Professional Documents
Culture Documents
Received April 13, 2021, accepted April 29, 2021, date of publication May 10, 2021, date of current version May 18, 2021.
Digital Object Identifier 10.1109/ACCESS.2021.3078536
ABSTRACT In the context of epidemic prevention and control, food safety monitoring, data analysis and
food safety traceability have become more important. At the same time, the most important reason for food
safety issues is incomplete, opaque, and asymmetric information. The most fundamental way to solve these
problems is to do a good job of traceability, and establish a reasonable and reliable food safety traceability
system. The traceability system is currently an important means to ensure food quality and safety and
solve the crisis of trust between consumers and the market. Research on food safety traceability systems
based on big data, artificial intelligence and the Internet of Things provides ideas and methods to solve the
problems of low credibility and difficult data storage in the application of traditional traceability systems.
Therefore, this research takes rice as an example and proposes a food safety traceability system based on
RFID two-dimensional code technology and big data storage technology in the Internet of Things. This
article applies RFID technology to the entire system by analyzing the requirements of the system, designing
the system database and database tables, encoding the two-dimensional code and generating the design for
information entry. Using RFID radio frequency technology and the data storage function in big data to obtain
information in the food production process. Finally, the whole process of food production information can
be traced through the design of dynamic query platform and mobile terminal. In this research, the food safety
traceability system based on big data and the Internet of Things guarantees the integrity, reliability and safety
of traceability information from a technical level. This is an effective solution for enhancing the credibility
of traceability information, ensuring the integrity of information, and optimizing the data storage structure.
INDEX TERMS Two-dimensional code technology, Internet of Things, big data, artificial intelligence, food
safety traceability system.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 9, 2021 70571
M. Zheng et al.: Construct Food Safety Traceability System for People’s Health
Especially for cold chain food imported from overseas, every production and circulation, the construction of a food quality
food should be monitored and traced to prevent the spread and safety traceability system must receive strong support and
of COVID-19 virus and protect the health and safety of mutual cooperation from upstream and downstream related
the population. Therefore, the establishment of a safe and companies. Using the Internet of Things technology to build
reliable food safety traceability management system is an a food safety traceability system will greatly reduce the diffi-
urgent requirement of the society and the people, and it is also culty of collaboration. In this context, information technology
an effective way to fundamentally solve the post-epidemic is used to carry out food safety traceability in the context of
era and protect the health of the population. The food safety post-epidemic situations, and IoT and big data technologies
traceability management system is based on automatic identi- are applied to the food safety traceability management system
fication and information technology to integrate information in the post-epidemic era [4]. Ensuring food safety in the
in the entire chain of food production, processing, storage, whole process of food production, inventory, distribution and
transportation and sales. A comprehensive service manage- sales has become a hot research issue in the field of food
ment platform that is presented to users and consumers in safety for people’s health.
real time through the Internet, terminals, phone calls, and Therefore, this research proposed a food safety traceabil-
text messages. At the same time, the food safety traceabil- ity system based on RFID technology and big data storage
ity system involves food planting (breeding) purchase links, technology in the Internet of Things. The use of the Internet
enterprise processing (packaging) links, storage and logis- of Things and big data technology has realized the data
tics links, and sales links [1], [2]. Through the information collection of various food data. The use of RFID technology
traceability mechanism, the responsible body of each link to realize automatic recording of relevant parameters avoids
of food production and circulation can be clarified, so as to the contamination of food product traceability information
more effectively control the safety and reliability of breeding caused by manual data input. At the same time, a set of small
(planting), processing, and transportation, and indeed prevent food industry data search engine was designed and imple-
various food safety risks, and protect the people’s safety and mented by using big data analysis technology. The traditional
health. traceability system is integrated with the Internet of Things
The development of automatic information generation and big data technology to realize the traceability of the entire
equipment represented by sensors and intelligent terminal agricultural production process of agricultural and sideline
recognition has enabled rapid development of technologies products such as planting, processing, testing, warehousing,
such as perception, measurement and monitoring based on the transportation, and sales. This ensured that the source of
Internet of Things (IoT), artificial intelligence and big data agricultural and sideline products can be traced, flow can
technology. The Internet of Things and big data technology be traced, information can be inquired, and responsibilities
are profoundly changing people’s production and life, and can be held accountable to protect people’s health and food
their significance has gone beyond the scope of communi- safety. The food safety traceability system constructed in this
cation technology [3]. The Internet of Things is the use of research has a perceivable realization process, traceability
information technologies such as the Internet and sensors to of the source, and early warning of risks. This is of great
connect people and things together, so that things can be significance for improving the management level of China’s
interconnected, forming a new network of intelligent sharing food quality and safety, preventing food safety accidents,
of information. Artificial intelligence has the huge advantage maintaining the balance of supply and demand, and ensuring
of simplifying the process of using data, and it could play a people’s health and safety.
