Intelligent Systems with Applications最新文献

筛选
英文 中文
Artificial neural networks applied to olive oil production and characterization: A systematic review 人工神经网络在橄榄油生产和表征中的应用:系统综述
Intelligent Systems with Applications Pub Date : 2025-05-07 DOI: 10.1016/j.iswa.2025.200525
Francesca Lonetti , Francesca Martelli , Giovanni Resta
{"title":"Artificial neural networks applied to olive oil production and characterization: A systematic review","authors":"Francesca Lonetti ,&nbsp;Francesca Martelli ,&nbsp;Giovanni Resta","doi":"10.1016/j.iswa.2025.200525","DOIUrl":"10.1016/j.iswa.2025.200525","url":null,"abstract":"<div><div>In recent years, the olive oil sector has experienced growth due to the health benefits associated with olive oil and its increasing demand in international markets. Artificial Neural Networks (ANNs) have emerged as powerful tools in various scientific domains, enhancing both the efficiency and the accuracy of analyses in the olive oil sector. This paper aims to comprehensively review the adoption of ANNs in the assessment of olive oil across production and post-production stages. To achieve this goal, we followed the well-known guidelines of Kitchenham (2004) for performing <em>systematic reviews</em>. This up-to-date review examines literature from the last seven years, analyzing 628 publications and finally selecting 79 primary studies. Through a systematic and comprehensive analysis, this review seeks to provide insights into the current state of research, identify gaps in knowledge, and offer recommendations for future directions in harnessing ANNs to optimize the production and post-production analyses of olive oil.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"26 ","pages":"Article 200525"},"PeriodicalIF":0.0,"publicationDate":"2025-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143935988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disruptive attacks on artificial neural networks: A systematic review of attack techniques, detection methods, and protection strategies 对人工神经网络的破坏性攻击:攻击技术、检测方法和保护策略的系统回顾
Intelligent Systems with Applications Pub Date : 2025-04-29 DOI: 10.1016/j.iswa.2025.200529
Ahmad Alobaid , Talal Bonny , Maher Alrahhal
{"title":"Disruptive attacks on artificial neural networks: A systematic review of attack techniques, detection methods, and protection strategies","authors":"Ahmad Alobaid ,&nbsp;Talal Bonny ,&nbsp;Maher Alrahhal","doi":"10.1016/j.iswa.2025.200529","DOIUrl":"10.1016/j.iswa.2025.200529","url":null,"abstract":"<div><div>This paper provides a systematic review of disruptive attacks on artificial neural networks (ANNs). As neural networks become increasingly integral to critical applications, their vulnerability to various forms of attack poses significant security challenges. This review categorizes and analyzes recent advancements in attack techniques, detection methods, and protection strategies for ANNs. It explores various attacks, including adversarial attacks, data poisoning, fault injections, membership inference, model inversion, timing, and watermarking attacks, examining their methodologies, limitations, impacts, and potential improvements. Key findings reveal that while detection and protection mechanisms such as adversarial training, noise injection, and hardware-based defenses have advanced significantly, many existing solutions remain vulnerable to adaptive attack strategies and scalability challenges. Additionally, fault injection attacks at the hardware level pose an emerging threat with limited countermeasures. The review identifies critical gaps in defense strategies, particularly in balancing robustness, computational efficiency, and real-world applicability. Future research should focus on scalable defense solutions to ensure effective deployment across diverse ANN architectures and critical applications, such as autonomous systems. Furthermore, integrating emerging technologies, including generative AI models and hybrid architectures, should be prioritized to better understand and mitigate their vulnerabilities.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"26 ","pages":"Article 200529"},"PeriodicalIF":0.0,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143931536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing CNN-based network intrusion detection through hyperparameter optimization 通过超参数优化增强基于cnn的网络入侵检测
Intelligent Systems with Applications Pub Date : 2025-04-28 DOI: 10.1016/j.iswa.2025.200528
Antanios Kaissar , Ali Bou Nassif , Bassel Soudan , MohammadNoor Injadat
