Next Article in Journal
Identification of a Mathematical Model for the Transformation of Images for Stereo Correspondence Measurements of Mining Equipment
Previous Article in Journal
A Period-Based Neural Network Algorithm for Predicting Building Energy Consumption of District Heating
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Drunkard Adaptive Walking Chaos Wolf Pack Algorithm in Parameter Identification of Photovoltaic Module Model

1
College of Equipment Support and Management, Engineering University of PAP, Xi’an 710086, China
2
Foundation Department, Engineering University of PAP, Xi’an 710086, China
3
School of Electronic Engineering, Xidian University, Xi’an 710071, China
4
School of Computer Science, Shaanxi Normal University, Xi’an 710119, China
*
Author to whom correspondence should be addressed.
Energies 2022, 15(17), 6340; https://doi.org/10.3390/en15176340
Submission received: 26 July 2022 / Revised: 21 August 2022 / Accepted: 29 August 2022 / Published: 30 August 2022
(This article belongs to the Section F: Electrical Engineering)

Abstract

:
The rapid and accurate identification of photovoltaic (PV) model parameters is of great significance in solving practical engineering problems such as PV power prediction, maximum power point tracking and battery failure model recognition. Aiming at the shortcomings of low accuracy and poor reliability and being easy to fall into local optimization when standard intelligent optimization algorithms identify PV model parameters, a novel drunken adaptive walking chaotic wolf swarm algorithm is proposed, which is named DCWPA for short. The DCWPA uses the chaotic map sequence to initialize the population, thus to improve the diversity of the initial population. It adopts the walking direction mechanism based on the drunk walking model and the adaptive walking step size to increase the randomness of walking, enhance the individual’s ability to explore and develop and improve the ability of algorithm optimization. It also designs the judgment conditions for half siege in order to accelerate the convergence of the algorithm and improve the speed of the algorithm. In the iterative process, according to the change of the optimal solution, the Hamming Distance is used to judge the similarity of individuals in the population, and the individuals in the population are constantly updated to avoid the algorithm from stopping evolution prematurely due to falling into local optimization. This paper firstly analyzes the time complexity of the algorithm, and then selects eight standard test functions (Benchmark) with different characteristics to verify the performance of the DCWPA algorithm for continuous optimization, and finally the improved algorithm is applied for parameter identification of PV models. The experiments show that the DCWPA has higher identification accuracy than other algorithms, and the results are more consistent with the measured data. Thus, the effectiveness and superiority of the improved algorithm in identifying solar cell parameters are verified, and the identification effect of the improved algorithm on solar cell parameters under different illumination is shown. This research provides a new idea and method for parameter identification of a PV module model.

1. Introduction

Solar energy is characterized as non-polluting, renewable, cheap and easy to obtain, thus considered to be an effective solution for energy shortage and environmental pollution caused by industrial and economic development [1]. A photovoltaic (PV) system is a collection device of solar energy that converts solar energy into electrical energy, which has attracted great attention from scholars. In order to better design and apply fault diagnosis [2] and maximum power-point-tracking control [3] and other technologies of a PV system, it is very important to establish a mathematical model that can describe the current–voltage relationship in PV systems with high accuracy. In recent years, scholars at home and abroad have conducted a lot of research on the output characteristic models of PV system. The most commonly seen ones are the single-diode model (SDM) [4], the double-diode model (DDM) and the PV module model [5,6]. The accuracy of a PV model mainly depends on its model parameters, whose availability usually decreases due to aging, faults and unstable operating conditions. Therefore, accurate, stable and efficient identification of these PV model parameters is crucial for the evaluation, optimization and control of PV models. Parameter identification for a PV system model can be regarded as a function optimization problem, but because its search space is nonlinear and multi-modal, it is easy to fall into local optimum in the solution, which puts forward higher requirements for the solution [7].
The characteristics of swarm intelligence are clearly manifested in the behavior of organisms that adjust themselves according to the perceived information. Swarm intelligence is the information interaction between biological individuals, groups and environments that follow simple rules, and the characteristics of intelligence emerge as a whole. With the deepening of relevant research on Swarm Intelligence (SI), particle swarm optimization (PSO) [8], artificial fish swarm algorithm (AFSA) [9], ant colony algorithm [10], bacterial colony algorithm [11], artificial bee colony algorithm (ABC) [12], wolf pack algorithm [13] and their corresponding improved algorithms [14,15,16] have been proposed successively. Simple, robust, adaptable and applicable to wide ranges, these algorithms are effective ways to solve all kinds of complex optimization problems and have also been widely used for model parameter identification of a PV system [17,18,19,20,21,22,23,24,25]. Ref. [22] proposes a particle swarm algorithm (Classified Perturbation Mutation based Particle Swarm Optimization, CPMPSO) to seek solution for perturbation variation classification of PV system model parameter identification. It uses the damping constraint processing strategy to avoid falling into local optimization. Ref. [23] proposes a Logistic Chaotic Java to solve the parameter identification problem. The Logistic chaotic mapping strategy is introduced in the update stage of the algorithm to improve the population diversity. At the same time, the chaotic mutation strategy is introduced in the search stage to balance the search and exploration ability of the algorithm, but it also turns out to be easy to fall into local optimization in the later stage of the algorithm. Ref. [24] introduces the multiple learning backtracking search algorithm (MLBSA) for parameter identification of different PV models. Xu Yan et al. [25] propose a PV model parameter identification method based on a hybrid leapfrog algorithm. The update strategy of this method is directional and has strong local search ability, which can effectively solve the problem that the algorithm is easy to fall into local optimum. However, the solution steps of the algorithm are relatively complex, and the solution time is long. The intelligent optimization algorithm and its improved algorithm can globally optimize the parameters of a PV model on the basis of a small amount of experimental data, achieving satisfactory results with high precision and small errors, which can effectively meet the actual needs of some projects. However, due to the limitations of the algorithm’s own optimization mechanism, it is difficult for most algorithms to find the exact global optimal solution in practice. Therefore, it is still a challenge to design a highly competitive intelligent optimization algorithm to identify the parameters of a PV system model.
Wolf pack is a type of biological population with strong cognitive ability and rigorous social organization structure. Confronted with the “survival of the fittest” rule in a harsh environment, they have formed extremely sophisticated and efficient group intelligence behaviors such as cooperative hunting, enemy defense, reproduction, child rearing, etc. They have clear social class and labor division, and the group has demonstrated high intelligence features. Therefore, Yang et al. [26] propose a wolf swarm search algorithm based on the hunting behavior of wolves, which provides a better idea for solving complex problems. In 2013, Wu Husheng et al. [13] deeply analyzed the roles and behaviors of wolves in wolf pack hunting and designed a new wolf pack algorithm (WPA) based on the two rules of “winner as the king” and “survival of the strong” and the three behaviors of “walk, summon and siege”. The algorithm has good performance in global search and local exploration and shows great advantages in solving efficiency. It has been widely used in solving many practical problems such as 0–1 knapsack problem [27], TSP problem [28] and the path optimization problem [29]. Moreover, many scholars have improved the WPA in practical application in terms of too many parameters, high consumption of computing resources, long computing time and being easy to fall into local optimization, etc., and put forward a large number of improved algorithms [30,31,32,33,34]. Although a large number of improved algorithms have been proposed, the WPA is still rarely used for solving practical complex engineering problems, such as parameter identification of a PV model, and its efficiency and accuracy for solving complex optimization problems need to be further improved.
Aiming to avoid the low accuracy of the current intelligent optimization algorithm and the nonlinear and complexity of a PV module model, this paper proposes an improved Wolf Pack Algorithm (WPA) for parameter identification of a PV model based on the analysis of the basic Wolf pack algorithms. This algorithm uses the chaotic map sequence to initialize the population, thus to improve the diversity of the initial population. It adopts the walking direction mechanism based on the drunk walking model and the adaptive walking step size to increase the randomness of walking, enhance the individual’s ability to explore and develop and improve the ability of algorithm optimization. It also designs the judgment conditions for half siege in order to accelerate the convergence of the algorithm and improve the speed of the algorithm. In the iterative process, according to the change of the optimal solution, the Hamming Distance is used to judge the similarity of individuals in the population, and the individuals of the population are constantly updated to avoid the algorithm from stopping evolution prematurely due to falling into local optimization. This paper firstly analyzes the time complexity of the algorithm and then selects eight standard test functions (Benchmark) with different characteristics to verify the performance of the DCWPA algorithm for continuous optimization, and finally the improved algorithm is applied to the parameter identification problem of PV models. The experimental results show that the DCWPA has higher identification accuracy than other algorithms, and the results are more consistent with the measured data. Thus, the effectiveness and superiority of the improved algorithm in identifying solar cell parameters are verified, and the identification effect of the improved algorithm on solar cell parameters under different illumination is shown.
This paper is organized as follows. Section 2 introduces the PV module parameter identification problem and its mathematical model. Section 3 introduces the basic wolf pack algorithm and carefully analyzes its performance and its shortcomings. Section 4 proposes a specific improvement strategy for the problems existing in the basic wolf pack algorithm, forming the DCWPA. In Section 5, benchmark functions are used to verify the performance of the DCWPA for solving continuous optimization problems. In Section 6, experiments are conducted to evaluate the effectiveness and superiority of the proposed algorithm for solving the parameter identification problem of PV models. In Section 7, the conclusion is drawn for the future work.

2. Mathematical Model of PV System Module

2.1. Problem Description

At present, the single-diode and double-diode models are the most widely used. On the basis of these two models, the PV module model has also been further developed.

