You are on page 1of 17

Discover Internet of Things

Research

Hunger games search optimization with deep learning model


for sustainable supply chain management
Zheng Xu1 · Deepak Kumar Jain2,3,4 · S. Neelakandan5 · Jemal Abawajy6

Received: 6 May 2023 / Accepted: 10 September 2023

© The Author(s) 2023  OPEN

Abstract
The supply chain network is one of the most important areas of focus in the majority of business circumstances. Block-
chain technology is a feasible choice for secure information sharing in a supply chain network. Despite the fact that
maintaining security at all levels of the blockchain is difficult, cryptographic methods are commonly used in existing
works. Effective supply chain management (SCM) offers various benefits to organizations, such as enhanced customer
satisfaction, increased operational efficiency, competitive advantage, and cost reduction. Potential SCM for agricultural
and food supply chains needs distributors, coordination and collaboration among farmers, retailers, and stakeholders.
The use of technology like Block Chain (BC), sensors, and data analytics, can boost traceability and visibility, decrease
waste, and ensure safety and quality throughout the supply chain. Therefore, this study develops a Hunger Games Search
Optimization with Deep Learning Model for Sustainable agricultural and food Supply Chain Management (HGSODL-
ASCM) technique. The fundamental goal of the HGSODL-ASCM technique is to improve decision-making processes for
agricultural and food commodity production and storage in order to optimise revenue. In the provided HGSODL-ASCM
technique, a bidirectional long short-term memory (Bi-LSTM) model is built to determine the amount of productivity
and storage required to maximise profit. In order to boost the performance of the Bi-LSTM classification process, the
HGSO algorithm has been utilized in this work. The presented HGSODL-ASCM technique can independently achieve the
SCM policies via interaction with complicated and adaptive environments. A brief set of simulations were performed to
ensure the improved performance of the HGSODL-ASCM technique. The simulation results demonstrated how superior
the HGSODL-ASCM method is to other methods already in use.

Keywords Supply chain management · Agricultural and food supply · Deep learning · Metaheuristics · Data analytics ·
Sustainability

1 Introduction

According to some, the supply chain is a form of network that is heavily utilised in industrial sectors to meet customer
expectations. Producers, distributors, retailers, customers, and traders all make up this framework. Similar to market-
ing channel management, supply chain management [1] is largely intended for the strategic management of storage

* Deepak Kumar Jain, dkj@ieee.org | 1School of Computer and Information Engineering, Institute for Artificial Intelligence, Shanghai
Polytechnic University, Shanghai 201209, China. 2Key Laboratory of Intelligent Control and Optimization for Industrial Equipment
of Ministry of Education, Dalian University of Technology, Dalian 116024, China. 3School of Artificial Intelligence, Dalian, China. 4Symbiosis
Institute of Technology, Symbiosis International University, Pune, India. 5Department of Computer Science and Engineering, R.M.K
Engineering College, Taluk, India. 6Deakin University, Geelong, Australia.

Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7

13
Vol.:(0123456789)
Research Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7

materials, components, and procurement in order to improve future profitable growth. The supply chain includes
both the intricate creation of goods and their delivery. Depending on the commodities, there are many stages,
locations, accounts, payment methods, people, organisations, and forms of transportation. The supply-purchasing
process as a result can take months [2]. The parties involved are particularly interested in integrating and developing
blockchain technology to improve supply chain logistical operations [3] and increase their profitability due to the
inherent complexity and lack of transparency in the logistics process. Although crypto-currencies are where block-
chain technology is most frequently used, it offers a considerably wider range of possible uses [4]. There are many
uses for the distributed book (ledger) known as blockchain [5].
This SCN is a collection of sequential actions needed by an institution in distributing and transforming raw com-
ponents and resources into an ultimate product and transporting it to the destined customer [6]. These days, the
current increase in the populace global wide and the growing demand for food and diet products, the agricultural
business has attained huge significance, particularly in emerging and under emerging nations [7]. Hence, under this
circumstance, Agricultural Food Supply Chain (AFSC) plays a crucial part in reducing issues related to food-safety.
The AFSC network consists of various shareholders participating in transporting ultimate products to the customer
end encompassing the agriculturalists or manufacturers [8], producers or food processors, suppliers, and vendors
at the same time adding a particular value to the ultimate products. In the view of logistics, the AFSC scheme can
be efficiently improvised by maximizing the site of food manufacturing amenities besides the delivery directions
by taking into account the atmospheric aspects in all transportation and supply stages [9]. Consequently, design-
ing an efficient logistic network for farming and diet items can tackle supply-associated problems and thus satisfy
interested consumers’ needs and hopes.
Constructing and deploying dispersed management, dynamic scheduling, and monitoring schemes of farming
actions for product rate anticipation and distribution chains need a crucial effective and safe approach [10]. Artificial
Intelligence (AI) is prevalently employed in mathematics and computer science in detailing the formation of ML to
the learning procedure, accomplishing transmissions founded on recognition, patterns of extraction, categorization,
improvising dynamic viewing and maximizing mechanisms [11]. Metaheuristics are one among the major preva-
lent approaches for organizing, managing, scheduling, and maximizing data, specifically the ones associated with
enterprises [12]. Metaheuristic prototypes were implemented to forecast and organize data/processed records from
records in single, greater business data and some transmission managements related to government institutions.
Metaheuristic methods are more convolutional and difference by nature, majorly relied on the range of info, par-
ticularly genetic protocols in the diet and farming fields [13], and goods price prediction, specifically farming goods
like rice. Hence, data handling and maximization are still challenging factors regarded in the metaheuristic-ML area
that is being manufactured in real-time [14].
Blockchains are regarded as suitable for application in the logistics and supply chain management sectors for a
number of reasons. Data created at each stage of a product’s life cycle can be recorded as a transaction as it moves up
the value chain and given a permanent historical record.The usage of blockchain, a decentralised, global ledger that
is digitally maintained, allows for the permanent storing of transactions. Due to its extensive offering of confidence,
openness, and provenance, it is relevant to applications involving transactions. Even non-financial sectors are starting
to pay attention to the technology, which was first created to facilitate financial transactions. Some of these sectors
include public services, manufacturing, healthcare, and retail. A number of challenges must be overcome before
blockchain in supply chain management (SCM) can offer a high level of security. Recently, many innovative optimisa-
tion techniques have been created to deal with this problem. The processing of a small number of transactions can
be done swiftly while maintaining a high level of security. As a result, it is currently challenging to reconcile security
and block size in SCM. Incorporating financial data into blockchain-based SCM could lead to less openness, more
expenses, and less effectiveness. In order to create a fresh and efficient SCM privacy framework based on blockchain
technology, the proposed work is being made.
This article designs a Hunger Games Search Optimization with Deep Learning Model for Sustainable agricultural
and food Supply Chain Management (HGSODL-ASCM) technique. A bidirectional long short-term memory model is
created using the HGSODL-ASCM technique to determine how much productivity and storage are needed to gener-
ate the most profit. In this work, the HGSO algorithm has been applied to improve the performance of the Bi-LSTM
classification process. The presented HGSODL-ASCM technique can independently achieve the SCM policies via
interaction with complicated and adaptive environments. A brief set of simulations were performed to ensure the
improved performance of the HGSODL-ASCM technique.

