Next Article in Journal
Exemplar Learning and Memory Retrieval-Based Particle Swarm Optimization Algorithm with Engineering Applications
Previous Article in Journal
Intelligent Automobile Bionic Cockpit Selection Considering Personalization Requirements: Multiple-Criterion Model and Decision-making Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Modified Black-Winged Kite Optimization Algorithm with Three-Phase Attacking Strategy and Lévy–Cauchy Migration Behavior to Solve Mathematical Problems

1
School of Information Engineering, Tianjin University of Commerce, Beichen, Tianjin 300134, China
2
School of Mathematics and Statistics, Changsha University of Science and Technology, Changsha 410114, China
*
Author to whom correspondence should be addressed.
Biomimetics 2025, 10(10), 707; https://doi.org/10.3390/biomimetics10100707
Submission received: 13 September 2025 / Revised: 2 October 2025 / Accepted: 14 October 2025 / Published: 17 October 2025
(This article belongs to the Section Biological Optimisation and Management)

Abstract

The Black-winged Kite Algorithm (BKA) is a novel heuristic optimization algorithm proposed in 2024, which has demonstrated superior optimization performance on most CEC benchmark functions and several engineering problems. To further enhance its convergence accuracy and solution quality, this paper proposes a Modified Black-winged Kite Algorithm (MBKA). First, a three-phase attacking strategy is designed to replace the original BKA’s attacking mechanism, thereby enhancing population diversity and improving solution quality. Additionally, a Lévy–Cauchy migration strategy is incorporated to achieve a more effective balance between exploration and exploitation. The effectiveness of MBKA is assessed through extensive experiments on 18 classical benchmark functions, the CEC-2017 and CEC-2022 test suites, and two real-world engineering optimization problems. The results indicate that MBKA consistently outperforms the original BKA and several state-of-the-art algorithms in both convergence accuracy and convergence speed across most test cases.

1. Introduction

The Black-winged Kite Optimization Algorithm (BKA), initially proposed by Wang et al. in 2024, is a nature-inspired swarm intelligence optimization algorithm that simulates the hunting and migration behaviors of black kites [1]. Owing to its strong global search ability, BKA has been successfully applied to solve a wide range of complex tasks, including high-dimensional function optimization [2,3], constrained engineering design [4,5], parameter tuning [6,7,8,9,10], Internet of Things (IoT) applications [11,12], and path planning [13].
However, like other meta-heuristic algorithms, BKA still exhibits certain inherent limitations. First, in the later stages of iterations, its global exploration ability declines, increasing the likelihood of premature convergence to local optima [14]. Second, its position update mechanism, which is formulated on migratory behavior, suffers from excessive reliance on the global best individual, leading to limited local exploitation efficiency [15]. Third, in the literature [16], a good adaptive adjustment mechanism is lacking in BKA’s attack behavior so that the BKA shows inadequate stability to deal with high-dimensional and multi-modal optimization problems.
In recent years, researchers have proposed various methods to address the limitations of BKA. Li et al. [17] proposed the Reconstructed Black Kite Algorithm (RBKA), which increases the diversity of the initial population through logical mapping. Li et al. [18] developed the DKCBKA algorithm, integrating Osprey optimization with an adaptive index factor to enhance optimization capabilities. Wan et al. [19] proposed the Direction-Assisted Enhanced Black Kite Algorithm (DAEBKA), which incorporates a variable spiral strategy to improve search performance. To address parameter dependency and search instability in BKA, Li et al. [20] introduced an elite guidance mechanism to direct the swarm towards optimal solutions. Li et al. [21] designed the DWBKA algorithm, which combines dynamic position balancing and whale random step strategies to enhance the efficiency of drone trajectory planning in complex orchard environments. Liu et al. [22] proposed the Non-dominated Sorting Black Kite Algorithm (NSBKA), which extends BKA to multi-objective optimization by incorporating non-dominated sorting and crowding distance methods. Xue et al. [23] combined BKA with the Artificial Rabbit Optimization algorithm (ARO), leveraging the advantages of both algorithms to address complex problems effectively. Kalyani Nagarajan [24] applied BKA to the K-anonymization of medical data, achieving a balance between data utility and privacy protection. Yu et al. [25] enhanced BKA by integrating the golden sine search strategy, improving global search capability, reducing local trapping, and accelerating convergence speed. Chen et al. [26] incorporated a greedy strategy into BKA, selectively updating positions to enhance convergence stability and solution robustness. She et al. [27] proposed the MOBK algorithm, which combines weighted Chebyshev scalarization with tent chaotic mapping strategies to improve the overall optimization capability of BKA. Zhang et al. [28] employed an improved BKA to optimize network parameters, enhancing overall model performance. Yang et al. [29] enhanced BKA using lens imaging reverse learning, optimizing the weights and biases of a BP neural network, and applying the improved IBKA-BP model to design an RSSI-based ranging algorithm. Zhao et al. [30] proposed the MBKA algorithm, which strengthens leadership mechanisms in BKA and introduces Morlet wavelet perturbation, thereby improving optimization performance. Zhang et al. [31] introduced a population reconstruction mechanism and developed the REBKA algorithm for applications in machine learning. Shu et al. [32] developed the Multi-Strategy Fusion Enhanced PSO (MSFPSO) algorithm, which incorporates Cauchy variational migration inspired by BKA and enhances both global and local search performance. Li et al. [33] introduced PSBKA, a hybrid algorithm that integrates PSO with BKA.
Despite these numerous improvements, to the best of our knowledge, no research has yet proposed a multi-behavior attacking strategy that integrates iterative phases with a strong perturbation component for dynamically adjusting search intensity. Such a strategy is generally regarded as crucial to balancing global exploration and local exploitation when addressing complex optimization problems.
To address the above limitations, this paper introduces a Modified Black-winged Kite Algorithm (MBKA) that incorporates a three-phase attacking strategy and a Lévy–Cauchy migration behavior into the original BKA framework. The three-stage attack strategy includes predatory behavior, defensive behavior, and competitive behavior. Each behavior employs a distinct individual position update mechanism to enhance population diversity and improve global exploration capability. In addition, three adaptive adjustment parameters (n1, n2, and n3) are designed and applied to three different attack behaviors to enhance population diversity. The Lévy–Cauchy migration behavior enhances the algorithm’s ability to escape local optima. In summary, these improvement strategies enhance the diversity of population individuals, balance exploration and exploitation capabilities, and improve the quality of solutions. Compared to BKA and other well-known optimization algorithms, the proposed MBKA demonstrates superior convergence accuracy on most mathematical test functions, validating the effectiveness of these improvement mechanisms.
The primary contributions of this paper are summarized as follows:
  • Three-phase attacking strategy: A novel three-phase attacking strategy is proposed and integrated into the attacking behavior phase of the original BKA. Simultaneously, three adaptive parameters (n1, n2, and n3) are designed for predatory, defensive, and competitive attacking behavior, respectively. The proposed strategy increases individual diversity and balances exploration and exploitation capabilities.
  • Lévy–Cauchy migration behavior: A Lévy–Cauchy migration behavior is designed to improve BKA’s global search capabilities and facilitate escape from local optima, thereby enhancing solution quality.
  • Comprehensive experimental validation: The proposed MBKA is evaluated on extensive mathematical problems, including 18 benchmark test functions, 29 CEC-2017 [34] test functions, 12 CEC-2022 [35] test functions, and two practical engineering design problems.
The remainder of this paper is organized as follows: Section 2 introduces the BKA, including its initialization, attacking, and migration behaviors, and elaborates on the MBKA, covering the three-phase attacking strategy, Lévy–Cauchy migration behavior, pseudo-code, and complexity analysis. Section 3 presents experimental validations of MBKA, including performance tests on benchmark functions, CEC-2017 functions, CEC- 2022 functions, and engineering optimization problems (compression spring and gear train design problems). Section 4 discusses the research’s alignment with prior work, theoretical and practical implications, and MBKA’s limitations. Section 5 draws conclusions and explores future research directions.

2. Materials and Methods

2.1. Black-Winged Kite Optimization Algorithm

2.1.1. Initialization Phase

In BKA, the population is initialized with a set of random solutions to represent the location of each black-winged kite (BK), and the exact location is represented by the following matrix:
B K = B K 1,1       B K 1,2             B K 1 , D B K 2,1       B K 2,2           B K 2 , D                                                         B K N , 1       B K N , 1           B K N , D  
Here, N represents the number of potential solutions, i.e., the population size, D is the dimension size of the solution, and B K i j is the j th dimension of the i th black-winged kite. At each population initialization, we randomly assign the position of each black-winged kite according to Equation (2).
B K i = B K l b + r a n d     ( B K u b B K l b )
where i is an integer between 1 N , B K l b and B K u b are the lower and upper bounds of the solution, respectively, and r a n d is a random number between [ 0 ,   1 ] .