2.1.1. Single-Diode Model

Single-diode model (SDM) has the advantages of simplicity and accuracy. It is often widely used to describe the static characteristics of PV systems. The equivalent circuit diagram of the model is shown in Figure 1.
The model consists of a current source connected in parallel to the diode, a shunt resistance representing the leakage current and a series resistance representing the load current related loss. The output current I is shown in Equation (1).
{ I = I p h I d I s h I d = I o · [ exp ( q · ( V + I · R s ) a · k · T ) 1 ] I s h = V + I · R s R s h
Here, I p h is photogenerated current, I d is diode current, I s h is the current of parallel resistor, I o is diode reverse saturation current, a is the ideal factor of diode, R s and R s h represent series and parallel resistance, respectively, and V is the battery output voltage, k refers to the Boltzmann constant ( k = 1.3806503 × 10 23   J / K ), q represents electron charge ( q = 1.60217646 × 10 19   C ), and T is the junction temperature expressed in Kelvin temperature. Among them, five unknown parameters ( I p h , I o , R s , R s h , a ) need to be extracted in SDM.

2.1.2. Double-Diode Model

Compared with SDM, the double-diode model (DDM) considering the influence of compound current loss in the depletion region is more accurate. Therefore, DDM is also commonly used in the modeling of PV cells [35]. The model has two diodes in parallel with the current source and a shunt resistance for shunting the photogenerated current source. One is used as a rectifier, and the other is used to simulate charge recombination current. The equivalent circuit of the dual diode model is shown in Figure 2.
The output current I of DDM can be calculated by Equation (2).
{ I = I p h I d 1 I d 2 I s h I d 1 = I o 1 · [ exp ( q · ( V + I · R s ) a 1 · k · T t ) 1 ] I d 2 = I o 2 · [ exp ( q · ( V + I · R s ) a 2 · k · T ) 1 ] I s h = V + I · R s R s h
Here, I d 1 and I d 2 represent the current of two diodes, respectively, I o 1 and I o 2 are diffusion current and saturation current, respectively, and a 1 and a 2 refer to the ideal factors of the two diodes. DDM needs to extract seven unknown parameters, namely I p h , I o 1 , I o 2 , R s , R s h , a 1 and a 2 .

2.1.3. PV Module Model

The PV module is composed of several solar cell units in series and parallel, and its equivalent circuit is shown in Figure 3.
For a single-diode PV module, the relationship between current and voltage is as follows.
I = I p h · N p I o · N p [ exp ( q · ( V + I · R s · N s / N p ) a · N s · k · T ) 1 ] V + I · R s · N s / N p R s h · N s / N p
where N s and N p are the number of solar cells in series or in parallel, respectively. The PV module model needs to extract five unknown parameters, namely I p h , I o , R s , R s h and a .

2.2. Objective Function

The main purpose of parameter identification of a PV model is to find the optimal value of unknown parameters and minimize the difference between measured data and calculated current data. The problem is usually transformed to an optimization problem and reached by an optimization algorithm. Therefore, the error function of each pair of measured and calculated current data points of each model is given in Table 1. In order to quantify the overall difference, the root mean square error (RMSE) in Equation (4) is taken as the objective function. Here, the problem of parameter identification of a PV model is transformed into the problem of finding the minimum value of the objective function.
R M S E ( x ) = 1 N k = 1 N f ( V k , I k , x ) 2

3. Basic Wolf Pack Algorithm

3.1. Basic Principles

In nature, wolves have a strict social division mechanism and efficient cooperative hunting mode. Usually, there are three kinds of wolves in the wolf pack: the lead wolf, the scout wolf and the fierce wolf. The lead wolf makes overall planning, the scout wolf roams and searches, and the fierce wolf rounds up and attacks. The division of labor is clear, and each performs its own duties. After catching prey, it is distributed according to work and the survival of the fittest so that the population capacity continues to evolve [13]. Therefore, three intelligent behaviors (wandering behavior, summoning behavior and siege behavior) and two basic mechanisms (the selection mechanism of winner as the lead wolf and the evolution mechanism of survival of the fittest) can be abstracted from the swarm intelligence model of wolves [13]. On this basis, the WPA is proposed, and its basic principle model is shown in Figure 4.

3.2. Basic Process

Consider the area where wolves hunt as a N × D Euclidean space where the size of wolf pack is N and the dimension of the space is D . The position of wolf i is X i = ( x i 1 , x i 2 , , x i D ) , where x i d is the position of wolf i in the d t h ( d = 1 , 2 , , D ) dimension space. The concentration of the prey smell perceived by wolf i (that is, the fitness value of the objective function) is recorded as Y i , then Y i = f ( X i ) ( i = 1 , 2 , , N ) . Taking solving the maximum fitness value of the function as an example, the following two basic mechanisms and three intelligent behaviors in the wolf pack algorithm are explained.
1.
Selection mechanism of the lead wolf. In the process of wolf rounding up, the lead wolf is constantly changing according to the principle of “winner as the king”. In the initial wolf pack, the individual wolf with the largest objective function value is selected as the lead wolf. During the round-up process, if there is an individual wolf that is superior to the target function value corresponding to the position of the lead wolf, the individual wolf will immediately replace the original lead wolf. In the whole process, the position of the lead wolf is denoted as g , and its corresponding objective function value is denoted as Y l e a d .
2.
Evolution mechanism of the wolf pack. The food distribution rules of the wolf pack reward on merit will inevitably lead to the starvation of some individual wolves with weak ability. Therefore, in the wolf pack algorithm, R individual wolves with the worst objective function value are removed, and R individual wolves are randomly produced to update the wolf pack, where R [ N / ( 2 β ) , N / β ] and β is the proportion factor of population renewal.
3.
Wandering behavior. The scout wolf advances one step in h directions, respectively, calculates the fitness value of the positions after moving forward and then returns to the original position. After one step in the p t h direction, the position of the scout wolf i in the d t h dimensional space is shown in Equation (5). In the h directions, the scout wolf advances in the direction with the largest fitness value and greater than the current position fitness value Y i . We continue to perform the above walking behavior and stop until the walking reaches the maximum number of steps T m a x or when Y i > Y l e a d occurs, which determines the updated lead wolf.
x i d p = x i d + s t e p a d × sin ( 2 π × p h )
Here s t e p a d is the walking step and d = 1 , 2 , , D ; P = 1 , 2 , , h , because the search ability of each scout wolf is different, the value of h is also different, which takes a random integer. Generally, the larger h is, the more detailed the scout wolf search is, but the slower the algorithm calculation speed is.
4.
Summoning behavior. After the wandering behavior is over, the lead wolf calls all wolves to approach him. After receiving the call information of the lead wolf, fierce wolf i quickly approaches the lead wolf with a large attack step s t e p b d according to Equation (6). If fierce wolf i finds a position with a greater fitness value than the current position of the lead wolf on the way to the lead wolf, fierce wolf i will replace the lead wolf and call; otherwise, the fierce wolf i continues to perform the summoning behavior until the siege conditions are met: L i g k L n e a r .
x i d k + 1 = x i d k + s t e p b d × ( g d k x i d k ) | g d k x i d k |
L n e a r is the judgment distance turning into siege behavior, and L n e a r can be calculated by Equation (7).
L n e a r = 1 D · ω · d = 1 D | max d min d |
max d and min d are the upper and lower bounds of the value of the variable x in the d t h dimensional space, respectively.
Suppose the distance between the fierce wolf i and the lead wolf in the k t h generation is L i g k , as shown in Equation (8), L i g k can be calculated by using the Manhattan distance.
L i g k = d = 1 D | x i d k g d k |
In the above equation, x i d k represents the position of the fierce wolf i in the d t h dimensional space in generation k , g d k represents the position of the lead wolf in the d t h dimensional space in generation k , and x i d k + 1 represents the position of the fierce wolf i in the d t h dimensional space in generation k + 1 .
5.
Siege behavior. Take the position of the lead wolf as the position of the prey, and all wolves siege the prey according to Equation (9). During the siege, if a new prey is found and its corresponding fitness value is greater than the current prey fitness value, update the prey location and siege the new prey until the prey is captured.
x i d k + 1 = x i d k + λ × s t e p c d × | g d k x i d k |
where λ takes the random number within (0,1), and s t e p c d represents the siege step length.
There are three steps in the WPA: walking step length s t e p a d , running step length s t e p b d and siege step length s t e p c d . The relationship of the three steps is shown in Equation (10):
s t e p a d = s t e p b d / 2 = 2 · s t e p c d = | max d min d | S
In the above formula, S represents the step size factor. The larger S is, the more detailed the search is.