huge role in areas such as food safety. Big data technology
is a data processing and application model based on cloud
computing and distributed computing. It can realize accurate II. ANALYSIS OF THE KEY TECHNOLOGIES AND
prediction or analysis through the integration and sharing of ADVANTAGES OF THE INTERNET OF THINGS AND BIG
data and the application of reasonable mathematical algo- DATA IN THE FOOD SAFETY TRACEABILITY SYSTEM
rithms. In food traceability, the successful application of A. THE KEY TECHNOLOGIES USED BY THE INTERNET OF
big data needs to be combined with technologies such as THINGS AND BIG DATA IN THE FOOD SAFETY
automatic identification and network communication, these TRACEABILITY SYSTEM
five main links play a role through data capture, data storage, The technology of the Internet of Things mainly relies on
data processing, data mining, and data knowledge display. communication and perception technology, which can be
Big data realizes the aggregation and virtual management of widely used in modern production and life. The Internet of
data, optimizes the allocation of information resources, which Things can be regarded as a product of the organic combina-
is conducive to the realization of cross-regional and cross- tion of sensor networks, the Internet, and mobile networks.
domain supervision that is difficult to break through in real It can be divided into a perception layer, a network layer,
management. In recent years, big data has been widely used in and an application layer, with sensor network technology as
the agricultural industry and has become an important force in the core. The successful application of big data needs to be
promoting the transformation of traditional agriculture. At the combined with technologies such as automatic identification
same time, since food quality is closely related to all links of and network communication. It plays a role through five main
FIGURE 1. The principle of RFID radio frequency technology (A) and scrapy crawler architecture
diagram(B).
links: data capture, data storage, data processing, data mining, low-cost two-way wireless communication technology [7].
and data knowledge display [5]. Combined with the analysis It is mainly used for data transmission between various elec-
of the requirements and characteristics of the food safety tronic devices with short distances, low power consumption
traceability system, the following technologies can be used and low transmission rates.
in the Internet of Things and big data technologies [6].
3) PYTHON PROGRAMMING LANGUAGE
1) INDIVIDUAL AUTOMATIC IDENTIFICATION TECHNOLOGY In the process of using the Python language, func-
The automatic identification technology of food labeling uses tions or other information are written into the .py file and
computers and related software and hardware to encode, iden- compiled into bytecode by the Python interpreter. Finally,
tify, collect, input and output individual food labels that need it is handed over to the Python virtual machine for execution.
to be traced. These processes are all carried out automatically. Usually, the compiled bytecode file is in the format of .pyc.
The radio frequency identification (RFID) in the individual In addition, Python can be directly interactively operated on
identification technology is a technology that can remotely mainstream operating systems such as Linux, windows and
identify a target object without direct contact and collect MAC, making development and debugging easier.
