Abstract
With the application of the Internet of Things, the cold-chain logistics efficiency of fresh agricultural product remarkably is improved, but the operating costs inevitably rise. Thus, the main bodies of circulation at various levels need to decide whether adopt the Internet of Things or not according to the cost–benefit situation. The significant boundary value closely related to the revenue decision of cold-chain logistics of fresh agricultural product was figured out by particularly analyzing the impact of the adoption of the Internet of Things on upstream and downstream wholesale prices, retail price, and order quantity decision based on the costs and revenues of the upstream and downstream of the supply chain before and after the adoption of the Internet of Things, and it was found that the overall profit boundary values of wholesaler, retailer, and supply chain are the same; the increment of retail price and retailers’ revenues is larger than that of wholesalers’ revenues, and the ascensional range of retail price is larger than that of wholesale price; the cost boundary value of order quantity in supply chain has little to do with the quality of agricultural products, but is affected by the time of circulation, and transportation and warehouse cost; the lower the cost of the Internet of Things is, the larger the impact on order quantity is. The correctness of the research results was proved by means of illustrative example. This paper provides a scientific basis for investment in the Internet of Things by enterprises engaged in cold-chain operation of fresh agricultural products.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Tsang YP, Choy KL, Wu CH, Ho GTS, Lam HY, Tang V (2018) An intelligent model for assuring food quality in managing a multi-temperature food distribution centre. Food Control 90:81–97
Bogataj D, Bogataj M, Hudoklin D (2017) Mitigating risks of perishable products in the cyber-physical systems based on the extended mrp model. Int J Prod Econ 193:51–62
Gunasekaran A, Subramanian N, Tiwari MK (2016) Information technology governance in internet of things supply chain networks. Ind Manag Data Syst 116(7):1–32
Bardaki C, Kourouthanassis P, Pramatari K (2012) Deploying RFID-enabled services in the retail supply chain: lessons learned toward the internet of things. J Inf Syst Manag 29(3):233–245
Silva TRD, Saalmann P, Cordes AK, Giacomolli A, Pereira CE, Hellingrath B (2014) Integration architecture of intelligent maintenance systems and spare parts supply chain planning. Procedia CIRP 25:192–198
Miorandi D, Sicari S, Pellegrini FD, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516
Verdouw CN, Beulens AJM, van der Vorst JGAJ (2013) Virtualisation of floricultural supply chains: a review from an internet of things perspective. Comput Electron Agric 99(6):160–175
Verdouw CN, Wolfert J, Beulens AJM, Rialland A (2016) Virtualization of food supply chains with the internet of things. J Food Eng 176(1):128–136
Bendaya M, Hassini E, Bahroun Z (2017) Internet of things and supply chain management: a literature review. Int J Prod Res 55(3):1–24
Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32
Geerts GL, O’Leary DE (2014) A supply chain of things: the eaglet ontology for highly visible supply chains. Decis Support Syst 63(3):3–22
Perera C, Zaslavsky A, Christen P, Georgakopoulos D (2014) Context aware computing for the internet of things: a survey. IEEE Commun Surv Tutor 16(1):414–454
Kortuem G, Kawsar F, Sundramoorthy V, Fitton D (2009) Smart objects as building blocks for the internet of things. IEEE Internet Comput 14(1):44–51
Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347–2376
Huang Z, Shan G, Cheng J, Sun J (2018) TRec: an efficient recommendation system for hunting passengers with deep neural networks. Neural Comput Appl. https://doi.org/10.1007/s00521-018-3728-2
Kaur B, Singh D, Roy PP (2018) Age and gender classification using brain–computer interface. Neural Comput Appl. https://doi.org/10.1007/s00521-018-3397-1
Hamedani K, Seyyedsalehi SA, Ahamdi R (2016) Video-based face recognition and image synthesis from rotating head frames using nonlinear manifold learning by neural networks. Neural Comput Appl 27(6):1761–1769