2.1.2. Attacking Behavior

The black-winged kite adjusts the angles of its wings and tail to suit the conditions during flight, hovering silently to observe its prey and then swooping quickly to attack. In this phase, the black-winged kite shows different attack behaviors for global exploration. The mathematical model of the attack behavior is summarized as follows:
B K t + 1 i , j = B K t i , j + n × ( 1 + sin ( r ) ) × B K t i , j     p < r B K t i , j + n × ( 2 r 1 ) × B K t i , j             p r
n = 0.05 × e 2 × ( t T ) 2
In Equations (3) and (4), B K t i , j and B K t + 1 i , j denote the position of the i th black-winged kite in the j th dimension at the t th and t + 1 th iteration steps, respectively, where r is a random number ranging between [ 0 , 1 ] , p is a constant value, T represents the maximum iteration number, and t is the current iteration number.

2.1.3. Migration Behavior

A hypothesis regarding the migration behavior in the algorithm is proposed by drawing on the characteristics of avian migration: For the maximum optimization problem, the black-winged kite with the highest fitness value is regarded as a leader. If the fitness of the leader is inferior to that of a randomly chosen individual, the leader abdicates its leadership and joins the migratory population. On the contrary, if the fitness value of the leader is superior to that of all individuals, the individuals’ behavior will be guided by the leader. This strategy can ensure the success of the migration by dynamically selecting outstanding leaders. The mathematical model of black-winged kite migratory behavior is described in Equation (5):
B K t + 1 i , j = B K t i , j + C ( 0,1 ) × ( B K t i , j L t j )                   F i < F r i B K t i , j + C ( 0,1 ) × ( L t j m × B K t i , j )       F i F r i
m = 2 × sin ( r + π / 2 )
f ( x , δ , μ ) = 1 π 1 x 2 + 1 ,     < x < +
In Equation (5), F i represents the current position in the j th dimension obtained by any black-winged kite in the t iteration, and F r i represents the fitness value of the random position in the j th dimension obtained from any black-winged kites in the t iteration. C ( 0 ,   1 ) is the Cauchy mutation, which is defined in the Equation (7), where δ = 1 and u = 0 .

2.2. Modified Black-Winged Kite Algorithm

In this section, a Modified Black-Winged Kite Algorithm (MBKA) is proposed and described in detail. Firstly, the attacking behavior in BKA is reformulated as a three-phase strategy consisting of predatory, defensive, and competitive behaviors. This strategy enhances population diversity and balances exploration with exploitation. Additionally, the Lévy flight coefficient is introduced in the migration behavior model to enhance the ability to escape local optima. The MBKA is described in detail as follows.

2.2.1. Three-Phase Attacking Strategy

In the original BKA, it has two ways to update an individual’s position in the attacking behavior phase, which may lead to the loss of population diversity and insufficient global search ability. Therefore, an attacking operator e p l   is introduced in the attacking behavior phase, and, by constructing the relationship between three parameters ( p , r , e p l ), the attacking behavior is divided into three categories: predatory attacking behavior, defensive attacking behavior, and competitive attacking behavior. Simultaneously, the original parameter n in the Formula (4) is expanded into the three distinct forms n 1 , n 2 , and n 3 , as shown in the Formula (8). These three parameters may improve the comprehensiveness and flexibility of the proposed algorithm.
n 1 = 0.05 × e 2 × ( t T ) 2 n 2 = e t T 1 0.9 × e t T n 3 = 0.05 × e t T × ( 1 + t T )
In regards to predatory attacking behavior, when p < r e p l , the black-winged kite, as a predator, employs a series of strategies to approach and capture its prey. The mathematical model of the predatory attacking behavior is shown in the Formula (9).
B K t + 1 i , j = B K t i , j + n 1 × ( 1 + sin ( r ) ) × B K t i , j
Seen from the Formula (9), the sin ( r ) [ 1, 1 ] , so the ( 1 + sin ( r ) ) [ 0 ,   2 ] . During the iterative process, the adaptive varying coefficient n 1 × ( 1 + sin ( r ) ) could have two effects:
When sin r 1 , the adaptive varying coefficient approaches 2 n 1 , resulting in a relatively large positive step size that propels the individual to accelerate towards the optimal region.
When sin r 1 , the coefficient approaches 0 , leading to a tiny step size that prevents overshooting the optimal solution.
This dynamic scaling mechanism enables the algorithm to conduct global search with large step sizes in the initial stages of iteration and automatically reduces the step sizes in the later stages of iteration to achieve precise convergence.
As shown in Figure 1, it presents a schematic diagram of the attack state of the black-winged kite when it acts as a predator.
In regards to defensive attacking behavior, when p > r e p l , the black-winged kite perceives a threat and employs defensive aggression to protect itself from harm caused by predators or competitors. The mathematical model of the defensive attacking behavior is shown in the Formula (10).
B K t + 1 i , j = B K t i , j + n 2 × ( 2 r 1 ) × B K t i , j
Seen from the Formula (10), r [ 0 ,   1 ] , so 2 r 1 [ 1 ,   1 ] . And the adaptive parameter n 2 × ( 2 r 1 ) could dynamically adjust the perturbation intensity during the iterative process. When this coefficient acts on the current position, the following effects will occur:
When 2 r 1 1 , a positive perturbation generates, causing the individual’s position to shift in the current direction.
When 2 r 1 1 , a negative perturbation generates, causing the individual’s position to shift in the opposite direction.
This stochastic perturbation mechanism is particularly crucial when the algorithm traps in local optima. By conducting small-scale explorations around the current position, the algorithm gains the opportunity to escape from local extreme points and discover better search directions. In particular, the parameter n 2 gradually decreases in the later stages of iteration to ensure the stability of the algorithm as it approaches the global optimal solution.
Figure 2 depicts a schematic illustration of the defensive attack posture of the black-winged kite when defending against natural predators, visually highlighting its defensive stances and offensive strategies.
In regards to competitive attacking behavior, when p = r e p l , the black-winged kites engage in resource competition, which is characterized by competitive aggression. The mathematical model of the competitive attacking behavior is shown in the Formula (11).
B K t + 1 i , j = B K t i , j + n 3 × ( sin ( r ) + cos ( r ) ) × B K t i , j
Seen from the Formula (11), the range of S i n r + C o s r = 2 s i n ( r + Π 4 ) is [ 2 ,     2 ] . The adaptive parameter n 3 × S i n r + C o s r   could balance the algorithm’s exploration and exploitation capabilities. This dynamic adjustment mechanism enables the algorithm to avoid premature convergence to local optima during resource competition while maintaining population diversity as it approaches the global optimal solution.
In regards to global exploration, when sin r + Π 4 ± 1 , the coefficient approaches ± 2 n 3 , generating a relatively large step size that propels the individual to conduct extensive searches across the solution space. This facilitates the discovery of new potential optimal regions.
In regards to local exploitation, when sin r + Π 4 0 , the coefficient approaches 0 , resulting in a tiny step size. This prompts the individual to perform fine-grained searches around the current optimal solution, facilitating the utilization of existing information to improve the precision of the solution.
As shown in Figure 3, the competitive attacking state of the black-winged kite in competitive situations is intuitively presented, allowing for the observation of specific attack behavior patterns when dealing with competition.
The variation curves of attack behaviors in the original BKA and the three-phase attack behavior changes in the MBKA are shown in Figure 4.
As shown in Figure 4, the left graph depicts the variation curve of attacking behaviors in BKA, while the right graph illustrates the three-phase attacking behavior change curve of MBKA. In BKA, as the number of iterations increases, the intensity of the Phase 1 attack (i.e., the magnitude of position update) gradually decreases, indicating that the algorithm is gradually converging; although the parameter value of Phase 2 also shows a downward trend, its overall variation pattern differs from that of Phase 1, and it can provide a certain perturbation capability in the early stage of iteration. In the right graph, the three-phase attacking strategies (predatory attacking, defensive attacking, and competitive attacking) exhibit different variation trends and complement each other during the iteration process. As the number of iterations increases, the defensive attack gradually strengthens, enabling the full utilization of local search capabilities and accelerating convergence as the optimal solution is approached. Simultaneously, the predatory attacking gradually decreases in strength, allowing the algorithm to focus its search in the later stages. The competitive attacking remains largely stable throughout the entire process, acting as a perturbation balancing mechanism that effectively maintains population diversity.