relevant information. Combined with an effective database
system and network system, the tracking and information 4) SCRAPY CRAWLER FRAMEWORK
sharing of items on a global scale can be realized. The prin- Scrapy is an open sources Internet crawler framework based
ciple is shown in Figure 1A. 2-Dimensional barcode technol- on the Python language. It has the characteristics of com-
ogy is one of the automatic identification technologies for plete functions, low development difficulty, and extremely
individuals. Using the concept of ‘‘0’’ and ‘‘1’’ bit streams strong expandability. Scrapy uses the Twisted network asyn-
that constitute the internal logic of the computer, it can be chronous framework to process network requests. The overall
automatically read through image input electronic equip- working architecture is shown in Figure 1B. The main work-
ment or through photoelectric scanning equipment to realize flow of Scrapy is that Spider assigns the first page to be visited
automatic processing of information, thereby achieving one- to the engine, and the engine is processed by the scheduler for
to-one tracking and Traceability. sorting; The engine obtains a page link from the scheduler,
encapsulates it as a Request and sends it to the downloader
2) SENSORS AND WIRELESS DATA TRANSMISSION for download; The downloader encapsulates the web content
Sensors belong to the nerve endings of the Internet of Things, processing into a Response and sends it to the crawler for
and become the core components for humans to fully per- processing; The crawler parses the Response, encapsulates
ceive nature. The large-scale deployment and application of the first data processing into an Item, and obtains several
various sensors is an indispensable basic condition for the links that need to be visited in the next step. Item is handed
Internet of Things. The wireless data transmission selected over to the Pipeline for one-step processing, and the link is
in this research is mainly through ZigBee technology, which handed over to the engine for processing; Entity data is circu-
is a short-distance, low-complexity, low-power, low-rate, lated to the pipeline for further data cleaning and persistence
FIGURE 2. The combined advantages of the Internet of Things and big data technology in the food safety traceability system (A) and
the food safety data storage model constructed in this research.
operations [8]. Repeat the above steps until the page that is information where the data is located. This not only improves
still to be crawled is accessed. the operating efficiency of big data, but also guarantees the
security and credibility of the data.
B. ADVANTAGES OF THE COMBINED USE OF IOT AND BIG
DATA TECHNOLOGY IN THE FOOD SAFETY TRACEABILITY III. DATA COLLECTION AND PROCESSING OF FOOD
SYSTEM SAFETY TRACEABILITY UNDER THE BACKGROUND OF
In the development process of the food quality and safety BIG DATA AND THE INTERNET OF THINGS
traceability system, the integration of the Internet of Things In the food safety traceability system, multiple data forms
technology and big data technology can complement each such as numbers, images, and videos are involved. In order
other. Firstly, the use of big data technology and smart con- to extract effective information from it, it is necessary to use
tracts can better detect and locate malicious nodes; Secondly, various data mining tools and techniques to filter and analyze
the use of asymmetric encryption technology of big data large amounts of data according to specific individual needs,
technology can ensure the security of file data and reduce so as to realize the accuracy and personalization of data, and
the dependence of the Internet of Things on the central provide users with good data support [11]. There are three
structure. Finally, the centralized platform of the Internet of types of data exchange systems used in this study:
Things has low compatibility and weak anti-attack ability (1) Python social auth
during the device identity authentication process. Introducing A social account authentication/registration mechanism
big data technology and storing information such as digital that supports multiple development frameworks including
identities in a new block data structure can effectively protect Django, Flask, Webpy, etc. It provides authorization and
privacy, improve security, and reduce computing overhead. authentication support for more than 50 service providers,
Meanwhile, the increase in the amount of data and the com- such as Google, Twitter, Sina Weibo and other sites, and the
plexity of the structure require cloud servers for memory configuration is simple.
and storage. In turn, the parallel computing capabilities of (2) Django OAuth Toolkit
cloud computing also promote the efficient and intelligent It can help Django projects implement data and logic
processing of big data; Big data solves the security problems OAuth2 functions, and can be perfectly integrated with the
of information leakage and tampering, and provides basic Django REST framework.
support and reshaping trust mechanisms for the Internet of (3) Celery
Things, big data, cloud computing, etc. Therefore, the advan- It is used to manage asynchronous and distributed mes-
tages of the combined use of IoT and big data technology sage job queues and can be used in production systems to
in the food safety traceability system can be represented handle millions of tasks. django-celery is the best choice
by Figure 2A. Based on this, in this article, a food safety for executing asynchronous tasks or timing tasks in django
data storage model is constructed for the information safety web development. Its application scenarios include: Asyn-
management and traceability of food, as shown in Figure 2B chronous tasks: When the user triggers an action that takes
[9], [10]. By verifying the detailed data information on the a long time to complete, it can be given to celery as a task
food supply chain through smart contracts, it is finally stored for asynchronous execution, and then returned to the user
in a relational database together with the big data location after execution. This is similar to using Ajax to implement
asynchronous loading on the front end. Timed tasks. Celery B. DATA PROCESSING
can help us quickly set different tasks on different machines. After obtaining a large amount of food-related data, this
Other tasks that can be performed asynchronously. Such as research built a small search engine for food. It takes Python’s
sending SMS, email, push message, cleaning/setting cache, open sources website framework Django as the main body,
etc. and uses elastic search technology for data storage. It has
Therefore, this part relies on big data technology to the characteristics of clear classification, low article repe-
research an information search engine for food safety trace- tition rate, strong pertinence, and no advertisements [13].
