Study on supply chain strategy based on cost income model and multi-access edge computing under the background of the Internet of Things

With the application of the Internet of Things, the cold-chain logistics efficiency of fresh agricultural product remarkably is improved, but the operating costs inevitably rise. Thus, the main bodies of circulation at various levels need to decide whether adopt the Internet of Things or not according to the cost–benefit situation. The significant boundary value closely related to the revenue decision of cold-chain logistics of fresh agricultural product was figured out by particularly analyzing the impact of the adoption of the Internet of Things on upstream and downstream wholesale prices, retail price, and order quantity decision based on the costs and revenues of the upstream and downstream of the supply chain before and after the adoption of the Internet of Things, and it was found that the overall profit boundary values of wholesaler, retailer, and supply chain are the same; the increment of retail price and retailers’ revenues is larger than that of wholesalers’ revenues, and the ascensional range of retail price is larger than that of wholesale price; the cost boundary value of order quantity in supply chain has little to do with the quality of agricultural products, but is affected by the time of circulation, and transportation and warehouse cost; the lower the cost of the Internet of Things is, the larger the impact on order quantity is. The correctness of the research results was proved by means of illustrative example. This paper provides a scientific basis for investment in the Internet of Things by enterprises engaged in cold-chain operation of fresh agricultural products.

[1]  Rongbo Zhu,et al.  Dynamic Spectrum Access Algorithm Based on Game Theory in Cognitive Radio Networks , 2015, Mob. Networks Appl..

[2]  Amos Beimel,et al.  Secret-Sharing Schemes for Very Dense Graphs , 2014, Journal of Cryptology.

[3]  Maria Zrikem,et al.  Variable neighborhood decomposition search for the optimization of power plant cable layout , 2002, J. Intell. Manuf..

[4]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[5]  Seyyed Ali Seyyedsalehi,et al.  Video-based face recognition and image synthesis from rotating head frames using nonlinear manifold learning by neural networks , 2015, Neural Computing and Applications.

[6]  Kent A Weigel,et al.  Applied animal genomics: results from the field. , 2014, Annual review of animal biosciences.

[7]  BottaAlessio,et al.  Integration of Cloud computing and Internet of Things , 2016 .

[8]  Partha Pratim Roy,et al.  Age and gender classification using brain–computer interface , 2019, Neural Computing and Applications.

[9]  J. Wolfert,et al.  Virtualization of food supply chains with the internet of things , 2016 .

[10]  Sébastien Lefèvre,et al.  A comparative study on multivariate mathematical morphology , 2007, Pattern Recognit..

[11]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[12]  Jordi Mongay Batalla,et al.  Deployment of smart home management system at the edge: mechanisms and protocols , 2018, Neural Computing and Applications.

[13]  Antonio Pescapè,et al.  On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[14]  Mohamed Elhoseny,et al.  EoT-driven hybrid ambient assisted living framework with naïve Bayes–firefly algorithm , 2019, Neural Computing and Applications.

[15]  Leilani Battle,et al.  Building the Internet of Things Using RFID: The RFID Ecosystem Experience , 2009, IEEE Internet Computing.

[16]  Jiujun Cheng,et al.  TRec: an efficient recommendation system for hunting passengers with deep neural networks , 2018, Neural Computing and Applications.

[17]  Carlos Eduardo Pereira,et al.  Integration Architecture of Intelligent Maintenance Systems and Spare Parts Supply Chain Planning , 2014 .

[18]  Xinping Yan,et al.  An Evidential Reasoning‐Based CREAM to Human Reliability Analysis in Maritime Accident Process , 2017, Risk analysis : an official publication of the Society for Risk Analysis.

[19]  Eric Ballot,et al.  Mitigating supply chain disruptions through interconnected logistics services in the Physical Internet , 2017, Int. J. Prod. Res..

[20]  Shubo Liu,et al.  A Differentially Private Unscented Kalman Filter for Streaming Data in IoT , 2018, IEEE Access.

[21]  C. Guedes Soares,et al.  Incorporating evidential reasoning and TOPSIS into group decision-making under uncertainty for handling ship without command , 2018, Ocean Engineering.

[22]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[23]  Camille Couprie,et al.  Combinatorial Continuous Maximal Flows , 2010, ArXiv.

[24]  LenharthAndrew,et al.  Making context-sensitive points-to analysis with heap cloning practical for the real world , 2007 .

[25]  Manoj Kumar Tiwari,et al.  Information technology governance in Internet of Things supply chain networks , 2016, Ind. Manag. Data Syst..

[26]  Camille Couprie,et al.  Combinatorial Continuous Maximum Flow , 2010, SIAM J. Imaging Sci..

[27]  M. Ben-Daya,et al.  Internet of things and supply chain management: a literature review , 2019, Int. J. Prod. Res..

[28]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[29]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[30]  Daniel E. O'Leary,et al.  A supply chain of things: The EAGLET ontology for highly visible supply chains , 2014, Decis. Support Syst..

[31]  Marija Bogataj,et al.  Mitigating risks of perishable products in the cyber-physical systems based on the extended MRP model , 2017 .

[32]  Katerina Pramatari,et al.  Deploying RFID-Enabled Services in the Retail Supply Chain: Lessons Learned toward the Internet of Things , 2012, Inf. Syst. Manag..

[33]  Vikram S. Adve,et al.  Making context-sensitive points-to analysis with heap cloning practical for the real world , 2007, PLDI '07.

[34]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[35]  Bhavani M. Thuraisingham,et al.  Secure query-processing strategies , 1989, Computer.

[36]  Lu Liu,et al.  A Special Section in IEEE Access: Cooperative and Intelligent Sensing , 2017, IEEE Access.

[37]  J.G.A.J. van der Vorst,et al.  Virtualisation of floricultural supply chains , 2013 .

[38]  Yung Po Tsang,et al.  An intelligent model for assuring food quality in managing a multi-temperature food distribution centre , 2018, Food Control.

[39]  B Palcic,et al.  Effects of fixation method on image cytometric measurement of DNA content and distribution in cells stained for fluorescence with propidium iodide. , 1994, The journal of histochemistry and cytochemistry : official journal of the Histochemistry Society.

[40]  I. Furno,et al.  Methods for Characterising Microphysical Processes in Plasmas , 2013, 1306.5303.

[41]  George Mastorakis,et al.  Efficient Next Generation Emergency Communications over Multi-Access Edge Computing , 2017, IEEE Communications Magazine.