2.2.2. Lévy–Cauchy Migration Behavior

In this subsection, a kind of Lévy–Cauchy migration behavior is designed. The Lévy– flight is an outstanding model of a random walk. Its step size distribution follows a specific power law, a unique property that enables it to integrate local exploration and global search efficiently.
Unlike simple random walks, the step sizes in Lévy flight are not uniformly distributed. It exhibits a pattern of interspersed large and short step sizes. Large step sizes enable the algorithm to rapidly explore distant regions within the search space, which is crucial for the algorithm to avoid getting trapped in local optimal solutions. Short step sizes, on the other hand, allow for a more refined search in the vicinity of potentially advantageous regions, thereby enhancing the efficiency of mining and utilization of potential high-quality solutions.
Mathematically, the probability density function of the step sizes in the Lévy flight is shown in Equation (12):
P α , β ( x ) = 1 2 π x 3 2 exp 1 2 x ,       x 0 0 ,                                                                       x 0
To intuitively understand the unique walking mechanism of the Lévy flight, its trajectory diagram is shown in Figure 5.
In the Figure 5, the green dot denotes the end point of the Lévy flight random walk, while the red dot indicates a key feature point in the trajectory.
In this migration behavior, when F i < F r i , the f Lévy light is used to replace the original Cauchy value, resulting in a new position update formula with enhanced perturbation capabilities. The Lévy flight could help individual populations escape from local optimal solutions and increase population diversity. The mathematical model of Lévy–Cauchy migration behavior is provided in the Formula (13).
B K t + 1 i , j = B K t i , j + L e v y × B K t i , j                                 F i < F r i B K t i , j + C 0,1 × L t j m × B K t i , j     F i F r i

2.3. Pseudo-Code of MBKA

According to the above analysis, the pseudo-code of the MBKA is given in Algorithm 1.
Algorithm 1: Pseudo-code of MBKA
Input:   T : the maximum iterations
D : variable dimensions of the problem to be addressed
p : the constant value in attack behavior
Establish an objective function F ( x ) ,where variable X = ( x 1 , x 2 , x 3 , . . . , x d ) .
Initialize a population of N black-winged kites using a random initialization method.
Output: x b e s t , f g
1: while the maximum iterations M is not met do
2: Rank the fitness values, identify the current best individual f g and worst individuals f w , and simultaneously calculate the average fitness of the population f m .
3: for i = 1 : N
4: Update the position of the black-winged kites population through enhanced attack by Equations (8)–(11) and migration behaviors by Equations (12) and (13)
5: end for
3: Get the current new location;
4: If the current new location is better than before, update it;
5: t = t + 1
6: edge detection
7: end while
8: return x b e s t , f g .

2.4. Complexity Analysis

In this subsection, the time complexity and space complexity are used to evaluate the proposed MBKA. The time complexity is related to the execution speed of the algorithm, and its impact is significant when dealing with large-scale datasets. The space complexity measures the memory usage, which determines the algorithm’s performance in memory-constrained environments. Evaluating these two aspects can ensure that the MBKA has good operability and scalability under various conditions.
The time complexity of both BKA and MBKA is O ( T   ×   N   ×   D ) , where T denotes the number of iterations, N is the population size, and D represents the problem dimension. The initialization phase has a complexity of O ( N   ×   D ) , while the core iterative phase processes D dimensions for each of the N individuals in each iteration, resulting in a per-iteration complexity of O ( N   ×   D ) . After T iterations, the total complexity accumulates to O ( T   ×   N   ×   D ) . Although MBKA incorporates more sophisticated strategies, its computations remain dimension-wise operations, thus maintaining the same asymptotic time complexity.
The space complexity of both BKA and MBKA is O ( N   ×   D ) . Both algorithms require storing a position matrix for N   D -dimensional individuals, which constitutes the primary space overhead. Although MBKA introduces additional parameters (such as attack operators and Lévy flight parameters), these parameters are either fixed in number or independent of D , thus not affecting the asymptotic order of the overall space complexity. Consequently, both algorithms exhibit the same memory footprint, linearly dependent on the population size N and problem dimension D .

3. Results

3.1. Experimental Evaluation

This section systematically evaluates the performance of the MBKA in addressing complex global optimization problems. A unified parameter configuration framework is adopted for the experiment, where the population size is 40 and the maximum iteration number is 500. The computational environment consists of a Windows 11 Professional workstation equipped with an AMD Ryzen 7 8845H processor (3.80 GHz), 16.0 GB of DDR5 RAM, and an 8 GB discrete graphics card (supporting multi-GPU parallel computing). The MATLAB R2024b scientific computing platform is used for simulating the algorithm.
The algorithm parameter settings adhere to the principle of consistency: MBKA inherits the core parameter system of the original BKA, while the comparative algorithms (including MPA, ALO, GWO, etc.) adopt the default parameter configurations recommended in the literature. The complete parameter list for all algorithms is detailed in Table 1. To ensure the statistical significance of the experimental results, each test is independently run 30 times. The performance differences among the algorithms are comprehensively evaluated in terms of convergence accuracy, stability, convergence speed, and global search capability by calculating the mean and standard deviation and plotting convergence curves.
In this paper, the core role of the parameter e p l is to divide the three phases of the attacking behavior in the MBKA algorithm. By regulating the threshold relationship between e p l and the population state parameters p and r , different phases of attacking strategies are triggered. After preliminary experimental verification, the basic parameter value is finally determined as e p l = 0.1 . Meanwhile, to analyze the parameter sensitivity, two additional comparison schemes are set: e p l = 0.2 (corresponding to the algorithm MBKA1) and e p l = 0.3 (corresponding to the algorithm MBKA2). All e p l values are constants (not changing with the number of iterations) to ensure the stability of the division of the three-phase behavior and avoid the interference of dynamic parameters on the core logic of the algorithm.
In terms of statistical analysis, the study employed a two-stage verification strategy. First, the Wilcoxon rank-sum test was performed at a significance level of α = 0.05 to verify whether the performance differences between MBKA and each comparative algorithm were statistically significant. Subsequently, the Friedman test was used to rank all compared algorithms comprehensively. As non-parametric statistical methods, the above tests do not require assuming a specific data distribution type, making them particularly suitable for analyzing multi-index performance differences in complex optimization scenarios and ensuring the robustness and objectivity of experimental conclusions.

3.2. Performance Testing on Benchmark Functions

The test suite consists of 18 functions: F1–F9 are uni-modal functions with global optima for evaluating MBKA’s optimization performance, while F10–F18 are multi-modal functions with multiple local extrema for assessing exploratory capability. Detailed information is in Table 2 and Table 3.
To evaluate the parameter sensitivity and time performance of the MBKA algorithm, MBKA is compared with BKA, MBKA1, and MBKA2. The convergence curves are shown in Figure 6, and the relevant results are presented in Table 4.
Based on the experimental verification of the F1–F18 benchmark test functions (refer to Figure 6 and Table 4), the determination of the parameter e p l =   0.1 is derived from a comparative analysis between the MBKA and its variant algorithms, namely MBKA1 ( e p l =   0.2 and MBKA2 e p l =   0.3 ). In terms of the average fitness index, taking F1 as an example, the average value of MBKA is 1.2047 × 10−94, which outperforms MBKA1 (6.7213 × 10−94) and MBKA2 (2.2697 × 10−95). In terms of stability, MBKA exhibits a standard deviation of 0 in functions such as F3 and F7, demonstrating superior operational consistency. Comprehensively considering optimization accuracy and stability, e p l =   0.1 is ultimately determined as the optimal value.
In terms of runtime, there is a noticeable difference between MBKA and the comparison algorithm BKA. For F1, the average runtime per execution of MBKA is 0.9139 s, while that of BKA is 0.0254 s. In F3, MBKA has an average runtime of 0.9875 s per execution, compared to 0.0638 s for BKA. Although MBKA requires slightly longer runtime, its advantages in average fitness (e.g., in F3, MBKA reaches 3.549 × 10−178 while BKA is 3.067 × 10−75) and stability across most of the F1–F18 functions fully confirm that its comprehensive optimization performance is more suitable for addressing complex optimization tasks.
To assess the performance of the MBKA algorithm, we conducted a comprehensive comparative analysis involving MBKA, BKA, MPA, ALO, GWO, and DO algorithms. The convergence curves for each algorithm are illustrated in Figure 7, and the detailed simulation results are presented in Table 5, offering valuable insights for further optimization and performance evaluation.
The results presented in Table 5 indicate that the MBKA algorithm generally outperforms the other algorithms in terms of average performance across most functions. While it shows slightly lower performance on functions F9 and F18, MBKA achieves theoretical optimal values for the remaining functions, particularly F10, F11, F15, and F17, highlighting its remarkable capabilities. Additionally, Figure 7 demonstrates MBKA’s significant advantage in convergence speed, consistently outperforming other algorithms in this aspect. This suggests that MBKA not only achieves superior final results but also exhibits high convergence efficiency, underscoring its effectiveness and practicality for solving optimization problems.