13
Vol:.(1234567890)
Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7 Research

2 Related works

Shokouhifar et al. [15], devised a technique termed H-WOA-VNS method (ensemble heuristic–metaheuristic approach
using the heuristic data, the WOA, and variable neighbourhood search). For generating a set of near-optimum feasible
solutions, a problem-dependent heuristic was projected. Such solutions are inputted in a population-based WAO, which
benefitted from exploitation and exploration strategies. Eventually, to enrich the quality of the solution by making use
of local search operator, a single-solution variable neighbourhood search is exploited. A method known as novel mixed
linear mathematical modelling for ASC was developed by Rajabi-Kafshgar et al. [16] to lower the overall variable and
fixed costs of the closed-loop supply chain. Renowned and effectual classical and current meta-heuristic techniques
were exploited for addressing the presented model. As well, three hybrid meta-heuristic techniques were advanced to
enrich diversification and intensification stages.
Singh and Srivastava [17] intend to overcome the practical and conceptual difficulties in incorporating triple bottom
line (TBL) sustainability in ASC. It scrutinizes their causal relations in addition to cross-dimensional interaction under
every TBL dimension and finds the key enablers for all 3D of TBL sustainability. Additionally, a decision support frame-
work (DSF) was developed to analyse and assess TBL sustainability practises and policies in ASC. Bhatia and Albarrak
[18] introduced a XAI-based Faster RCNN technique, also known as explainable AI -based faster region employing CNN,
to assess the components of food items using QR codes and an approachable web-based front-end model. A BC-based
elliptic curve integrated encrypted system (ECIES) was used to verify all communication tokens in the network. As well,
to register all users, a key artificial rabbit optimization (ARO) was utilized.
Chen et al. [19], devised a BC-related ASC structure to offer product traceability that guaranteed decentralization secu-
rity for agricultural and food tracing information in ASC. After, for effectual decision-making process on the storage and
production of agricultural and food products for profit maximization, a DRL related Supply Chain Management (DR-SCM)
technique was devised. Alkahtani et al. [20] this study has combined the BC effect by web design components into the
agricultural supply chain management (Agri-SCM). Also, partners in digital marketing SCM (DM-SCM) are met with the
problem of detecting web design components –oriented BC technology for obtaining high profits. By applying the fuzzy
system, the uncertainty in the technique is managed and to provide cleaner production, carbon emission is considered.
Sachdev looked into how supply chain management systems might be affected by AI and blockchain technologies
[21]. The purpose of this project was to apply AI and blockchain models to prevent supply chain disruptions. The block-
chain facilitates dependable communication across complex production networks while increasing logistical productiv-
ity, legitimacy, and anonymity. Furthermore, it might develop websites where trucking or shipping firms can list their
available ships or vehicles.
Salamai et al. [22]. Because tamper-proof smart contracts can be made using blockchain technology, a purchase
contract’s terms can be automatically enforced. Instead, smart contracts have the potential to independently validate
and execute themselves once the correct payments have been paid to the intended receivers. An AI-powered supply
chain optimisation solution raises the standard of intelligent assessments by including the optimum course of action
into demand estimates. As a result, producers will be able to anticipate how certain events will affect time, costs, and
income, which could increase the supply chain’s overall efficiency.
A description of BC technology and its potential for creating a safe and dependable agriculture SCM is provided
by Vidhate et al. [23]. To deliver food products from farmers to consumers, Agriculture SCM systems become vital. BC
technology is used to attain better payment options and prices, for transparent disbursement of subsidies and land title
registration to farmers. Gholian-Jouybari et al. [24], by modelling a stochastic multi-objective programming method
and food supply chain system under marketing practices is investigated to boost 3 main pillars of sustainability. The
potential of the presented mathematical method was certified by case study on saffron business by making use of the
LP-metric approach. To address the NP-hardness of the issues, a metaheuristic-oriented technique composed of a modi-
fied Keshtel Algorithm was applied.
Babaeinesami et al. [25]. This model responds to both the demand for finished goods as well as spare parts on the
market while simultaneously minimising transportation costs in forward and reverse chains, product purchase costs
in the assembly section, costs of renewing collected products, and fixed workplace costs. Suppliers, manufacturing
facilities, retail outlets, and customers make up the first player. Collecting sites, refurbishment sites, separation sites,
and disposal sites make up the second player. The reward for each actor is the minimization of their own aims, while the
model’s (information security’s) objective is for each link in the chain to be unaware of the objectives of the others. The

13
Vol.:(0123456789)
Research Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7

GAMS 24 programme was used to resolve the suggested model. Due to the nested model, the results of the first model
are inputted into the second model before the second model is solved.
Babaeinesami et al. [26] provides a mathematical methodology to reduce closed-loop supply chain costs and envi-
ronmental impacts. Suppliers bring raw timber from forests to industries. Factory-made wood is shipped to retailers.
Retailers ship to customers. Customers return items to recovery facilities. After processing, recovery centres ship to
industries. Innovations include adapting a genetic solution technique to match the suggested paradigm and developing
an environmentally friendly supply network for wood products. 3. Determining the raw materials and finished goods
that were sent and received from the flow of forest products. A closed-loop supply chain (CLSC) network, which includes
suppliers, assembly sites, retailers, customers, collection sites, refurbishment sites, disassembly sites, and disposal sites,
is the subject of [27]. It makes an effort to create a distribution network based on customer requirements in an effort to
reduce overall costs and CO2 emissions simultaneously. The self-adaptive non-dominated sorting genetic algorithm II
(NSGA-II) is developed and put to the test against the constraint technique in order to address the complexity of the issue.
Adav et al. [28] developed a model for a multi-tiered, sustainable system in the framework of Agriculture and Food
Supply Chains (AFSC) that depends on novel Internet of Things (IoT) technology. This study looks at how 14 major
components interact, assessing their causal links and implications within an IoT-centered framework for guaranteeing
food security. The study uses Interpretive Structural Modeling (ISM) to connect these components, as well as the Fuzzy-
Decision-Making Trial and Evaluation Laboratory (F-DEMATEL) to assess the strength of hierarchical cause-and-effect
associations. The work makes a theoretical contribution by drawing on Dynamic Capability Theory (DCT) and Information
Processing Theory (IPT). This approach gives useful insights for organizational managers engaged in strategy planning
by categorizing these aspects into cause and effect groups. Based on the findings of this study, this thorough guide has
the ability to motivate managers to integrate IoT technology into AFSC operations.
Dong et al. [29] pioneered cutting-edge Internet of Things (IoT) tracking technologies and conducted extensive sup-
ply chain management research. Their approach makes use of machine learning techniques applied to large datasets
secured by blockchain technology. This method not only ensures continued expansion, but also allows modern supply
chain management, powered by machine learning, to self-improve and stimulate ongoing progress. The incorporation
of blockchain technology tackles issues such as insufficient property rights protection, low trust in online transactions,
and poor safety and privacy standards. As a result, producers have the capacity to develop flawless production strate-
gies, properly estimate consumer demand, and orchestrate all aspects and linkages within the supply chain, resulting in
a cohesive operational framework and efficient oversight. This, in turn, leads to increased revenue.
Radanliev and De Roure [30] concentrated on the ethical design of IoT and updates to IoT design, but they neglected
to investigate the interrelated and diverse dangers emerging from IoT systems. Their findings emphasize the impor-
tance of adding ethical consideration of cyber threats into supply chains prior to using novel IoT technology. Notably,
including IoT into the vaccination supply chain significantly increases security vulnerabilities. The current study assists
healthcare practitioners, governments, and medical organizations by providing a comprehensive framework for informed
decision-making.

