus superans is extremely harmful to agriculture and forestry. In addition, the outbreak of Dendrolimus superans leads to tree death, reduces vegetation coverage, changes in plant population structure, and damages forest health and ecosystem stability. The life cycle of Dendrolimus superans consists of four stages: Egg, larva, pupa, and adult. In the life cycle of Dendrolimus superans, their development typically encompasses several key stages: Adult, egg, larva, and pupa, with each stage transitioning closely to the next. Specifically, adult insects will actively approach trees as a crucial behavior for seeking suitable environments to lay eggs. After the adults deposit their eggs on pine needles, the eggs will eventually hatch into larvae. During the larval stage, insects crawl on pine needles; this behavior is likely in search of food resources to meet the demands of their rapid growth and development. Subsequently, the larvae enter the pupal stage, during which they undergo a series of complex physiological and morphological changes. Finally, they metamorphose into adults through a process of transformation, thus completing a full life cycle. This process not only showcases the morphological and behavioral characteristics of insects at different life stages but also reflects their important strategies for adapting to the environment and reproducing. Among these stages, the larval stage is the most damaging to forests. The spread mechanism of the Dendrolimus superans is illustrated in Figure 1.

    Figure 1.  Spread mechanism of Dendrolimus superans infestation.

    There are three major methods for the prevention and control of Dendrolimus superans: Physical control, chemical control, and biological control. Among them, physical control is mainly aimed at the behavior patterns and characteristics of Dendrolimus superans. However, this method requires a lot of manpower and material resources, which is not suitable for large-scale prevention and control [1]. Although chemical control is effective for large-scale pests, the use of pesticides and other chemical reagents may cause environmental pollution. By comparison, biological control is an environmentally friendly and sustainable pest control technology. The use of natural biological control of pests reduces the use of chemical pesticides, maintains ecological balance, avoids pest resistance, and is harmless to human health. Therefore, it is suitable for long-term pest control. Dendrolimus superans mostly has two major natural enemies: Parasitic natural enemies and predatory natural enemies. Among the parasitic natural enemies, Trichogramma and Exorista civilis play an important role; in terms of predatory natural enemies, it is represented by Common Cuckoo, Cyanopica cyanus, and so on, as illustrated in Figure 2.

    Figure 2.  The variety of natural enemies that prey on Dendrolimus superans.

    When exploring the interaction between Dendrolimus superans and Cyanopica cyanus, we frequently employ the predator-prey model for analysis. This model is crucial for understanding and studying the dynamic changes in the predator-prey relationship between these two species within the realm of mathematical biology. In other studies, scholars have continuously refined and optimized these models [2,3,4,5,6,7]. The flight distance of adult female Dendrolimus superans is about 1.5 km, which shows that there are some limitations in their dispersal ability. Therefore, in the study of predator-prey model, the research environment can be regarded as relatively isolated. In such a relatively closed natural environment, scholars are concerned about the various factors that affect the system. Some biological studies have shown that habitat complexity affects population size and growth trends, indicating the important role of habitat complexity in the construction of ecological communities [8,9,10]. In addition, the construction of mixed forests provides habitat for natural enemies, increases environmental complexity, creates an ecological environment that is not conducive to the growth and development of Dendrolimus superans, and can effectively control the population of Dendrolimus superans [11,12]. Therefore, it is of great significance to study the biological control of Dendrolimus superans and their impact on forest ecosystems by using mathematical models. Based on the Lotka-Volterra model[13], Ma and Wang[14] proposed a predator-prey model with time delay and habitat complexity, that is

    {dudt=ru(1uK)c(1β)uαv1+ch(1β)uα,dvdt=ec(1β)uα(tτ)v(tτ)1+ch(1β)uα(tτ)dv, (1.1)

    where u and v describe the population of prey and predator, respectively. r is the intrinsic growth rate of prey. K is the capacity of environmental for prey. c is the attack rate of predator. β stands for the strength of habitat complexity. h is the handling time of predator. e is the conversion efficiency. τ is the gestation delay of predator. d is the death rate of predator. α is a positive real number. All parameters in model (1.1) are positive.

    The relationship between Dendrolimus superans and its natural enemies is typically characterized using the predator-prey model. The functional response, a key component in predator-prey models, is frequently employed to describe the predation ability of predators. Grounded in experimental findings, Holling[15] developed three functional responses, which are described below:

    I:mu,II:au1+mu,III:au21+mu2.

    In a specific area, we assume that the predation rate will reach saturation when the population of natural enemies is sufficiently large. This means that the predation rate will not increase further even if the number of natural enemies continues to grow. Conversely, when the population of natural enemies is low and begins to increase, the predation rate rises more rapidly than a linear function. This nonlinear increase is due to the fact that predators become more efficient at capturing prey as their numbers increase. A natural selection for such a predation rate is the Holling type-II functional response, which captures this nonlinear relationship between predator population and predation rate. In other words, the value of parameter α=1 in model (1.1).

    In a relatively closed natural environment, the spatial distribution of predators and prey significantly influences population dynamics, resource allocation, and predation efficiency. The nonlocal competition is in the interaction of predators and prey in different spatial locations, so that the system can predict the population dynamics and competition results more accurately. Peng and Zhang[16] investigated a predator-prey model incorporating collective behavior and nonlocal competition among prey. The findings indicated that nonlocal competition had a destabilizing effect on the predator-prey system.