3.3. Performance Analysis

In the WPA, the walk behavior makes the algorithm have better traversality, so the algorithm has strong global exploration ability. The lead wolf selection mechanism and calling behavior make the wolves gather quickly and accelerate the convergence speed of the algorithm. Moreover, during the siege, the wolves further refine the search near the current optimal solution, which improves the local exploration ability of the algorithm. In addition, the renewal mechanism of wolves not only maintains the population advantage, but also helps to jump out of the local optimum. Therefore, the WPA shows better optimization performance. However, the algorithm still shows some shortcomings in practical application, as follows:
Disadvantage 1: The population initialization of the WPA generally adopts the way of pseudo-random number, so the population cannot cover the solution space evenly. If we invoke all the rand function in MATLAB software to initialize the two populations of size 100 and 500, respectively, as shown in Figure 5, the individuals in the initial population overlap each other, and some areas are blank. As a result, the initial population is unable to cover the whole solution space evenly, affecting the optimization performance of the algorithm.
Disadvantage 2: In the wandering behavior, the scout wolf adopts the greedy strategy, as shown in Figure 6. When the search direction h in Equation (5) is fixed, the wandering of each scout wolf is equivalent to selecting the direction to move in the fixed h directions. The direction is relatively fixed, and the randomness of direction change is significantly reduced. If the prey is between the parallel lines of the search direction, it is very difficult for the scout wolf to find the prey; that is, it is hard to find the global optimal solution. In addition, the walk step adopts a fixed value, which also reduces the randomness of the search.
Disadvantage 3: In the running behavior, it is necessary to continuously analyze and calculate the distance between all the fierce wolves and the lead wolf, and only when the distance between all the fierce wolves and the lead wolf is less than the critical distance L n e a r , can the running behavior be ended and the prey be besieged. When solving high-dimensional complex optimization problems, the algorithm will inevitably consume a large amount of computing resources. At the same time, it may also make the algorithm unable to jump out of the rush behavior for a long time, resulting in a slow running speed and a large increase in time consumption.
Disadvantage 4: The WPA adopts the mechanism of continuous iterative change of population to optimize. In order to maintain the population superiority, only a few wolves are updated. At the later stage of iteration, the diversity of the population is bound to decrease, it is difficult to jump out of the local optimum, and the evolution will be stopped prematurely, so the solution accuracy of the algorithm is difficult to reach the best.

4. Improved Wolf Pack Algorithm

4.1. Improvement Strategy

Aiming at the four shortcomings of the WPA, this paper puts forward four improvement strategies. The first is to use a chaotic map to initialize the population, enhancing the diversity. The second is to choose the walking direction based on the drunk walking model and adopt the adaptive walking step size to increase the randomness of walking and improve the individual’s optimization ability. The third is to design the rush behavior. When half of the wolves meet the siege distance, the judgment conditions for siege behavior are carried out, so that the algorithm convergence is accelerated, and the algorithm solution speed is improved. Finally, in the iterative process, according to the change of the optimal solution, the Hamming Distance is used to judge the similarity of individuals in the population, and the individuals of the population are constantly updated to avoid the algorithm from stopping evolution prematurely due to falling into local optimization.

4.1.1. Population Initialization Based on Chaotic Maps

Chaotic states exist widely in nature and society and have the characteristics of randomness, ergodicity and regularity. Chaos motion can traverse all states without repetition within a certain range according to its own laws [36]. Therefore, in order to efficiently generate an initialization population with uniform distribution in the solution space, a chaotic mapping method is proposed to initialize the location of wolves. Currently, there are many kinds of chaotic map sequences that can meet such conditions. As shown in Table 2, Logistic map, Tent map, Piecewise map and Pwlcm map are four typical chaotic maps.
In order to intuitively display the characteristics of the four chaotic maps in Table 2, their probability distribution characteristics in the (0,1) interval are compared. Among them, the probability distribution is obtained in the following way: 50,000 chaotic numerical points generated by 50,000 iterations of chaotic mapping are used to count the probability of these 50,000 points falling into 100 intervals after equal division of interval (0,1), and the probability distribution diagram as shown in Figure 7 is drawn.
Analysis of Figure 7 shows that the logistic map shows a distribution trend that is large in the middle and small at both ends. If the global optimal solution of the function problem is distributed in the middle, there will be a large number of invalid searches, which will be very unfavorable for the global optimization. The probability distribution in the interval of the Tent map, the Piecewise map and the Pwlcm map (0,1) is uniform. The population initialized with these three distributions is evenly distributed in the solution space, so it can avoid excessive search in some local areas (such as the logistic map, a large number of searches are concentrated at both ends of the interval) and reduce the adverse impact caused by the incompatibility between the distribution characteristics of chaotic sequence and the location of the global optimal solution of the optimization problem. As can be seen from the figure, the probability fluctuation range of the Tent map is (0.0105, 0.00967), the probability fluctuation range of the Piecewise map is (0.0105, 0.0097), and the probability fluctuation range of the Pwlcm map is (0.01023, 0.00977). Compared with the Tent map and the Piecewise map, the probability distribution of the Pwlcm map is more uniform, and the interval size of the Pwlcm map probability distribution is 0.00046, which is much smaller than the other two sequences. As shown in Figure 8, if we use the Pwlcm map to initialize two two-dimensional populations with population numbers of 100 and 500 between (0, 1), it is obvious that compared with the randomly generated initial population in Figure 5, the distribution of the initial population generated by the Pwlcm map is more uniform, which is conducive to the complete search of the whole region in the initial stage of the algorithm. Therefore, this paper selects the Pwlcm map to initialize the individual population of the WPA.
After the chaotic ergodic sequence z is obtained by the Pwlcm map search, the chaotic ergodic sequence z needs to be transformed to the original solution space according to the following Equation (11).
X i 0 = l b + z i · ( u b l b )
Among them, u b and l b represent the upper boundary and lower boundary of wolf i activity, respectively.

4.1.2. Random Walk Based on Drunken Walk Model

Random walk [37] was put forward by Pearson in 1905. It is a random and irregular form of movement, and the next step in the movement process is uncertain. The idea of random walk is that an element starts random motion from any point, and after a certain period of time, it will traverse the entire space. Random walk has been widely used in many fields because of its strong applicability. Gupta et al. [38] designed an improved gray wolf optimization algorithm based on the idea of random walk, which shows good performance in solving continuous optimization problems and real-life optimization problems. Random walk can generally be divided into three types: Markov chain [39], Levy flight [40] and drunkard walk [41]. The drunk walking model is shown in Equation (12). In this model, the direction of each step of the drunk is in any direction in the whole space, which has great uncertainty and randomness and can better traverse the whole space.
{ x i d k + 1 = x i d k + s t e p · sin θ p θ p = ( 2 · r a n d 1 ) π
Therefore, in order to enhance the breakthrough ability of the scout wolf and avoid it falling into local areas, a walking behavior based on drunk walking is designed by combining drunk walking with greedy walking behavior, as shown in Figure 9. Equation (12) is the mathematical expression of the random walk based on the drunken walk model. In the process of wandering, scout wolf i takes a greedy strategy according to Equation (12), advances one step in h directions, respectively, records the position and corresponding fitness value before and after each step and then returns to the original position. Among the h directions, the direction with the largest odor concentration and greater than the current odor concentration Y i is taken as the update direction of the scout wolf.
The step length s t e p of a drunk can be fixed or changed. A small step length is helpful to carry out a fine search, while a large enough step length is helpful to expand the search range or jump out of the local optimum. At the same time, considering the spatial distance between the position of the scout wolf and the lead wolf, the walking length is designed as the adaptive step length shown in Equation (13). The adaptive step length can effectively increase the randomness of the wolf search to enhance the ability of wolf breakthrough and optimization.
s t e p = r a n d · n o r m x i g
x i is the position of wolf i , and g is the position of the lead wolf.

4.1.3. Half-Population Siege Strategy

The N 1 wolves except the lead wolf are regarded as fierce wolves, and fierce wolves quickly approach the lead wolf after receiving the summoning order. When the distance between more than half of the fierce wolves and the lead wolf is less than the determined distance L n e a r , all the fierce wolves will adjust their positions to be within the siege range to execute the siege behavior.
In the k t h iteration, the maximum distance between the N / 2 fierce wolves closest to the lead wolf and the lead wolf is L I g k . In order to obtain the distance L I g k , the distance between the fierce wolf and the lead wolf is sorted, and o r d ( L i g k ) represents the order of L i g k in the sequence after the distance between each fierce wolf and the lead wolf is arranged in ascending order. The sequence encoding vector P k of all wolves is shown in Equation (14).
P k = o r d ( L 1 g k ) , o r d ( L 2 g k ) , , o r d ( L i g k ) , , o r d ( L ( N 1 ) g k )
In each iteration, when the maximum distance L I g k between the N / 2 fierce wolves closest to the lead wolf and the lead wolf is less than L n e a r (i.e., the siege conditions in Equation (15) are met), all fierce wolves adjust their positions and execute the siege behavior; Otherwise, they continue to perform the summoning behavior.
{ o r d ( L i g k ) = N / 2 L I g k L n e a r

