Abstract

At the level of enterprise supply chain security management, with the rise of network technology big data technology methods such as the Internet of Things (IoT) and cloud computing, it has had a multi-level impact on its supply chain management mode, including operation mode, operation mode, and security management mode. The traditional supply chain management model is based on old-fashioned communication methods and manual intervention for judgment and processing. Information and communication technology has advantages such as immediacy and strong correlation. Based on this, this article applies the data interconnection technology of the Internet of Things to the construction of supply chain management models and combines it with efficient algorithms of cloud computing. This article also explores the construction of supply chain security management models from the perspectives of participants, activity modes, module operations, and conducts data comparisons based on them. The experimental results show that in the running tests of the model, its average accuracy is about 89.60%, and the prediction accuracy of benefits is as high as 98.48%. In stability testing, it is also evident that the average stability of the model after multiple iterations is about 96.02%. Research has shown that the Internet of Things and cloud computing technology have great application potential in the construction of supply chain security management, which can provide enterprises with more effective supply chain security management tools.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.