3 The proposed model

In this article, we have focused on the development of the HGSODL-ASCM technique for automated SCM in the agri-
cultural and food supply industries. The goal of the HGSODL-ASCM technique assists in the effectual decision-making
process associated to the production and storing of agricultural and food products to optimize profits. In the presented
HGSODL-ASCM technique, two stage process is performed namely Bi-LSTM based SCM and HGSO based hyperparameter
tuning. SCM is given top attention in corporate organisations since it places a strong emphasis on an industry’s effec-
tiveness. Blockchain technology is being used to connect supply chains because the network lacks adequate security.
However, there is still a lack of security and privacy protection. In order to safeguard SCM data, this article creates a novel
privacy preservation architecture based on blockchain technology. The proposed study’s primary objective is to develop
a lightweight, privacy-preserving SCM paradigm based on blockchain technology. The fundamental logistics information
collected from manufacturers is protected by this approach, which makes use of a cutting-edge optimisation technique.
The development of information and communication technology has made data sharing more practical. The effec-
tiveness of information flow in supply chains has increased thanks to the global framework for long-term coordination
and collaboration, enhancing the competitive advantages of businesses. Businesses’ inability to properly coordinate
their operations is hampered by a lack of information sharing. The primary objective of the suggested effort is to offer a

13
Vol:.(1234567890)
Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7 Research

small and blockchain-based SCM privacy-preserving paradigm. This solution uses a cutting-edge optimisation strategy
to safeguard the vital logistics data that was obtained from manufacturers. In order to secure the privacy of supply chain
networks, this study suggested creating an innovative blockchain-based architecture. In order to increase the security and
privacy of the proposed blockchain-assisted SCM, this study used cutting-edge “data sanitization and data restoration”
to protect the data in each block. The optimal key in this situation was chosen using the HGSO optimisation method.
In the literature now available, a variety of optimisation approaches are applied to complicated engineering prob-
lems. The HGSO-based optimisation technique is utilised in the proposed study for optimal key generation due to the
improved convergence rate and efficacy. Animal behaviour in response to hunger was used to develop the HGSO; this
meta-heuristics algorithm was inspired by animal social behaviour and activity-driven behaviour. The creation of a vari-
able weight using the concept of appetite. To increase the effectiveness of their search, the writers took into account the
consequences of famine at each stage. Figure 1 illustrates the overall process of HGSODL-ASCM approach.

3.1 Problem formulation

The goal of the ASC management challenge is to increase farmer revenue (product profits). Consider a streamlined
scenario in which there is a single processor (a corn factory) and numerous retailers on a finite number of occasions,
and corn is transported from the manufacturer to the store via distributors (trucks). All the time, the corn quantity must
be generated and kept at factory along with corn that shipped to retailer will be determined. A punishment occurred
until the requirement met if the retailer could not meet the requirement. For making the problems into reality, there is
a limitation on manufacturing ability and memory of the factory in addition limitation on storage capability of retailer.
In terms of this issue, the factory and retailer must be capable of powerfully reconstruct stock based on the corn
demand. Particularly, there is one factory, represented asv0, and multiple retailers, represented asL = {V1, V2, … , vn }.
Firstly, the overall turnover attained by selling corn at retailers can be represented as follows:

Fig. 1  Overall process of


HGSODL-ASCM approach

13
Vol.:(0123456789)
Research Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7


n
TO = p ⋅ di (1)
i=1

In Eq. (1), T indicates the number of time periods, p denotes unit price of corn, and di = Tt=1 di,t indicates retailers
corn demand. Especially, for the management of ASC, assumes 12 months. In the meanwhile, the use of frozen storage
and vacuum packs ensures that the maize will remain fresh for a full year. Therefore, in these circumstances, the corn’s
shelf life is disregarded. Due to the seasonal demand for corn at various retailers, Eq. (2) can be used to model the retailer
corn demand at any given period.
[ ( ) ]
dmax dmax (2i + t) ⋅ 𝜋
di,t = + ⋅ sin + stoi,t (2)
2 2 6

where dmax denotes the predetermined maximal demand at the retailer. stoi,t indicates the stochastic feature which is
allocated random value of zero or one at retailer on distinct time periods that was unutilised used for stimulating the
rapid rise in demand.
Cprod = cpr ⋅ a0 (3)

In Eq. (3), cpr and a0 denotes the unit price of generating corn and the productivity factory level, correspondingly.
Next, the transport corn cost can be determined as follows:
[ ]
∑n
ai
Ctrans = (ctr,i ⋅ ) (4)
i=1
t− capi

In Eq. (4), t− capi indicates the truck capability to the retailer. ai shows the transport volume to the retailers, and the
overall amount to each retailer must be lesser than factory stock. ctr,i denotes truck cost of transport corn to the retailers.
Furthermore, corn storage cost was determined as follows:

n
Cstore = (cst,i ⋅ si ) (5)
i=0

In Eq. (5), cst,i and si indicates corns the storage cost and the stock level of retailer or factory, correspondingly. In addi-
tion, the punishment cost takes place while the retailer could not see the corn demand that is shown below:

n
Cpunish = cpu ⋅ (di − si ) (6)
i=1

In Eq. (6) cpu denotes unit punishment cost. Thus, net profit of selling and producing corn in ASC is computed as follows:
Profits = TO − Cprod − Ctrans − Cstore − Cpunish (7)

