The Application Prospects of Consumer Emotion Recognition Technology in Marketing Strategies

Journal: Modern Economics & Management Forum DOI: 10.32629/memf.v6i3.4002

Huanyu Liu

Johns Hopkins University, Baltimore, Maryland

Abstract

Consumer emotion recognition technology combines key technologies such as multimodal data fusion, incremental learning and edge computing, which provides a new optimization path for modern marketing strategies. In this paper, a simulation model of consumer behavior based on the Markov Decision Process is established, and the validity of this technology is verified by numerical simulation and field monitoring. Results show that emotion recognition accuracy increased to 89.7%, strategy response timeliness to 93.0%%, and consumer satisfaction and marketing conversion to 86.5% and 18.9%, respectively. The research proves that emotion recognition technology significantly improves the accuracy and effectiveness of marketing strategies and provides strong support for digital transformation of enterprises. Future development priorities include privacy protection and algorithm interpretability.

Keywords

consumer emotion recognition, multimodal fusion, incremental learning, edge computing

References

[1] Zhang, Zhiyao, et al. “Implementation and Application of Multimodal Emotion Recognition Technology in Bank Customer Service.” Financial Technology Times, vol. 30, no. 9, 2022, pp. 33-42.
[2] Liu, Yan, et al. “Multimodal Emotion Recognition Technology and Its Application in the Insurance Industry.” Insurance Theory and Practice, no. 8, 2022, pp. 68-84.
[3] Zhou, Jing, and Zhou, Lili. “Emotion Recognition and Emotional Analysis Based on Non-invasive Multimodal BCI.” Automation Technology and Application, vol. 43, no. 4, 2024, pp. 186-188.
[4] Qin, Tianpeng, et al. “Review of Brain Electrical Signal Emotion Recognition Research.” Computer Engineering and Applications, vol. 59, no. 15, 2023, pp. 38-54.
[5] Wang, Yihui. “Security Risk Analysis and Legal Regulation of Face Emotion Recognition Application.” Network Security, vol. 15, no. 2, 2024, pp. 41-44, 57.

Copyright © 2025 Huanyu Liu

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License