    In addition to geographical distribution, ecological conditions, and other factors, time delay also plays an important role in the maintenance of ecological balance. In the predator-prey model, gestation delay is a key biological factor affecting the system, which is mainly reflected in the time difference between the occurrence of predation behavior and the birth of offspring. This physiological trait can significantly change the functional response pattern of predators to prey: During the breeding interval, the predator's predation frequency may decrease significantly or decrease to zero. This time delay mechanism directly affects the predator's growth rate by adjusting the number of effective predation per unit time and affects the dynamic balance of the ecosystem. The researchers in [17,18,19] developed a type of predator-prey model incorporating gestation delay and examined the dynamic characteristics of the systems.

    Inspired by the above, we incorporate the nonlocal competition and gestation delay into the model (1.1). In the ecological environment, spatial distribution is often inhomogeneous, and spatial diffusion often occurs within populations. Therefore, when we study predator-prey models, reaction-diffusion equations may be more realistic. Thus, the resulting system is given by:

    {u(x,t)t=d1Δu+ru(1˜uK)acuv1+achu,xΩ,t>0,v(x,t)t=d2Δv+gacu(x,tτ)v(x,tτ)1+ahcu(x,tτ)dv,xΩ,t>0,u(x,t)n=0,v(x,t)n=0,xΩ,t>0,u(x,t)=u0(x,t)0,v(x,t)=v0(x,t)0,(t,x)[τ,0]ׯΩ, (1.2)

    where u and v denote the density of Dendrolimus superans (prey) and Cyanopica cyanus (predator), respectively, the parameters r, K, h, c, and d have the same meanings as in model (1.1). d1 stands for the diffusion coefficients of Dendrolimus superans. d2 stands for the diffusion coefficients of Cyanopica cyanus. g denotes the efficiency with which energy is transferred from the species Dendrolimus superans to Cyanopica cyanus. a is the attack rate of predator on prey. τ is the gestation delay of Cyanopica cyanus. r, K, a, c, h, g, d, d1, d2 are a positive constant. We select Ω(0,lπ) where l>0. ˜u=1KΩG(x,y)u(y,t)dy represents the nonlocal competition, and the kernel function is given by G(x,y)=1|Ω|=1lπ, which is based on the assumption that the competition intensity among prey individuals in the habitat is uniform, meaning that the competition between any two preys is identical. The Neumann boundary condition is employed in this study, suggesting that the habitat is closed and effectively preventing any prey or predator from entering or leaving, thereby maintaining a self-contained ecosystem. We aim to investigate the dynamics of a predator-prey model, with a particular focus on the stability and dynamic properties of the system as the time delay parameter varies and serves as the bifurcation parameter.

    The structure of this paper is as follows: In Section 2, we analyze the stability of positive constant steady states and the existence of Hopf bifurcation. In Section 3, we investigate the normal form of the Hopf bifurcation. In Section 4, we present numerical simulations. Finally, conclusions are drawn in Section 5.

    System (1.2) has a boundary equilibria E0=(0,0) and a non-trivial equilibrium E1=(u,v), where

    u=d(ghd)ac,v=rg(ghd)ac(1uK).

    If the following assumption holds:

    (H0)g>hd,

    then the system (1.2) must have a positive constant steady equilibrium E1=(u,v).

    By defining U(x,t)=(u(x,t),v(x,t))T, the linearized system for Eq (1.2) can be re-expressed as a differential equation at the equilibrium E=(u0,v0),with(u0,v0)=(0,0)or(u,v):

    tU=D(Δu(x,t)Δv(x,t))+L1(u(x,t)v(x,t))+L2(u(x,tτ)v(x,tτ))+L3(˜u(x,t)˜v(x,t)),

    where

    D=(d100d2),L1=(a1a20d),L2=(00b1b2),L3=(c1000),

    with a1=r(1u0K)acv0(1+achu0)2,a2=acu01+achu0,b1=gacv0(1+achu0)2,b2=gacu01+achu0,c1=ru0K.

    Especially, when (u0,v0)=(u,v), a1=r(1uK)hdg>0,a2=dg<0,b1=r(ghd)(1uK)>0,b2=d>0,c1=ruK<0.

    Hence, the characteristic equation of (1.2) at E=(u0,v0) is given as follows:

    λ2+Anλ+(Bnλ+Cn)eλτ+Dn=0,n=0,1,2. (2.1)

    where

    {An=(nl)2(d1+d2)+da1δnc1,Bn=b2,Cn=(nl)2b2d1+a1b2a2b1+δnb2c1,Dn=(nl)4d1d2+(nl)2d1d(nl)2a1d2a1dδnc1d,

    with

    δn={1,n=0,0,n0.

    When τ=0, Eq (2.1) for equilibrium E0=(0,0) becomes

    λ2+[n2l2(d1+d2)+dr]λ+n4l4d1d2+n2l2d1dn2l2rd2rd=0,n=0,1,2. (2.2)

    For the case of n=0 in Eq (2.2), the product of the two eigenvalues rd is negative. Therefore, the equilibrium E0=(0,0) is always unstable.

    When τ=0, Eq (2.1) for equilibrium E1=(u,v) becomes

    λ2+(An+Bn)λ+Cn+Dn=0,n=0,1,2. (2.3)

    Subsequently, we examine the conditions under which habitat complexity guarantees the stability of a positive constant steady state in the system (1.2).