ability. Through the design and development of a web crawler It can provide users with accurate and fast data acquisition
based on the scrapy framework of Python, it crawls the food- channels. Elastic search is a distributed database that allows
related information publicly released on the Internet, classi- multiple servers to operate at the same time, and each server
fies and archives it, and provides data support for the food can run multiple Elastic search instances. The structure of
health search engine. a small search engine website is shown in Figure 3B. The
first is the construction of the Model layer. According to the
A. DATABASE DESIGN format of data stored in elastic search, three Model classes
The database design of this research mainly involves histori- inherited from the Doc Type class in elastic search_ dsl are
cal information database, real-time monitoring database and established, namely commodity Model class, edible Model
web crawling database. The historical database is mainly used class and product Model class. Corresponding fields are
for historical data query and display, and it also provides data established according to the specific requirements of different
support for subsequent data analysis. Take the information types. The second is the construction of the View layer. In this
data in the rice planting process as an example, the detailed research, View is mainly responsible for the provision of
design situation is shown in Table 1. search suggestions and the keyword search after users click
TABLE 1. Design of query table for information data in the process of rice
the search and return to the result page. Using the Request.
planting. GET method to get the keyword entered by the user and the
category of the keyword. After a series of formatting, the key-
words are sent to elastic search according to different cate-
gories, and the returned json string is obtained, and the json
string is parsed and sorted, and returned to the original page
for display. Finally, the construction of the Template layer
[14]. This research only developed a small search engine,
The web crawling database is used to store various rice so the main page only has a search page and a result display
data information crawled from the Internet, mainly including page.
rice commodity information, rice edible information, and rice
product information. The various information stored in the C. DATA ANALYSIS PROCESS
early stage provides data protection for subsequent crawlers Machine learning (ML for short) is a branch of artificial
to crawl the website for classification. This research uses intelligence, which aims to feed various new rules and action
Scrapy for data crawling. Scrapy is an open sources web reference information to the system according to established
crawler framework with very practical designs such as auto- steps. This information can be automatically learned by the
matic deduplication and automatic suspension of access [12]. system to continuously accumulate experience and achieve
These designs make the developed web crawler more scalable ‘‘self-improvement’’. Artificial intelligence (AI) refers to the
and robust. The specific web crawler flowchart is shown ability of machines to continuously learn and apply flexibly
in Figure 3A. according to various scenarios in real life and real-time data.
Its goal is to independently perform certain specific and encrypted part, which is combined into an 18-bit traceabil-
interrelated tasks by imitating human behavior. In order to ity code. The body code requires 17 digits, which must be
achieve the desired purpose, AI can work collaboratively with variable and related to the product information. Therefore,
a variety of program integration, verification mechanisms, the clear code part before encryption is combined with the
and pattern recognition methods. As mentioned earlier, after commodity code, and the global trade item code and batch
a certain amount of data has been collected, this research code are combined to become the clear code to be encrypted.