3.2 Supply chain management using bi‑LSTM model

In this work, the Bi-LSTM model is derived to compute the quantity of productivity and storage to accomplish maximum
profit. The fundamental RNN cell is not holding long‐term dependence later [28, 29]. It therefore demonstrates the flaws
in this cell. If the order is excessively long, preventing the effective upgrading of weights, the backpropagation (BP) gradi-
ent tends to fall. Bi-LSTM’s architecture is depicted in Fig. 2. The weighted matrix may become unstable if the gradient,
however, spreads across a longer sequence if it is strong. Due to the intractable gradient nature, RNN cells are unable
to acknowledge or assume responsibility for a long-term connection, which leads to the two problems outlined above.
The mathematical equation for RNN structure is defined by Eqs. (8) and (9).
( )
ht−1 = 𝜎 Ph ∗ ht−1 + Px ∗ xt + Ba (8)

13
Vol:.(1234567890)
Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7 Research

Fig. 2  Structure of Bi-LSTM

( )
yt = tanh Po ∗ ht + Bo (9)

where as ht implies the hidden layer (HL), and it is only variety of memory from the RNN cell.Ph and Px exemplify the
weighted matrix for HL and Po bias vector for cell output correspondingly, xt and yt portray the input and output of cells
at t time step, respectively, Ba and Bo signify the bias vector for HL and cell outputs, correspondingly.
The subsequent HL was reliant on the inputs at hand right now and the HL from the prior time step. The current state
and the future state are connected through the cell feedback loop. To take into account past data while altering the cur-
rent state of the cell, this connection is crucial. In certain circumstances, the sigmoid function has been run, denoted by,
to switch on HL, and the Tanh-described hyperbolic tangent function has been triggered on the visible layer. The RNN
is a specific ANN method that works well for processing data sequences because it has a cyclic architecture. Large time
gaps cause the gradient to disappear and significantly lower learning potential. After these issues were fixed, Hochreiter
and Schmidhuber developed the LSTM. The fundamental idea behind the LSTM, which has been extensively applied
to time-series data, is that the cell state is connected to one another like a conveyor belt. As a result, as the distance
between the states increases, the gradient grows. In LSTM cells, the input, forget, and output gates are employed to
regulate the state of the cell.
The GRU was created in 2014 as a network that modified the LSTM approach to increase learning accuracy. The GRU
participates in two gating roles and has a quick learning rate compared to LSTM. The parameters are also less than LSTM
since the HL and cell state can be integrated into a single HL. As a consequence, the GRU performs very well for long-
term reliance on time-series data processing and progresses with a minimum of computation time after being coupled
to the LSTM. The GRU formula used to determine the HL is shown below:
( )
rt = 𝜎 Wr xt + Ur ht−1 + br (10)

( )
zt = 𝜎 Wz xt + Uz ht−1 + bz (11)

( ) ( ( ) )
ht = 1 − zt ⊙ ht−1 + zt ⊙ tanh Wh xt + Uh rt E ⊙ ht−1 + bh (12)

whereas, rt represents reset gate and zt denotes the updating gate at time t. xt stands for input value at t time, W and
U signify the weighted, and b signifies the bias. ht defines the HL at time t. ⊙ depicts the component‐wise (Hadamard)
multiplication. The LSTM can address RNN’s shortcomings; typically, the result of the current time is appropriate for the
state data of the previous and future times. By connecting two LSTMs, the Bi-LSTM network has been developed in an
effort to address the issue of merging previous and future data. The framework of the Bi-LSTM network includes the

13
Vol.:(0123456789)
Research Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7

front-to-back and back-to-forth LSTM layers. The output of the Bi-LSTM network is created by combining the architectures
of the forward and backward layers, which compute the input database:
ot = g(𝜔1 it + 𝜔2 0t−1 )

ot � = g(𝜔3 it + 𝜔5 0t−1 �), (13)

yt = f (𝜔4 0t + 𝜔6 0t

In Eq. (13), 𝜔 signifies the weight parameters in Bi-LSTM network, it illustrates input at t time , 0t stands for the outcome of
forward HL at t time , 0t ′ refers the resultant of backward HL at t time, and yt indicates the outcome of networks.

3.3 Hyperparameter tuning

For enhancing the performance of the Bi-LSTM classification process, the HGSO algorithm has been utilized in this work.
Yang et al. [30, 31] proposed a new optimizer called the HGSO optimization to mimic animals’ starvation‐driven behaviour
and activities. They have 2 social behaviours while finding food: at first, the animal behaves as a team. They formulated
the mathematical equation of HGS to perform this social manner, as follows:

⎧ Game1 ∶ Y → (t)(1 + randn(1))R1 < f , … … ..(i)


⎪ i
⃗b (t) → +D(t).��
Yi (t→ + 1) = ⎨ Game2 ∶ 𝜔(t).Y
��⃗ i
� 𝜔(t).�Y
⃗ b
i
(t) → −Yi⃗(t)�r1 > L, R2 > B(t), … … ..(ii) (14)
⎪ Game ∶ 𝜔(t).Y
��⃗ b
(t) → −Di (t).��𝜔(t).�Y
⃗ b
(t) → −Yi⃗(t)�r1 > L, R2 < B(t) … … ..(iii)
⎩ 3 i i

In Eq. (15), The 𝜔 ��⃗2 denotes the weighted of hungers for implementing the hunger‐driven signal.Y⃗ib (t) denotes
��⃗1 and 𝜔
the position of the better solution at the existing iteration (t), theY(t ) denotes the location of ith animal. The multiplication
ofYi⃗(t ) and (1 + randn(1)) of Eq. (15) denote the random method of hungry animal while finding the food at the existing
location. The |Y⃗b (t) → −Yi⃗(t)|) of Eq. (14) represent the activity range of the iih animal int . The weight (��𝜔⃗2 ) is multiplied in
i

that part (|Y⃗ib (t) − Yi⃗(t) for adjusting the range of activities. Henceforth, the animal could stop finding once it is complete.

