

Lyrebird Optimization for Bidirectional Gated Recurrent Unit-Based Risk Prediction in Supply Chain Management
Abstract
The interconnectivity and globalization of today's world have made supply chains more complex than ever. Production, delivery, and profitability are increasingly vulnerable to unforeseen disruptions. This study introduces a novel approach to proactive risk prediction in supply chains using deep learning techniques. Inspired by the Lyrebird Optimization Algorithm (LOA), our proposed method employs a Bidirectional Gated Recurrent Unit (BiGRU). BiGRUs excel at processing sequential data, such as supply chain metrics, due to their remarkable ability to capture temporal relationships within the data.
To enhance the learning process of BiGRUs from supply chain data, LOA—a bio-inspired algorithm—addresses hyper-parameter tuning. Initial data points collected include inventory levels, transportation records, supplier performance, and other external factors. We ensure the data is suitable for time-series analysis through cleaning techniques like imputation, normalization, and structuring. LOA fine-tunes the hyperparameters of the BiGRU, enabling it to better interpret the data and make accurate predictions about potential risks.
Proactively identifying these risks allows companies to strengthen their supply chain resilience by implementing appropriate mitigation strategies. By demonstrating the effectiveness of Lyrebird-optimized BiGRUs for proactive risk prediction, this study contributes to the field of supply chain risk management, ultimately fostering more resilient and adaptable supply networks.
References
R. R. Pansara, S. A. Vaddadi, R. Vallabhaneni, N. Alam, B. Y. Khosla and P. Whig, "Fortifying Data Integrity using Holistic Approach to Master Data Management and Cybersecurity Safeguarding," 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2024, pp. 1424-1428, doi: 10.23919/INDIACom61295.2024.10498671.
R. Vallabhaneni, N. H. S, H. P and S. S, "Protecting the Cybersecurity Network Using Lotus Effect Optimization Algorithm Based SDL Model," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-7, doi: 10.1109/ICDCOT61034.2024.10515812.
R. Vallabhaneni, N. H S, H. P and S. S, "Feature Selection Using COA with Modified Feedforward Neural Network for Prediction of Attacks in Cyber-Security," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/ICDCOT61034.2024.10516044.
S. E. V. S. Pillai, R. Vallabhaneni, P. K. Pareek and S. Dontu, "Strengthening Cybersecurity using a Hybrid Classification Model with SCO Optimization for Enhanced Network Intrusion Detection System," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-9, doi: 10.1109/ICDCOT61034.2024.10516247.
R. Vallabhaneni, N. H. S, H. P and S. S, "Team Work Optimizer Based Bidirectional LSTM Model for Designing a Secure Cybersecurity Model," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/ICDCOT61034.2024.10515495.
S. E. V. S. Pillai, R. Vallabhaneni, P. K. Pareek and S. Dontu, "The People Moods Analysing Using Tweets Data on Primary Things with the Help of Advanced Techniques," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/ICDCOT61034.2024.10516073.
S. E. V. Somanathan Pillai, R. Vallabhaneni, P. K. Pareek and S. Dontu, "Financial Fraudulent Detection using Vortex Search Algorithm based Efficient 1DCNN Classification," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/ICDCOT61034.2024.10515330.
Vallabhaneni, Rohith et al. Secured web application based on CapsuleNet and OWASP in the cloud. Indonesian Journal of Electrical Engineering and Computer Science, [S.l.], v. 35, n. 3, p. 1924-1932, sep. 2024. ISSN 2502-4760. doi:http://doi.org/10.11591/ijeecs.v35.i3.pp1924-1932.
Vallabhaneni, Rohith et al. Detection of cyberattacks using bidirectional generative adversarial network. Indonesian Journal of Electrical Engineering and Computer Science, [S.l.], v. 35, n. 3, p. 1653-1660, sep. 2024. ISSN 2502-4760. doi:http://doi.org/10.11591/ijeecs.v35.i3.pp1653-1660.
Vallabhaneni, Rohith et al. MobileNet based secured compliance through open web application security projects in cloud system. Indonesian Journal of Electrical Engineering and Computer Science, [S.l.], v. 35, n. 3, p. 1661-1669, sep. 2024. ISSN 2502-4760. doi:http://doi.org/10.11591/ijeecs.v35.i3.pp1661-1669.
Refbacks
- There are currently no refbacks.