designed an algorithm for the classification of various data Among them, the Rijndael algorithm is a block algorithm, and
of rice. Taking web crawling rice-related databases as an its encryption process is a set of reversible operations includ-
example, the specific algorithm is as follows: ing Sub Bytes, Shift Rows, Mix Columns, and AddRound-
(1) Obtaining the word segmentation classification result Key. The principle is as follows:
table, a total of three, namely the product word segmentation
result table H1, the eating method word segmentation table 02 03 02 01 F0.0 F0.1 F0.2 F0.3
H2, and the product information word segmentation table H3. 01 02 03 02 F1.0 F1.1 F1.2 F1.3
(2) Comparing the three words segmentation tables to find 03 01 01 03 F2.0 F2.1 F2.2 F2.3
0 0 0 0
the word segmentation data contained in the three words F0.0 F0.1 F0.2 F0.3
segmentation tables. These data were removed from the three 0
= F1.0 0
F1.1 0
F1.2 0
F1.3 (4)
words segmentation tables, and three relatively independent 0 0 0
F2.0 F2.1 F2.2 F2.3 0
TABLE 3. (Continued.) System test case analysis. food safety traceability technology can effectively improve
the effect of food safety management, which is conducive to
the development of epidemic prevention and control, and has
practical value for the solution of future food safety issues
in China as a whole. So as to better protect people’s life,
health and safety. The use of Internet of Things technology
to regulate food safety can effectively curb the emergence of
major food safety incidents. Moreover, the problem can be
diagnosed more real-time and accurately, and the source of
the hazard can be quickly identified, so that the quality of
the food is more guaranteed. This will have a huge impact
on the food supply chain. At the same time, under the intel-
ligent monitoring of big data, it is difficult for companies
in the food supply chain to tamper with the data, ensuring
the authenticity of the data. Combining big data, the Internet
of Things, the Internet and the food traceability system will
truly achieve openness, transparency, and completeness of
TABLE 4. Temperature control results.
information, and strictly control the various steps of the food
traceability system, so that the value of the food traceability
system can be truly realized. This research uses IoT technol-
ogy, wireless sensor technology, RFID technology, crawler
technology, database technology and other related technolo-
gies to design and implement a set of food traceability system
using rice as an example. It has initially completed the trace-
ability requirements for the entire process of food products,
and also provided network data information for food-related
industries. The implementation of traceability is not only a
TABLE 5. Humidity control results. practical need to ensure food safety, but also the main means
of current and future food safety measures. Through combing
and researching the existing food safety traceability system,
drawing on advanced domestic and foreign experience and
achievements, strategically, systematically and structurally,
establish a unified and standardized food safety traceability
standard system, and establish a food safety traceability sys-
tem for the government and enterprises Provide standardized
technical guidance, it also provides standard support for the
establishment of third-party certification, thereby improving
the level of food safety traceability and people’s health.
constructed by this research institute is equipped with temper-
ature and humidity sensors, which can realize the control of REFERENCES
environmental factors during the transportation and storage of [1] J. Wang, H. Yue, and Z. Zhou, ‘‘An improved traceability system for food
food. Detecting and tracing the changes of temperature and quality assurance and evaluation based on fuzzy classification and neural
humidity in the environment during the transportation and network,’’ Food Control, vol. 79, pp. 363–370, Sep. 2017.
storage of rice are of great significance to the protection of [2] Q. Lin, H. Wang, X. Pei, and J. Wang, ‘‘Food safety traceability system
based on blockchain and EPCIS,’’ IEEE Access, vol. 7, pp. 20698–20707,
food quality and people’s health. Take the change of envi- 2019.
ronmental temperature and humidity during the transporta- [3] G Alfian, M. Syafrudin, U. Farooq, M. R. Ma’arif, M. A. Syaekhoni,
tion and storage of rice as an example, briefly describe the N. L. Fitriyani, J. Lee, and J. Rhee, ‘‘Improving efficiency of RFID-
based traceability system for perishable food by utilizing IoT sen-
actual and theoretical values of environmental temperature sors and machine learning model,’’ Food Control, vol. 110, Apr. 2020,
and humidity monitoring in this system. The temperature Art. no. 107016.
and humidity adjustment and monitoring and the simulation [4] F. Liu, Y. Wang, Y. Jia, S. Hu, L. Tu, and C. Tang, ‘‘The egg traceability
system based on the video capture and wireless networking technology,’’
value, test value and relative error of each test node are within
Int. J. Sensor Netw., vol. 17, no. 4, pp. 211–216, Apr. 2015.
the error range. [5] X. Xiao, Z. Fu, L. Qi, T. Mira, and X. Zhang, ‘‘Development and evaluation
of an intelligent traceability system for frozen tilapia fillet processing,’’
J. Sci. Food Agricult., vol. 95, no. 13, pp. 2693–2703, Oct. 2015.
VI. CONCLUSION
[6] M. M. Aung and Y. S. Chang, ‘‘Traceability in a food supply chain:
In the context of epidemic prevention and control, strength- Safety and quality perspectives,’’ Food Control, vol. 39, pp. 172–184,
ening food safety data analysis based on the application of May 2014.