Subtracting and adding the part of 𝜔.Y ��⃗ ib(t) in the 2nd and 3rd lines of Eq. (14) performs the present animal becomes
acquainted with its peers when approaching the food position and later continue to find food again at the existing posi-
tion. f denotes the constant value selected to be 0.03 depending on the actual article on HGS. R1 and R2 denotes random
value i ranges from zero to one. The D is a ranging controller; whose values within [−b, b]. The D is exploited for manag-
ing the range of activities. Thus, it can be reduced gradually to zero. randn(1) shows the random integer derived from a
uniform distribution. The decision making of Eq. (14) can be controlled by the parameter B that is evaluated as follows.
( )
Bi (t) = sech ||Funi (t) − G∗ (t)|| i ∈ 1, 2, 3, … , N (15)

In Eq. (15),G∗ indicates the optimum obtained objective function at t . Fuhi denotes the main function value of ith animal
at t. The sech (x) denotes the hyperbolic function that equals 1∕Cosh(x) and parameter N denotes the overall number of
animals [32].
The first line of the equation represents the application of a self-dependent strategy. Next, 2nd and 3rd lines are emu-
lation of the team cooperation work. The movement of the animal based on the 2nd and 3rd lines is mostly constrained
by 3 parameters: D, ��⃗ 𝜔
��⃗1, and 𝜔
��⃗2 . Yang et al. adapted those parameters by carrying out the subsequent equation.

• Tuning the ranging controller(D)


��⃗ : It is recommended the subsequent formula to perform the animal shrinking strategy
through iteration (t):
D∼i(t) = 2 × shrinki (t) × R3 − shrinki (t),

where,

13
Vol:.(1234567890)
Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7 Research

( )
t
shrinki (t) = 2 × 1 − (16)
MT

In Eq. (16), MT demonstrates the overall number of iterations, R3 indicate a random value within [0,1].

• Tuning the weights (��𝜔⃗1 ) and (��𝜔⃗2 ): it is applied the subsequent equation to increase the animals’ manner when finding the
food.
{
M
Hungryi (t). S × R4 R5 < f
��⃗1 (t) =
w − Hungry(t) (17)
1 R5 > f

��⃗2i (t) = (1 − exp(−|Hungryi (t) − S− Hungry(t) × R6 × 2


w (18)

where S− Hungry(t) represents the sum of hungry feelings of each animal at (t), R4 , R5, and R6 the random value, and
Hungry(t) denotes the ith hungry animal. The equation of Hungry (t) is modelled as follows:
{
0 Funi (t) == G∗ (t)
Hungryi (t) =
Hungry(t) + N− Hungryi (t) Funi (t) = G∗ (t) (19)

In Eq. (19), N− Hungryi (t) denotes the novel hungry animal that is regarded once the main function of ith animal isn’t
equivalent to the optimal‐obtained objective G∗. The corresponding novel hunger of animals is various. Thus, novel
hunger N− Hungry equation can be expressed as follows
{
C− H × (1 + R) K− H < C− H
N− Hungryi (t) =
K− Hi (t) K− H ≥ C− H.

Funi (t) − G∗ (t)


K− Hi (t) = × R7 × 2 × (High − Low)
W ∗ (t) − G∗ (t)

where W ∗ (t) denotes the worse value of fitness. High and Low represent the searching space upper and lower boundaries,
correspondingly. C_H indicates a constant value suggested to be 100.

4 Results and discussion

The study’s conclusions are presented in this section, along with a blockchain supply chain management concept based
on optimization approaches. Blockchains are cutting-edge technological advancements with the potential to alter how
people trade today. Blockchain technology is altering actual product safety by improving accountability. Living standards
will rise as a result of product traceability, which will also lower application system costs. Additionally, environmental
sustainability, social transformation, and environmental preservation have already been impacted by blockchain use. We
used the Kaggle Smart Supply Chain dataset to assess how well our solution performed. We took into account a number
of optimization approaches for this comparative study, including the particle swarm optimization (PSO), the artificial bee
colony (ABC), the grey wolf optimization (GWO), and the jellyfish optimization (JFO). Several metrics, including efficacy,
key sensitivity, correlation coefficient, and others, were used to validate the results of our investigation.
The experimental validation of the HGSODL-ASCM technique is investigated in detail. By implementing Hunger Games
search optimisation techniques, businesses can align their supply chain management policies with actionable strategies.
These techniques facilitate data-driven decision-making, permit organisations to optimise trade-offs, and enhance sup-
ply chain performance overall. Throughout the supply chain, they support the implementation of policies that promote
sustainability, cost reduction, risk management, operational efficiency, and compliance.

• Scenario1: A simple scenario with single retailer.


• Scenario2: A classic scenario with 3 retailers and similar settings.
• Scenario3: A difficult scenario with 3 retailers and distinct settings.

13
Vol.:(0123456789)
Research Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7

Table 1  Reward analysis of 10$^3$ RMB;Rewards (Profits)–Scenario 1


HGSODL-ASCM approach with
other systems on scenario1 Time period Heuristics Q-learning DR-SCM HGSODL-ASCM

0 52.79 − 8.77 − 5.57 − 3.97


500 51.99 3.23 8.82 26.41
1000 51.19 31.21 55.19 66.38
1500 53.59 49.60 62.39 75.98
2000 54.39 55.19 69.58 83.97
2500 51.19 58.39 71.18 86.37
3000 51.19 60.79 73.58 90.37
3500 51.19 63.99 75.98 91.17
4000 51.99 66.38 75.18 90.37
4500 52.79 66.38 77.58 92.77
5000 51.99 66.38 75.98 92.77
5500 51.19 67.18 76.78 90.37
6000 52.79 73.58 77.58 92.77
6500 51.99 70.38 78.38 92.77
7000 52.79 73.58 81.57 92.77
7500 51.99 72.78 79.98 96.76
8000 52.79 71.98 79.98 93.57
8500 51.19 73.58 81.57 92.77
9000 52.79 73.58 83.97 93.57
9500 52.79 71.18 80.78 95.17
10000 52.79 76.78 84.77 96.76

Fig. 3  Reward analysis of


HGSODL-ASCM approach on
scenario1

Table 1 and Fig. 3 examines the reward (profits) analysis of the HGSODL-ASCM technique under scenario 1 with existing
models [33]. The experimental outcomes indicate that the HGSODL-ASCM technique reaches increasing rewards over
other models. With 1000 time periods, the HGSODL-ASCM technique attains increasing rewards of 66.38 while the heu-
ristic, Q-learning, and DR-SCM models obtain decreasing rewards of 51.19, 31.21, and 55.19 correspondingly. Meanwhile,
with 5000 time periods, the HGSODL-ASCM technique attains increasing rewards of 92.77 while the heuristic, Q-learning,
and DR-SCM methods attain decreasing rewards of 51.99, 66.38, and 75.98 correspondingly. Moreover, with 10000 time
periods, the HGSODL-ASCM technique attains increasing rewards of 96.76 while the heuristic, Q-learning, and DR-SCM
methods obtain decreasing rewards of 52.79, 76.78, and 84.77 correspondingly.
Table 2 and Fig. 4 inspects the reward (profits) analysis of the HGSODL-ASCM method under scenario 2 with existing
methods. The experimental outcome indicates that the HGSODL-ASCM method obtains increasing rewards over other
models. With 1000 time periods, the HGSODL-ASCM method attains increasing rewards of 126.47 while the heuristic,
Q-learning, and DR-SCM methods attain decreasing rewards of 104.72, 72.09, and 102.00 correspondingly. Meanwhile,