Batalla JM, Gonciarz F (2018) Deployment of smart home management system at the edge: mechanisms and protocols. Neural Comput Appl. https://doi.org/10.1007/s00521-018-3545-7
Hassan MK, Desouky AIE, Badawy MM, Sarhan AM, Elhoseny M, Gunasekaran M (2018) EoT-driven hybrid ambient assisted living framework with naïve Bayes–firefly algorithm. Neural Comput Appl. https://doi.org/10.1007/s00521-018-3533-y
Markakis EK, Politis I, Lykourgiotis A, Rebahi Y, Mastorakis G, Mavromoustakis CX et al (2017) Efficient next generation emergency communications over multi-access edge computing. IEEE Commun Mag 55(11):92–97
Welbourne E, Battle L, Cole G, Gould K, Rector K, Raymer S et al (2009) Building the internet of things using RFID: the RFID ecosystem experience. IEEE Internet Comput 13(3):48–55
Couprie C, Grady L, Talbot H, Najman L (2011) Combinatorial continuous maximal flows. SIAM J Imaging Sci 4(3):905–930
Wit TDD (2013) Methods for characterising microphysical processes in plasmas. Space Sci Rev 178(2–4):665–693
Beimel A, Farràs O, Mintz Y (2016) Secret-sharing schemes for very dense graphs. J Cryptol 29(2):336–362
Lattner C, Lenharth A, Adve V (2007) Making context-sensitive points-to analysis with heap cloning practical for the real world. ACM SIGPLAN Not 42(6):278–289
Poulin NM, Matthews JB, Skov KA, Palcic B (1994) Effects of fixation method on image cytometric measurement of dna content and distribution in cells stained for fluorescence with propidium iodide. J Histochem Cytochem 42(8):1149–1156
Keefe TF, Thuraisingham MB, Tsai WT (2015) Secure query-processing strategies. Computer 22(3):63–70
Aptoula E, Lefèvre S (2007) A comparative study on multivariate mathematical morphology. Pattern Recogn 40(11):2914–2929
Weber RH (2010) Internet of things—new security and privacy challenges. Comput Law Secur Rev Int J Technol Pract 26(1):23–30
Van Eenennaam AL, Weigel KA, Young AE, Cleveland MA, Dekkers JC (2014) Applied animal genomics: results from the field. Annu Rev Anim Biosci 2(2):105–139
Costa MC, Monclar FR, Zrikem M (2002) Variable neighborhood decomposition search for the optimization of power plant cable layout. J Intell Manuf 13(5):353–365
Botta A, Donato WD, Persico V (2016) Integration of cloud computing and internet of things. Future Gener Comput Syst 56(C):684–700
Wang J, Zhu R, Liu S (2018) A differentially private unscented Kalman filter for streaming data in IoT. IEEE Access 6:6487–6495
Zhu R, Ma M, Liu L, Mao S (2017) Cooperative and intelligent sensing: a special section in iEEE Access. IEEE Access 5:27824–27826
Liu X, Zhu R, Jalaian B, Sun Y (2015) Dynamic spectrum access algorithm based on game theory in cognitive radio networks. ACM MONET 20(6):817–827
Wu B, Yan X, Wang Y, Guedes Soares C (2017) An evidential reasoning-based CREAM to human reliability analysis in maritime accident process. Risk Anal 37(10):1936–1957
Wu B, Zong L, Yan X, Guedes Soares C (2018) Incorporating evidential reasoning and TOPSIS into group decision-making under uncertainty for handling ship without command. Ocean Eng 164:590–603
Acknowledgements
The authors thank Project supported by Fujian Provincial Social Science Research Base Major Project (Grant No. 2016JDZ037); Xiamen University of Technology high level talent project(Grant No. YSK16009R). Ministry of Education, Humanities and Social Sciences project ‘Research on the evolution of global value chain of digital creative industry based on complex system’.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work and there is no professional or other personal interest of any nature or kind in any product, service, and/or company that could be construed as influencing the position presented in, or the review of, the manuscript entitled.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sun, L., Zhao, Y., Sun, W. et al. Study on supply chain strategy based on cost income model and multi-access edge computing under the background of the Internet of Things. Neural Comput & Applic 32, 15357–15368 (2020). https://doi.org/10.1007/s00521-019-04125-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-019-04125-9