[7] E. Abad, F. Palacio, M. Nuin, A. G. D. Zárate, A. Juarros, J. M. Gómez, [30] J. Han, N. Lin, J. Ruan, X. Wang, W. Wei, and H. Lu, ‘‘A model for joint
and S. Marco, ‘‘RFID smart tag for traceability and cold chain monitoring planning of production and distribution of fresh produce in agricultural
of foods: Demonstration in an intercontinental fresh fish logistic chain,’’ Internet of Things,’’ IEEE Internet Things J., early access, Nov. 16, 2020,
J. Food Eng., vol. 93, no. 4, pp. 394–399, Aug. 2009. doi: 10.1109/JIOT.2020.3037729.
[8] T. Bosona and G. Gebresenbet, ‘‘Food traceability as an integral part [31] W. Wang, N. Kumar, J. Chen, Z. Gong, X. Kong, W. Wei, and H. Gao,
of logistics management in food and agricultural supply chain,’’ Food ‘‘Realizing the potential of Internet of Things for smart tourism with 5G
Control, vol. 33, no. 1, pp. 32–48, Sep. 2013. and AI,’’ IEEE Netw., vol. 34, no. 6, pp. 295–301, Nov./Dec. 2020.
[9] F. Tian, ‘‘A supply chain traceability system for food safety based on [32] S. Qi, Y. Lu, W. Wei, and X. Chen, ‘‘Efficient data access control with fine-
HACCP, blockchain & Internet of Things,’’ in Proc. Int. Conf. Service Syst. grained data protection in cloud-assisted IIoT,’’ IEEE Internet Things J.,
Service Manage., Jun. 2017, pp. 1–6. vol. 8, no. 4, pp. 2886–2899, Feb. 2021, doi: 10.1109/JIOT.2020.3020979.
[10] J. F. Galvez, J. C. Mejuto, and J. Simal-Gandara, ‘‘Future challenges on [33] S.-W. Chen, D. L. Chiang, C.-H. Liu, T.-S. Chen, F. Lai, H. Wang, and
the use of blockchain for food traceability analysis,’’ TrAC Trends Anal. W. Wei, ‘‘Confidentiality protection of digital health records in cloud
Chem., vol. 107, pp. 222–232, Oct. 2018. computing,’’ J. Med. Syst., vol. 40, no. 5, p. 124, May 2016.
[11] G. P. Danezis, A. S. Tsagkaris, F. Camin, V. Brusic, and C. A. Georgiou,
‘‘Food authentication: Techniques, trends & emerging approaches,’’ TrAC
Trends Anal. Chem., vol. 85, pp. 123–132, Dec. 2016.
[12] M. Thibaud, H. Chi, W. Zhou, and S. Piramuthu, ‘‘Internet of Things (IoT)
in high-risk environment, health and safety (EHS) industries: A compre-
hensive review,’’ Decis. Support Syst., vol. 108, pp. 79–95, Apr. 2018. MIAOMIAO ZHENG was born in Harbin, China,
[13] K. Salah, N. Nizamuddin, R. Jayaraman, and M. Omar, ‘‘Blockchain-based in 1982. She received the bachelor’s degree from
soybean traceability in agricultural supply chain,’’ IEEE Access, vol. 7, Qiqihar University, in 2005, and the master’s and
pp. 73295–73305, Aug. 2019. Ph.D. degrees from Northeast Forestry University,
[14] M. Lv, Y. Liu, J. Geng, X. Kou, Z. Xin, and D. Yang, ‘‘Engineering in 2009 and 2012, respectively. She has published a
nanomaterials-based biosensors for food safety detection,’’ Biosensors
total of two articles. Her research interests include
Bioelectron., vol. 106, pp. 122–128, May 2018.
microbiology and food safety.
[15] K. Behnke and M. Janssen, ‘‘Boundary conditions for traceability in food
supply chains using blockchain technology,’’ Int. J. Inf. Manage., vol. 52,
Jun. 2020, Art. no. 101969.
[16] R.-Y. Chen, ‘‘An intelligent value stream-based approach to collaboration
of food traceability cyber physical system by fog computing,’’ Food Con-
trol, vol. 71, pp. 124–136, Jan. 2017.