13
Vol:.(1234567890)
Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7 Research

Table 2  Reward analysis of 10$^3$ RMB;Rewards (Profits)–Scenario 2


HGSODL-ASCM approach with
other systems on scenario2 Time period Heuristics Q-Learning DR-SCM HGSODL-ASCM

0 104.72 32.66 32.66 39.46


500 102.00 38.10 54.41 73.45
1000 104.72 72.09 102.00 126.47
1500 104.72 93.84 126.47 146.87
2000 104.72 126.47 135.99 164.54
2500 107.44 126.47 146.87 172.70
3000 106.08 135.99 156.38 168.62
3500 102.00 140.07 161.82 179.50
4000 102.00 138.71 176.78 187.66
4500 104.72 155.02 174.06 189.02
5000 103.36 150.95 174.06 190.38
5500 103.36 148.23 172.70 193.09
6000 103.36 152.31 174.06 194.45
6500 110.16 159.10 175.42 195.81
7000 104.72 153.67 176.78 189.02
7500 102.00 149.59 180.86 191.73
8000 102.00 156.38 180.86 194.45
8500 107.44 156.38 176.78 194.45
9000 102.00 156.38 171.34 195.81
9500 104.72 163.18 178.14 198.53
10000 108.80 160.46 175.42 195.81

Fig. 4  Reward analysis of


HGSODL-ASCM approach on
scenario2

with 5000 time periods, the HGSODL-ASCM technique attains increasing rewards of 190.38 while the heuristic, Q-learning,
and DR-SCM methods obtain decreasing rewards of 103.36, 150.95, and 174.06 correspondingly. Furthermore, with
10000 time periods, the HGSODL-ASCM technique attains increasing rewards of 195.81 while the heuristic, Q-learning,
and DR-SCM methods obtain decreasing rewards of 108.80, 160.46, and 175.42 correspondingly.
The reward (profits) analysis of the HGSODL-ASCM technique under scenario 3 is examined in Table 3 and Fig. 5 using
current models. The results of the experiments demonstrate that the HGSODL-ASCM approach outperforms other models
with increasing rewards. With 1000 time periods, the HGSODL-ASCM method attains increasing rewards of 126.10 while
the heuristic, Q-learning, and DR-SCM methods obtain decreasing rewards of 128.78, 81.80, and 105.96 respectively.
Meanwhile, with 5000 time periods, the HGSODL-ASCM method accomplishes increasing rewards of 190.54 while the
heuristic, Q-learning, and DR-SCM method attain decreasing rewards of 118.05, 148.92, and 171.74 correspondingly. Fur-
thermore, with 10000 time periods, the HGSODL-ASCM method attains increasing rewards of 195.91 while the heuristic,
Q-learning, and DR-SCM methods attain decreasing rewards of 119.39, 162.35, and 179.80 correspondingly.

13
Vol.:(0123456789)
Research Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7

Table 3  Reward analysis of 10$^3$ RMB;Rewards (Profits)–Scenario 3


HGSODL-ASCM approach with
other systems on scenario3 Time period Heuristics Q-learning DR-SCM HGSODL-ASCM

0 118.05 24.08 26.76 18.71


500 124.76 44.21 52.27 79.12
1000 128.78 81.80 105.96 126.10
1500 126.10 88.51 124.76 151.61
2000 119.39 107.31 135.50 165.03
2500 122.07 122.07 140.87 171.74
3000 120.73 132.81 148.92 174.43
3500 120.73 134.15 158.32 183.82
4000 119.39 136.84 166.37 182.48
4500 122.07 146.24 169.06 189.19
5000 118.05 148.92 171.74 190.54
5500 118.05 144.89 169.06 187.85
6000 118.05 151.61 173.08 191.88
6500 119.39 162.35 170.40 193.22
7000 119.39 156.98 177.11 199.93
7500 120.73 163.69 174.43 194.56
8000 120.73 163.69 173.08 194.56
8500 123.42 163.69 175.77 198.59
9000 118.05 155.63 174.43 199.93
9500 116.70 161.00 177.11 199.93
10,000 119.39 162.35 179.80 195.91

Fig. 5  Reward analysis of


HGSODL-ASCM approach on
scenario3

Table 4 and Fig. 6 represents the stock analysis of the HGSODL-ASCM technique with other existing techniques such
as heuristics, Q-learning, and DR-SCM. The presented HGSODL-ASCM technique is retain the stock of factory accessible
for the retailer in majority time periods, then the stock of retailer’s could endure positive. Due to the DR-SCM’s flexibility,
production and storage levels at factories and merchants might be modified to accommodate cyclically fluctuating
demand over a range of time periods. On the other hand, the current approaches frequently keep factory stock at a level
that reflects demand in retailers from a number of perspectives but do not function well once the demand increases.
Due to this issue, shops have negative inventories, which suggests that demand cannot be satisfied, resulting in declin-
ing profitability. The outcomes demonstrated the benefits of the HGSODL-ASCM technique in managing the difficult
problems of ASC management in dynamic environment.
Finally, the average training time (ATT) examination of the HGSODL-ASCM technique with recent models in Table 5
and Fig. 7. The experimental values inferred that the HGSODL-ASCM technique accomplishes reduced ATT of 0.20s/
episode whereas the DR-SCM, Q-learning, and heuristic techniques attain increasing ATT of 0.43s, 0.68s, and 1.15s for

13
Vol:.(1234567890)
Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7 Research

Table 4  Stock analysis of Time periods Heuristics model


HGSODL-ASCM approach with
other systems under varying Stock (Ton)
time periods
Factory Retailer1 Retailer2 Retailer3