4.1.4. Evolutionary Mechanism Based on Hamming Distance

After several iterations of the WPA, most individual wolves are near the current optimal solution. As the similarity between individuals increases and the population diversity decreases, it is very easy to cause “stopping evolution prematurely”, leading to the stagnation of evolution. Therefore, this paper introduces the similarity judgment mechanism based on the Hamming Distance [42] to dynamically update the population in order to maintain the continuous evolution of the population. When the number of stagnant changes of the optimal value exceeds the preset threshold, we will calculate the the Hamming Distance between each wolf and the lead wolf to judge the similarity between individuals, eliminate the individual wolves with high similarity with the lead wolf and generate new individuals with low similarity with the lead wolf to enhance the diversity of the population to improve the ability of the algorithm to jump out of the local extreme value in the iteration and maintain the vitality of continuous evolution.
The Hamming Distance is mainly used to describe the difference between two vectors with the same dimension. As shown in Equation (16), the Hamming Distance is the sum L i j of the number of positions with different values at all corresponding positions of vector X i = ( x i 1 , x i 2 , , x i D ) and vector X j = ( x j 1 , x j 2 , , x j D ) . It can accurately reflect the difference between two vectors, so as to objectively judge the similarity of vectors.
L i j = d = 1 D x i d x j d
In the above equation, is the XOR operator, D represents the dimension of the vector, and d 1 , 2 , , D .
Suppose the similarity between individuals in the wolf pack is S , which represents the proportion of the sum of the number of dimensions with the same position in all the corresponding dimensional spaces of the two artificial wolves to the total dimension. Then, according to Equation (17), the similarity S i j of any two wolves in the wolf pack can be calculated. By contrast, if the calculated similarity S i j , is less than the preset threshold S t , it indicates that the similarity between the two individuals is low. Otherwise, the similarity between the two individuals is high.
S i j = 1 L i j D
When the population evolution is found to be stagnant in the iterative optimization process, the similarity between all individual wolves and the current alpha wolf is calculated by the Hamming Distance. Individuals with low similarity will be retained, individuals with high similarity will be eliminated, and individuals with low similarity to the head wolf will be generated to update the wolf group. Then the wolves are distributed in the solution space, and the global optimization ability of the algorithm is increased. The specific process is as follows:
Step 1: Calculate the similarity S between all individual wolves and the lead wolf. Individuals whose S is greater than S t form wolf pack P d , and other individuals form wolf pack P x . Let the scale of P d be N d , then the scale of P x be N N d .
Step 2: In order to maintain the dominance of the population, only r outstanding individuals in the wolf pack P d are retained, r [ ( 1 1 / β ) N d , ( 1 1 / ( 2 β ) ) N d ] , and the remaining individuals in P d are eliminated.
Step 3: In the optimization space, R individuals whose similarity meets the requirements are randomly generated and supplemented to P d , R = [ N d / ( 2 β ) , N d / β ] .
Step 4: Combine P x and P d to form a new wolf pack, that is, the initial wolf pack P 0 of the next iteration.
It should be noted that wolves have good distribution in the solution space at the initial stage of evolution. In order to improve the convergence of the algorithm, save computing resources and reduce computing time, only when the population stagnant evolution algebra reaches the threshold can the population be updated by the population dynamic update method based on the Hamming Distance.

4.2. Basic Process of Improved WPA

The flow of the improved algorithm is shown in Figure 10. The calculation steps of the algorithm are described below by taking the solution of the maximum value as an example:
Step 1: Initialization. According to the wolf pack generation method based on the Pwlcm map in Equation (11), N artificial wolves are randomly generated in the Euclidean space of N × D , with the position of artificial wolf i as X i , the step length factor as S , the maximum number of walks as T m a x , the distance judgment factor as ω , the maximum number of iterations as k m a x , the update scale factor as β , the evolution stop threshold as g e n m a x and the similarity judgment threshold as S t .
Step 2: Wandering behavior. Select the lead wolf and treat all other wolves except the lead wolf as scout wolves. Let all scout wolves have random walk based on the exploration direction of the drunk walk model, then decide the best position in the next step and move forward by using the adaptive greedy mechanism, calculate the fitness value of the scout wolves’ positions and update the lead wolf in real time.
Step 3: Summoning behavior. All other wolves except the lead wolf are considered fierce wolves. After the lead wolf issues the summoning command, all scout wolves quickly move closer to the lead wolf according to Equation (6). If the fierce wolf i finds a better fitness value than the position of the lead wolf during the attack, that is: Y i Y l e a d , then the fierce wolf i replaces the lead wolf and initiates a call; otherwise, continue to attack until the siege conditions of half the population are met, end the summoning behavior and turn to Step 4.
Step 4: Siege behavior. The position of the lead wolf is regarded as the position of the prey, and all wolves besiege the prey according to Equation (9).
Step 5: Wolf pack update. Compare the objective function value Y m a x k + 1 corresponding to the lead wolf after each iteration with the function value Y l e a d k corresponding to the lead wolf in the previous generation. If Y m a x k + 1 Y l e a d k , update the position of the lead wolf, and update the R wolves with poor fitness value according to Equation (11).
Step 6: Determine whether to terminate. Judge whether the maximum number of iterations k m a x or the accuracy requirement is reached, and if so, output the optimal solution and its corresponding fitness value; otherwise, go to step 7.
Step 7: Determine whether to update the wolf pack. If there is no artificial wolf with a new optimal position in the current generation of the wolf pack, record the algebra g e n that has stopped evolving, and determine whether the conditions for updating the population are met. If g e n > g e n m a x , go to step 8; otherwise, go to step 2.
Step 8: Population update. By updating the individuals with high similarity to the lead wolf in the population based on the Hamming Distance, a new wolf pack is obtained, which is used as the initial population for the next generation evolution, then g e n = 0 , and go to step 2.

4.3. Time Complexity Analysis of the Algorithm

In order to illustrate the operation efficiency of the DCWPA, this paper uses the time complexity analysis method in [43] to analyze the time complexity of the proposed algorithm.
In the WPA, the population size is N , and the length of individual wolf positions is m . The setting time of parameters such as basic motion step s t e p , maximum walking period T m a x of wolf detection, siege judgment distance L n e a r and update scale factor β is η 0 , the time of generating the initial population is η 1 , and the time of calculating the fitness function value is f ( m ) , then the time complexity of algorithm initialization is:
o ( η 0 + N ( m η 1 + f ( m ) ) ) = o ( m )
If we assume the time consumption of the competition process of the lead wolf as η 2 , the time consumption of the wandering process of the scout wolf as η 3 , the time consumption of the fierce wolf performing the calling behavior and approaching the lead wolf as η 4 , the time consumption of the fierce wolf moving towards the lead wolf in each dimension space as η 5 , and the time consumption of judging whether to end the calling behavior as η 6 , then the time complexity of the algorithm in this stage is:
o ( N ( η 2 + η 3 + η 4 + n η 5 + η 6 ) ) = o ( m + f ( m ) )
From the above, the time complexity of each iteration in the WPA is:
T m = o ( m ) + o ( m + f ( m ) ) = o ( m + f ( m ) )
We put the time complexity of the algorithm analyzed in combination with the basic process of the DCWPA. In the initialization phase of the algorithm, the time consumption of generating the initialization population by chaotic mapping is t 1 , and the other initialization processes are the same as the WPA. Therefore, the time complexity of DCWPA initialization is:
o ( η 0 + N ( n η 1 + f ( n ) + t 1 ) ) = o ( n )
The time consumption of calculating the adaptive walk step length of the scout wolf as η 7 , the time consumption of judging whether the siege condition of half the population is reached as η 8 , the time consumption of population diversity detection and population evolution update as η 9 , and the rest of the process is the same as that of the WPA. Then the time complexity of this stage is:
o ( N ( η 2 + η 3 + η 4 + n η 5 + η 6 + η 7 + η 8 + η 9 ) ) = o ( n + f ( n ) )
In summary, the time complexity of each iteration process in the DCWPA is:
o ( n ) + o ( n + f ( n ) ) = o ( n + f ( n ) )
Therefore, compared with the WPA, the time complexity of the DCWPA does not change, and the operating efficiency of the algorithm does not decrease.

5. Algorithm Performance Test

5.1. Benchmark Function

In order to verify the effectiveness and feasibility of the algorithm in this paper, the DCWPA and six swarm intelligence optimization algorithms are used to optimize eight Benchmark functions [44] with different mathematical characteristics and dimensions in Table 3. US and UN in trait column in Table 3 are single-peak separable and non-separable functions, respectively, while MS and MN are multi-peak separable and multi-peak non separable functions, respectively. Here, the unimodal function is mainly used to test the local exploration ability of the algorithm, the multi-modal function is mainly used to test the global search ability of the algorithm, and the higher-dimension and non-separable function is mainly applied to test the performance of the algorithm to solve complex functions.

5.2. Parameter Setting

The comparison algorithms in this paper are the WPA, the opposite wolf pack algorithm (OWPA) [45], the cultural wolf pack algorithm (CWPA) [46], PSO, ABC and ASFA. Due to the differences in the test parameters adopted by the intelligent evolutionary algorithm in different reference, this paper selects the same setting of general parameters; that is, the maximum number of iterations is 200, the initial population size is 50, and the other parameter settings are shown in Table 4.