[17] H. Huang, L. Liu, and M. Ngadi, ‘‘Recent developments in hyperspectral
imaging for assessment of food quality and safety,’’ Sensors, vol. 14, no. 4,
pp. 7248–7276, Apr. 2014. SHANSHAN ZHANG was born in Southwest
[18] C. M. Galanakis, ‘‘The food systems in the era of the coronavirus (COVID- Guizhou, China, in 1999. She received the bach-
19) pandemic crisis,’’ Foods, vol. 9, no. 4, p. 523, Apr. 2020. elor’s degree from Harbin University, in 2021. Her
[19] X. Zhang, S. Lv, M. Xu, and W. Mu, ‘‘Applying evolutionary prototyping research interests include microbiology and devel-
model for eliciting system requirement of meat traceability at agribusiness opmental direction.
level,’’ Food Control, vol. 21, no. 11, pp. 1556–1562, Nov. 2010.
[20] Y. Dong, Z. Fu, S. Stankovski, S. Wang, and X. Li, ‘‘Nutritional quality and
safety traceability system for China’s leafy vegetable supply chain based on
fault tree analysis and QR code,’’ IEEE Access, vol. 8, pp. 161261–161275,
Feb. 2020.
[21] W. Liu, W. Cheng, and J. Zhang, ‘‘Study on the traceability system
establishment of safety-objective-oriented food logistics supply chain,’’
Advance J. Food Sci. Technol., vol. 5, no. 4, pp. 492–499, Apr. 2013.
[22] R.-Y. Chen, ‘‘Autonomous tracing system for backward design in food
supply chain,’’ Food Control, vol. 51, pp. 70–84, May 2015. YIDAN ZHANG was born in Southwest Guizhou,
[23] J. An-Qi, C. Xiu-Lian, L. I. Ming-Fu, and J. Zong-Yue, ‘‘Application of China, in 1999. She received the bachelor’s degree
traditional Chinese medicine (TCM) traceability system based on TCM from Harbin University, in 2021. Her research
quality characteristics and HACCP system,’’ China J. Chin. Materia Med-
interests include microbiology and developmental
ica, vol. 45, no. 21, pp. 5304–5308, Aug. 2020.
direction.
[24] M. Deng and P. Feng, ‘‘A food traceability system based on blockchain and
radio frequency identification technologies,’’ J. Comput. Commun., vol. 8,
no. 9, pp. 17–27, 2020.
[25] G. Zhao, X. Sun, and X. Y. Wang, ‘‘Research on the vegetable quality safety
traceability system based on Internet of Things and biosensor,’’ J. Food Saf.
Qual., vol. 6, no. 3, pp. 747–755, Dec. 2015.
[26] M. Castro-Puyana, R. Pérez-Míguez, L. Montero, and M. Herrero, ‘‘Appli-
cation of mass spectrometry-based metabolomics approaches for food
safety, quality and traceability,’’ TrAC Trends Anal. Chem., vol. 93,
pp. 102–118, Aug. 2017.
BAOZHONG HU was born in Harbin, China,
[27] T. Pizzuti, G. Mirabelli, G. Grasso, and G. Paldino, ‘‘MESCO (MEat
supply chain Ontology): An ontology for supporting traceability in the in 1962. He received the bachelor’s, master’s, and
meat supply chain,’’ Food Control, vol. 72, pp. 123–133, Feb. 2017. Ph.D. degrees from Northeast Agricultural Univer-
[28] M. C. Chen, S. Q. Lu, and Q. L. Liu, ‘‘Uniform regularity for a Keller– sity, in 1985, 1993, and 1996, respectively. He has
Segel–Navier–Stokes system,’’ Appl. Math. Lett., vol. 107, Sep. 2020, published a total of 20 articles. His research inter-
Art. no. 106476. ests include microbiology and food safety.
[29] W. Wei, M. Guizani, S. H. Ahmed, and C. Zhu, ‘‘Guest editorial: Special
section on integration of big data and artificial intelligence for Internet
of Things,’’ IEEE Trans. Ind. Informat., vol. 16, no. 4, pp. 2562–2565,
Apr. 2020.