1 55.24 24.20 13.53 2.24


2 58.69 24.20 12.28 1.30
3 52.74 21.37 11.97 1.93
4 51.79 16.04 11.34 2.24
5 56.50 12.91 11.02 3.81
6 66.53 7.57 11.34 4.75
7 72.81 3.50 9.14 5.07
8 58.69 1.30 6.01 6.63
9 49.29 − 3.72 2.56 4.12
10 44.58 − 8.11 − 3.09 − 1.21
11 53.05 − 9.05 − 3.40 − 1.83
12 49.91 − 6.22 − 4.03 − 7.79
Time periods Q-Learning
Stock (Ton)
Factory Retailer1 Retailer2 Retailer3
1 40.50 17.92 13.53 8.20
2 56.18 16.67 13.22 8.83
3 52.11 12.91 11.34 8.83
4 64.03 6.32 11.97 5.69
5 45.84 2.24 11.34 7.26
6 62.77 0.36 8.83 5.69
7 49.29 1.93 6.95 1.93
8 43.64 3.18 5.69 1.62
9 53.99 2.87 4.12 − 0.89
10 66.22 4.75 2.24 − 0.89
11 48.66 7.57 3.18 − 3.40
12 54.62 10.40 4.44 − 6.85
Time periods DR-SCM
Stock (Ton)
Factory Retailer1 Retailer2 Retailer3
1 68.38 6.36 15.44 15.13
2 62.74 7.30 13.56 13.87
3 53.97 9.80 11.99 12.93
4 67.13 9.80 8.86 9.18
5 56.48 11.05 6.36 11.37
6 67.44 7.92 0.40 9.49
7 53.34 9.80 − 1.79 5.10
8 56.16 4.48 − 4.29 − 1.16
9 59.92 1.34 − 6.49 − 3.04
10 66.19 − 7.11 − 2.41 − 5.86
11 53.66 − 12.44 4.79 − 6.49
12 56.79 − 13.38 6.98 − 4.61
Time periods HGSODL-ASCM
Stock (Ton)
Factory Retailer1 Retailer2 Retailer3
1 33.60 24.23 17.10 9.60
2 47.48 26.48 18.98 12.60
3 58.35 23.48 24.60 14.10

13
Vol.:(0123456789)
Research Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7

Table 4  (continued) Time periods Heuristics model


Stock (Ton)
Factory Retailer1 Retailer2 Retailer3

4 53.10 20.10 24.98 17.10


5 64.73 19.35 16.73 19.73
6 67.36 16.73 13.35 20.85
7 63.98 14.85 11.10 22.35
8 48.98 14.10 10.35 18.23
9 30.98 14.10 14.48 15.23
10 18.60 9.97 16.73 7.72
11 10.35 6.60 7.72 1.72
12 12.60 1.72 − 0.53 2.10

Fig. 6  Stock analysis of HGSODL-ASCM approach with varying time periods

13
Vol:.(1234567890)
Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7 Research

Table 5  ATT analysis of Average training time (s/episode)


HGSODL-ASCM approach with
recent methods Methods Scenario—1 Scenario—2 Scenario—3

HGSODL-ASCM 0.20 1.95 3.19


DR-SCM 0.43 2.32 3.54
Q-Learning 0.68 2.80 3.91
Heuristics 1.15 3.07 3.99

Fig. 7  ATT analysis of


HGSODL-ASCM approach with
recent methods

every episodes. Meanwhile, under scenario2, the HGSODL-ASCM technique accomplishes reduced ATT of 1.95s/episode
whereas the DR-SCM, Q-learning, and heuristic methods attain increasing ATT of 2.32s, 2.80s, and 3.07s for every episodes.
Eventually, under scenario3, the HGSODL-ASCM method accomplishes reduced ATT of 3.19s/episode whereas the
DR-SCM, Q-learning, and heuristic techniques attain increasing ATT of 3.54s, 3.91s, and 3.99s for every episodes. These
results shown the enhanced performance of the HGSODL-ASCM technique.

5 Conclusion

In this article, we have focused on the development of the HGSODL-ASCM technique for automated SCM in the agricul-
tural and food supply industries. The goal of the HGSODL-ASCM technique assists in the effectual decision-making process
related to the production and storage of agricultural and food products to optimize profits. In the presented HGSODL-
ASCM technique, the Bi-LSTM model is derived to compute the quantity of productivity and storage to accomplish maxi-
mum profit. In order to boost the performance of the Bi-LSTM classification process, the HGSO algorithm has been utilized
in this work. The presented HGSODL-ASCM technique can independently achieve the SCM policies via interaction with
complicated and adaptive environments. A brief set of simulations were performed to ensure the improved performance
of the HGSODL-ASCM technique. The results of the simulation showed how effective the HGSODL-ASCM technique is
compared to other methods already in use. The suggested HGSODL-ASCM approach can be expanded in the future to
address issues with cold storage in the pharmaceutical sector. In terms of data collecting, storage, and querying capabili-
ties for product identification and monitoring, the proposed HGSODL-ASCM model has a considerable disadvantage.
This architecture uses a blockchain, which demands recording all blocks and transactions among network users, placing
storage capacity restrictions on this data. The accuracy, security, and privacy of tracking data must be protected, which
further reduces the effectiveness and traceability of supply chain management systems. It is suggested that in order to
resolve these issues and improve system resilience, central processing should be abandoned and each party should be
required to keep a local copy of the whole set of traceable data. The development of sturdy systems will be facilitated
by this method. Blockchain architecture places a premium on connecting data across remote data centres, therefore the
speed at which that data is shared limits the data’s availability. In other words, the delay makes it harder to communicate
the situation as it is. The simulation findings are noteworthy for their speedy convergence, even distribution, and high
efficacy and demonstrate the success of the offered approaches. The quality and reliability of the suggested procedures

13
Vol.:(0123456789)
Research Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7

were proven by comparison results with other well-known optimisation techniques. The current work can be improved
in the future by putting this technology into a real-time application.

Author contributions Zheng and Deepak wrote the main manuscript text. All authors reviewed the manuscript.

Funding Supported by the Open Project Program of Shanghai Innovation Center of Reverse Logistics and Supply Chain.

Declarations
Competing interests The authors declare no competing interests.

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adapta-
tion, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source,
provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article
are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in
the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will
need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://c​ reati​ vecom
​ mons.o
​ rg/l​ icens​ es/b
​ y/4.0
​ /.