5.3. Analysis of Simulation Results

The above seven intelligent algorithms are used to conduct 20 independent experiments on the eight typical test functions shown in Table 3. The simulation experiment environment is as follows: HONOR Magic Book Pro, WIN10 operating system, Intel corei5-10210U processor, the program is implemented in MATLAB R2019b, m language. In this paper, the optimal value (BEST), worst value (WORST), mean value (MEAN) and standard deviation (STD) of the objective function, optimization success rate (SR) and average optimization success evolution number (AEN) are used to evaluate the pros and cons of the algorithm [47]. Table 5 shows the comparison results of the seven algorithms for the simulation calculation of the test function.
In order to visually show the performance of each algorithm, Figure 11 shows the radar chart comparing the obtained indicators. The closer the corresponding point of each index is to the center, the better the performance of the algorithm on this index is and vice versa. The area of the closed image composed of each color can represent the overall performance of the algorithm; that is, the smaller the area, the better the overall performance of the algorithm.
From Table 5 and Figure 11, it can be seen that compared with other algorithms, the BEST, MEAN, WORST, STD and AEN obtained by the DCWPA are all better. The DCWPA shows better performance. The detailed analysis is as follows:
(1)
The DCWPA has strong global search ability. For high-dimensional functions, the complexity of problem solving will increase exponentially as the spatial dimension of the solution increases, that is, to cause the “dimensional disaster” in computing. The six algorithms, PSO, ABC, ASFA, WPA, OWPA, and CWPA, have good calculation results for 2-dimensional and low-dimensional functions, but it is difficult to successfully optimize the multi-dimensional and multi-modal functions F6. However, the DCWPA not only performs well for low-dimensional functions, but also performs better for high-dimensional complex functions, indicating that the DCWPA has a very strong ability to jump out of local optima.
(2)
The DCWPA has good local exploration ability. When the classical algorithms PSO, ABC and ASFA are used to solve the low-dimensional, multimodal function F4, they cannot find a solution that meets the accuracy requirements, and generally fall into local optimum. The WPA, the OWPA and the CWPA are not good for solving F1 except that the success rate of solving the unimodal function F2 is 100%, and the accuracy of the solution is high. The optimization success rate of the DCWPA for eight functions is 100%, indicating that the DCWPA is applicable to most functions. The DCWPA obtains a solution that meets the accuracy requirements for each function with a small number of iterations, and the solution accuracy is much higher than other algorithms, and even the solution results for F1 and F7 are the most optimal in theory.
(3)
The DCWPA has high solution efficiency. In the 20 solving calculations, except that the average number of iterations for solving the low-dimensional, unimodal function F1 reaches 200 and is lower than only ABC, the average number of iterations for solving all other functions is smaller than that of other algorithms to obtain solutions that meet the accuracy requirements.
(4)
The DCWPA has good robustness. It can be seen from the solution results of the eight standard test functions that the variance of the DCWPA is the smallest, and the stability of the DCWPA is stronger than other algorithms.
In order to further analyze the performance of the proposed algorithm, Figure 12 shows the comparison of the average convergence curves of the seven algorithms for solving eight functions, respectively.
It can be seen from Figure 12 that the convergence speed and solution accuracy of the seven algorithms for Easom function are generally higher than other functions. As a whole, PSO, ABC, ASFA and CWPA converge faster, but the effect of solving high-dimensional complex functions is far from satisfactory and the continuous evolution ability is weak, which are easy to fall into local optimization. In the process of iteration, the accuracy of the results obtained by the OWPA and the WPA is constantly improving; it is not easy to fall into local optimization, and it is even possible to find the optimal solution, which shows the advantages of the wolf pack algorithm in solving complex functions, but the convergence speed of the algorithm is slow, and the solution efficiency is low. The average convergence curve of the DCWPA is the straight line with the largest change speed and the smallest final function value, which shows that the DCWPA has not only the fastest convergence speed, the highest solution efficiency, but also the highest solution accuracy and the strongest optimization ability in the solution of eight functions.
To sum up, in the aspects of global search efficiency, convergence speed and local development accuracy, the DCWPA has the best performance with better optimization effects than that of the other six algorithms. It shows the effectiveness of the algorithm improvement strategy for solving complex functions in continuous space.

6. Parameter Identification of the PV Module Model

6.1. Effectiveness and Feasibility Test

To verify its effectiveness in parameter identification, the DCWPA is used to extract parameters for SDM, DDM and PV module models. The measured data of the current (I) and voltage (V) of the three models are all from reference [48]. All the parameter settings and the experimental environment are the same as those in Section 4 of this paper, except that the maximum number of iterations for each calculation is set to 2000. The objective functions of the three models are calculated 20 times independently by using the DCWPA. The obtained I–V features and related experimental data are shown in Table 6, and the I–V characteristics are shown in Figure 13.
In Table 6, V m and I m are measured voltage and measured current data, respectively, I c is the current data obtained from simulation calculation, D is the error rate between the simulated current and the measured current, D = I c / I m 1 . The closer D is to 0, the more accurate I c is. As can be seen from Table 6, when V m = 0.5736 , the D of the single-diode model and the double-diode model reach the maximum value of −13.1878% and −13.2862%, respectively. When V m = 16.5241 and V m = 16.7987 , the D of the PV model reaches a relatively large value of −4.9950% and 6.0499%. The results show that the simulation data of the DCWPA are highly consistent with the measured data in the whole voltage range. The practical application effect of the parameters identified by the DCWPA is more intuitively shown in Figure 13. It can also be seen from the figure that the measured and simulated I and V on the three models have a high degree of coincidence, indicating that the error of the predicted parameters in practical application is very small, and the accuracy is relatively high. In particular, the parameter identification of the double-diode model and the PV module model is more difficult than that of the single-diode model, but the DCWPA can still obtain more accurate identification results. It shows that the DCWPA can show good performance in parameter identification, and the identified parameters can be used in practical application. It is proved that the DCWPA has excellent comprehensive performance.

6.2. Stability and Robustness Test

To verify the superiority in performance, the proposed DCWPA is compared with five algorithms, ABC, IJAYA [49], PSO, crow search algorithm (CSA) [50] and the WPA. ABC, PSO, IJAYA and CSA are commonly used algorithms in the field of PV parameter identification. The overall size of all the compared algorithms is set to 100, the maximum number of iterations of the algorithms are all set to 2000, and other algorithm parameters are set in [49,50] and Section 4 of this paper. There is no completely correct solution to the parameter identification problem. The RMSE is the most important criterion for evaluating the performance of the algorithm. The smaller the RMSE value, the better the performance of the algorithm. Each algorithm is run independently for 20 times, and the obtained simulation results are shown in Table 7.
Table 7 shows the best value (BEST), the worst value (WORST), the mean value (MEAN) and the standard deviation (SD) obtained by the six algorithms for optimizing the three models. It can be clearly seen from Table 7 that, except for the standard deviation of the double-diode model, which is inferior to the WPA, the rest of the indexes obtained by the DCWPA are better than those obtained by other algorithms. Especially under the condition of the same number of calculation iterations, the solution accuracy of the DCWPA is obviously better than other algorithms. It shows that the accuracy of the optimal value searched by the DCWPA algorithm on the single-diode model is higher, and the execution process of the algorithm is more stable. Compared with the five comparison algorithms, the DCWPA algorithm still has certain advantages when applied to solve practical problems, which proves that the improvement of the algorithm in this paper is practical and effective. It can be concluded that in the field of PV system parameter identification in industrial applications, the DCWPA can achieve relatively good parameter identification results, ahead of the other five comparison algorithms, proving the superior performance of the DCWPA in practical applications.
The convergence curves of the six algorithms for the three PV models are shown in Figure 14. Obviously, among the three models, the DCWPA has the fastest convergence speed, and the optimal solution is better than other algorithms. As can be seen from Figure 14, PSO converges rapidly but falls into the local optimal solution. The convergence speed of CSA is slow, and it is difficult to find the optimal value. The WPA has some advantages in solving, but its local exploration ability is weak, and the accuracy of the solution is low. IJAYA and ABC have faster convergence speed and higher accuracy, but the solution results of the two algorithms are slightly inferior to the DCWPA. The DCWPA has the fastest convergence speed and the highest solution accuracy and shows strong optimization ability.
Therefore, through the practical application of the DCWPA in PV system parameter identification, it is proved that the proposed DCWPA is effective and superior in practical production and life.

7. Conclusions

Aiming at the low accuracy problem of parameter identification by the current intelligent optimization algorithm in a PV model, this paper improves the basic wolf pack algorithm and puts forward a novel drunken adaptive walking chaotic wolf pack algorithm, which is named the DCWPA for short. The DCWPA uses the chaotic map sequence to initialize the population, thus to improve the diversity of the initial population. It adopts the walking direction mechanism based on the drunk walking model and the adaptive walking step size to increase the randomness of walking, enhance the individual’s ability to explore and develop and improve the ability of algorithm optimization. It also designs the judgment conditions for half siege in order to accelerate the convergence of the algorithm and improve the speed of the algorithm. In the iterative process, according to the change of the optimal solution, the Hamming Distance is used to judge the similarity of individuals in the population, and the individuals of the population are constantly updated to avoid the algorithm from stopping evolution prematurely due to falling into local optimization. This paper selects eight standard test functions (Benchmark) with different characteristics to verify the performance of the DCWPA algorithm for continuous optimization and uses it for parameter identification of a single-diode five-parameter model, a double-diode seven-parameter model and a photovoltaic module model. The results show that the DCWPA has stronger optimization ability in high-dimensional complex continuous reading space and can accurately and reliably identify the model parameters of photovoltaic modules. This research provides a new idea and method for solving the parameter identification problem of a PV module model.
Although the DCWPA shows better performance in PV module model parameter identification, there are still some works that need further improvement. First, whether the proposed method still has good performance for complex PV module models requires continued validation and research. In addition, in terms of the DCWPA algorithm, too many parameters and complex algorithm processes still need to be solved in the next step. Finally, the method should be further extended to other practical engineering problems.

Author Contributions

All authors contributed to the study conception and design. Experiments and analysis were performed by H.W. and Q.P. The first draft of the manuscript was written by H.W. The full text was checked and verified by S.C. and L.X. M.S. proofread for article writing. All authors commented on previous versions of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Military science project of National Social Science Foundation (2019-SKJJ-C-092), Natural Science Foundation of ShaanXi Province (No. 2020JQ-493), Military Equipment Research Project (WJ2020A020029), Equipment comprehensive research project (WJY20211A030018), National Natural Science Foundation of China (No. 61773120), the Hunan Provincial Innovation Foundation For Postgraduate (CX20200585), and the Special Projects in Key Fields of Universities in Guangdong (No. 2021ZDZX1019).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The financial supports received from the Military science project of National Social Science Foundation (2019-SKJJ-C-092), Natural Science Foundation of ShaanXi Province (No. 2020JQ-493), Military Equipment Research Project (WJ2020A020029), Equipment comprehensive research project (WJY20211A030018), National Natural Science Foundation of China (No. 61773120), the Hunan Provincial Innovation Foundation For Postgraduate (CX20200585), and the Special Projects in Key Fields of Universities in Guangdong (No. 2021ZDZX1019) are gratefully acknowledged.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Liu, L.; Wang, Z.; Zhang, H.; Xue, Y. Solar energy development in China—A review. Renew. Sustain. Energy Rev. 2010, 14, 301–311. [Google Scholar] [CrossRef]
  2. Zhou, G.; Li, K.; Liu, W.; Su, Z. Grey wolf optimizes mixed parameter multi-classification twin support vector machine. J. Front. Comput. Sci. Technol. 2020, 14, 628–636. [Google Scholar] [CrossRef]
  3. Ren, Y.; Yan, W. An efficient algorithm for high-dimensional function optimization. Soft Comput. 2013, 17, 995–1004. [Google Scholar] [CrossRef]
  4. Errouha, M.; Motahhir, S.; Combe, Q.; Derouich, A. Parameters extraction of single diode PV model and application in solar pumping. In International Conference on Integrated Design and Production; Springer: Cham, Switzerland, 2019; pp. 178–191. [Google Scholar] [CrossRef]
  5. Alam, D.F.; Yousri, D.A.; Eteiba, M.B. Flower pollination algorithm based solar PV parameter estimation. Energy Convers. Manag. 2015, 101, 410–422. [Google Scholar] [CrossRef]
  6. Hamadi, S.A.; Chouder, A.; Rezaoui, M.M.; Motahhir, S.; Kaddouri, A.M. Improved Hybrid Parameters Extraction of a PV Module Using a Moth Flame Algorithm. Electronics 2021, 10, 2798. [Google Scholar] [CrossRef]
  7. Wang, R. Parameter Identification of Photovoltaic Cell Model Based on Enhanced Particle Swarm Optimization. Sustainability 2021, 13, 840. [Google Scholar] [CrossRef]
  8. Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the ICNN’95-International Conference on Neural Networks, Perth, Australia, 27 November–1 December 1995; pp. 1942–1948. [Google Scholar]
  9. Li, X.L.; Shao, Z.J.; Qian, J.X. An optimization model based on animal commune: Fish swarm algorithm. Syst. Eng. Theory Pract. 2002, 22, 32–38. [Google Scholar]
  10. Colorni, A.; Dorigo, M.; Maniezzo, V. Distributed optimization by ant colonies. In Proceedings of the First European Conference on Artificial Life, Paris, France, 11–13 December 1991; pp. 134–142. [Google Scholar]
  11. Passino, K.M. Biomimicry of bacterial foraging for distributed optimization and control. IEEE Control Syst. Mag. 2002, 22, 52–67. [Google Scholar] [CrossRef]
  12. Karaboga, D.; Basturk, B. A powerful and efficient algorithm for numerical function optimization: Artificial bee colony (ABC) algorithm. J. Glob. Optim. 2007, 39, 459–471. [Google Scholar] [CrossRef]
  13. Wu, H.; Zhang, F.; Wu, L. A new swarm intelligence algorithm-wolf pack algorithm. Syst. Eng. Electron. Technol. 2013, 35, 2430–2438. [Google Scholar]
  14. Chu, D.; Chen, H.; Wang, X. Whale optimization algorithm based on adaptive weight and simulated annealing. Acta Electron. Sin. 2019, 47, 992–999. [Google Scholar] [CrossRef]
  15. Long, W.; Cai, S.; Jiao, J.; Wu, T.B. An improved grey wolf optimization algorithm. Acta Electron. Sin. 2019, 47, 169–175. [Google Scholar] [CrossRef]
  16. Ma, W.; Sun, Z.A. Global cuckoo optimization algorithm using coarse-to-fine search. Acta Electron. Sin. 2015, 43, 2429–2439. [Google Scholar] [CrossRef]
  17. Jordehi, A.R. Enhanced leader particle swarm optimisation (ELPSO): An efficient algorithm for parameter estimation of photovoltaic (PV) cells and modules. Sol. Energy 2018, 159, 78–87. [Google Scholar] [CrossRef]
  18. Gong, W.; Cai, Z. Parameter extraction of solar cell models using repaired adaptive differential evolution. Sol. Energy 2013, 94, 209–220. [Google Scholar] [CrossRef]
  19. Oliva, D.; Cuevas, E.; Pajares, G. Parameter identification of solar cells using artificial bee colony optimization. Energy 2014, 72, 93–102. [Google Scholar] [CrossRef]
  20. Yu, K.; Qu, B.; Yue, C.; Ge, S.; Chen, X.; Liang, J.A. Performance-guided JAYA algorithm for parameters identification of photovoltaic cell and module. Appl. Energy 2019, 237, 241–257. [Google Scholar] [CrossRef]
  21. Liang, J.; Ge, S.; Qu, B.; Yu, K.J. Improved particle swarm optimization algorithm for solving power system economic dispatch problem. Control Decis. 2020, 35, 1813–1822. [Google Scholar]
  22. Liang, J.; Ge, S.; Qu, B.; Yu, K.; Liu, F.; Yang, H.; Wei, P.; Li, Z. Classified perturbation mutation based particle swarm optimization algorithm for parameters extraction of photovoltaic models. Energy Convers. Manag. 2020, 203, 112138. [Google Scholar] [CrossRef]
  23. Jian, X.; Weng, Z. A logistic chaotic JAYA algorithm for parameters identification of photovoltaic cell and module models. Optik 2020, 203, 164041. [Google Scholar] [CrossRef]
  24. Yu, K.; Liang, J.J.; Qu, B.Y.; Cheng, Z.; Wang, H. Multiple learning backtracking search algorithm for estimating parameters of photovoltaic models. Appl. Energy 2018, 226, 408–422. [Google Scholar] [CrossRef]
  25. Xu, Y.; Gao, Z.; Zhu, X. Parameter identification method of photovoltaic array based on shuffled frog leaping algorithm. Actor Energy Sol. Sin. 2019, 40, 1903–1911. [Google Scholar]
  26. Yang, C.; Tu, X.; Chen, J. Algorithm of marriage in honey bees optimization based on the wolf pack search. In Proceedings of the 2007 International Conference on Intelligent Pervasive Computing (IPC 2007), Jeju Island, Korea, 11–13 October 2007; pp. 462–467. [Google Scholar]
  27. Wu, H.; Zhang, F.; Zhan, R.; Wang, S. A binary wolf pack algorithm for solving 0–1 knapsack problem. Syst. Eng. Electron. 2014, 36, 1660–1667. [Google Scholar]
  28. Wu, H.; Zhang, F.; Li, H.; Liang, X. Discrete wolf pack algorithm for traveling salesman problem. Control Decis. 2015, 30, 1861–1867. [Google Scholar]
  29. Liu, Y.L.; Li, W.M.; Wu, H.S.; Song, W.J. Track planning for unmanned aerial vehicles based on wolf pack algorithm. J. Syst. Simul. 2015, 27, 1838–1843. [Google Scholar]
  30. Wang, Y.; Chen, M.; Cheng, T.; Shen, Q.; Dong, L. Research on improved Wolf pack algorithm based on kitting differential evolution. Comput. Appl. Res. 2019, 36, 2305–2310. [Google Scholar]
  31. Hui, X.; Guo, Q.; Wu, P.; Zhao, Y. An improved wolf pack algorithm. Control Decis. 2017, 32, 1163–1172. [Google Scholar]