{"title":"Enhancing CNN-based network intrusion detection through hyperparameter optimization","authors":"Antanios Kaissar ,&nbsp;Ali Bou Nassif ,&nbsp;Bassel Soudan ,&nbsp;MohammadNoor Injadat","doi":"10.1016/j.iswa.2025.200528","DOIUrl":"10.1016/j.iswa.2025.200528","url":null,"abstract":"<div><div>This research investigates the optimization of hyperparameters in Convolutional Neural Networks (CNNs) to enhance the performance of Network Intrusion Detection Systems (NIDS). Four distinct optimization techniques, including Grid Search (GS), Genetic Algorithm (GA), Particle Swarm Optimization (PSO), and Grey Wolf Optimization (GWO), are rigorously examined. Comprehensive experiments employ the UNSW-NB15 and CSE-CIC-IDS2018 datasets to determine the optimal hyperparameter configurations for each technique. Subsequently, detailed experiments evaluate the efficiency of the optimized models in detecting network attacks.</div><div>The findings consistently reveal that optimized CNN models outperform their non-optimized counterparts across all optimization techniques. Notably, GWO emerges as the top-performing technique, achieving remarkable detection performance on both datasets, with 97.08 % accuracy, 96.95 % precision, 97.21 % recall, and 97.08 % F1 score on the UNSW-NB15 dataset, and 96.37 % accuracy, 96.13 % precision, 96.59 % recall, and 96.36 % F1 score on the CSE-CIC-IDS2018 dataset. Furthermore, hyperparameter optimization significantly reduces training and testing times. The GWO-optimized model achieved a reduction of &gt;11 % in training time and 6.14 % in testing time on the UNSW-NB15 dataset. On the CSE-CIC-IDS2018 dataset, the GA-optimized model provided the best improvements, reducing training and testing times by 9.63 % and 8.61 %, respectively.</div><div>In comparison to existing CNN models trained on the same datasets, the GWO-optimized CNN model consistently excels in all performance metrics, without the need for complex hybrid Deep Learning models. These results underscore the value of systematic hyperparameter optimization in enhancing CNN-based NIDS, with GWO standing out as a compelling technique for achieving optimal model configurations.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"26 ","pages":"Article 200528"},"PeriodicalIF":0.0,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143931565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GIRCS: An effective evolutionary scheme to solve SBM-RCPSP scheduling problems for industrial production planning GIRCS:解决工业生产计划中SBM-RCPSP调度问题的有效进化方案
Intelligent Systems with Applications Pub Date : 2025-04-26 DOI: 10.1016/j.iswa.2025.200522
Loc Nguyen The , Huu Dang Quoc , Hao Nguyen Thi
{"title":"GIRCS: An effective evolutionary scheme to solve SBM-RCPSP scheduling problems for industrial production planning","authors":"Loc Nguyen The ,&nbsp;Huu Dang Quoc ,&nbsp;Hao Nguyen Thi","doi":"10.1016/j.iswa.2025.200522","DOIUrl":"10.1016/j.iswa.2025.200522","url":null,"abstract":"<div><div>Resource Constrained Project Scheduling Problem (RCPSP) is a fundamental scheduling problem that has attracted much attention from researchers for many years. Many variants of this problem have been modeled, and many different approaches have been proposed and published in journals. However, the classical mathematical models of RCPSP still have some limitations that make it not really suitable for application in practical projects. This paper introduces practical applications and classifications of the RCPSP problem. After describing some common extensions of the original RCPSP problem, we briefly introduce three approaches that have been used to solve those extensions, including exact, heuristic, and metaheuristic algorithms. We define a novel scheduling problem named SBM-RCPSP (Skill-Based Makespan-RCPSP) which overcomes the limitations of previous variants of the RCPSP problem. The Graham representation of the SBM-RCPSP problem is introduced, and then the problem is proven to be NP-Hard. To solve the SBM-RCPSP problem, we propose an evolutionary algorithm called GIRCS inspired by Cuckoo Search and improved to reduce the total project execution time. Experimental results on datasets have demonstrated that the proposed scheme finds more efficient schedules than previous solutions.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"26 ","pages":"Article 200522"},"PeriodicalIF":0.0,"publicationDate":"2025-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143894997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced AI techniques for root disease classification in dental X-rays using deep learning and metaheuristic approach 使用深度学习和元启发式方法在牙科x射线中进行牙根疾病分类的先进AI技术
Intelligent Systems with Applications Pub Date : 2025-04-25 DOI: 10.1016/j.iswa.2025.200526
Prem Enkvetchakul , Surajet Khonjun , Rapeepan Pitakaso , Thanatkij Srichok , Peerawat Luesak , Chutchai Kaewta , Sarayut Gonwirat , Chawis Boonmee , Matus Noowattana , Thitinon Srisuwandee