3.3. Performance Testing on CEC-2017

In this study, to evaluate the performance of the proposed MBKA algorithm, 29 10-dimensional functions from the CEC-2017 benchmark test function set were selected for testing. Since the CEC2017-F2 function shows poor stability in high-dimensional cases, it was not included in the test scope. The CEC-2017 benchmark function set primarily covers four types of functions: first, uni-modal functions (F1–F3); second, simple multi-modal functions (CEC2017-F4–CEC2017-F10); third, hybrid functions (CEC2017-F11–CEC2017-F20); and fourth, synthesis functions (CEC2017-F21–CEC2017-F30). Compared with other test functions, the CEC-2017 benchmark function set has richer functional characteristics and can more comprehensively and accurately reflect the algorithm’s performance.
Figure 8 presents the convergence curves of MBKA and BKA on the CEC-2017 benchmark functions; Table 6 lists the corresponding experimental result data.
Judging from the convergence curves and numerical results, the MBKA has extremely prominent advantages over the BKA. Taking the CEC2017-F1 function as an example, on the convergence curve, the MBKA drops rapidly in the initial stage of iteration. After about 100 iterations, the error value has decreased to a relatively low level, while the error value of the BKA during the same period is significantly higher, indicating that the MBKA converges faster. In terms of numerical results, the minimum value of the MBKA for the CEC2017-F6 function, 6.12 × 102, is smaller than that of the BKA, 6.16 × 102. In multiple functions including F11, the MBKA also shows higher solution accuracy. Regarding stability, the standard deviation of the MBKA for the CEC2017-F6 function, 6.33 is smaller than that of the BKA 7.29. The same characteristic can be seen in functions such as CEC2017-F23, indicating that the results of multiple runs of the MBKA are more stable. Moreover, the p-values between the MBKA and the BKA for most functions are extremely small. For example, the p-value of the CEC2017-F11 function reaches 3.88 × 10−6, indicating a statistically significant difference. In conclusion, the MBKA far surpasses the BKA in terms of convergence, solution accuracy, stability, and other comprehensive performance aspects. It fully demonstrates its advantages when dealing with various functions in CEC-2017, and has high application value in practical engineering problems.

3.4. Performance Testing on CEC-2022

The CEC-2022 test suite is the most recent and widely used testing collection currently. Its functions are mainly categorized into four types: uni-modal function (CEC2022-F1), basic functions (CEC2022-F2–CEC2022-F5), hybrid functions (CEC2022-F6–CEC2022-F8), and combined functions (CEC2022-F9–CEC2022-F12). These test functions are renowned for their complex structures, which pose significant challenges during the solving process.
In this study, a performance comparison was conducted between BKA and MBKA on the CEC-2022 test suite. Each algorithm was run independently 30 times, and the results in ten dimensions are presented here. Figure 9 shows the convergence curves of MBKA and BKA on the CEC-2022 benchmark test functions, while Table 7 lists the corresponding experimental data results.
The MBKA has significant advantages over the BKA. In terms of convergence curves, MBKA converges faster in most benchmark functions (such as CEC2022-F1, CEC2022-F3, CEC2022-F6, etc.). From the numerical results, the minimum values of multiple functions (such as CEC2022-F1, CEC2022-F4, CEC2022-F5, etc.) show that MBKA has a higher solution accuracy. The standard deviation data indicate that MBKA has better stability in some functions (such as CEC2022-F2). Moreover, for most functions, the p-values of the comparison between MBKA and BKA are small, indicating a significant difference. In summary, MBKA outperforms BKA in terms of convergence, solution accuracy, stability, and other comprehensive performance aspects, and it has more advantages in solving practical engineering problems.

3.5. Engineering Optimization Problem

Addressing practical engineering challenges is a key objective in the research of swarm intelligence algorithms [40]. While test function results offer preliminary insights into the algorithm’s performance, they do not comprehensively reflect its effectiveness in real-world applications. To evaluate the efficacy of the Modified Black-winged Kite Algorithm (MBKA) in engineering contexts, this study investigates two representative real-world problems: the compression spring design problem and the gear train design problem.

3.5.1. Compression Spring Design Problem

The goal of designing compression springs is to minimize the weight of the spring while meeting minimum deflection, vibration frequency, and shear stress constraints. As shown in Figure 10 and Table 8, the problem involves three successive design variables: the spring coil diameter d , the spring coil diameter D , and the number of coils wound N .
Consider variable :   H = [ h 1 , h 2 , h 3 ] = [ d , D , N ] .
Minimize :   f H = h 3 + 2 × h 2 h 1 2 .
Subject to :   l 1 ( H ) = h 2 3 h 3 71,785 h 1 4 + 1 0 ,
  l 2 H = 4 h 2 2 h 1 h 2 12,566 h 1 3 h 2 h 1 4 + 1 5108 h 1 2 1 0 , l 3 ( H ) = 140.45 h 1 h 2 2 h 3 + 1 0 ,
l 4 ( H ) = 1 + h 1 + h 2 1.5 0 .
Table 8 presents the statistical results for each algorithm applied to the compression spring design problem, with optimal results highlighted in bold. The data indicate that the MBKA algorithm consistently outperforms the original BKA algorithm, achieving superior optimal values compared to all other algorithms. Moreover, when compared with other algorithms involved in this experiment like WOA, ALO, and DO, MBKA also achieves superior optimal values. These findings suggest that MBKA provides valuable insights and demonstrates excellent performance for tackling the compression spring design problem.

3.5.2. Gear Train Design Problem

The gear train design problem is a typical unconstrained discrete design problem in mechanical engineering where the main objective is to minimize the gear ratio, which is defined as the ratio of the angular velocity of the output shaft to the angular velocity of the input shaft. As shown in Figure 11 and Table 9, n A , n B , n C , n D represents the coefficients of tour different gears. The structure of the wheel train design problem is shown schematically:
Consider variable :   H = [ h 1 , h 2 , h 3 , h 4 ] = [ n A , n B , n C , n D ] .
Minimize :   f ( H ) = 1 6.931 h 3 h 2 h 1 h 4 2 .
Variable range :   12 x i 60 , i = 1,2 , 3,4
Shown in Table 8, although the MBKA algorithm shows slightly lower variance compared to the DO algorithm, it achieves superior optimal values and consistently outperforms all other algorithms in terms of average performance across multiple runs. This suggests that the MBKA algorithm not only exhibits high convergence but also demonstrates robust performance. When applied to the optimization of four variables in the gear train design problem, the MBKA algorithm identified the optimal gear configuration. These results indicate that the MBKA algorithm possesses a significant advantage in solving the gear train design problem.

4. Discussion

4.1. Alignment with Prior Research and Hypothesis Validation

The Modified Black-winged Kite Algorithm (MBKA) overcomes the main drawbacks of the original Black-winged Kite Algorithm (BKA), such as weakened exploration in the later stage, excessive reliance on global optimal individuals for position updates, and inflexible attack behavior. Its three-phase attacking strategy, along with the attack operator e p l and adaptive parameters ( n 1 , n 2 , n 3 ), allows for coordinated adjustment of predatory, defensive, and competitive behaviors. This design confirms the hypotheses that the three-phase strategy increases population diversity and that Lévy–Cauchy migration enhances the ability to escape local optima, which is reflected in the better performance of benchmark functions and multi-modal functions after the table modifications.

4.2. Theoretical and Practical Implications

Theoretically, MBKA’s “behavioral modularization” approach, which decomposes bio-inspired behaviors into adaptive sub-mechanisms, provides a scalable framework for other nature-inspired algorithms to balance exploration and exploitation. Practically, with the revised tables showing more accurate data, MBKA performs well in compression spring and gear train design tasks, outperforming BKA and other algorithms in optimal values, thus meeting the needs of high-precision mechanical optimization in fields like aerospace and manufacturing.

4.3. Limitations

MBKA still has some limitations. Parameters such as e p l and those in Lévy flight are set empirically and may lack adaptability in ultra-high-dimensional or dynamic scenarios. It focuses on single-objective optimization and cannot handle multi-criteria engineering problems. Also, its computational efficiency decreases in large-population settings due to the three-phase attacking strategy, and this can be better explained with the more accurate data from the revised tables.

5. Conclusions

A Modified Black-winged Kite Algorithm (MBKA) is proposed in this paper by introducing a three-phase attacking strategy and Lévy–Cauchy migration behavior to improve the BKA’s performance. An attacking operator e p l and three adaptive parameters ( n 1 , n 2 , and n 3 ) are designed to enrich the location update pattern of population individuals and improve adaptability for avoiding trapping into local optima. With the revised tables providing more accurate and complete data, the experimental results, obtained by testing on 18 benchmark functions, as well as CEC-2017/CEC-2022 functions and two practical engineering problems, reveal that the proposed MBKA has better convergence accuracy and solution quality than the original BKA on most testing functions. Therefore, the proposed improved mechanisms are obviously effective.
In the future, we will continue to conduct in-depth research on MBKA. We will integrate the causal reasoning model and the embodied intelligence concept into MBKA to further improve its performance. Specifically, causal reasoning can be used for the real-time adjustment of parameters like e p l by learning the causal relationship between function types and optimal parameter values from historical iteration data. Embodied intelligence can be employed to simulate dynamic constraints in real environments. In addition, we will integrate multi-objective optimization mechanisms, such as non-dominated sorting referenced from NSBKA, into MBKA to solve more complex practical optimization problems that involve multiple conflicting objectives.

Author Contributions

Y.M.: Funding Acquisition, Revision of the Manuscript, and Writing—Reviewing and Editing; W.M.: Conceptualization, Methodology, Software, and Writing—Original Draft Preparation; R.G.: Supervision and Validation; X.Z.: Methodology and Software. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (Grant No. 62203332), the Natural Science Foundation of Tianjin (Grant No. 20JCQNJC00430), the Tianjin Research Innovation Project for Postgraduate Students (2022SKYZ310), and the College Students’ Innovative Entrepreneurial Training Plan Program (Grant No. 202510069145 and 202410069005).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon request. There are no restrictions on data availability.