    An+Bn=(nl)2(d1+d2)a1. Due to d1+d2>0, there is An+Bn>A1+B1>A0+B0=(a1+c1). Assuming A0+B0=(a1+c1)>0, there is c<hd+gahK(ghd). So we have A1+B1=d1+d2l2a1>0d1+d2l2rhdg+rhd2gk(ghd)ac>0. Thus, if rhdl2(d1+d2)g>0, that is c<rhd2l2Ka(ghd)[rhdl2(d1+d2)g]. Otherwise, if rhdl2(d1+d2)g<0, that is c>0. Define:

    c0={rhd2l2Ka(ghd)[rhdl2(d1+d2)g],rhdl2(d1+d2)g>0,hd+gahK(ghd),rhdl2(d1+d2)g<0.

    Due to a1>0,a2<0,b1>0,b2>0,C0+D0=a2b1>0 holds. When n=0, a2b1>0, a12d10 and 1=(a1d2)2+4a2b1d1d2<0 c<dk(ghd)a(14d1(ghd)rh)1c, the function Cn+Dn=(nl)4d1d2(nl)2a1d2a2b1>0 holds for any nN.

    In summary, if c<min{hd+gahK(ghd),c0,c} holds, A0B0>0,AnBn>0,Cn+Dn>0, for nN holds. Thus, we make the following hypothesis

    (H1)c<min{hd+gahK(ghd),c0,c}.

    When (H1) holds, the roots of characteristic equation (2.3) have negative real parts.

    Theorem 1. For the model (1.2) with τ=0, the stability findings for equilibria are detailed below:

    1) Equilibrium E0=(0,0) is always unstable.

    2) Equilibrium E1=(u,v) is always locally asymptotically stable when (H0) and (H1) hold.

    3) Equilibrium E1=(u,v) is always unstable when (H0) or (H1) does not hold.

    Next, we investigate the existence of bifurcating periodic solutions near the positive constant steady state E1=(u,v) for τ0.

    When τ0, the characteristic equation describing the system (2.1) is presented as:

    λ2+Anλ+(Bnλ+Cn)eλτ+Dn=0,n=0,1,2. (2.4)

    We may assume that λ=±iω (ω>0) are a pair of purely imaginary roots of Eq (2.4). By substituting λ=±iω into Eq (2.4) and separating the real and imaginary components, we derive:

    {ω2+Dn+Cncos(ωτ)Bnωsin(ωτ)=0,ωAnCnsin(ωτ)Bnωcos(ωτ)=0,

    that is,

    {cos(ωτ)=ω2(AnBn+Cn)DnCnC2n+B2nω2,sin(ωτ)=ω(AnCn+BnDn+Bnω2)C2n+B2nω2, (2.5)

    with n=0,1,2. Then, for n=0,1,2,3 and j=0,1,2,3, we get

    τ(j)n={1ωnarccos(cosωτ)+2jπ,sinωτ0,1ωn[2πarccos(cosωτ)]+2jπ,sinωτ<0. (2.6)

    From (2.5), let z=ω2, we obtain:

    h(z)=z2+(A2n2DnB2n)z+D2nC2n=0. (2.7)

    Calculating the transversality condition, we get:

    Re(dλdτ)1|τ=τ(j)n=2z+(A2n2DnB2n)C2n+B2nω2n=h(z)C2n+B2nω2n.

    Denote

    τc=min{τ(0)nnN+} (2.8)

    and

    (H2)D2nC2n<0,
    (H3)A2n2DnB2n<0,D2nC2n>0,Δn>0,

    with Δn=(A2n2DnB2n)24(D2nC2n).

    We define the following set

    G1={nkjN+|j=1,2,3},
    G2={nktN+|t=1,2,3}.

    G1 satis (H2) and G2 satis (H3), respectively.

    When (H2) holds, Eq (2.7) has the unique positive root znk for some n=nkjG1. Therefore, we can solve for ωnk and τ(j)nk, where

    ωnk=12[[A2nk2DnkB2nk])+Δnk], (2.9)

    h(znk)>0,so we haveRe(dλdτ1)1|τ=τ(j)nk>0.

    When (H3) holds, Eq (2.7) has two positive root znt,i for some n=nktG2. Therefore, we can solve for ωnt,i and τ(j)nt,i,i=1,2, where

    ωnt,i=12[(A2nt,i2Dnt,iB2nt,)Δnt,i]. (2.10)

    Due to ωnt,1<ωnt,2, we have h(znt,1)<0 and h(znt,2)>0. Thus Re(dλdτ)1|τ=τ(j)nt,1<0, Re(dλdτ)1|τ=τ(j)nt,2>0 hold.

    In summary, we can get the following conclusions.

    Theorem 2. Under the framework of model (1.2) with τ0, when (H0) and (H1) are valid and τ(j)n is defined by Eq (2.6), the subsequent conclusions hold.

    1) Under the conditions G1= and G2=,Eq (2.7) has no positive roots, and the positive constant steady state E1 retains local asymptotic stability for all τ0.

    2) Under the conditions G1 and G2=,Eq (2.7) admits a unique positive root znk for some nkG1, the positive constant steady state E1 of system (1.2) exhibits asymptotic stability for 0<τ1<τc and unstable for τ1>τc, where τc=min{τ(0)nknkG1}. Additionally, system (1.2) undergoes nkmode Hopf bifurcation near E1 when τ=τ(j)nk(nkG1,j=0,1,2,3).

    3) Under the conditions G1= and G2,Eq (2.7) admits two positive roots znt,i(i=1,2) for some ntG2, the positive constant steady state E1 of system (1.2) exhibits asymptotic stability for 0<τ1<τc, but a stability switch may occur for τ1>τc, where τc=min{τ(0)ntntG1}. Furthermore, ntmode Hopf bifurcation emerges near E1 at τ=τ(j)nt(ntG1,j=0,1,2,3).