{"title":"Advanced AI techniques for root disease classification in dental X-rays using deep learning and metaheuristic approach","authors":"Prem Enkvetchakul ,&nbsp;Surajet Khonjun ,&nbsp;Rapeepan Pitakaso ,&nbsp;Thanatkij Srichok ,&nbsp;Peerawat Luesak ,&nbsp;Chutchai Kaewta ,&nbsp;Sarayut Gonwirat ,&nbsp;Chawis Boonmee ,&nbsp;Matus Noowattana ,&nbsp;Thitinon Srisuwandee","doi":"10.1016/j.iswa.2025.200526","DOIUrl":"10.1016/j.iswa.2025.200526","url":null,"abstract":"<div><div>Root dental diseases remain among the most diagnostically challenging conditions in oral healthcare, often leading to treatment delays and suboptimal outcomes. This study is motivated by the limitations of existing automated diagnostic systems, which tend to focus on superficial abnormalities and overlook complex root pathologies such as pulpal infections, periapical lesions, and progressive periodontitis. To bridge this critical gap, we propose an advanced AI-based classification model that integrates ensemble deep learning architectures with a hybrid metaheuristic optimization strategy-namely, the non-population-based Artificial Multiple Intelligence System (np-AMIS) for image augmentation and the population-based AMIS (pop-AMIS) for adaptive decision fusion. This dual-phase approach enhances feature diversity, classification robustness, and computational efficiency. The model was trained and validated on two proprietary datasets, TD-1 and TD-2, achieving classification accuracies of 98.87 % and 98.41 %, respectively. It was further implemented in a real-world application via the Automated Teeth Disease and Abnormality Classification System (A-TD-A-CS), demonstrating 98.95 % accuracy, a rapid response time of 1.5 s, and a System Usability Scale (SUS) score of 94.5 from dental professionals. The system's ability to accurately identify multiple root disease categories highlights its clinical viability and transformative potential. In addition to its current performance, this study lays the groundwork for future extensions to multi-center datasets and cross-modality diagnostics using cone-beam CT or intraoral scans, further advancing intelligent dental care.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"26 ","pages":"Article 200526"},"PeriodicalIF":0.0,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OPT-IQA: Automated camera parameters tuning framework with IQA-guided optimization OPT-IQA:自动相机参数调整框架与iqa指导的优化
Intelligent Systems with Applications Pub Date : 2025-04-24 DOI: 10.1016/j.iswa.2025.200520
Jan-Henner Roberg, Vladyslav Mosiichuk, Ricardo Silva, Luís Rosado
{"title":"OPT-IQA: Automated camera parameters tuning framework with IQA-guided optimization","authors":"Jan-Henner Roberg,&nbsp;Vladyslav Mosiichuk,&nbsp;Ricardo Silva,&nbsp;Luís Rosado","doi":"10.1016/j.iswa.2025.200520","DOIUrl":"10.1016/j.iswa.2025.200520","url":null,"abstract":"<div><div>In industrial visual inspection, computer vision-based AI systems play a pivotal role, with performances dependent on the quality of the acquired images and changes in environmental conditions. Modern cameras adapt to these varying environments by allowing the tuning of a wide range of camera parameters that significantly change the characteristics of the acquired images. While some parameters are already automatically adjusted in most cameras (e.g., exposure, focus, white balance), others are static and remain at their default values (e.g., brightness, contrast, color-saturation, sharpness). Adaptably adjusting these non-automatic (NAUTO) parameters significantly influences both image quality and the performance of automated visual inspection systems. This work introduces OPT-IQA, a novel framework to automate NAUTO parameter tuning. The proposed approach is based on an optimization process guided by Image Quality Assessment (IQA) metrics that measure human-understandable image quality characteristics, thus enhancing the interpretability of the parameters’ selection process. The framework is built modularly, including a Camera Abstraction Layer to ensure its camera-agnostic nature and a Region-of-Interest Selection Module to select the target region of the inspected object. It also facilitates the seamless integration of supplementary IQA metrics and optimization algorithms to support additional use cases. By using an IQA-guided optimization process based on a reference image, our results show that OPT-IQA alleviates the burden of manually adjusting NAUTO parameters in response to varying illumination conditions, whether caused by shifts in natural elements (e.g., weather) or human-induced changes (e.g., reconfiguration of assembly lines).</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"26 ","pages":"Article 200520"},"PeriodicalIF":0.0,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving speaker-independent visual language identification using deep neural networks with training batch augmentation 基于训练批增强的深度神经网络改进与说话人无关的视觉语言识别
Intelligent Systems with Applications Pub Date : 2025-04-22 DOI: 10.1016/j.iswa.2025.200517
Jacob L. Newman
{"title":"Improving speaker-independent visual language identification using deep neural networks with training batch augmentation","authors":"Jacob L. Newman","doi":"10.1016/j.iswa.2025.200517","DOIUrl":"10.1016/j.iswa.2025.200517","url":null,"abstract":"<div><div>Visual Language Identification (VLID) is concerned with using the appearance and movement of the mouth to determine the identity of spoken language. VLID has applications where conventional audio based approaches are ineffective due to acoustic noise, or where an audio signal is unavailable, such as remote surveillance. The main challenge associated with VLID is the speaker-dependency of image based visual recognition features, which bear little meaningful correspondence between speakers.</div><div>In this work, we examine a novel VLID task using video of 53 individuals reciting the Universal Declaration of Human Rights in their native languages of Arabic, English or Mandarin. We describe a speaker-independent, five fold cross validation experiment, where the task is to discriminate the language spoken in 10 s videos of the mouth. We use the YOLO object detection algorithm to track the mouth through time, and we employ an ensemble of 3D Convolutional and Recurrent Neural Networks for this classification task. We describe a novel approach to the construction of training batches, in which samples are duplicated, then reversed in time to form a <em>distractor</em> class. This method encourages the neural networks to learn the discriminative temporal features of language rather than the identity of individual speakers.</div><div>The maximum accuracy obtained across all three language experiments was 84.64%, demonstrating that the system can distinguish languages to a good degree, from just 10 s of visual speech. A 7.77% improvement on classification accuracy was obtained using our distractor class approach compared to normal batch selection. The use of ensemble classification consistently outperformed the results of individual networks, increasing accuracies by up to 7.27%. In a two language experiment intended to provide a comparison with our previous work, we observed an absolute improvement in classification accuracy of 3.6% (90.01% compared to 83.57%).</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"26 ","pages":"Article 200517"},"PeriodicalIF":0.0,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Meyer wavelet neural networks procedure for prediction, pantograph and delayed singular models Meyer小波神经网络程序预测,受电弓和延迟奇异模型
Intelligent Systems with Applications Pub Date : 2025-04-18 DOI: 10.1016/j.iswa.2024.200457
Zulqurnain Sabir , Hafiz Abdul Wahab , Mohamed R. Ali , Shahid Ahmad Bhat
{"title":"A Meyer wavelet neural networks procedure for prediction, pantograph and delayed singular models","authors":"Zulqurnain Sabir ,&nbsp;Hafiz Abdul Wahab ,&nbsp;Mohamed R. Ali ,&nbsp;Shahid Ahmad Bhat","doi":"10.1016/j.iswa.2024.200457","DOIUrl":"10.1016/j.iswa.2024.200457","url":null,"abstract":"<div><div>This work aims the numerical solutions of the nonlinear form of prediction, pantograph, and delayed differential singular models (NPPD-DSMs) by exploiting the Meyer wavelet neural networks (MWNNs). The optimization is accomplished using the local and global search paradigms of active-set approach (ASA) and genetic algorithm (GA), i.e., MWNNs-GA-ASA. An objective function is designed using the NPPD-MSMs and the corresponding boundary conditions, which is optimized through the GA-ASA paradigms. The obtained numerical outcomes of the NPPD-MSMs are compared with the true results to observe the correctness of the designed MWNNs-GA-ASA. The absolute error in good measures, i.e., negligible, for solving the NPPD-DSMs is plotted, which shows the stability and effectiveness of the MWNNs-GA-ASA. For the reliability of the procedure, the performances through different statistical operators have been presented for multiple trials to solve the NPPD-NSMs.</div><div>Mathematics Subject Classification. Primary 68T07; Secondary 03D15, 90C60.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"26 ","pages":"Article 200457"},"PeriodicalIF":0.0,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143855189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GAN-ViT-CMFD: A novel framework integrating generative adversarial networks and vision transformers for enhanced copy-move forgery detection and classification with spectral clustering GAN-ViT-CMFD:一个集成生成对抗网络和视觉转换器的新框架,用于增强复制-移动伪造检测和光谱聚类分类
Intelligent Systems with Applications Pub Date : 2025-04-17 DOI: 10.1016/j.iswa.2025.200524
Jyothsna Ravula, Nilu Singh
{"title":"GAN-ViT-CMFD: A novel framework integrating generative adversarial networks and vision transformers for enhanced copy-move forgery detection and classification with spectral clustering","authors":"Jyothsna Ravula,&nbsp;Nilu Singh","doi":"10.1016/j.iswa.2025.200524","DOIUrl":"10.1016/j.iswa.2025.200524","url":null,"abstract":"<div><div>Copy-move forgery detection (CMFD) is a critical task in digital forensics to ensure the authenticity of visual content, as the prevalence of advanced editing tools has made it increasingly easy to tamper with images. Such forgeries can have severe implications in fields like journalism, legal evidence, and cybersecurity. The motivation for adopting a hybrid Generative Adversarial Network (GAN)-Vision Transformer (ViT) approach arises from the need for robust models capable of handling the complexities of forgery patterns while ensuring high detection accuracy. This study proposes a hybrid framework, GAN-ViT-CMFD, integrating GANs and ViTs to address these challenges. GANs are employed to generate realistic forged images, creating an augmented dataset that enhances model robustness. ViTs extract powerful feature representations, leveraging their competence to capture long-range dependencies and intricate patterns in image data. Spectral clustering is then applied to the feature space to segregate forged and original image features, which are subsequently fed into a Convolutional Neural Network (CNN)-based classifier for forgery detection and classification.</div><div>The proposed model demonstrates superior performance, achieving a training accuracy of 99.62 % and a validation accuracy of 99.0 %, with training and validation losses of 0.0352 and 0.0269, respectively. Evaluation metrics further affirm its effectiveness, with an accuracy of 99.02 %, precision of 97.92 %, recall of 99.89 %, and F1-score of 98.95 %. Additionally, the model achieves an exceptional ROC-AUC score of 99.88 %. These outcomes emphasize the ability of the GAN-ViT method in CMFD, highlighting its potential impact in reinforcing the reliability of image authenticity verification across various domains.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"26 ","pages":"Article 200524"},"PeriodicalIF":0.0,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143869836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attention-enhanced LSTM for high-value customer behavior prediction: Insights from Thailand’s E-commerce sector 关注增强的LSTM用于高价值客户行为预测:来自泰国电子商务行业的见解
Intelligent Systems with Applications Pub Date : 2025-04-16 DOI: 10.1016/j.iswa.2025.200523
Rattapol Kasemrat, Tanpat Kraiwanit
{"title":"Attention-enhanced LSTM for high-value customer behavior prediction: Insights from Thailand’s E-commerce sector","authors":"Rattapol Kasemrat,&nbsp;Tanpat Kraiwanit","doi":"10.1016/j.iswa.2025.200523","DOIUrl":"10.1016/j.iswa.2025.200523","url":null,"abstract":"<div><div>The rapid growth of e-commerce in emerging markets like Thailand has presented businesses with both opportunities and challenges. One critical challenge lies in accurately identifying high-value customers amidst vast amounts of transactional data. Effective predictive models must not only deliver high accuracy but also provide transparency to guide actionable business decisions. Predicting high-value customers is particularly important in these markets due to evolving consumer behaviors and increasing competition.</div><div>This study introduces an attention-enhanced Long Short-Term Memory (LSTM) model to predict high-value customer behavior in Thailand's e-commerce sector, addressing the challenges of achieving high predictive accuracy while ensuring interpretability. The novelty of this research lies in integrating an attention mechanism within the LSTM framework, enabling the identification of key customer behaviors—such as total purchase amount, purchase frequency, and monthly purchase frequency—that significantly influence high-value customer classification. By leveraging transactional data from a leading Thai e-commerce platform, the model delivers outstanding predictive performance with accuracy rates of 99.75 % (training), 99.77 % (validation), and 99.83 % (testing), coupled with low error metrics (RMSE: 0.0391, MAE: 0.0039).</div><div>The attention mechanism enhances model transparency by identifying influential behavioral features, thereby enabling actionable insights that align with customer segmentation and targeted marketing strategies. Compared to traditional LSTM models, this approach demonstrates superior predictive power and interpretability, making it an effective tool for e-commerce platforms seeking to optimize customer retention and engagement strategies.</div><div>This study significantly contributes to advancing machine learning applications in e-commerce by showcasing how attention mechanisms can address the dual needs of predictive accuracy and transparency. The practical benefits of this model are particularly relevant for emerging markets like Thailand, where consumer behaviors and competitive dynamics are evolving rapidly. Future research should investigate the scalability of this approach across diverse datasets and markets, incorporating additional data sources such as demographic and social media information, to further enhance its applicability and robustness.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"26 ","pages":"Article 200523"},"PeriodicalIF":0.0,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143855190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信