Conflicts of Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

  1. Wang, J.; Wang, W.C.; Hu, X.X.; Qiu, L.; Zang, H.F. Black-winged kite algorithm: A nature-inspired meta-heuristic for solving benchmark functions and engineering problems. Artif. Intell. Rev. 2024, 57, 98. [Google Scholar] [CrossRef]
  2. Fathy, A.; Bouaouda, A.; Hashim, F.A. Optimal arrangement of shaded photovoltaic array using new modified black-winged kite algorithm. Expert Syst. Appl. 2025, 289, 128375. [Google Scholar] [CrossRef]
  3. Nie, J.; Wu, C.; Liu, D.; Zhou, S. Enhanced Black-Winged Kite Algorithm for Agile Software Project Scheduling Optimization. In Proceedings of the 2025 8th International Conference on Advanced Algorithms and Control Engineering (ICAACE), Shanghai, China, 21–23 March 2025; pp. 286–294. [Google Scholar]
  4. Lin, G.; Zhou, Z.; Chiu, K.H.; Lin, H.; Shi, X.; Ma, H. Improved Black-winged Kite Algorithm for Welded Beam Structural Optimization and Cost Management. In Proceedings of the 2025 5th International Symposium on Computer Technology and Information Science (ISCTIS), Xi’an, China, 16–18 May 2025; pp. 229–232. [Google Scholar]
  5. Mansouri, H.; Elkhanchouli, K.; Elghouate, N.; Bencherqui, A.; Tahiri, M.A.; Karmouni, H.; Sayyouri, M.; Moustabchir, H.; Askar, S.S.; Abouhawwash, M. A modified black-winged kite optimizer based on chaotic maps for global optimization of real-world applications. Knowl.-Based Syst. 2025, 318, 113558. [Google Scholar] [CrossRef]
  6. Li, G.; Zhu, K.; Li, Z.; Chen, H.; Zhang, W.; Chen, J. Multi-Parameter Optimization of VIV Energy Harvesting System Based on Black-winged Kite Algorithm. In Proceedings of the 2024 8th International Symposium on Computer Science and Intelligent Control (ISCSIC), Zhengzhou, China, 6–8 September 2024; pp. 376–384. [Google Scholar]
  7. Lin, M.; Qiu, Z.; Dai, Z.; Luo, Y. Erythemato-Squamous Diseases Diagnosis Based on Support Vector Machine Optimized by Black-Winged Kite Algorithm. In Proceedings of the 2024 5th International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI), Nanchang, China, 27–29 September 2024; pp. 86–89. [Google Scholar]
  8. Huang, S.; Xing, Y.; Cao, J.; Zhang, X.; Wang, Y. Identification of optimal parameters of PEMFC steady-state model using improved black kite algorithm. Int. J. Hydrogen Energy 2025, 106, 1302–1321. [Google Scholar] [CrossRef]
  9. Wang, L.; Xu, L.; Fan, S.; Zhang, Y. An optimized multi-source feature extraction model with black-winged kite algorithm for hourly seamless PM2.5 estimation. Swarm Evol. Comput. 2025, 97, 102069. [Google Scholar] [CrossRef]
  10. Zhou, M.; Shi, C.; Hu, F.; Zhu, Z.; Wang, K.; Sun, X.; Zhang, Y.; Zhou, M.; Zhang, L.; Zhang, Y. RC parameter identification and load aggregation analysis of air-conditioning systems: A multi-strategy improved black-winged kite algorithm. Energy Build. 2025, 337, 115641. [Google Scholar] [CrossRef]
  11. Rani, S.J.; Santhakumar, D. Black-winged kite algorithm-based energy efficient Clustering Protocol for Internet of Things. In Proceedings of the 2024 IEEE 16th International Conference on Computational Intelligence and Communication Networks (CICN), Indore, India, 22–23 December 2024; pp. 1052–1057. [Google Scholar]
  12. Sun, H.; Yang, S. Range-free localization algorithm based on modified distance and improved black-winged kite algorithm. Comput. Netw. 2025, 259, 111091. [Google Scholar] [CrossRef]
  13. Gupta, S.; Gupta, S.; Sunil, G.; Kant, V.; Bharany, S. Path Planning Optimization for Four-Wheeled Mobile Robots Using the Black-Winged Kite Algorithm. In Proceedings of the 2025 4th OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 5.0, Raigarh, India, 9–11 April 2025; pp. 1–6. [Google Scholar]
  14. Ma, H.; Azizan, A.; Feng, Y.; Cheng, L.; Delgoshaei, A.; Ismail, M.I.S.; Ramli, H.R. Improved black-winged kite algorithm and finite element analysis for robot parallel gripper design. Adv. Mech. Eng. 2024, 16, 1–16. [Google Scholar] [CrossRef]
  15. Du, C.; Zhang, J.; Fang, J. An innovative complex-valued encoding black-winged kite algorithm for global optimization. Sci. Rep. 2025, 15, 932. [Google Scholar] [CrossRef] [PubMed]
  16. Wang, S.; Xu, B.; Zheng, Y.; Yue, Y.; Xiong, M. Path Optimization Strategy for Unmanned Aerial Vehicles Based on Improved Black Winged Kite Optimization Algorithm. Biomimetics 2025, 10, 310. [Google Scholar] [CrossRef]
  17. Mohapatra, S.; Kaliyaperumal, D.; Gharehchopogh, F.S. A revamped black winged kite algorithm with advanced strategies for engineering optimization. Sci. Rep. 2025, 15, 17681. [Google Scholar] [CrossRef] [PubMed]
  18. Li, Y.; Shi, B.; Qiao, W.; Du, Z. A black-winged kite optimization algorithm enhanced by osprey optimization and vertical and horizontal crossover improvement. Sci. Rep. 2025, 15, 6737. [Google Scholar] [CrossRef]
  19. Wan, H.; Wu, Q.; Peng, Z.; Lu, Z. Direction-assisted enhanced black-winged kite algorithm for mobile robot path planning. J. King Saud Univ. Comput. Inf. Sci. 2025, 37, 121. [Google Scholar] [CrossRef]
  20. Li, C.; Zhang, K.; Zheng, B.; Chen, Y. Path planning problem solved by an improved black-winged kite optimization algorithm based on multi-strategy fusion. Int. J. Mach. Learn. Cybern. 2025, 16, 7859–7895. [Google Scholar] [CrossRef]
  21. Li, J.; Fu, S.; Zhang, W.; Fu, H.; Fang, X.; Li, Z. Enhanced Black-Winged Kite Algorithm for Drone Coverage in Complex Fruit Farms. Agriculture 2025, 15, 1044. [Google Scholar] [CrossRef]
  22. Liu, X.; Wang, F.; Liu, Y.; Li, L. A Multi-Objective Black-Winged Kite Algorithm for Multi-UAV Cooperative Path Planning. Drones 2025, 9, 118. [Google Scholar] [CrossRef]
  23. Xue, R.; Zhang, X.; Xu, X.; Zhang, J.; Cheng, D.; Wang, G. Multi-strategy Integration Model Based on Black-Winged Kite Algorithm and Artificial Rabbit Optimization. In International Conference on Swarm Intelligence; Springer Nature: Singapore, 2024; pp. 197–207. [Google Scholar]
  24. Nagarajan, K.; Rajagopalan, S. A Novel Black-Winged Kite Algorithm with Deep Learning for Autism Detection of Privacy Preserved Data. J. Bionic Eng. 2025, 22, 1985–2011. [Google Scholar] [CrossRef]
  25. Yu, Q.; He, X.; Chen, Y.; Jiang, Z.; Tan, Y.; Liu, L.; Xie, B.; Wen, C. Multi-objective optimization for energy-efficient management of electric Tractors via hybrid energy storage systems and scenario recognition. Appl. Energy 2025, 391, 125898. [Google Scholar] [CrossRef]