    4) Under the conditions G1 and G2,Eq (2.7) admits positive roots znk and znt,i(i=1,2) and letting np correspond to the smallest critical time delay τc, where npG1 or npG2, the positive constant steady state E1 of model (1.2) remains asymptotically stable for 0<τ1<τc, but a stability switch may arise for τ1>τc, where τc=min{τ(0)npnpG1ornpG2}. Furthermore, npmode Hopf bifurcation occurs near E1 at τ=τ(j)np(npG1ornpG2,j=0,1,2,3).

    In this section, we use the multiple time scales method to derive the normal form of the Hopf bifurcation for system (1.2).

    Suppose that the characteristic equation (2.4) has a pair of pure imaginary roots λ=±iω for τ=τc Then, system (1.2) undergoes n-mode Hopf bifurcation near the equilibrium point E1. Then, we derive the normal form of Hopf bifurcation of system (1.2) by the multiple time scales method. We choose time delay τ as a bifurcation parameter, where τ=τc+εμ. The parameter ε is a dimensionless scaling factor, μ is a perturbation parameter, and τc is given in Eq (2.8).

    We let u(x,t)u(x,t)u, v(x,t)v(x,t)v, α=ac, then model (1.2) can be rewritten as

    {u(x,t)t=d1Δu+u(rf1uK)ruK˜uf2v12f11u2f12uv16f111u312f112u2v,v(x,t)t=d2Δu+gf2v(x,tτ)+gf1u(x,tτ)+g2f11u2(x,tτ)+gf12u(x,tτ)v(x,tτ)+g6f111u3(x,tτ)+g2f112u2(x,tτ)v(x,tτ)dv, (3.1)

    where

    f1=αv(1+αhu)2,f2=αu1+αhu,f11=2α2hv(1+αhu)3+rK,f12=α(1+αhu)2,f111=6α3h2v(1+αhu)4,f112=2α2h(1+αhu)3.

    Let h=(h11,h12)T be the the eigenvector of the linear operator of system (3.1) corresponding to the eigenvalue λ=iω, and let h=(h11,h12)T be the normalized eigenvector of the adjoint operator of the linear operator of system (3.1) corresponding to the eigenvalue iω satisfying the inner product <h, h>=¯hTh=1. By a simple calculation, we get

    h=(h11,h12)T=(1,iω(nl)2d1+rf1uKuKδnf2),h=s(h21,h22)T=s(f2iω(nl)2d1+rf1uKuKδn,1), (3.2)

    with s=(¯h11h21+h22¯h12)1, and

    δn={1,n=0,0,n0.

    Suppose the solution of Eq (3.1) is

    U(x,t)=U(x,T0,T1,T2,)=+k=1εkUk(x,T0,T1,T2,), (3.3)

    where

    U(x,T0,T1,T2,)=(u(x,T0,T1,T2,),v(x,T0,T1,T2,))T,Uk(x,T0,T1,T2,)=(uk(x,T0,T1,T2,),vk(x,T0,T1,T2,))T.

    The derivation with respect to t is

    ddt=T0+εT1+ε2T2+=D0+εD1+ε2D2+,

    where the differential operator Di=Ti,i=0,1,2,.

    We obtain

    U(x,t)t=εD0U1+ε2D0U2+ε2D1U1+ε3D0U3+ε3D1U2+ε3D2U1+,ΔU(x,t)=εΔU1(x,t)+ε2ΔU2(x,t)+ε3ΔU3(x,t)+. (3.4)

    Denote

    uj=uj(x,T0,T1,T2,),vj=vj(x,T0,T1,T2,),uj,τc=uj(x,T0τc,T1,T2,),vj,τc=vj(x,T0τc,T1,T2,),

    with j=1,2,3,.

    We take perturbations as τ=τc+εμ to deal with the delayed terms. By expand U(x,tτ) at U(x,T0τc,T1,T2,···), respectively, that is,

    {u(x,tτ)=εu1,τc+ε2u2,τc+ε3u3,τcε2μD0u1,τcε3μD0u2,τcε2τcD1u1,τcε3μD1u1,τcε3τcD2u1,τcε3τcD1u2,τc+,v(x,tτ)=εv1,τc+ε2v2,τc+ε3v3,τcε2μD0v1,τcε3μD0v2,τcε2τcD1v1,τcε3μD1v1,τcε3τcD2v1,τcε3τcD1v2,τc+. (3.5)

    By substituting Eqs (3.3)–(3.5) into Eq (3.1), we obtain the expression for ε.

    {D0u1d1Δu1(rf1uK)u1+uK~u1+f2v1=0,D0v1d2Δv1gf2v1,τcgf1u1,τc+dv1=0. (3.6)

    The solution of Eq (3.6) can be written as follows:

    {u1=GeiωτcT0h11cos(nx)+c.c.,v1=GeiωτcT0h12cos(nx)+c.c., (3.7)

    where h11 and h12 are given in Eq (3.2), and c.c. means the complex conjugate of the preceding terms.

    For the ε2, we have

    {D0u2d1u2(rf1uK)u2+uK~u2+f2v2=D1u1~u1v1K12f11u21f12u1v1,D0v2d2v2gf2v2,τcgf1u2,τc+dv2=D1v1+gf2(τcD1v1,τc+μD0v1,τc)+gf1(τcD1u1,τc+μD0u1,τc)+g2f11u21,τc+gf12u1,τcv1,τc. (3.8)

    Substituting Eq (3.7) into the right side of Eq (3.8), we denote the coefficient vector of eiωT0 as m1, from solvability condition <h,(m1,cosnlx)>=0, we obtain

    GT1=μMG, (3.9)

    with

    M=iω(gf2h12+gf1h11)[iωn2l2d1+rf1uK(1δn)]f2h11+(h12+τcgf2h12+τcgf1h11)[iωn2l2d1+rf1uK(1δn)].