References
1. Tukamuhabwa BR. Supply chain orientation and supply chain risk management capabilities: mechanisms for supply chain performance
of agro-food processing firms in Uganda. J Afr Bus. 2023. https://​doi.​org/​10.​1080/​15228​916.​2023.​21658​94.
2. Agarwal U, Rishiwal V, Tanwar S, Chaudhary R, Sharma G, Bokoro PN, Sharma R. Blockchain technology for secure supply chain manage-
ment: a comprehensive review. IEEE Access. 2022;10:85493–517.
3. Baryannis G, Validi S, Dani S, Antoniou G. Supply chain risk management and artificial intelligence: state of the art and future research
directions. Int J Prod Res. 2019;57:2179–202.
4. Chang SE, Chen Y. When blockchain meets supply chain: a systematic literature review on current development and potential applica-
tions. IEEE Access. 2020;8:62478–94.
5. Chennam KK, Aluvalu R, Shitharth S. An authentication model with high security for cloud database. In: Das SK, Samanta S, Dey N, Patel
BS, Hassanien AE, editors. Architectural wireless networks solutions and security issues. Singapore: Springer; 2021. p. 13–25.
6. Raza SA, Govindaluri SM, Bhutta MK. Research themes in machine learning applications in supply chain management using bibliometric
analysis tools. Benchmarking Int J. 2022;30(3):834–67.
7. Bhat SA, Huang NF, Sofi IB, Sultan M. Agriculture-food supply chain management based on blockchain and IoT: a narrative on enterprise
blockchain interoperability. Agriculture. 2021;12(1):40.
8. Shokouhifar M, Sohrabi M, Rabbani M, Molana M, Werner F. Designing a renewable and sustainable phosphorus fertilizer supply chain
network using an ensemble knowledge-based heuristic-metaheuristic algorithm. Basel: Preprints; 2022.
9. Abbasi B, Babaei T, Hosseinifard Z, Smith-Miles K, Dehghani M. Predicting solutions of large-scale optimization problems via machine
learning: a case study in blood supply chain management. Comput Oper Res. 2020;119:104941.
10. Ableeva AM, Salimova GA, Rafikova NT, Fazrahmanov II, Zalilova ZA, Lubova TN, Nigmatullina GR, Girfanova IN, Farrakhova FF, Hazieva
AM. Economic evaluation of the efficiency of supply chain management in agricultural production based on multidimensional research
methods. Int J Supply Chain Manag. 2019;8(1):328.
11. Iqbal R, Butt TA. Safe farming as a service of blockchain-based supply chain management for improved transparency. Clust Comput.
2020;23:2139–50.
12. Mursidah S, Djatna T, Fauzi AM. 2020. Supply chain sustainability assessment system based on supervised machine learning techniques:
The case for sugarcane agroindustry. In 2020 International Conference on Computer Science and Its Application in Agriculture (ICOSICA)
(pp. 1–7). IEEE.
13. Pallathadka H, Jawarneh M, Sammy F, Garchar V, Sanchez T, Naved M. 2022. A Review of Using Artificial Intelligence and Machine Learning
in Food and Agriculture Industry. In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineer-
ing (ICACITE) (pp. 2215–2218). IEEE.
14. Yadav S, Garg D, Luthra S. Analysing challenges for internet of things adoption in agriculture supply chain management. Int J Ind Syst
Eng. 2020;36(1):73–97.
15. Shokouhifar M, Sohrabi M, Rabbani M, Molana SMH, Werner F. Sustainable phosphorus fertilizer supply chain management to improve
crop yield and P use efficiency using an ensemble heuristic-metaheuristic optimization algorithm. Agronomy. 2023;13(2):565.
16. Rajabi-Kafshgar A, Gholian-Jouybari F, Seyedi I, Hajiaghaei-Keshteli M. Utilizing hybrid metaheuristic approach to design an agricultural
closed-loop supply chain network. Expert Syst Appl. 2023. https://​doi.​org/​10.​1016/j.​eswa.​2023.​119504.
17. Singh S, Srivastava SK. Decision support framework for integrating triple bottom line (TBL) sustainability in agriculture supply chain.
Sustain Account Manag Policy J. 2022;13(2):387–413.
18. Bhatia S, Albarrak AS. A blockchain-driven food supply chain management using QR Code and XAI-faster RCNN architecture. Sustain-
ability. 2023;15(3):2579.
19. Chen H, Chen Z, Lin F, Zhuang P. Effective management for blockchain-based agri-food supply chains using deep reinforcement learning.
IEeE Access. 2021;9:36008–18.

13
Vol:.(1234567890)
Discover Internet of Things (2023) 3:10 | https://doi.org/10.1007/s43926-023-00040-7 Research

20. Alkahtani M, Khalid QS, Jalees M, Omair M, Hussain G, Pruncu CI. E-agricultural supply chain management coupled with blockchain effect
and cooperative strategies. Sustainability. 2021;13(2):816.
21. Sachdev D. Enabling data democracy in supply chain using blockchain and iot. J Manag. 2019;6:66–83.
22. Salamai A, Hussain OK, Saberi M, Chang E, Hussain FK. Highlighting the importance of considering the impacts of both external and
internal risk factors on operational parameters to improve supply chain risk management. IEEE Access. 2019;7:49297–315.
23. Vidhate AV, Saraf CR, Wani MA, Waghmare SS, Edgar T. Applying blockchain security for agricultural supply chain management. In: Asso-
ciation Information Resources Management, editor. Research anthology on convergence of blockchain, internet of things, and security.
Pennsylvania: IGI Global; 2023.
24. Gholian-Jouybari F, Hashemi-Amiri O, Mosallanezhad B, Hajiaghaei-Keshteli M. Metaheuristic algorithms for a sustainable agri-food supply
chain considering marketing practices under uncertainty. Expert Syst Appl. 2023;213:118880.
25. Babaeinesami A, Tohidi H, Seyedaliakbar SM. A closed loop stackelberg game in multi-product supply chain considering information
security: a case study. Adv Produc Eng Manag. 2020;15(2):233–46.
26. Babaeinesami A, Ghasemi P, Chobar AP, Sasouli MR, Lajevardi M. A new wooden supply chain model for inventory management consider-
ing environmental pollution: a genetic algorithm. Found Comput Decis Sci. 2022;47(4):383–408.
27. Babaeinesami A, Tohidi H, Ghasemi P, et al. A closed-loop supply chain configuration considering environmental impacts: a self-adaptive
NSGA-II algorithm. Appl Intell. 2022;52:13478–96.
28. Yadav S, Luthra S, Garg D. Modelling Internet of things (IoT)-driven global sustainability in multi-tier agri-food supply chain under natural
epidemic outbreaks. Environ Sci Pollut Res. 2021;28:16633–54.
29. Dong Z, Liang W, Liang Y, Gao W, Lu Y. Blockchained supply chain management based on IoT tracking and machine learning. EURASIP J
Wirel Commun Netw. 2022;2022(1):1–19.
30. Radanliev P, De Roure D. Epistemological and bibliometric analysis of ethics and shared responsibility—health policy and IoT systems.
Sustainability. 2021;13(15):8355.
31. Challa SK, Kumar A, Semwal VB. A multibranch CNN-BiLSTM model for human activity recognition using wearable sensor data. Vis Comput.
2022;38(12):4095–109.
32. Yang Y, Chen H, Heidari AA, Gandomi AH. Hunger games search: visions, conception, implementation, deep analysis, perspectives, and
towards performance shifts. Expert Syst Appl. 2021;177:114864.
33. Sachin Upadhye K, Thangaraj D, Vijendra Babu N, Qureshi Arulkumar Kashif. Modeling of real time traffic flow monitoring system using
deep learning and unmanned aerial vehicles. J Mobil Multimed. 2023. https://​doi.​org/​10.​1305/​jmm15​50-​4646.​1926.

Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

13
Vol.:(0123456789)

You might also like