  26. Chen, H.; Zheng, Y.; Huang, H.; Wang, Z.; Yang, B.; Ni, J. A point-interval prediction framework for minimum miscibility pressure of CO2-crude oil systems. Fuel 2025, 381, 133573. [Google Scholar] [CrossRef]
  27. She, L.; Hu, C.C.; Li, Y.L.; Li, Z.Y.; Song, Q.; Zhang, Y.; He, M.M. Intelligent decision of TBM operating parameters: A multi-objective optimization approach based on tabular deep learning. Adv. Eng. Inform. 2025, 68, 103573. [Google Scholar] [CrossRef]
  28. Zhang, S.; Fu, Z.; An, D.; Yi, H. Network security situation assessment based on BKA and cross dual-channel. J. Supercomput. 2025, 81, 461. [Google Scholar] [CrossRef]
  29. Yang, J.; Wan, L.; Qian, J.; Li, Z.; Mao, Z.; Zhang, X.; Lei, J. An Innovative Indoor Localization Method for Agricultural Robots Based on the NLOS Base Station Identification and IBKA-BP Integration. Agriculture 2025, 15, 901. [Google Scholar] [CrossRef]
  30. Zhao, H.; Li, P.; Duan, S.; Gu, J. Inversion of image-only intrinsic parameters for steel fibre concrete under combined rate-temperature conditions: An adaptively enhanced machine learning approach. J. Build. Eng. 2024, 94, 109836. [Google Scholar] [CrossRef]
  31. Zhang, C.; Cheng, J.; Guo, Z.; Li, J. Unraveling surface roughness variations in SLM-GH4169 alloy polishing: A synergistic approach combining mechanistic modeling and machine learning algorithms. Mater. Today Commun. 2025, 46, 112505. [Google Scholar] [CrossRef]
  32. Shu, B.; Hu, G.; Cheng, M.; Zhang, C. MSFPSO: Multi-algorithm integrated particle swarm optimization with novel strategies for solving complex engineering design problems. Comput. Methods Appl. Mech. Eng. 2025, 437, 117791. [Google Scholar] [CrossRef]
  33. Li, N.; Liu, J.; Wang, L.; Dai, B.; Zhao, S.; Chang, J.; Ye, H.; Yan, D. A hybrid intelligent optimization algorithm for long-term production planning of open-pit mine considering carbon reduction plan. Swarm Evol. Comput. 2025, 98, 102078. [Google Scholar] [CrossRef]
  34. Wu, G.; Mallipeddi, R.; Suganthan, P. Problem Definitions and Evaluation Criteria for the CEC 2017 Competition and Special Session on Constrained Single Objective Real-parameter Optimization; South Korea and Nanyang Technological University: Singapore, 2016. [Google Scholar]
  35. Yazdani, D.; Branke, J.; Omidvar, M.N.; Li, X.; Li, C.; Mavrovouniotis, M.; Nguyen, T.; Yao, X. IEEE CEC 2022 competition on dynamic optimization problems generated by generalized moving peaks benchmark. arXiv 2021, arXiv:2106.06174. [Google Scholar]
  36. Faramarzi, A.; Heidarinejad, M.; Mirjalili, S.; Gandomi, A.H. Marine Predators Algorithm: A nature-inspired metaheuristic. Expert Syst. Appl. 2020, 152, 113377. [Google Scholar] [CrossRef]
  37. Mafarja, M.; Mirjalili, S. Antlion optimizer: “The ant lion optimizer”. Adv. Eng. Softw. 2015, 83, 80–98. [Google Scholar]
  38. Mirjalili, S.; Lewis, A. The grey wolf optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef]
  39. Zhao, S.; Zhang, T.; Ma, S.; Chen, M. Dandelion Optimizer: A nature-inspired metaheuristic algorithm for engineering applications. Eng. Appl. Artif. Intell. 2022, 114, 105075. [Google Scholar] [CrossRef]
  40. Rather, S.A.; Bala, P.S. Swarm-based chaotic gravitational search algorithm for solving mechanical engineering design problems. World J. Eng. 2020, 17, 97–114. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of predatory attack state.
Figure 1. Schematic diagram of predatory attack state.
Biomimetics 10 00707 g001
Figure 2. Schematic diagram of defensive attack state.
Figure 2. Schematic diagram of defensive attack state.
Biomimetics 10 00707 g002
Figure 3. Schematic diagram of competitive attack state.
Figure 3. Schematic diagram of competitive attack state.
Biomimetics 10 00707 g003
Figure 4. Comparison diagram of attack behavior variation curves.
Figure 4. Comparison diagram of attack behavior variation curves.
Biomimetics 10 00707 g004
Figure 5. Trajectory diagram of Lévy flight.
Figure 5. Trajectory diagram of Lévy flight.
Biomimetics 10 00707 g005
Figure 6. Convergence curves for F1–F18 benchmark functions of MBKA and its variants.
Figure 6. Convergence curves for F1–F18 benchmark functions of MBKA and its variants.
Biomimetics 10 00707 g006aBiomimetics 10 00707 g006bBiomimetics 10 00707 g006c
Figure 7. F1–F18 benchmark function comparison images.
Figure 7. F1–F18 benchmark function comparison images.
Biomimetics 10 00707 g007aBiomimetics 10 00707 g007bBiomimetics 10 00707 g007c
Figure 8. CEC-2017 benchmark function comparison images.
Figure 8. CEC-2017 benchmark function comparison images.
Biomimetics 10 00707 g008aBiomimetics 10 00707 g008bBiomimetics 10 00707 g008cBiomimetics 10 00707 g008d
Figure 9. CEC-2022 benchmark function comparison images.
Figure 9. CEC-2022 benchmark function comparison images.
Biomimetics 10 00707 g009aBiomimetics 10 00707 g009b
Figure 10. The image of compression spring.
Figure 10. The image of compression spring.
Biomimetics 10 00707 g010
Figure 11. The image of gear train.
Figure 11. The image of gear train.
Biomimetics 10 00707 g011
Table 1. The parameters of each algorithm.
Table 1. The parameters of each algorithm.
AlgorithmParameters
BKA p = 0.9
MPA [36] p = 0.9 ,   F A D s = 0.2
ALO [37]
GWO [38] α = 2 0 ,   l i n e a r l y   d e c r e a s e
DO [39] a = 1 T 2 2 T + 1 ,   b = 2 a ,   c = 1 a b ,
k = 1 r a n d ( ) × ( c + a t 2 + b × t )
Table 2. Uni-modal test functions.
Table 2. Uni-modal test functions.
FunctionRangeOptima
F 1 ( x ) = i = 1 n x i 2 [−100, 100]n0
F 2 ( x ) = i = 1 D [ y i 2 10 cos ( 2 π y i ) + 10 ] ,   y i = x i , x i < 0.5 [−10, 10]n0
F 3 ( x ) = i = 1 D ( j = 1 i x j ) 2 [−100, 100]n0
F 4 ( x ) = max i x i , 1 x i D [−10, 10]n0
F 5 ( x ) = i = 1 D D × x i 2 + r a n d ( 0,1 ) [−1.28, 1.28]n0
F 6 ( x ) = i = 1 D x i ( i + 1 ) [−1, 1]n0
F 7 ( x ) = i = 1 D D × x i 2 [−10, 10]n0
F 8 ( x ) = i = 1 D x i 2 + i = 1 D 0.5 i x i 2 + i = 1 D 0.5 i x i 4 [−5, 10]n0
F 9 ( x ) = i = 1 D i x i 4 [−1.28, 1.28]n0
Table 3. Multi-modal test functions.
Table 3. Multi-modal test functions.
FunctionRangeOptima
F 10 ( x ) = i = 1 D x i 2 10 cos ( 2 π x i ) + 10 [−5.12, 5.12]n0
F 11 ( x ) = i = 1 D y i 2 10 cos ( 2 π y i ) + 10 ,   y i = x i , x i < 0.5 r o u n d ( 2 x i ) / 2 , x i > 0.5 [−5.12, 5.12]n0
F 12 ( x ) = 20 exp ( 0.2 1 D i = 1 D x i 2 ) + 10 + e [−50, 50]n0
F 13 ( x ) = 1 4000 i = 1 D x i 2 i = 1 D cos ( x i i ) + 1 [−600, 600]n0
F 14 ( x ) = i = 1 D x i × sin ( x i ) + 0.1 x i [−10, 10]n0
F 15 ( x ) = i = 1 D k = 0 k m a x [ a k cos ( 2 π b k ( x i + 0.5 ) ) ]
D k = 0 k m a x [ a k cos ( 2 π b k 0.5 ) ] , a = 0.5 , b = 3 , k m a x
[−1, 1]n0
F 16 ( x ) = 1 cos 2 π i = 1 D x i 2 + 0.1 i = 1 D x i 2 [−100, 100]n0
F 17 ( x ) = i = 1 D 1 x i 2 + 2 x i + 1 2 0.3 cos ( 3 π x i ) 0.4 cos ( 4 π x i + 1 ) + 0.7 [−10, 10]n0
F 18 ( x ) = 0.5 + π Sin i = 1 D x i 2 2 0.5 × 1 + 1.001 ( i = 1 D x i 2 ) 2 [−100, 100]n0
Table 4. Simulation results of MBKA and its variants on F1–F18 benchmark functions.
Table 4. Simulation results of MBKA and its variants on F1–F18 benchmark functions.
IndexMBKABKAMBKA1MBKA2
F 1 Mean1.349 × 10−1772.345 × 10−744.742 × 10−1818.254 × 10−186
SD01.048 × 10−7300
runtime0.92680.02550.92210.9133
F 2 Mean1.205 × 10−941.697 × 10−376.721 × 10−942.269 × 10−95
SD6.473 × 10−949.284 × 10−373.662 × 10−931.233 × 10−94
runtime0.91390.02540.90780.9111
F 3 Mean3.549 × 10−1783.067 × 10−751.642 × 10−1772.149 × 10−178
SD01.357 × 10−7400
runtime0.98750.06380.98320.9796
F 4 Mean6.198 × 10−926.399 × 10−501.244 × 10−882.337 × 10−87
SD2.800 × 10−912.573 × 10−494.957 × 10−881.279 × 10−86
runtime0.91550.02430.91190.9103
F 5 Mean1.757 × 10−43.679 × 10−41.167 × 10−41.264 × 10−4
SD1.074 × 10−42.987 × 10−48.388 × 10−58.811 × 10−5
runtime1.24350.07571.25701.2567
F 6 Mean1.323 × 10−2785.382 × 10−1221.532 × 10−2742.659 × 10−277
SD02.010 × 10−12100
runtime1.00660.04461.00591.0052
F 7 Mean3.667 × 10−1842.881 × 10−844.284 × 10−1771.448 × 10−185
SD0×1000
runtime0.98770.02410.97900.9864
F 8 Mean4.772 × 10−1836.402 × 10−768.967 × 10−1851.509 × 10−181
SD03.507 × 10−7500
runtime1.03770.06081.03781.0381
F 9 Mean1.542 × 10−43.835 × 10−42.146 × 10−41.854 × 10−4
SD1.132 × 10−43.085 × 10−41.618 × 10−41.489 × 10−4
runtime1.45170.08321.46171.4541
F 10 Mean0000
SD0000
runtime1.37020.03851.36861.3780
F 11 Mean0000
SD0000
runtime1.35200.03921.35141.3490
F 12 Mean4.441 × 10−164.441 × 10−164.441 × 10−164.441 × 10−16
SD0000
runtime1.07620.03181.09031.0939
F 13 Mean0000
SD0000
runtime1.01880.04261.01441.0148
F 14 Mean6.941 × 10−971.872 × 10−381.327 × 10−972.695 × 10−95
SD3.379 × 10−961.021 × 10−375.999 × 10−971.022 × 10−94
runtime0.99320.02840.98490.9917
F 15 Mean0000
SD0000
runtime2.85411.60832.84622.8825
F 16 Mean6.774 × 10−1765.147 × 10−635.168 × 10−1771.322 × 10−184
SD0×10−6200
runtime0.95560.02810.94870.9508
F 17 Mean0000
SD0000
runtime0.92640.02640.92010.9235
F 18 Mean3.999 × 10−13.979 × 10−13.997 × 10−13.992 × 10−1
SD1.999 × 10−302.911 × 10−31.793 × 10−3
runtime0.71290.02530.71550.7142
Table 5. Simulation results of MBKA and comparative algorithm on F1–F18.
Table 5. Simulation results of MBKA and comparative algorithm on F1–F18.
IndexMBKABKAMPAALOGWODO
F 1 Mean7.89 × 10−1853.74 × 10−815.59 × 10−308.04 × 10−99.94 × 10−571.46 × 10−11
SD02.05 × 10−801.21 × 10−294.45 × 10−93.65 × 10−562.27 × 10−11
pNA1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
Fri124635
F 2 Mean1.46 × 10−942.24 × 10−475.69 × 10−173.765.23 × 10−331.00 × 10−6
SD7.63 × 10−941.17 × 10−465.41 × 10−179.947.67 × 10−337.34 × 10−7
pNA1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
Fri124635
F 3 Mean7.45 × 10−1727.64 × 10−772.89 × 10−161.00 × 10−31.43 × 10−276.85 × 10−8
SD04.19 × 10−764.25 × 10−163.29 × 10−36.24 × 10−271.66 × 10−7
pNA1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
Fri124635
F 4 Mean2.93 × 10−909.61 × 10−391.01 × 10−133.61 × 10−41.69 × 10−191.13 × 10−5
SD1.52 × 10−895.05 × 10−381.01 × 10−137.67 × 10−42.35 × 10−191.28 × 10−5
pNA1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 1065
Fri124635
F 5 Mean1.49 × 10−43.18 × 10−48.12 × 10−43.03 × 10−25.93 × 10−42.70 × 10−3
SD1.18 × 10−42.24 × 10−45.11 × 10−41.77 × 10−24.45 × 10−41.82 × 10−3
pNA5.29 × 10−41.73 × 10−61.73 × 10−61.24 × 10−51.73 × 10−6
Fri1.32.473.6762.84.77
F 6 Mean5.46 × 10−2836.81 × 10−1141.34 × 10−612.42 × 10−71.28 × 10−1206.09 × 10−15
SD03.47 × 10−1133.21 × 10−611.59 × 10−74.39 × 10−1207.11 × 10−5
pNA1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
Fri124625
F 7 Mean1.89 × 10−1821.34 × 10−892.65 × 10−311.24 × 10−76.76 × 10−582.74 × 10−12
SD07.35 × 10−894.24 × 10−311.68 × 10−72.69 × 10−573.33 × 10−12
pNA1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
Fri124635
F 8 Mean5.87 × 10−1841.15 × 10−754.82 × 10−311.29 × 10−102.18 × 10−585.87 × 10−13
SD06.29 × 10−751.09 × 10−304.82 × 10−115.98 × 10−586.02 × 10−13
pNA1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
Fri124635
F 9 Mean1.73 × 10−42.39 × 10−47.24 × 10−41.46 × 10−27.74 × 10−41.14 × 10−2
SD1.75 × 10−42.33 × 10−44.45 × 10−48.75 × 10−34.21 × 10−46.72 × 10−3
pNA1.47 × 10−12.59 × 10−51.73 × 10−63.88 × 10−61.73 × 10−6
Fri1.671.73.25.633.435.37
F 10 Mean002.66 × 10−1323.558.16 × 10−12.65
SD001.12 × 10−1210.081.912.78
pNA10.51.73 × 10−61.56 × 10−21.73 × 10−6
Fri2.352.352.4862.984.83
F 11 Mean000.6027.332.171.23
SD001.0111.852.521.43
pNA18.29 × 10−61.73 × 10−62.93 × 10−41.44 × 10−6
Fri1.781.793.7863.554.1
F 12 Mean4.44 × 10−164.44 × 10−161.57 × 10−144.01 × 10−12.6911.32
SD001.63 × 10−141.126.9810.06
pNA11.49 × 10−68.29 × 10−65.08 × 10−71.73 × 10−6
Fri1.571.573.624.833.925.5
F 13 Mean001.73 × 10−112.14 × 10−13.08 × 10−21.02 × 10−1
SD008.54 × 10−111.35 × 10−14.15 × 10−29.43 × 10−2
pNA10.131.73 × 10−62.74 × 10−51.73 × 10−6
Fri2.052.052.255.873.824.97
F 14 Mean2.59 × 10−952.90 × 10−397.22 × 10−84.53 × 10−11.19 × 10−41.26 × 10−1
SD1.41 × 10−941.16 × 10−383.95 × 10−75.77 × 10−12.38 × 10−42.56 × 10−1
pNA1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
Fri123.45.83.94.9
F 15 Mean00001.743.88 × 10−1
SD00001.122.89
pNA1113.79 × 10−62.56 × 10−6
Fri2.552.552.552.555.735.07
F 16 Mean1.37 × 10−1771.63 × 10−549.95 × 10−26.79 × 10−19.95 × 10−21.39 × 10−1
SD08.9 × 10−545.53 × 10−172.51 × 10−13.77 × 10−101.03 × 10−1
pNA1.73 × 10−66.79 × 10−81.25 × 10−61.73 × 10−61.72 × 10−6
Fri123.075.934.874.13
F 17 Mean0002.1502.12 × 10−13
SD0001.1902.32 × 10−13
pNA111.73 × 10−61.73 × 10−61.73 × 10−6
Fri2.52.52.562.55
F 18 Mean3.99 × 10−13.98 × 10−13.98 × 10−13.98 × 10−13.98 × 10−13.98 × 10−1
SD2.83 × 10−309.75 × 10−151.04 × 10−136.76 × 10−63.22 × 10−11
pNA1.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−61.73 × 10−6
Fri61.351.722.9354
Note: NA in the table indicates invalid data.
Table 6. Simulation results of MBKA and BKA on CEC-2017.
Table 6. Simulation results of MBKA and BKA on CEC-2017.
FunctionMBKABKA
MaxMeanMinSDMaxMeanMinSDp-Values
C E C 2017 F 1 2.13 × 1091.05 × 1096.44 × 1075.59 × 1082.15 × 1094.27 × 1071.01 × 1075.25 × 1082.41 × 10−4
C E C 2017 F 3 5.19 × 1032.92 × 1038.73 × 1021.19 × 1039.71 × 1033.14 × 1037.72 × 1021.91 × 1038.93 × 10−1
C E C 2017 F 4 5.4 × 1024.79 × 1024.31 × 1022.49 × 1018.75 × 1025.42 × 1024.14 × 1029.82 × 1015.67 × 10−3
C E C 2017 F 5 5.68 × 1025.53 × 1025.28 × 1028.295.92 × 1025.59 × 1025.33 × 1021.8 × 1012.8 × 10−1
C E C 2017 F 6 6.37 × 1026.23 × 1026.12 × 1026.336.45 × 1026.31 × 1026.16 × 1027.296.16 × 10−4
C E C 2017 F 7 7.85 × 1027.71 × 1027.59 × 1027.928.09 × 1027.72 × 1027.33 × 10221.758.94 × 101
C E C 2017 F 8 8.56 × 1028.43 × 1028.19 × 1028.388.5 × 1028.31 × 1028.13 × 1029.491.36 × 104
C E C 2017 F 9 1.28 × 1031.06 × 1039.32 × 1028.41 × 1011.77 × 1031.28 × 1039.53 × 1021.88 × 1023.41 × 10−2
C E C 2017 F 10 2.49 × 1032.23 × 1031.74 × 1031.56 × 1023.01 × 1032.3 × 1031.44 × 1033.76 × 1023.82 × 10−1
C E C 2017 F 11 2.14 × 1031.62 × 1031.23 × 1032.17 × 1021.49 × 1031.26 × 1031.13 × 1031.04 × 1023.88 × 10−6
C E C 2017 F 12 1.03 × 1082.89 × 1071.52 × 1062.84 × 1071.22 × 1072.49 × 1061.71 × 1043.42 × 1063.52 × 10−2
C E C 2017 F 13 1.67 × 1055.51 × 1047.01 × 1034.43 × 1041.74 × 1044.82 × 1031.56 × 1024.26 × 1031.92 × 10−6
C E C 2017 F 14 2.83 × 1031.85 × 1031.53 × 1032.64 × 1021.59 × 1031.5 × 1031.44 × 1034.18 × 1021.73 × 10−6
C E C 2017 F 15 1.28 × 1045.98 × 1032.58 × 1032.61 × 1037.23 × 1032 × 1031.53 × 1031.02 × 1037.69 × 10−6
C E C 2017 F 16 1.99 × 1031.83 × 1031.65 × 1038.13 × 1012.07 × 1031.88 × 1031.72 × 1038.84 × 1011.32 × 102
C E C 2017 F 17 1.81 × 1031.45 × 1051.76 × 1031.17 × 1011.94 × 1031.79 × 1031.74 × 1034.37 × 1017.19 × 10−1
C E C 2017 F 18 5.34 × 1053.24 × 1032.28 × 1041.39 × 1052.56 × 1045.88 × 1031.97 × 1034.55 × 1031.73 × 10−6
C E C 2017 F 19 1.18 × 1052.11 × 1042.83 × 1032.32 × 1047.29 × 1032.34 × 1031.92 × 1031.05 × 1031.73 × 10−6
C E C 2017 F 20 2.24 × 1032.15 × 1032.07 × 1034.26 × 1012.26 × 1032.16 × 1032.08 × 1035.51 × 1016.88 × 10−1
C E C 2017 F 21 2.35 × 1032.25 × 1032.22 × 1033.45 × 1012.38 × 1032.29 × 1032.2 × 1036.56 × 1011.11 × 10−2
C E C 2017 F 22 2.52 × 1032.44 × 1032.28 × 1034.27 × 1013.45 × 1032.48 × 1032.29 × 1031.74 × 1022.06 × 10−1
C E C 2017 F 23 2.67 × 1032.65 × 1032.63 × 1038.352.73 × 1032.65 × 1032.62 × 1032.92 × 1019.59 × 10−1
C E C 2017 F 24 2.79 × 1032.77 × 1032.59 × 1034.25 × 1012.84 × 1032.78 × 1032.54 × 1036.12 × 1011.85 × 10−1
C E C 2017 F 25 3.11 × 1033.01 × 1032.95 × 1034.21 × 1013.25 × 1033.04 × 1032.92 × 1038.34 × 1012.45 × 10−1
C E C 2017 F 26 3.4 × 1033.16 × 1033.04 × 1038.83 × 1014.55 × 1033.56 × 1032.75 × 1034.87 × 1022.41 × 10−4
C E C 2017 F 27 3.11 × 1033.11 × 1033.1 × 1031.763.31 × 1033.14 × 1033.09 × 1034.34 × 1011.49 × 10−5
C E C 2017 F 28 3.42 × 1033.31 × 1033.23 × 1035.21 × 1013.79 × 1033.42 × 1033.18 × 1031.71 × 1026.04 × 10−3
C E C 2017 F 29 3.33 × 1033.24 × 1033.17 × 1034.05 × 1013.44 × 1033.29 × 1033.17 × 1035.81 × 1014.89 × 10−4
C E C 2017 F 30 8.86 × 1058.37 × 1054.72 × 1041.64 × 1051.88 × 1073 × 1064.16 × 1034.07 × 1065.47 × 10−3
Table 7. Simulation results of MBKA and BKA on CEC-2022.
Table 7. Simulation results of MBKA and BKA on CEC-2022.
FunctionMBKABKA
MaxMeanMinSDMaxMeanMinSDp-Values
C E C 2022 F 1 30,001.2513,103.737063.044069.287625.073190.79573.081865.351.73 × 10−6
C E C 2022 F 2 580.19498.35464.3423.56811.28534.48422.29109.143.82 × 10−1
C E C 2022 F 3 635.67623.88608.885.72654.09633.69615.7710.783.07 × 10−4
C E C 2022 F 4 852.79839.36822.405.97850.10831.89815.097.703.24 × 10−5
C E C 2022 F 5 160.791031.04937.6750.661633.731197.97939.72160.795.31 × 10−5
C E C 2022 F 6 23.52 × 1069.54 × 1051.34 × 1055.09 × 1068234.003342.081884.131777.417.57 × 10−10
C E C 2022 F 7 2086.972061.52044.879.752103.232064.312027.7820.295.04 × 10−1
C E C 2022 F 8 2239.442233.492226.333.392354.192235.172222.9224.221.25 × 10−2
C E C 2022 F 9 2720.432636.312576.1533.052727.312642.852540.9850.174.53 × 10−1
C E C 2022 F 10 2642.092505.592500.8925.233053.042563.002500.64114.741.66 × 10−2
C E C 2022 F 11 3420.092845.972769.09121.704069.563156.642770.26381.552.61 × 10−4
C E C 2022 F 12 2873.432871.172867.991.462973.332902.042868.2330.226.98 × 10−6
Table 8. Compression spring design problem’s optimal outcomes from various algorithms.
Table 8. Compression spring design problem’s optimal outcomes from various algorithms.
AlgorithmsOptimal Values for VariablesBestAvg.Std.
d D N
MBKA5.43 × 10−20.42208.29681.28 × 10−21.978 × 10−21.6658 × 10−4
BKA5.91 × 10−20.56334.90741.36 × 10−21.3329 × 10−29.2757 × 10−4
WOA5.85 × 10−20.54635.23351.35 × 10−21.3917 × 10−21.5035 × 10−3
ALO5.70 × 10−20.49956.09581.32 × 10−21.36 × 10−21.421 × 10−3
DO5.51 × 10−20.44477.52921.291.4021 × 10−21.2076 × 10−3
Table 9. Gear train design problem’s optimal outcomes from various algorithms.
Table 9. Gear train design problem’s optimal outcomes from various algorithms.
AlgorithmsOptimal Values for VariablesBestAvg.Std.
n A n B n C n D
MBKA51.43926.28314.93852.7452.3078 × 10−111.4425 × 10−91.649 × 10−9
BKA47.36712.55812.48522.8239.9216 × 10−101.8605 × 10−93.7157 × 10−9
WOA46.75812.19312.51923.1099.9216 × 10−103.7376 × 10−96.3414 × 10−9
ALO42.75912.00014.56329.1134.5033 × 10−96.8496 × 10−97.7234 × 10−9
DO55.56713.36622.58237.0816.6021 × 10−101.6529 × 10−91.2562 × 10−9
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ma, Y.; Meng, W.; Gu, R.; Zhang, X. Modified Black-Winged Kite Optimization Algorithm with Three-Phase Attacking Strategy and Lévy–Cauchy Migration Behavior to Solve Mathematical Problems. Biomimetics 2025, 10, 707. https://doi.org/10.3390/biomimetics10100707

AMA Style

Ma Y, Meng W, Gu R, Zhang X. Modified Black-Winged Kite Optimization Algorithm with Three-Phase Attacking Strategy and Lévy–Cauchy Migration Behavior to Solve Mathematical Problems. Biomimetics. 2025; 10(10):707. https://doi.org/10.3390/biomimetics10100707

Chicago/Turabian Style

Ma, Yunpeng, Wanting Meng, Ruixue Gu, and Xinxin Zhang. 2025. "Modified Black-Winged Kite Optimization Algorithm with Three-Phase Attacking Strategy and Lévy–Cauchy Migration Behavior to Solve Mathematical Problems" Biomimetics 10, no. 10: 707. https://doi.org/10.3390/biomimetics10100707

APA Style

Ma, Y., Meng, W., Gu, R., & Zhang, X. (2025). Modified Black-Winged Kite Optimization Algorithm with Three-Phase Attacking Strategy and Lévy–Cauchy Migration Behavior to Solve Mathematical Problems. Biomimetics, 10(10), 707. https://doi.org/10.3390/biomimetics10100707

Article Metrics

Back to TopTop