    Assume the solution of Eq (3.8) to be as follows:

    {u2=+k=0(η0kG¯G+η1kG2e2iωT0+¯η1k¯G2e2iωT0)cos(kxl),v2=+k=0(ς0kG¯G+ς1kG2e2iωT0+¯ς1k¯G2e2iωT0)cos(kxl). (3.10)

    Denote

    {ck=lπ0cos(nxl)cos(kxl)dx={lπ,k=n0,lπ2,k=n=0,0,kn.fk=lπ0cos2(nxl)cos(kxl)dx={lπ2,k=0,lπ4,k=2n0,0,k2n0.

    Substituting solutions Eqs (3.7) and (3.10) into Eq (3.8), we obtain

    η0k=X0kD0kY0kB0kA0kD0kC0kB0k,ζ0k=A0kY0kC0kX0kA0kD0kC0kB0k,η1k=X1kD1kY1kB1kA1kD1kC1kB1k,ζ1k=A1kY1kC1kX1kA1kD1kC1kB1k,

    where

    {A0k=[(kl)2d1(rf1uK)]lπ0cos2(klx)dx+uklπ[lπ0cos2(klx)dx]2,B0k=f2lπ0cos2(klx)dx,C0k=gf1lπ0cos2(klx)dx,D0k=(d1+d2gf2)lπ0cos2(klx)dx,X0k=[(h11¯h12+h12¯h11)f2+f11h11¯h11+(h11¯h12+h11h12)]fk,Y0k=g[f11h11¯h11+f12(h12¯h11+h11¯h12)]fk,A1k=[2iω+(kl)2d1(rf1uK)]lπ0cos2(klx)dx+uklπ[lπ0cos2(klx)dx]2,B1k=f2lπ0cos2(klx)dx,C1k=gf1lπ0cos2(klx)dx,D1k=[2iω+d2(kl)2gf2+d1]lπ0cos2(klx)dx,X1k=h11h12ck(12f11h211+f2h11h12)fk,Y1k=(g2f11h211+gf12h12h11)fk.

    For the ε3, we obtain

    {D0u3d1u3(rf1u3K)u3+u3K~u3+f2v3+16f111u33=D2u1D1u2~u1v2+~u2v1Kf11(u1u2+u2v1)16f111u3112f112u21v1+o(μ),D0v3d2v3+gf2v3,τc+dv3=D1u2D2u1gf2τc(D2v1,τc+D1v2,τc)gf1τc(D2u1,τc+D1u2,τc)+gf11(u2,τcu1,τcu1D1u1,τcτc)++g6f11u31,τc+g2f11u21,τ1v1,τc+gf12[u1,τcv2,τc+u2,τcv1,τcτc(D1u1,τcv1,τc+D1v1,τcv1,τc)]+o(μ). (3.11)

    Substituting Eqs (3.7) and (3.10) into the right side of Eq (3.11), we denote the coefficient vector of eiωT0 as m2, by solvability condition <h,(m2,cosnlx)>=0, we obtain

    GT2=XG2¯G, (3.12)

    where

    X=σφ, (3.13)

    with

    {σ=k=01klπ(η0kh11+η1k¯h11)fk+k=0(f11η0kh11+f11η1k¯h11+f12ς0kh12+f12ς1k¯h12)ck12[(1g)f111h211¯h11+(f112gf111)(h211¯h12+2h11¯h11h12)]lπ0cos3(nlx)dx+k=0g[f11(η0kh11+η1k¯h11)+f12(ς0kh11+ς1k¯h11+η0kh12+η1k¯h12)]ck,φ=[2h11+gτc(f2h12+f1h11)]lπ0cos2(nlx)dx.

    According to the above analysis, the normal form of Hopf bifurcation for system (1.2) reduced on the center manifold is

    ˙G=MμG+XG2¯G, (3.14)

    where M and X are given by Eqs (3.9) and (3.13), respectively.

    Let G=reiθ and substitute it into Eq (3.14), and we obtain the Hopf bifurcation normal form in polar coordinates:

    {˙r=Re(M)μr+Re(X)r3,˙θ=Im(M)μ+Im(X)r2. (3.15)

    Therefore, we arrive at the following theorem.

    Theorem 3. For system (3.15), if Re(M)μRe(X)<0 holds, model (1.2) exists periodic solutions near equilibrium E1=(u,v).

    1) If Re(M)μ<0 the bifurcating periodic solutions reduced on the center manifold are unstable, and the direction of bifurcation is forward (backward) for μ>0(μ<0).

    2) If Re(M)μ>0 the bifurcating periodic solutions reduced on the center manifold are stable, and the direction of bifurcation is forward (backward) for μ>0(μ<0).

    In this section, we perform numerical simulations to verify the correctness of the theoretical analysis. In summary, we choose d=0.3,g=0.6,a=0.6,d1=0.01,d2=0.2,c=0.55, r=0.41, K=5, h=0.41, and l=1.

    Based on the data above, (H0) and (H1) always hold, and system (1.2) has one unstable boundary equilibrium E0=(0,0), and one nontrivial equilibrium E1=(u,v)=(1.90585,0.96710). What matters most to us is the stability of the nontrivial equilibrium E1.

    According to Theorem 1, then E1 is local asymptotically stable. This means that if system (1.2) is without delay, although Cyanopica cyanus and Dendrolimus superans can coexist at this time, natural predators are capable of suppressing the reproduction of the pests.

    When τ0, by a simple calculation, (H2) only holds for n=1 there does not exist any n such that (H3) holds. Thus, Eq (2.9) has a unique positive root ω=0.1616, which corresponds to the critical delay τ(0)1=2.5897. From the definition of τc, we obtain τc=2.5897, theorem 2.2 supports the conclusion that the positive constant steady state E1 achieves local asymptotic stability when τ[0,2.5897), and instability when τ(2.5897,+). We select τ=1.5[0,2.5897) to conduct the simulation. See Figure 3.

    Figure 3.  When τ=1.5, the simulation of system (1.2) reveals that the equilibrium E1 is locally asymptotically stable.

    We choose τ=2.8>τc=2.5879, from Eqs (3.9) and (3.12), we obtain Re(M)>0, Re(X)<0. Thus, according to Theorem 3, system (1.2) will generate inhomogeneous periodic solutions near the positive constant steady state E1 of model (1.2), and bifurcating periodic solutions are stable and forward (see Figure 4).

    Figure 4.  When τ=2.8, system (1.2) produces stable inhomogeneous forward periodic solutions near E1.

    By analyzing Figures 3 and 4, we can draw the following conclusions.

    1) When the gestation delay of the predator is less than the critical value, the predator can quickly control the number of pests and reach a stable state by preying on pests.

    2) When the gestation delay of the predator is slightly more than the critical value, the predator has a certain control effect on the number of pests. This will cause the number of pest populations to erupt periodically, and the number of natural enemy populations will fluctuate periodically.

    3) Comparing Figures 3 and 4, when the gestation delay of insectivorous birds is long, so it is necessary to artificially intervene in the population of pests to prevent the outbreak of insect pests. By releasing insectivorous birds to increase their number, we can indirectly reduce the increase in the number of pests and the outbreak of pests due to the prolonged pregnancy of predators, so that the population of pests can return to a controllable stable state.

    In this paper, aiming at the population density control problem of the pine caterpillar, considering the Holling-II type functional response, we developed a pest control model with gestation delay and nonlocal competition. For our analysis, we focused on two major aspects: first, the existence and stability of the positive constant steady state, and second, the conditions under which Hopf bifurcations emerge near this steady state. In the part of numerical simulation, we selected a set of suitable parameters for numerical simulation. It provided an explanation for effectively controlling the population density of the pine caterpillar and maintained the stability between natural enemies and the pine caterpillar species, so as to realize effective environmental protection and true green pest control. Therefore, gestation delay has a significant impact on the stability of the population. When the gestation delay is less than the critical delay, the predator can effectively control the pest population. When the gestation delay exceeds the critical delay, the pest population experiences periodic outbreaks.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This study was funded by the Heilongjiang Provincial Natural Science Foundation of China (Grant No. LH2024A001), and the College Students Innovations Special Project funded by Northeast Forestry University (No. DCLXY-2025011).

    The authors declare there are no conflicts of interest.



    [1] K. Naik, S. Sule, S. Jadhav, S. Pandey, Automatic question paper generation system using randomization algorithm, Int. J. Eng. Tech. Res. (IJETR), 2 (2014), 192–194.
    [2] W. J. Linden, Linear models for optimal test design, Springer, (2005). https://doi.org/10.1007/0-387-29054-0_3
    [3] W. J. Linden, Review of the shadow-test approach to adaptive testing, Behaviormetrika, (2021), 1–22. https://doi.org/10.1007/s41237-021-00150-y doi: 10.1007/s41237-021-00150-y
    [4] K. Zhang, L. Zhu, Application of improved genetic algorithm in automatic test paper generation, in 2015 Chinese Automation Congress (CAC), (2015), 495–499. https://doi.org/10.1109/cac.2015.7382551
    [5] T. N. T. A. Rahim, Z. A. Aziz, R. H. A. Rauf, N. Shamsudin, Automated exam question generator using genetic algorithm, in 2017 IEEE Conference on e-Learning, e-Management and e-Services (IC3e), (2017), 12–17. https://doi.org/10.1109/ic3e.2017.8409231
    [6] T. Nguyen, T. Bui, H. Fujita, T.-P. Hong, H. D. Loc, V. Snasel, et al., Multiple-objective optimization applied in extracting multiple-choice tests, Eng. Appl. Artif. Intell., 105 (2021), 104439. https://doi.org/10.1016/j.engappai.2021.104439 doi: 10.1016/j.engappai.2021.104439
    [7] Z. Wu, T. He, C. Mao, C. Huang, Exam paper generation based on performance prediction of student group, Inform. Sci., 532 (2020), 72–90. https://doi.org/10.1016/j.ins.2020.04.043 doi: 10.1016/j.ins.2020.04.043
    [8] M. Aktaş, Z. Yetgin, F. Kılıç, Ö. Sünbül, Automated test design using swarm and evolutionary intelligence algorithms, Expert Syst., 39 (2022). https://doi.org/10.1111/exsy.12918 doi: 10.1111/exsy.12918
    [9] N. H. I. Teo, N. A. Bakar, M. R. A. Rashid, Representing examination question knowledge into genetic algorithm, in 2014 IEEE Global Engineering Education Conference (EDUCON), (2014), 900–904. https://doi.org/10.1109/educon.2014.6826203
    [10] Z. Jia, C. Zhang, H. Fang, The research and application of general item bank automatic test paper generation based on improved genetic algorithms, in 2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering, 1 (2011), 14–18. https://doi.org/10.1109/ccieng.2011.6007945
    [11] M. Yildirim, A genetic algorithm for generating test from a question bank, Computer Appl. Eng. Educ., 18 (2010), 298–305. https://doi.org/10.1002/cae.20260 doi: 10.1002/cae.20260
    [12] M. Shao, W. Li, J. Du, The research and implementation of technology of generating test paper based on genetic algorithm, in Intelligence Computation and Evolutionary Computation: Results of 2012 International Conference of Intelligence Computation and Evolutionary Computation (ICEC), (2013), 657–663. https://doi.org/10.1109/mines.2012.232
    [13] L. Han, X. Li, The analysis of exam paper component based on genetic algorithm, in 2014 Fourth International Conference on Communication Systems and Network Technologies, (2014), 561–564. https://doi.org/10.1109/csnt.2014.118
    [14] Y. Zhang, J. Zhang, P. Wang, Research and implementation of intelligent test paper composition based on genetic algorithm, in 2018 9th International Conference on Information Technology in Medicine and Education (ITME), (2018), 552–556. https://doi.org/10.1109/itme.2018.00128
    [15] D. Liu, J. Wang, L. Zheng, Automatic test paper generation based on ant colony algorithm, J. Softw., 8 (2013), 2600–2606. https://doi.org/10.4304/jsw.8.10.2600-2606 doi: 10.4304/jsw.8.10.2600-2606
    [16] T. Nguyen, T. Bui, B. Vo, Multi-swarm single-objective particle swarm optimization to extract multiple-choice tests, Vietnam J. Computer Sci., 6 (2019), 147–161. https://doi.org/10.1142/s219688881950009x doi: 10.1142/s219688881950009x
    [17] K. O. Jones, J. Harland, J. M. Reid, R. Bartlett, Relationship between examination questions and bloom's taxonomy, in 2009 39th IEEE frontiers in education conference, (2009), 1–6. https://doi.org/10.1109/fie.2009.5350598
    [18] S. Bloxham, P. Boyd, Developing effective assessment in higher education: A practical guide, McGraw-Hill Education (UK), (2007).
    [19] N. Utaberta, B. Hassanpour, Aligning assessment with learning outcomes, Procedia-Social Behav. Sci., 60 (2012), 228–235. https://doi.org/10.1016/j.sbspro.2012.09.372 doi: 10.1016/j.sbspro.2012.09.372
    [20] A. Smith, S. L.-Munk, A. Shelton, B. Mott, E. Wiebe, J. Lester, A multimodal assessment framework for integrating student writing and drawing in elementary science learning, IEEE Transact. Learn. Technol., 12 (2018), 3–15. https://doi.org/10.1109/tlt.2018.2799871 doi: 10.1109/tlt.2018.2799871
    [21] A. Alammary, LOsMonitor: A machine learning tool for analyzing and monitoring cognitive levels of assessment questions, IEEE Transact. Learn. Technol., 14 (2021), 64–652. https://doi.org/10.1109/tlt.2021.3116952 doi: 10.1109/tlt.2021.3116952
    [22] A. J. Swart, Evaluation of final examination papers in engineering: A case study using bloom's taxonomy, IEEE Transact. Educ., 53 (2009), 257–264. https://doi.org/10.1109/te.2009.2014221 doi: 10.1109/te.2009.2014221
    [23] B. S. Bloom, M. D. Englehard, Committee of College and University Examiners, Taxonomy Educ. Object., Longmans, 2 (1964).
    [24] L. W. Anderson, D. R. Krathwohl, A taxonomy for learning, teaching, and assessing: A revision of Bloom's taxonomy of educational objectives, Addison Wesley Longman, (2001).
    [25] L. Smith, J. King, A dynamic systems approach to wait time in the second language classroom, System, 68 (2017), 1–14. https://doi.org/10.1016/j.system.2017.05.005 doi: 10.1016/j.system.2017.05.005
    [26] M. Riojas, S. Lysecky, J. Rozenblit, Educational technologies for precollege engineering education, IEEE Transact. Learn. Technol., 5 (2011), 20–37. https://doi.org/10.1109/tlt.2011.16 doi: 10.1109/tlt.2011.16
    [27] F. K. Gangar, H. G. Gori, A. Dalvi, Automatic question paper generator system, Int. J. Computer Appl., 166 (2017), 42–47. https://doi.org/10.5120/ijca2017914138 doi: 10.5120/ijca2017914138
    [28] V. S. Rao, V. C. Sai, S. S. Sandeep, MV Jayadeep, Automated exam paper process based on schedule and authenticity, in International Conference of Advance Research & Innovation(ICARI), (2020). https://doi.org/10.2139/ssrn.3643880
    [29] M. S. R. Chim, G. V. Kale, Automatic question paper generation using parametric randomization, J. Gujarat Res. Soc., 21 (2019), 444-451.
    [30] S. A. El-Rahman, A. H. Zolait, Automated test paper generation using utility based agent and shuffling algorithm, Int. J. Web-based Learn. Teach. Technol. (IJWLTT), 14 (2019), 69–83. https://doi.org/10.4018/ijwltt.2019010105 doi: 10.4018/ijwltt.2019010105
    [31] J. H. Holland, Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence, MIT press, (1992).
    [32] M. Dorigo, V. Maniezzo, A. Colorni, Ant system: Optimization by a colony of cooperating agents, IEEE Transact. Syste. Man Cybernet., 26 (1996), 29–41. https://doi.org/10.1109/3477.484436 doi: 10.1109/3477.484436
    [33] J. Kennedy, R. Eberhart, Particle swarm optimization, in Proceedings of ICNN'95-international conference on neural networks, 4 (1995), 1942-1948.
    [34] S. Mirjalili, S. M. Mirjalili, A. Lewis, Grey wolf optimizer, Adv. Eng. Software, 69 (2014), 46–61. https://doi.org/10.1016/j.advengsoft.2013.12.007 doi: 10.1016/j.advengsoft.2013.12.007
    [35] A. A. Heidari, S. Mirjalili, H. Faris, I. Aljarah, M. Mafarja, H. Chen, Harris hawks optimization: Algorithm and applications, Future Gener. Comput. Syst., 97 (2019), 849–872. https://doi.org/10.1016/j.future.2019.02.028 doi: 10.1016/j.future.2019.02.028
    [36] B. Abdollahzadeh, F. S. Gharehchopogh, S. Mirjalili, African vultures optimization algorithm: A new nature-inspired metaheuristic algorithm for global optimization problems, Comput. Indust. Eng., 158 (2021), 107408. https://doi.org/10.1016/j.cie.2021.107408 doi: 10.1016/j.cie.2021.107408
    [37] X. Bao, H. Jia, C. Lang, A novel hybrid harris hawks optimization for color image multilevel thresholding segmentation, IEEE Access, 7 (2019), 76529–76546. https://doi.org/10.1109/access.2019.2921545 doi: 10.1109/access.2019.2921545
    [38] Y. Xiao, Y. Guo, H. Cui, Y. Wang, J. Li, Y. Zhang, IHAOAVOA: An improved hybrid aquila optimizer and african vultures optimization algorithm for global optimization problems, Math. Biosci. Eng., 19 (2022), 10963–11017. https://doi.org/10.3934/mbe.2022512 doi: 10.3934/mbe.2022512
    [39] J. Liu, Y. Wang, N. Fan, S. Wei, W. Tong, A convergence-diversity balanced fitness evaluation mechanism for decomposition-based many-objective optimization algorithm, Integr. Computer-Aided Eng., 26 (2019), 159–184. https://doi.org/10.3233/ica-180594 doi: 10.3233/ica-180594
    [40] J. Liu, Y. Wang, Y. Cheung, A cα-dominance-based solution estimation evolutionary algorithm for many-objective optimization, Knowledge-based Syst., 248 (2022), 108738. https://doi.org/10.1016/j.knosys.2022.108738 doi: 10.1016/j.knosys.2022.108738
    [41] W. Li, H. Pu, P. Schonfeld, J. Yang, H. Zhang, L. Wang, et al., Mountain railway alignment optimization with bidirectional distance transform and genetic algorithm, Computer-Aided Civil Infrastruct. Eng., 32 (2017), 691–709. https://doi.org/10.1111/mice.12280 doi: 10.1111/mice.12280
    [42] M. Wei, S. Zhang, T. Liu, B. Sun, The adjusted passenger transportation efficiency of nine airports in China with consideration of the impact of high-speed rail network development: A two-step DEA-OLS method, J. Air Transport Manag., 109 (2023), 102395. https://doi.org/10.1016/j.jairtraman.2023.102395 doi: 10.1016/j.jairtraman.2023.102395
    [43] J. L. Gordon, Creating knowledge maps by exploiting dependent relationships, in Appl. Innovat. Intell. Syst. VII, (2000), 64–78. https://doi.org/10.1007/978-1-4471-0465-0_5
    [44] N. Henze, W. Nejdl, Logically characterizing adaptive educational hypermedia systems, in International Workshop on Adaptive Hypermedia and Adaptive Web-based Systems (AH 2003), (2003), 20–24. https://doi.org/10.1080/13614560410001728128
    [45] M. Nickel, K. Murphy, V. Tresp, E. Gabrilovich, A review of relational machine learning for knowledge graphs, Proceed. IEEE, 104 (2015), 11–33. https://doi.org/10.1109/jproc.2015.2483592 doi: 10.1109/jproc.2015.2483592
    [46] Q. Liu, Z. Huang, Y. Yin, E. Chen, H. Xiong, Y. Su, et al., Ekt: Exercise-aware knowledge tracing for student performance prediction, IEEE Transact. Knowledge Data Eng., 33 (2019), 100–115. https://doi.org/10.1109/tkde.2019.2924374 doi: 10.1109/tkde.2019.2924374
    [47] J. D. L. Torre, Dina model and parameter estimation: A didactic, J. Educ. Behav. Statist., 34 (2009), 115–130. https://doi.org/10.3102/1076998607309474 doi: 10.3102/1076998607309474
    [48] T. H. Cormen, C. E. Leiserson, R. L. Rivest, C. Stein, Introduction to algorithms, MIT press, (2009).
    [49] Gurobi Optimization, LLC, Gurobi Optimizer Reference Manual, (2023).
    [50] D. H. Hallett, A. M. Gleason, W. G. McCallum, Calculus: Single and multivariable, John Wiley and Sons Inc, (1998).
    [51] D. C. Webb, Bloom's Taxonomy in Mathematics Education, Encyclopedia of Mathematics Education, Springer Netherlands, (2014), 63–68. https://doi.org/10.1007/978-94-007-4978-8_17
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1408) PDF downloads(57) Cited by(1)

Figures and Tables

Figures(12)  /  Tables(6)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog