Study on supply chain strategy based on cost income model and multi-access edge computing under the background of the Internet of Things
暂无分享,去创建一个
Lu Sun | Zhengkai Liu | Wenqi Sun | Yuanjun Zhao | Yuanjun Zhao | Lu Sun | Wenqi Sun | Zhengkai Liu
[1] Rongbo Zhu,et al. Dynamic Spectrum Access Algorithm Based on Game Theory in Cognitive Radio Networks , 2015, Mob. Networks Appl..
[2] Amos Beimel,et al. Secret-Sharing Schemes for Very Dense Graphs , 2014, Journal of Cryptology.
[3] Maria Zrikem,et al. Variable neighborhood decomposition search for the optimization of power plant cable layout , 2002, J. Intell. Manuf..
[4] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[5] Seyyed Ali Seyyedsalehi,et al. Video-based face recognition and image synthesis from rotating head frames using nonlinear manifold learning by neural networks , 2015, Neural Computing and Applications.
[6] Kent A Weigel,et al. Applied animal genomics: results from the field. , 2014, Annual review of animal biosciences.
[7] BottaAlessio,et al. Integration of Cloud computing and Internet of Things , 2016 .
[8] Partha Pratim Roy,et al. Age and gender classification using brain–computer interface , 2019, Neural Computing and Applications.
[9] J. Wolfert,et al. Virtualization of food supply chains with the internet of things , 2016 .
[10] Sébastien Lefèvre,et al. A comparative study on multivariate mathematical morphology , 2007, Pattern Recognit..
[11] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[12] Jordi Mongay Batalla,et al. Deployment of smart home management system at the edge: mechanisms and protocols , 2018, Neural Computing and Applications.
[13] Antonio Pescapè,et al. On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[14] Mohamed Elhoseny,et al. EoT-driven hybrid ambient assisted living framework with naïve Bayes–firefly algorithm , 2019, Neural Computing and Applications.
[15] Leilani Battle,et al. Building the Internet of Things Using RFID: The RFID Ecosystem Experience , 2009, IEEE Internet Computing.
[16] Jiujun Cheng,et al. TRec: an efficient recommendation system for hunting passengers with deep neural networks , 2018, Neural Computing and Applications.
[17] Carlos Eduardo Pereira,et al. Integration Architecture of Intelligent Maintenance Systems and Spare Parts Supply Chain Planning , 2014 .
[18] Xinping Yan,et al. An Evidential Reasoning‐Based CREAM to Human Reliability Analysis in Maritime Accident Process , 2017, Risk analysis : an official publication of the Society for Risk Analysis.
[19] Eric Ballot,et al. Mitigating supply chain disruptions through interconnected logistics services in the Physical Internet , 2017, Int. J. Prod. Res..
[20] Shubo Liu,et al. A Differentially Private Unscented Kalman Filter for Streaming Data in IoT , 2018, IEEE Access.
[21] C. Guedes Soares,et al. Incorporating evidential reasoning and TOPSIS into group decision-making under uncertainty for handling ship without command , 2018, Ocean Engineering.
[22] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[23] Camille Couprie,et al. Combinatorial Continuous Maximal Flows , 2010, ArXiv.
[24] LenharthAndrew,et al. Making context-sensitive points-to analysis with heap cloning practical for the real world , 2007 .
[25] Manoj Kumar Tiwari,et al. Information technology governance in Internet of Things supply chain networks , 2016, Ind. Manag. Data Syst..
[26] Camille Couprie,et al. Combinatorial Continuous Maximum Flow , 2010, SIAM J. Imaging Sci..
[27] M. Ben-Daya,et al. Internet of things and supply chain management: a literature review , 2019, Int. J. Prod. Res..
[28] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[29] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[30] Daniel E. O'Leary,et al. A supply chain of things: The EAGLET ontology for highly visible supply chains , 2014, Decis. Support Syst..
[31] Marija Bogataj,et al. Mitigating risks of perishable products in the cyber-physical systems based on the extended MRP model , 2017 .
[32] Katerina Pramatari,et al. Deploying RFID-Enabled Services in the Retail Supply Chain: Lessons Learned toward the Internet of Things , 2012, Inf. Syst. Manag..
[33] Vikram S. Adve,et al. Making context-sensitive points-to analysis with heap cloning practical for the real world , 2007, PLDI '07.
[34] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[35] Bhavani M. Thuraisingham,et al. Secure query-processing strategies , 1989, Computer.
[36] Lu Liu,et al. A Special Section in IEEE Access: Cooperative and Intelligent Sensing , 2017, IEEE Access.
[37] J.G.A.J. van der Vorst,et al. Virtualisation of floricultural supply chains , 2013 .
[38] Yung Po Tsang,et al. An intelligent model for assuring food quality in managing a multi-temperature food distribution centre , 2018, Food Control.
[39] B Palcic,et al. Effects of fixation method on image cytometric measurement of DNA content and distribution in cells stained for fluorescence with propidium iodide. , 1994, The journal of histochemistry and cytochemistry : official journal of the Histochemistry Society.
[40] I. Furno,et al. Methods for Characterising Microphysical Processes in Plasmas , 2013, 1306.5303.
[41] George Mastorakis,et al. Efficient Next Generation Emergency Communications over Multi-Access Edge Computing , 2017, IEEE Communications Magazine.