  32. Yu, L.; Zhang, L.; Gu, X. Methanol synthesis mechanism modeling and parameter estimation based on improved wolf pack algorithm. J. East China Univ. Sci. Technol. 2017, 43, 815–823. [Google Scholar]
  33. Zhou, J.; Tian, M.; Zhong, F. High density wireless sensor network efficient clustering method based on chaotic niche wolf algorithm. Gansu Sci. Technol. 2016, 32, 38–40. [Google Scholar]
  34. Ma, L.; Lu, C.; Gu, Q.; Chen, X. Cellular wolf pack optimization algorithm for multi-objective 0–1 programming. Oper. Manag. 2018, 27, 17–24. [Google Scholar]
  35. Kang, T.; Yao, J.; Jin, M.; Yang, S.; Duong, T. A Novel Improved Cuckoo Search Algorithm for Parameter Estimation of Photovoltaic (PV) Models. Energies 2018, 11, 1060. [Google Scholar] [CrossRef] [Green Version]
  36. Gandomi, A.H.; Yang, X.S.; Talatahari, S.; Alavi, A.H. Firefly algorithm with chaos. Commun. Nonlinear Sci. Numer. Simul. 2013, 18, 89–98. [Google Scholar] [CrossRef]
  37. Pearson, K. The problem of the random walk. Nature 1905, 72, 294. [Google Scholar] [CrossRef]
  38. Gupta, S.; Deep, K. A novel random walk grey wolf optimizer. Swarm Evol. Comput. 2019, 44, 101–112. [Google Scholar] [CrossRef]
  39. Norris, J.R.; Norris, J.R. Markov Chains; Cambridge University Press: Cambridgeshire, UK, 1998. [Google Scholar]
  40. Viswanathan, G.M.; Afanasyev, V.; Buldyrev, S.V.; Murphy, E.J.; Prince, P.A.; Stanley, H.E. Lévy flight search patterns of wandering albatrosses. Nature 1996, 381, 413–415. [Google Scholar] [CrossRef]
  41. Nie, S.; Liang, T. A historical study about random walk model. J. Weinan Norm. Univ. 2012, 27, 19–21. [Google Scholar]
  42. Cong, P.; Li, L.; Chen, Y. Particle Swarm Optimization Algorithm Based on Optimization Hamming Distance and Immune Thought. J. Chongqing Univ. Technol. 2019, 33, 122–127. [Google Scholar]
  43. Zhou, H.; Li, Y. Cuckoo search algorithm with dynamic inertia weight. CAAI Trans. Intell. Syst. 2015, 10, 645–651. [Google Scholar]
  44. Solano-Aragón, C.; Castillo, O. Optimization of benchmark mathematical functions using the firefly algorithm with dynamic parameters. In Fuzzy Logic Augmentation of Nature-Inspired Optimization Metaheuristics; Springer: Cham, Switzerland, 2015; pp. 81–89. [Google Scholar]
  45. Li, H.; Wu, H. An oppositional wolf pack algorithm for parameter identification of the chaotic systems. Optik 2016, 127, 9853–9864. [Google Scholar] [CrossRef]
  46. Qian, R. A wolf pack algorithm based on cultural mechanism. Inf. Technol. 2015, 12, 98–102. [Google Scholar]
  47. Xue, J.; Ying, W.; Li, H.; Xiao, J. An intelligent algorithm for wolves and its convergence analysis. Control Decis. 2016, 12, 2131–2139. [Google Scholar]
  48. Easwarakhanthan, T.; Bottin, J.; Bouhouch, I.; Boutrit, C. Nonlinear minimization algorithm for determining the solar cell parameters with microcomputers. Int. J. Sol. Energy 1986, 4, 1–12. [Google Scholar] [CrossRef]
  49. Yu, K.; Liang, J.J.; Qu, B.Y.; Chen, X.; Wang, H. Parameters identification of photovoltaic models using an improved JAYA optimization algorithm. Energy Convers. Manag. 2017, 150, 742–753. [Google Scholar] [CrossRef]
  50. Omar, A.; Hasanien, H.M.; Elgendy, M.A.; Badr, M.A.L. Identification of the photovoltaic model parameters using the crow search algorithm. J. Eng. 2017, 2017, 1570–1575. [Google Scholar] [CrossRef]
Figure 1. Equivalent circuit diagram for SDM.
Figure 1. Equivalent circuit diagram for SDM.
Energies 15 06340 g001
Figure 2. Equivalent circuit diagram for DDM.
Figure 2. Equivalent circuit diagram for DDM.
Energies 15 06340 g002
Figure 3. Equivalent circuit of PV module model.
Figure 3. Equivalent circuit of PV module model.
Energies 15 06340 g003
Figure 4. Basic principle model of the WPA.
Figure 4. Basic principle model of the WPA.
Energies 15 06340 g004
Figure 5. Pseudo-random number initialization population distribution.
Figure 5. Pseudo-random number initialization population distribution.
Energies 15 06340 g005
Figure 6. Schematic diagram of scout wolf.
Figure 6. Schematic diagram of scout wolf.
Energies 15 06340 g006
Figure 7. Probability distribution of four typical chaotic maps.
Figure 7. Probability distribution of four typical chaotic maps.
Energies 15 06340 g007
Figure 8. Pwlcm map sampling point distribution.
Figure 8. Pwlcm map sampling point distribution.
Energies 15 06340 g008
Figure 9. Schematic diagram of random walk search.
Figure 9. Schematic diagram of random walk search.
Energies 15 06340 g009
Figure 10. Flowchart of the improved algorithm.
Figure 10. Flowchart of the improved algorithm.
Energies 15 06340 g010
Figure 11. Algorithm level radar chart.
Figure 11. Algorithm level radar chart.
Energies 15 06340 g011
Figure 12. Comparison of the average convergence curves of the eight functions.
Figure 12. Comparison of the average convergence curves of the eight functions.
Energies 15 06340 g012
Figure 13. Comparison between measured and simulated data for the three models.
Figure 13. Comparison between measured and simulated data for the three models.
Energies 15 06340 g013
Figure 14. Convergence curves of the algorithm solution.
Figure 14. Convergence curves of the algorithm solution.
Energies 15 06340 g014
Table 1. Error functions of the three models.
Table 1. Error functions of the three models.
No.TypeModel
1Single-diode model { f ( V , I , x ) = I p h I o · [ exp ( q · ( V + I · R s ) a · k · T ) 1 ] V + I · R s R s h I x = [ I p h , I o , R s , R s h , a ]
2Double-diode model { f ( V , I , x ) = I p h I o 1 · [ exp ( q · ( V + I · R s ) a 1 · k · T ) 1 ] I o 2 · [ exp ( q · ( V + I · R s ) a 2 · k · T ) 1 ] V + I · R s R s h I x = [ I p h , I o 1 , I o 1 , R s , R s h , a 1 , a 2 ]
3PV module based the SDM { f ( V , I , x ) = I p h · N p I o · N p [ exp ( q · ( V + I · R s · N s / N p ) a · N s · k · T ) 1 ] V + I · R s · N s / N p R s h · N s / N p I x = [ I p h , I o , R s , R s h , a , N p , N s ]
Table 2. Four typical chaotic maps.
Table 2. Four typical chaotic maps.
No.MapExpressionExplanation
1Logistic map z k + 1 = a · z k ( 1 z k ) Generally, the value of a is 4; When z 0 ( 0 , 1 ) and z 0 ( 0 , 0.25 , 0.5 , 0.75 , 1 ) , z k ( 0 , 1 )
2Tent map z k + 1 = { z k / 0.7 , z k < 0.7 10 / 3 z k ( 1 z k ) , otherwise z k ( 0 , 1 )
3Piecewise map z k + 1 = { z k / p , 0 z k < p z k p 0.5 p , p < z k < 0.5 1 p z k 0.5 p , 0.5 z k < 1 p ( 1 z k ) / p , 1 p z k < 1 When p ( 0 , 0.5 ) , z k ( 0 , 1 )
4Pwlcm map z k + 1 = { z k / p ,                                       z k ( 0 , p )   ( 1 z k ) ( 1 p ) ,         z k [ p , 1 ) When p = 0.7 , z k ( 0 , 1 )
Table 3. Benchmark functions in experiments.
Table 3. Benchmark functions in experiments.
No.TraitFunctionsFormulationRangeMin
F1UNEasom f ( X ) = cos ( x 1 ) · cos ( x 2 ) · e ( ( x 1 π ) 2 ( x 2 π ) 2 ) [ 10 , 10 ] 2 −1
F2UNMatyas f ( X ) = 0.26 ( x 1 2 + x 2 2 ) 0.48 x 1 x 2 [ 10 , 10 ] 2 0
F3USSumsquares f ( X ) = i = 1 D i · ( x i ) 2 [ 10 , 10 ] D 0
F4USSphere f ( X ) = i = 1 D x i 2 [ 1.5 , 1.5 ] D 0
F5MSBooth f ( X ) = ( x 1 + 2 x 2 7 ) 2 + ( 2 x 1 + x 2 5 ) 2 [ 10 , 10 ] 2 0
F6MSQuadric f ( X ) = i = 1 D ( k = 1 i x k ) 2 [ 30 , 30 ] D 0
F7MNBohachevsky3 f ( X ) = x 1 2 + 2 x 2 2 0.3 cos ( 3 π x 1 + 4 π x 2 ) + 0.3 [ 100 , 100 ] 2 0
F8MNEggcrate f ( X ) = x 1 2 + x 2 2 + 25 ( sin 2 x 1 + sin 2 x 2 ) [ 2 π , 2 π ] 2 0
Table 4. Parameter setting of the intelligent optimization algorithms.
Table 4. Parameter setting of the intelligent optimization algorithms.
MethodsParameter Setting
PSO ω = 0.7298 , c 1 = c 2 = 1.4946 , limit v ( 0.5 , 0.5 )
ABC N = 2 , limit = 100
ASFA t r y n u m = 100 , v = 1 , d e = 0.618 , s t e p = 0.1
WPA T m a x = 10 , S = 0.06 , ω ω = 0.04 , β = 5
OWPA T m a x = 10 , S = 0.06 , ω ω = 0.04 , β = 5
CWPA T m a x = 10 , S = 0.06 , ω ω = 0.04 , β = 5
DCWPA T m a x = 10 , S = 0.06 , ω ω = 0.04 , β = 5
Table 5. Comparison of test results of the intelligent optimization algorithms.
Table 5. Comparison of test results of the intelligent optimization algorithms.
FUNDimIndexPSOABCAFSAWPAOWPACWPADCWPA
F12BEST−1−1−1−1−1−1−1
MEAN−1−1−0.701−0.95−0.9999−0.9999−1
WORST−1−1−8.06 × 10−5−8.11 × 10−5−0.9997−0.9998−1
STD7.8644 × 10−500.46780.22367.6544 × 10−55.8551 × 10−52.1721 × 10−8
SR100%100%095%10%25%100%
AEN20037.4200200200200200
F22BEST7.9904 × 10−119.6388 × 10−76.7805 × 10−93.6266 × 10−202.9776 × 10−221.8871 × 10−141.3166 × 10−23
MEAN4.4123 × 10−82.0856 × 10−49.2214 × 10−71.8457 × 10−171.2073 × 10−166.0856 × 10−74.4866 × 10−20
WORST2.4008 × 10−78.5121 × 10−41.3451 × 10−51.1829 × 10−161.1454 × 10−155.2634 × 10−65.1666 × 10−19
STD5.9306 × 10−82.418 × 10−42.9783 × 10−63.2654 × 10−172.8883 × 10−161.1774 × 10−61.2333 × 10−19
SR100%20%95%100%100%100%100%
AEN12.2175.25133.819.613.9532.34.85
F3150BEST476.96598.9914 × 1041.5141 × 1041.4595 × 10−1115.15648.0471 × 10−75.0886 × 10−12
MEAN633.04321.133 × 1051.6486 × 1042.5592 × 10−940.84190.2629.8624 × 10−10
WORST750.01931.3107 × 1051.7742 × 1041.6101 × 10−8158.20365.12688.005 × 10−9
STD66.40261.1949 × 104703.09884.1411 × 10−929.07611.14532.0005 × 10−9
SR000100%065%100%
AEN200200200134.8200192.35142.9
F4200BEST11.849857.257451.60546.2244 × 10−150.05253.7845 × 10−101.5957 × 10−15
MEAN16.241265.6567473.37686.8221 × 10−130.09364.7262 × 10−92.532 × 10−13
WORST19.243774.0817493.51155.3258 × 10−120.14883.7217 × 10−81.236 × 10−12
STD2.03124.978310.35991.2832 × 10−120.038.2814 × 10−93.9012 × 10−13
SR000100%0100%100%
AEN20020020082.85200117.792.45
F52BEST3.4468 × 10−85.7334 × 10−121.1403 × 10−62.8894 × 10−74.0935 × 10−81.2224 × 10−76.1414 × 10−17
MEAN1.4946 × 10−61.1554 × 10−101.3081 × 10−52.3196 × 10−66.5075 × 10−61.0868 × 10−51.3109 × 10−10
WORST9.3532 × 10−66.0774 × 10−104.5909 × 10−51.1638 × 10−51.5391 × 10−59.7972 × 10−52.4185 × 10−9
STD2.1951 × 10−61.6551 × 10−101.4181 × 10−52.4271 × 10−63.6939 × 10−62.1291 × 10−55.3893 × 10−10
SR100%100%50%95%90%65%100%
AEN65.388.55167.0552.45106.7122.1518.25
F6100BEST15.09071.396 × 1042.2416 × 10−56.9983 × 10−111.0112 × 1032.3952 × 10−69.9569 × 10−12
MEAN25.94542.7012 × 1042.25472.817 × 10−83.3495 × 1030.62432.7455 × 10−9
WORST42.80163.4634 × 10435.02451.9521 × 10−71.2198 × 10412.48522.7331 × 10−8
STD6.93414.6356 × 1037.90965.337 × 10−82.3253 × 1032.79186.5291 × 10−9
SR000100%020%100%
AEN200200200149.65200198.8134.05
F72BEST3.5387 × 10−79.6579 × 10−70.00393.1742 × 10−108.3267 × 10−163.967 × 10−90
MEAN6.6341 × 10−67.0323 × 10−5701.65090.55790.18080.62112.6368 × 10−16
WORST7.8543 × 10−54.5012 × 10−47.2342 × 1030.93992.03270.94122.8311 × 10−15
STD1.7217 × 10−51.0936 × 10−41.5802 × 1030.39040.48390.38346.507 × 10−16
SR90%35%020%75%10%100%
AEN106.4158.3200193.9587.05193.8512.8
F82BEST1.0388 × 10−64.639 × 10−204.8442 × 10−54.4745 × 10−191.1689 × 10−183.6379 × 10−135.3206 × 10−21
MEAN1.2549 × 10−55.0131 × 10−182.85115.802 × 10−160.94884.2246 × 10−42.7143 × 10−18
WORST5.5292 × 10−52.1425 × 10−179.48935.525 × 10−159.48820.00211.9367 × 10−17
STD1.2975 × 10−55.6373 × 10−184.45821.2884 × 10−152.92045.669 × 10−44.4522 × 10−18
SR65%100%0100%90%30%100%
AEN150.223.3520037.448.05155.64.2
Table 6. Simulation results of using the DCWPA for three models solution.
Table 6. Simulation results of using the DCWPA for three models solution.
SDMDDMPV
V m   ( V ) I m   ( A ) I c   ( A ) D ( % ) V m   ( V ) I m   ( A ) I c   ( A ) D ( % ) V m   ( V ) I m   ( A ) I c   ( A ) D ( % )
−0.20570.7640.7640−0.0003−0.20570.7640.7639−0.00870.12481.03151.0295−0.1986
−0.12910.7620.76260.0788−0.12910.7620.76250.07201.80931.031.0276−0.2356
−0.05880.76050.76130.1075−0.05880.76050.76130.10233.35111.0261.0258−0.0187
0.00570.76050.7601−0.04740.00570.76050.76010.05124.76221.0221.02410.2019
0.06460.760.7591−0.12350.06460.760.7590−0.12606.05381.0181.02220.4081
0.11850.7590.7581−0.12280.11850.7590.7581−0.12437.23641.01551.01970.4159
0.16780.7570.75710.01780.16780.7570.75710.01738.31891.0141.01610.2087
0.21320.7570.7569−0.10580.21320.7570.7562−0.10559.30971.011.01020.0244
0.25450.75550.7552−0.04540.25450.75550.7552−0.044710.21631.00351.0004−0.3069
0.29240.7540.7537−0.03430.29240.7540.7537−0.033511.04490.9880.9844−0.3621
0.32690.75050.75150.12930.32690.75050.75150.129811.80180.9630.9595−0.3627
0.35850.74650.74740.12410.35850.74650.74740.123812.49290.92550.9229−0.2762
0.38730.73850.74020.22640.38730.73850.74020.225113.12310.87250.87280.0347
0.41370.7280.7274−0.08120.41370.7280.7274−0.083613.69830.80750.80750.0035
0.43730.70650.70700.06570.43730.70650.70690.062514.22210.72650.72860.2872
0.4590.67550.6752−0.03910.4590.67550.67520.042514.69950.63450.63730.4460
0.47840.6320.6307−0.20780.47840.6320.6307−0.210515.13460.53450.53630.3382
0.4960.5730.5718−0.20170.4960.5730.5718−0.202515.53110.42750.42950.4681
0.51190.4990.49950.10580.51190.4990.49950.108115.89290.31850.31870.0517
0.52650.4130.41360.14320.52650.4130.41360.149716.22290.20850.2072−0.6177
0.53980.31650.31750.31090.53980.31650.31750.322716.52410.1010.0960−4.9950
0.55210.2120.21220.07630.55210.2120.21220.095316.7987−0.008−0.00856.0499
0.56330.10350.1023−1.17540.56330.10350.1023−1.144817.0499−0.111−0.11100.0073
0.5736−0.01−0.0087−13.1870.5736−0.01−0.0087−13.28617.2793−0.209−0.20920.0890
0.5833−0.123−0.12552.01610.5833−0.123−0.12552.036017.4885−0.303−0.3006−0.7882
0.59−0.21−0.2085−0.72480.59−0.21−0.2085−0.6964----
Table 7. Solution results of three models by different algorithms.
Table 7. Solution results of three models by different algorithms.
ModelIndexPSOABCCSAIJAYAWPADCWPA
SDMBEST3.1262 × 10−21.0140 × 10−32.9826 × 10−31.2816 × 10−32.3252 × 10−39.8745 × 10−4
WORST0.10041.2414 × 10−31.1751 × 10−21.8729 × 10−32.7204 × 10−39.9366 × 10−4
MEAN6.1721 × 10−21.1405 × 10−36.0005 × 10−31.4222 × 10−32.5813 × 10−39.9182 × 10−4
SD2.9675 × 10−28.6246 × 10−53.8113 × 10−32.5345 × 10−42.2205 × 10−42.4858 × 10−6
DDMBEST1.2001 × 10−29.9687 × 10−45.4739 × 10−31.6090 × 10−33.8205 × 10−39.8780 × 10−4
WORST0.24671.0371 × 10−31.3528 × 10−22.3040 × 10−33.8207 × 10−39.8882 × 10−4
MEAN0.11261.0038 × 10−39.6281 × 10−31.9171 × 10−33.8206 × 10−39.8831 × 10−4
SD9.9695 × 10−21.9256 × 10−53.0123 × 10−32.7273 × 10−45.4595 × 10−84.3543 × 10−7
PVBEST8.7645 × 10−32.4399 × 10−34.7107 × 10−32.4520 × 10−35.3838 × 10−32.4320 × 10−3
WORST1.09042.5122 × 10−38.8175 × 10−32.4986 × 10−35.3846 × 10−32.4331 × 10−3
MEAN0.53712.4803 × 10−36.8965 × 10−32.4682 × 10−35.3841 × 10−32.4326 × 10−3
SD0.37842.6510 × 10−51.7547 × 10−31.8621 × 10−54.6818 × 10−74.2351 × 10−7
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wu, H.; Peng, Q.; Shi, M.; Xing, L.; Cheng, S. Drunkard Adaptive Walking Chaos Wolf Pack Algorithm in Parameter Identification of Photovoltaic Module Model. Energies 2022, 15, 6340. https://doi.org/10.3390/en15176340

AMA Style

Wu H, Peng Q, Shi M, Xing L, Cheng S. Drunkard Adaptive Walking Chaos Wolf Pack Algorithm in Parameter Identification of Photovoltaic Module Model. Energies. 2022; 15(17):6340. https://doi.org/10.3390/en15176340

Chicago/Turabian Style

Wu, Husheng, Qiang Peng, Meimei Shi, Lining Xing, and Shi Cheng. 2022. "Drunkard Adaptive Walking Chaos Wolf Pack Algorithm in Parameter Identification of Photovoltaic Module Model" Energies 15, no. 17: 6340. https://doi.org/10.3390/en15176340

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop