1.
Introduction
With the advocacy of green travel, the development concept of low-carbon life, shared electric vehicles have recently become our answer to increasing environmental pollution and the energy crisis. The shared electric vehicle dispatching scheduling (SEVS) problem is a car rental model where customers can rent a car for a relatively short time, usually an operator whose owner is responsible for maintaining it [1]. Compared with traditional travel methods such as private cars, shared electric vehicles can effectively improve vehicle utilization, reduce urban traffic congestion, reduce user travel costs, and effectively reduce urban carbon emissions. According to the different ways of providing car-sharing services, it can be divided into three models based on two-way stations, one-way stations, and free-floating [2]. Specifically, in the two-way mode, the user needs to go to a site designated by the service provider to find an available car, the parking site is a parking lot defined by the service provider or the local administration, and the user's journey must start and end at the same site [3]. Therefore, this operating model does not consider intermediate parking, which is a parking spot that customers may plan based on their individual needs. The collection of parking lots is predefined. The one-way mode is like the two-way mode, but in the one-way case, the stop at the end of the journey may be different from the stop at the start of the journey [3]. The collection of parking sites is predefined. The free-floating model is the last model to enter the market, where vehicles are free to park in public spaces within the operating area (i.e., the area served by the car-sharing company), and users can start and end services anywhere in the area [4]. This article mainly focuses on the one-way site pattern. While shared EVs bring benefits to users, they also present many challenges for vehicle managers, two of the most important being the need for charging infrastructure and the need to redistribute vehicles.
The metaheuristic optimization algorithm is a technology combining random and local search method, according to the principle of the internal mechanism of the algorithm, the population-based metaheuristic algorithm can be divided into three categories. The first type is the evolutionary algorithm, which is subject to the natural selection of the biological world and the law of survival of the fittest, using crossover, mutation, and selection operators to operate. The more famous ones are Genetic Algorithm (GA), Differential Evolution Algorithm (DE), Evolutionary Strategy (ES), Evolutionary Programming (EP), Cultural Algorithm (CA) [5,6,7,8,9], etc. The second category is algorithms inspired by physicochemical phenomena, including simulating physics, chemical laws, mathematical formulas, etc. The well-known algorithms are the Big Bang-Big Shrinking Algorithm (BBBC), Gravity Search Algorithm (GSA), Command System Search (CSS), Magnetic Field Optimization Algorithm (MOA), Center Force Optimization (CFO), Artificial Chemical Reaction Optimization Algorithm (ACROA) [10,11,12,13,14,15], Black Hole Algorithm (BH), Small World Optimization Algorithm (SWOA), Galaxy Search Algorithm (GBSA), Space Gravity Optimization (SGO), Henry Gas Solubility Optimization, Arithmetic Optimization Algorithm (AOA), Runge Kutta method (RUN) [16,17,18,19,20,21,22] etc. The third category is optimization algorithms inspired by the behavior of animals in nature. Such as Particle Swarm Optimization Algorithm (PSO), Artificial Bee Colony Algorithm (ABC), Ant Colony Optimization Algorithm (ACO), Firefly Optimization Algorithm (FA), Bat Algorithm (BA), Cuckoo Search Algorithm (CS) [23,24,25,26,27,28], Artificial Algae Algorithm (AAA), Tree Species Algorithm (TSA), Grey Wolf Optimization Algorithm (GWO), Social Spider Algorithm (SSA), Moth Flame Algorithm (MFA), Whale Optimization Algorithm (WOA), Dolphin Echo Localization Algorithm (DEA) [29,30,31,32,33,34,35], Cat Swarm Optimizer (CSO), Lion Swarm Optimization Algorithm (LOA), Fruit Fly Optimization Algorithm (FOA), Chimpanzee Optimization Algorithm (CHOA), Chameleon Optimization Algorithm (CSA), Slime Mould Algorithm (SMA), Hunger Games Search (HGS), Colony Predation Algorithm (CPA) [36,37,38,39,40,41,42,43], and so on. The metaheuristic algorithm can better solve the complex optimization problems that cannot be solved by traditional optimization algorithms and cannot be effectively solved and have better performance than traditional methods in many practical application problems.
The Vehicle Routing Problem (VRP) was proposed by (Dantzig & Ramser, 1959) and is one of the most attractive topics in operations research, communications, manufacturing, transportation, distribution, and logistics [44]. VRP is an np-hard problem, and its real-life applications are on a much larger scale, so metaheuristics are often better suited for real-world applications. Many scholars have applied meta-heuristic algorithms to the VRP problem. Du et al. proposed to use SA to solve the vehicle routing problem in multiple depots for dangerous goods transportation [45]; García-Nájera et al. used GA to study the multi-objective vehicle routing problem with backhaul [46]; Cao et al. open vehicle routing problem based on DE research demand uncertainty [47]; Jabir et al. proposed the design and development of a multi-vehicle green vehicle hybrid ant colony variable neighborhood search algorithm [48]; Okulewicz et al. based on particle swarm optimization to solve the dynamic vehicle routing problem of specific components [49]; Iqbal et al. employed an artificial bee colony algorithm with a soft time window to solve the routing problem of multi-objective aircraft [50]; Teymourian presented improved Intelligent water droplets and cuckoo search algorithms solve the capable vehicle routing problem [51] et al.
The Harris Hawks optimization algorithm is a new metaheuristic algorithm [52], which has been applied to some practical problems by many scholars. Fan et al. proposed an improved Harris Hawks optimization training the neural network based on the learning of neighborhood centroid duality [53]; Zhang et al. employed a deep neural network and Harris hawks optimization algorithm to estimate the friction angle of clays in evaluating slope stability of a generalized artificial intelligence model [54]; Mouassa et al. based on Harris Hawks optimization algorithm to solve scheduling of smart home appliances for optimal energy management in smart grid [55]; Kumar et al. used extra tree classifier and enhanced Harris Hawks optimization algorithm for software component reusability prediction [56]; Naik et al. confirmed that a leader Harris hawks optimization is able to solve 2-D Masi entropy-based multilevel image thresholding [57]; Mossa et al. used Harris Hawks optimization algorithm and atom search optimization algorithm to address parameter estimation of PEMFC model [58]; Houssein et al. hybridized Harris Hawk optimization and support vector machines for drug design and discovery [59]; Setiawan et al. presented the use of Harris Hawks optimization for parameter optimization of support vector regression [60]; Dehkordi et al. proposes a non-linear chaotic Harris Hawk optimizer to solve the path planning problem of vehicle networks [61]. However, by reading the review [62], it is found that HHO has little research on VRP. This paper studies the performance of HHO in VRP variant shared electric vehicle scheduling problem considering the charging schedule (SEVS) [63]. As the SEVS model is discrete, discrete methods can impact the performance of the algorithm on the model, so this paper also analyses the impact of eight transfer functions on the performance of the model.
The rest of this paper is organized as follows: Section 2 introduces the SEVS mathematical model. Section 3 presented the DHHO algorithm and applied it to solving the SEVS problem. Section 4 is the analysis of the experimental results. Finally, Section 5 concludes future work.
2.
Preliminaries
2.1. Mathematical model of SEVS
2.1.1. Problem description
Suppose a company provides shared car service in a certain area and has a dispatching center. The vehicles providing services are homogeneous pure electric vehicles. During the period of low demand every day (such as night), the platform sends employees to dispatch vehicles for two purposes. The first is to rebalance the distribution of vehicles between stations. The second is to transport the vehicles with insufficient power to the station with a charging pile to charge the vehicles for continued service the next day. The way of transportation is that employees start from the dispatching center, ride folding bicycles to the station where vehicles need to be transferred out, drive a vehicle to a station where vehicles need to be transferred out (folding bicycles are carried with the vehicle), and then ride bicycles to the next station where vehicles need to be transferred out. In this way, we can complete the transportation task assigned to the employee. The parameters and symbols used in the problem are explained in Table 1.
2.1.2. Feasibility analysis of vehicle dispatching among various types of stations
Considering the different types of stations and vehicles, some stations can only transfer specific vehicles. For example, vehicles transferred to a saturated site j∈S1 with charging piles can only be vehicles that are parked at a certain station without charging piles and have insufficient power. Correspondingly, vehicles with sufficient power can be transferred from this type of site to unsaturated sites and saturated sites without charging piles. Vehicles transferred to an unsaturated site j∈S2 with charging piles can only be vehicles parked at a saturated site with sufficient power and vehicles parked at a site without charging piles with insufficient power, and vehicles should not be transferred from this type of site. Vehicles transferred to a saturated site j∈S3 without charging piles can only be vehicles parked at a saturated site with charging piles and have sufficient power. Correspondingly, vehicles with sufficient power can be transferred from this type of site to an unsaturated site, and vehicles with insufficient power can be transferred from this type of site to a site with charging piles. Vehicles transferred to an unsaturated site j∈S4 without charging piles can only be vehicles parked at a saturated site with sufficient power. Correspondingly, vehicles with insufficient power can be transferred from this type of site to a site with charging piles. The types of vehicles that can be transferred in and the types of vehicles that can be transferred and the source and destination of each type of station are shown in Table 2.
2.1.3. Model and interpretation
The 0-1 nonlinear programming model is a classic mathematical problem as follow:
The nodes include the dispatch center, the collection of vehicles, and the collection of stations. The shared electric vehicle dispatching problem considering charging schedule can be described as the following 0-1 nonlinear programming model,
Subject to:
In this model, the objective function (2) aims to minimize the combination of total driving cost and total riding cost of employees. Constraint (3) removed the infeasible conversion. The seven parts, in turn, correspond to the conversion between vehicle nodes, the conversion between site nodes, the conversion from vehicle nodes to the dispatch center, the conversion from the dispatch center to the site node, and the vehicle nodes to the conversion of the site node where it is located, the conversion from a fully charged vehicle node to a saturated site node with charging piles, and the conversion from a vehicle station with insufficient power to a node without charging piles. Specifically, constraint (3) is established, which is equivalent to that all seven parts are zero.
Constraints (4)-(7) realize the net number of vehicles transferred in/out of different types of sites. Specifically, constraint (4) corresponds to a saturated site with charging piles, constraint (5) corresponds to an unsaturated site with charging piles, constraint (6) corresponds to a saturated site without charging piles, and constraint (7) corresponds to a saturated site without charging piles, among them, nj satisfies the condition ∑j∈Snj=0. Constraint (8) Realize that vehicles with insufficient power parked at sites without charging piles are transferred to sites with charging piles. Constraint (9) means that each employee can be dispatched at most once. Constraint (10) guarantees that each vehicle node can be visited at most once. Constraint (11) ensures that only employees starting from the dispatch center can participate in the dispatch of vehicles, that is, eliminate the sub-loop between the vehicle node and the site node. Constraint (12) guarantees that if an employee leaves the dispatch center, he must return to the dispatch center. Constraint (13) ensures that employees have a balance between the entry and exit of the vehicle node and the site node, that is, if and only when an employee enters a certain node, he must leave the site. Constraint (14) ensures that the total working hours of each employee do not exceed T. Constraint (15) realizes the vehicle's cruising range limit, that is, there is sufficient power to reach the next stop. Constraint (16) realizes the restriction of the remaining power after the vehicle is hoisted to a site without charging piles, that is, to ensure that the vehicle can work normally the next day. Constraint (17) defines all decision variables.
2.2. Harris Hawks optimization (HHO)
HHO is a metaheuristic algorithm based on swarm intelligence, proposed by Heidari [52]. The main inspiration for the algorithm comes from the predation behavior of Harris Hawk. The Harris Hawk is a famous bird of prey in southern Arizona and other regions of the United States. They forage through the coordination of group behaviors. The main strategy for capturing prey is "surprise pounce", that is, the Harris hawk can hide near the prey many times, in a short time, and quickly, waiting for the opportunity. Through teamwork, Harris Hawks can confuse their escaped prey and make them unable to recover their defense capabilities, thereby efficiently capturing tired prey.
2.2.1. Exploration phase
During the exploration phase, Harris Hawks can track and detect prey through their powerful eyes, but sometimes prey is not easy to spot. Therefore, the Harris Hawk determines the habitat position based on the random prey position and the vector difference between the prey position and the center position of the group. The opportunities for both strategies are equal.
where t is the current iteration. X(t+1) represent the position of the agent in the next iteration. Xrabbit(t) represent the position of the rabbit, X(t) is the current position vector of the agent. Xrand(t) represent a randomly determined Harris hawk position. UB and LB represent the upper and lower bounds of the search space. R1,r2,r3 and r4 are random numbers inside [0, 1]. Xm(t) is the center position of the Harris hawks in the current population, calculated as follows,
where Xi(t) indicates the location of each hawk in iteration t. N indicate the all number of Harris Hawks.
2.2.2. Transition from exploration to exploitation
With the continuous movement of the prey, the prey will transition from an energetic state to a tired state. Inspired by this, the Harris Hawk algorithm proposed a prey escape energy mechanism, enabling the algorithm to transition from exploration to development. The energy mechanism of the game is modelled as follows,
where E means the escaping energy of the prey. T indicates the maximum number of iterations. E0 is the initial state of prey escape energy. E0 varies randomly between -1 and 1 in each iteration. when the value of E0 decreases from 0 to −1, the energy of the rabbit gradually decreases. When the value of E0 increases from 0 to 1, the energy of the rabbit is increasing. |E|≥1 means that the Harris hawk is still looking for prey in the area, and |E|<1 means that the Harris hawk starts to use the area to attack its prey. The time-dependent trajectory E of is presented in Figure 1.
2.2.3. Exploitation phase
In the development phase, Harris hawk will use a surprise strategy to attack its prey. When the prey tries to escape, it may succeed or fail. Even so, Harris Hawk will still adopt other strategies to capture prey. According to the energy of the prey |E| when it escapes and the chance of the prey avoiding the attack, the Harris Hawk will have four attack strategies at this stage. Specifically,
Soft besiege: When r≥0.5 and |E|≥0.5, the prey still has enough energy and tries to escape the pursuit of Harris Hawk through some random misleading jumps, but in the end, it cannot. During these attempts, the Harris Hawk gradually surrounded it, making the rabbit more exhausted, and then launched a surprise attack. The mathematical description is as follows,
where ΔX(t) is the difference between the rabbit's position vector and the current position of the Harris Hawk in iteration t. J=2(1−r5) show the strength of the prey random jump, and r5 is a random number within (0,1). The J value changes randomly during each iteration, which can simulate the nature of rabbit movement.
Hard besiege: When r≥0.5 and |E|<0.5, it shows that the prey is tired and the energy to escape is very low. Therefore, Harris Hawk finally executed the act of surprise pounce. The current positions are updated using Eq (23):
Soft besiege with progressive rapid dives: When r<0.5 and |E|≥0.5, the rabbit has enough energy to escape, so the Harris Hawk needs a soft encirclement strategy before the raid. This process is more complicated and smarter than before. To mathematically simulate the escaping patterns of the prey, the concept of Levi flight (LF) was referenced in the HHO algorithm [64]. The mathematical formula for this stage is modeled as follows,
where D is the dimension of problem and S is a random vector by size 1×D. LF is the levy flight function, which is calculated using Eq (26) [65].
Hard besiege with progressive rapid dives: When r<0.5 and |E|<0.5, the rabbit has not had enough energy to escape due to long-term movement. The Harris hawk rounds up based on the position of the prey and the center of the group to reduce the distance between the group and the prey. If the raid fails (the fitness is not improved), perform a random walk, if the walk fails, return to the original place. The formula is defined as follows,
3.
Our proposed algorithm
This section proposes our algorithm to solve the shared electric vehicle scheduling model considering the charging schedule. We will introduce it in three parts. The first part is to encode the problem to facilitate the model solution. On the other hand, there is also a corresponding decoding method to explain the optimal solution. The second part describes the algorithm, including the transfer function used and the specific algorithm steps. The third part is an explanation of how to deal with model constraints.
3.1. Encoding and decoding
Coding is the first step to solving the problem, which is very important. It is known that there are five employees. Each employee needs to ride a bicycle from the dispatch center to the station where the car needs to be transferred first, then drive the car to the transfer station that meets the constraints, and then ride a bicycle from the station to the next need call out the station of the vehicle, and so on, until the deployment task assigned to the employee is completed, and then return to the dispatch center by bicycle. Specifically, suppose we have 1 S1, 1 S2, 1 S3, and 1 S4, a total of four sites. Therefore, we define the code to include two parts: location and path, as shown below,
where the location vector indicates whether the employee has been to the station or not. If the employee has been there, it is represented by 1, otherwise, it is 0. Its size is S×K. The path vector is used to assist the location vector to record the employee's visit to the station footprint, its size is as large as the position vector.
The decoding process is the inverse process of the encoding process. The code given above can be decoded in this way. First, look at the location code. The first part means that the first employee starts from the dispatch center and calls out the vehicle from station 1 (saturated station with charging piles), and then drives the vehicle to station 3 (saturated sites without charging piles), completes all assigned dispatching tasks and return to the dispatch center. The path code reflects the order in which employees visit the site. The second employee departs from the dispatch to station 4 (unsaturated station without charging piles) and transfers the vehicle to station 1 (saturated station with charging piles), completes the dispatched task, and rides back to the dispatched center. The third employee is not assigned a scheduling task and does not need to work. The fourth employee starts from the dispatch center to transfer the vehicle to the No. 3 station and then to the No. 4 station to transfer the vehicle to the No. 2 station, complete the dispatched task and return to the dispatch center. The fifth employee starts from the dispatch center to call out the vehicle at No. 4 station, then drives the car to No. 2 station to transfer in the vehicle, completes all the dispatch tasks, and returns to the dispatch center. Since then, the decoding has been completed.
3.2. DHHO algorithm
The basic HHO is a continuous optimization algorithm, and the coding method of the shared electric vehicle scheduling model considering charging scheduling is binary coding. Therefore, the original HHO cannot be directly applied to practical problems, which brings challenges to our research. Consequently, it is necessary to find an efficient transfer function to convert the continuous optimization algorithm into binary form. In [66], a binary version of the Harris Eagle optimization algorithm is proposed, in which the specific description of the transfer function is shown in Table 3. The transfer function image is shown in Figures 2-9. The pseudo-code definitions of the detailed steps of the algorithm are shown in Algorithms 1-3. The detailed flow chart of the DHHO approach for solving the SEVS model is shown in Figure 10.
3.3. Constrain handling
The constraint processing of the model is generally divided into three methods, namely: directly processing the constraints, that is, adding constraints in the encoding process; checking the constraints during the calculation process; and processing constraints through the penalty function [66]. According to the characteristics of the model, this paper adopts a mixed constraint processing method. Constraints (4)-(8) and (14) adopt the penalty function method, constraints (9)-(13) are processed in the encoding process, and constraints (15) and (16) are checked during the calculation process.
3.4. DHHO algorithm complexity analysis
As can be seen from Algorithm 1, the complexity of the DHHO algorithm consists of three parts: initialization of model and algorithm parameters, fitness calculation, and Harris Hawk population update. The complexity of the initialization phase mainly depends on the number of Harris Hawk, so the complexity is O(N). From Algorithms 2 and 3, the complexity of fitness calculation and Harris Hawk population update is O(T×N×D×D×C)+O(T×N×D×D), where C is the number of cars, D is the vector dimension of Harris Hawk positions, and T is the maximum number of iterations. Overall, the computational complexity of DHHO is O(N×(T×D×D×(C+1)+1)).
4.
Experimental results and discussion
4.1. Parameter setting
The experiments were used Matlab 2019b and were run on an Intel Core i5 machine, with a 1.80 GHz and 8 GB of RAM. In this work, the number of stations of the platform in the area usually belongs to the interval [4, 12]. Randomly generate 15 groups of examples, with 5 cases in each of the small, medium, and large groups. The main parameter settings of the experiment are shown in Table 4, and the specific information of the number of stations of each type and the number of vehicles of each type in each calculation example is shown in Table 5.
4.2. Performance measures
To evaluate the performance of our proposed algorithm on the model, we use the best value, mean, and standard deviation to analyze the results.
Best value: It is the best obtained values over several runs, its definitions as follows:
where N is the number of algorithm runs, and Fi is the best value.
Mean value: It is an average of the best obtained values over several runs, it is calculated as:
Standard deviation: It is used to indicate the stability of the algorithm to produce the best value over different runs:
4.3. Small scale example experiments
In the experiments, we adopt eight transfer functions mentioned in the literature, the T1, T2, T3, T4, T5, and T6 transfer functions are proposed by [67,68], and the T7 and T8 transfer functions are proposed by [69]. We combined the transfer function with HHO and named DHHOT1, DHHOT2, DHHOT3, DHHOT4, DHHOT5, DHHOT6, DHHOT7, and DHHOT8, respectively. The number of small-scale data iterations is 500 times, and the experimental results are shown in Table 6. In Table 6, the small-scale data is set to verify the algorithm's effectiveness. As the experiment shows, each calculation example can find the optimal value on the algorithm, and each algorithm has a good performance on each calculation example, and the variance is 0.
4.4. Medium scale example experiments
In Table 7, for the medium-sized data set, each algorithm of Examples 8 and 10 calculated the optimal value. The individual algorithms of Examples 6, 7, and 9 calculated the optimal value. Algorithms DHHO4, DHHO5, DHHO6, and DHHO8 have calculated the optimal values in Example 6, and the algorithm DHHO8 has the lowest mean and variance. Algorithms DHHO1, DHHO3, DHOO5, DHHO6, and DHHO8 have calculated the optimal values in Example 7. The algorithm DHHO8 is also the lowest in terms of mean and variance. Algorithms DHHO2, DHHO4, DHHO5, DHOO6, DHHO7, and DHHO8 have calculated the optimal values in Example 9. The algorithm DHHO8 has the lowest average value, and the variance is slightly higher than DHHO4. Overall, DHHO8 performed more prominently.
4.5. Large scale example experiments
In Table 8, for large-scale data sets, not every algorithm can find the optimal value for every calculation example. Algorithms DHHO3, DHHO5, DHHO7, and DHHO8 can all find the optimal value in Example 11, and the average value of algorithm DHHO5 is also the smallest. Algorithm DHHO5 is the only algorithm that can calculate the optimal value in Example 12, and the average value is slightly higher than that of Algorithm DHHO7. Among them, the average value calculated by Algorithm DHHO7 in Example 12 is the smallest. Algorithm DHHO5 and algorithm DHHO7 found the optimal value in example 13, and algorithm DHHO6 found the lowest average value in example 13. Algorithm DHHO5 performed well in Example 14. Not only the optimal value was obtained, but the average value was also the lowest among the eight algorithms. The algorithm DHHO7 calculated the optimal value in Example 15, and the algorithm DHHO5 achieved the lowest mean value and the lowest variance. In general, the algorithm DHHO5 performs better.
4.6. Friedman test
The Friedman test is based on the ranking of the algorithms. We used this method to rank the performance of the eight algorithms and finally calculated the average order. In Table 9, we can easily see that DHHO8 achieved the average of the minimum values and ranked first. In Table 10, DHHO5 performs well on the large-scale dataset, outperforming other algorithms, achieving the minimum mean, and ranking first.
4.7. Wilcoxon rank-sum test
To evaluate the performance of the algorithm, a Wilcoxon rank-sum test was performed to obtain a statistical test. We use statistical methods to analyze whether the results of different discrete Harris Eagle algorithms differ. The significance level for nonparametric tests was 5%. Table 9 presents a statistical analysis using the Wilcoxon rank-sum test to compare the results obtained for each discrete version of the Harris Eagle algorithm. In general, p-values greater than 0.05 can be considered as the alternative hypothesis is accepted; otherwise, the null hypothesis.
As shown in Table 11, DHHO8 performs better than other algorithms in the medium-scale examples, Examples 6 and 10. In Example 7, except for DHHO6, DHHO8 outperforms other algorithms. In Example 8, DHHO8 is better than DHHO1, DHHO2, and DHHO3. Excellent performance in example 9, except for DHHO5 and DHHO6. As shown in Table 12, among the large-scale examples, DHHO5 outperforms other algorithms in Example 11, except for DHHO6 and DHHO7. In Example 12, the performance of DHHO5 is better than that of DHHO1, DHHO2, DHHO3, and DHHO6. In Examples 13 and 14, the performance of the algorithm DHHO5 is better than that of DHHO1, DHHO2, DHHO3, and DHHO8. Example 15 outperforms other algorithms except for DHHO7. In general, DHHO5 is valid for other algorithms.
4.8. Results discussion
During the experiment, we use 8 transfer functions to convert the continuous HHO into the discrete HHO, which is used to solve the shared electric vehicle dispatching model considering the charging dispatch. We analyze the performance of eight transfer functions on three datasets of varying sizes. On a small-scale data set, eight discrete HHOs can obtain the optimal solution, which proves the effectiveness of the algorithm. On medium-sized datasets, some algorithms perform well, such as DHHO8. Notably, in Examples 8 and 10, each algorithm can calculate the optimal value. The reason for the analysis may be that the complexity of the randomly generated datasets in Examples 8 and 10 is not high, and it is relatively easy to get the optimal value. On large-scale datasets, the DHHO5 algorithm performs well, and four out of five examples calculate the optimal value. Consider that if the number of iterations of the algorithm is reduced, then the performance of the DHHO5 algorithm may be more obvious compared to other algorithms. It is clear from the experimental results that the use of different transfer functions by the algorithm in datasets of different sizes impacts the model performance. It may well be that other transfer functions lead to different population distributions, and a good transfer function can lead to a more diverse population distribution.
5.
Conclusions and future works
In this paper, a discrete DHHO algorithm is proposed to solve the shared vehicle scheduling model considering the charging schedule, and the influence of the transfer function on the algorithm is analyzed. The DHHO algorithm finds the optimal solution through coding and decoding and discovers the scheduling scheme that minimizes the objective function, which is the cost of all employees to complete the scheduling task. In the experiment, three data sets of different scales are used for verification. In the small-scale data set, there is no significant difference in the experimental results of the eight transfer functions. DHHO8 performs well in medium-sized datasets. DHHO5 outperforms the other seven transfer functions in large-scale datasets. Experiments show that the transfer function has a certain influence on the algorithm in datasets of different scales. In future work, we plan to modify the shared vehicle dispatching model considering charging scheduling into a multi-objective model. Since the constraints (4)-(8) in the model are in an ideal situation, the quality of the results depends on the speed of the randomly generated data set. This study adopts the penalty function to deal with these constraints. In future research, the constraints (4)-(8) will also be considered as the objective function. At the same time, the two objectives of optimization, the minimum cost and the balance of the vehicle at each station, will be optimized. This goal makes the model more general.
Acknowledgments
This work was supported by the National Natural Science Foundation of China (U21A20464, 62066005), Project of the Guangxi Science and Technology (AD21196006).
Conflict of interest
The authors declare no conflict of interest.