0% found this document useful (0 votes)
20 views10 pages

Mathematical Problems in Engineering - 2022 - Liu - Analysis of Cross Border E Commerce Commodities in Internet of Things

This research article presents a Semantic Web-based traceability algorithm for cross-border e-commerce to combat issues of counterfeit goods and ensure product quality. The proposed system utilizes the Internet of Things for real-time product tracking and aims to enhance consumer trust by providing accurate product information. Simulation results indicate that the algorithm effectively identifies online goods with minimal network delay, meeting the real-time requirements of e-commerce.

Uploaded by

speriwal21024
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views10 pages

Mathematical Problems in Engineering - 2022 - Liu - Analysis of Cross Border E Commerce Commodities in Internet of Things

This research article presents a Semantic Web-based traceability algorithm for cross-border e-commerce to combat issues of counterfeit goods and ensure product quality. The proposed system utilizes the Internet of Things for real-time product tracking and aims to enhance consumer trust by providing accurate product information. Simulation results indicate that the algorithm effectively identifies online goods with minimal network delay, meeting the real-time requirements of e-commerce.

Uploaded by

speriwal21024
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Hindawi

Mathematical Problems in Engineering


Volume 2022, Article ID 2017827, 10 pages
https://doi.org/10.1155/2022/2017827

Research Article
Analysis of Cross-Border E-Commerce Commodities in Internet of
Things Based on Semantic Traceability Algorithm

Min Liu
Zhejiang Industry & Trade Vocational College, ZheJiang, WenZhou 325000, China

Correspondence should be addressed to Min Liu; [email protected]

Received 14 January 2022; Accepted 3 March 2022; Published 24 March 2022

Academic Editor: Gengxin Sun

Copyright © 2022 Min Liu. *is is an open access article distributed under the Creative Commons Attribution License, which
permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

With the advancement of economic globalization and the continuous development of “Internet +” economy, cross-border
e-commerce has become an important part of participating in international economic exchanges and developing foreign trade. As
the direct participation of consumers, cross-border online shopping has gradually become an important way for people to obtain
overseas commodities. *e phenomenon of fake products and parallel goods is serious in e-commerce online shopping. How to
use the existing Internet of *ings to achieve product traceability is an important research topic. For different modes of cross-
border online shopping, this paper combines the traceability algorithm with the idea of semantic routing, proposes a Semantic
Web-based traceability algorithm, and constructs a quality safety traceability system. In order for consumers to accurately know
the product quality of sellers, the product traceability model of cross-border e-commerce relying on Semantic Web is constructed
to prevent false information from recording product information from the product source. *rough the tracing query algorithm,
the simulation results show that the hop number of routes between nodes is 1, and the tracing algorithm can quickly determine the
identity of online goods. *e network delay is mostly distributed between 0 and 0.05 s, which meets the real-time requirements of
the Internet of *ings.

1. Introduction the resources of different countries have been optimized,


conducive to the realization of a win-win model. For cross-
Cross-border e-commerce is developed on the basis of border buyers, cross-border e-commerce provides them
e-commerce, which not only has all the characteristics of with a broader vision, and they can easily and quickly buy
e-commerce but also has the characteristics that e-com- their favourite goods on cross-border e-commerce plat-
merce does not have. Cross-border e-commerce is an online forms. *e virtual nature of the Internet has had a great
trade activity conducted by different countries or different impact on cross-border e-commerce, which is very different
tariff subjects through the media of the Internet and cross- from the traditional trade model. Trans-e-commerce has
border platforms. It is a new trade mode integrating services, characteristics that traditional trade does not have, such as
payment, logistics, and other businesses [1]. Cross-border paperless and intangibility, which have brought great impact
e-commerce has broken down the traditional trade barriers, to the current traditional trade [2]. In today’s open network
integrated the trade subjects of different countries, deepened environment, the authenticity of these information often
the globalization of trade, and affected the transformation of needs to rely on data traceability. Data traceability was only
the global economy. Cross-border e-commerce has the used in database and data warehouse system at the earliest
characteristics of e-commerce and cross-border trade at the and later developed to various fields with high requirements
same time, which is more complicated. *e rapid rise of on data authenticity, such as biology, history, archaeology,
cross-border e-commerce has brought more diversified astronomy, and medicine. With the rapid development of
business models for enterprises. *e international circula- the Internet and the frequent occurrence of network
tion of commodities has more diversified channels, so that cheating, people are more and more suspicious of the
2629, 2022, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2022/2017827, Wiley Online Library on [23/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
2 Mathematical Problems in Engineering

authenticity of data, the authenticity of data requirements influencing factors of cross-border e-commerce, Wang et al.
are more and more high. Data traceability has become an explained the reasons for the development of cross-border
effective way to study the authenticity of data, setting off a e-commerce. Due to its virtuality, cross-border e-commerce
wave of data traceability research upsurge, therefore, data will lead to serious information asymmetry of transaction
traceability tracing gradually expanded to all walks of life. At subjects [6]. Based on the semantic tracing algorithm,
present, the research fields have covered geographic infor- Bernstein et al. proposed the method of coordinated packet
mation system (GIS), cloud computing, grid computing, trace-back and constructed the whole path by using the
ubiquitous computing, wireless sensor networks, and se- broadcast characteristics to exchange information between
mantic networks. Among them, data traceability is the most forwarding nodes and listening nodes [7]. Qian et al. pro-
popular research field in database and workflow. Applica- posed the method of contact-based traceback in wireless
tions driven by traceability data will integrate and fuse some sensor networks, which enabled each node to construct a
data. If the traceability information of these original data is path to connect to a contact through the contact list and
not recorded, the authenticity and validity of the fused data eventually traced back to the data source node [8]. Wang
will be reduced. *e online market is flooded with a large et al. can quickly construct the trunk part of the path
number of fake goods and parallel goods, which to a certain composed of cluster head nodes by using hierarchical
extent reduces the credibility of online retail enterprises [3] marking method and reconstruct the detailed path within
and brings losses to consumers. *erefore, how to trace each cluster. *ey proposed the algorithm of probabilistic
online goods efficiently and quickly to determine whether marking traceability and stored the encrypted node infor-
they are genuine or not is an urgent challenge we are facing mation through nesting [9]. *ese traceability algorithms
at present. have their own advantages and disadvantages, but they are
Internet of things is the computer, Internet, and mobile not suitable for the traceability of e-commerce products.
communication network after the fourth technological At the top of the Semantic Web technology stack, the
revolution, the world’s information industry to all kinds of logic, validation, and trust layers have not been standardized
information sensing devices combined with Internet and and are also the focus of current Semantic Web research. *e
form a huge network, implement physical interconnection, logic layer provides inference rules and axiomatic con-
in real time for object identification, location, tracking and straints, the verification layer verifies inference results, and
monitoring purposes, comply with the requirements of the the trust layer is the guarantee to evaluate the reliability and
traceability system. Due to the virtual network nature of security of the output of Semantic Web. Traceability pro-
cross-border e-commerce, consumers are unable to know vides metadata information for the creation and processing
the specific location and product quality of sellers, which of semantic M resources, which is an important means to
easily leads to sellers selling inferior goods, causing harm to solve trust. Credibility is usually a subjective judgment,
consumers’ health and productivity [4]. Cross-border which needs to be derived based on context, while trace-
e-commerce all have independent demands for business ability can provide objective records for trust assessment.
interests, and members are more enthusiastic about sharing *rough the analysis of the traceability information, the
the business information of other enterprises than their own user’s reputation can be evaluated, or the combination of the
enterprises. *is tendency of egoism leads to the incom- two can be evaluated for trust. Alfian et al. established links
pleteness of information transmission in the information between development data, namely, associated data. Asso-
chain between enterprises, which leads to the degradation of ciated data are a new way of publishing network resources,
the network information system expected to be constructed which uses URI and RDF data model to publish, share, and
by cross-border e-commerce, and the discontinuous in- link all kinds of data [10]. González-Amarillo et al. promoted
formation network seriously hinders the application effi- document-oriented web to data-oriented web, realized se-
ciency of product quality traceability technology in cross- mantic association of different resources in distributed
border e-commerce. environment, and formed the cornerstone of the next
generation of World Wide Web [11]. Under the initiative of
2. Related Work World Wide Web consortium W3C, more and more data are
published in the form of associated data, forming an as-
With the development of Internet and e-commerce, cross- sociated open data cloud. At present, there are a lot of re-
border e-commerce has gradually become a new engine to searches using linked data to publish traceability or metadata
promote the growth of China’s foreign trade. *e proposal information. Appelhanz and others to realize the traceability
and application of the concept of traceability system, to a for the development of data sharing and interoperation, in
certain extent, has become a great help to strengthen the view of the correlation data in the field of traceability re-
supervision of e-commerce, but the lack of laws, information quirements, not only covers the data to create the traceability
asymmetry, and technical barriers to traceability have also but also including the traceability information, when the
become an important constraint for its weak promotion and data access allows publishers to traceability information
slow progress. Pauwels et al. identified and evaluated the risk released in the form of associated data in data networks,
factors of e-commerce projects, analyzed the content of the support the user through the SPARQL query language
operation process of B2C e-commerce enterprises, and traceability information [12]. Different traceability infor-
constructed an evaluation index system for the development mation models usually cater to the traceability needs of
level of e-commerce platforms [5]. In terms of the different application fields, communities, or user groups,
2629, 2022, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2022/2017827, Wiley Online Library on [23/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Mathematical Problems in Engineering 3

resulting in the heterogeneity of the representation of description are the basis of automatic reasoning. Level 6
traceability models, which brings challenges to the sharing verifies the result of reasoning. Layer 7 is responsible for
and interoperability of data traceability. *e tracing infor- providing the application with a mechanism to decide
mation can be a description of a web resource. *ere is still a whether to trust a given argument. *e establishment of
lack of a mature technical framework for how to publish this trust layer enables intelligent agents to realize personalized
information and how to adopt the necessary policies to services on the network and interact with each other au-
ensure the security of the traceability information itself. How tomatically, thus providing reliability and security.
to create this traceability information is the direction of In the middle tier of the Semantic Web technology stack,
traceability research. RDF, OWL, and SPARQL form the core of Semantic Web
technology. RDF is a language for data exchange and data
3. Cross-border e-Commerce Framework storage. Resource description framework (FRF) describes
Based on Semantic Traceability Algorithm the data model of data and becomes the most core standard
specification of data model in Semantic Web. It interpolates
3.1. Semantic Web Framework. *is design establishes the data resources in the form of “subject-verb-object” triad and
association in the web data and forms the data network. can be expressed by a variety of syntax. RDF models express
Semantic routing uses the mapping relationship between links between web resources without providing domain-
query keywords and nodes to forward query requests to specific semantics, while RDF schema (RDFS) defines vo-
some nodes that are considered most likely to meet the cabularies for describing resource attributes and classes and
request. *is method is similar to prefix matching, but it provides modelling primitives that enhance RDF’s ability to
directly maps the resource key to the resource index posi- describe resources. Due to the limited semantic expression
tion, and the query key adopts the same semantic repre- ability of RDFS, W3C proposed a more powerful ontology
sentation as the resource key [13]. In this paper, the modelling language: web oOntology language. WOL has
corresponding relationship between the query key word and become a powerful data modelling language in the Semantic
the index position of the perception node is established, and Web community by providing additional vocabulary for
the query packet is routed to the corresponding perception describing properties and classes of resources. *e PARQL
node through the query key word. Determining the ap- language is an RDF query language that can retrieve and
propriate query key is the key of the algorithm. For data manipulate data resources stored in an RDF model.
structures, select the contents of List_D, List_S of each
perception node as the resource key. Query keywords are
represented by the same semantics as resource keywords. 3.2. Semantic Traceability Algorithm. *is algorithm designs
Figure 1 shows the technology stack for the Semantic Web, three pairs of keys, which are public key, private key, and
similar to the seven-layer protocols of the existing web. At private key implanted in commodity awareness devices. *e
the bottom is the coding of data resources, which uses public key and private key are released through official
uniform resource identifier to identify resources. *e XML channels and can be queried by consumers. *e static
specification is defined at the syntax level, which provides property list of the perception node before delivery is
element syntax that describes the structure of the content of encrypted by public key [14]. *e sensing node starts the
a document, but does not establish associations between its sensing device at each new sales transfer place and executes
contents and the corresponding semantic information. the tracing algorithm. *e remaining time is in hibernation
As you can see from the figure, layer 1 is the foundation state to save resources to the greatest extent. *e tracing
of the whole Semantic Web, where URIs are responsible for algorithm describes that all nondeep sleep nodes wake up
identifying resources, and unicode is responsible for and sense all neighbor nodes within their own path range.
encoding resources. *e second layer is the syntactic layer of Deep sleep nodes can be read and written by other nodes to
Semantic Web. XML is the de facto standard of data rep- save resources to the greatest extent. Set List_Neighbor to 1
resentation and data exchange. *e namespace mechanism to sense the current location. Public key decryption sends the
is introduced, and URI index is added in front of markup to query key and returns the query result. Read the content
resolve such conflicts. XML schema provides a mechanism from the returned result of QK and compare it with the
for data validation of XML documents. XML query is a detected result. If the result is consistent, construct
technical standard based on XML. *e third layer is the data TA_Nowx to ensure the accuracy of the current location
interoperability layer of the Semantic Web. *e resource information to the greatest extent. Flagn reads the result
description framework uses triples to represent resources, from QK, checks the result in turn, if 0, continues to check
attributes, and their values on the Internet. *e fourth layer the next node until it finds the node. Read the content from
is the knowledge set of the Semantic Web. Ontology consists the return result of QK and compare whether TA_Nowx
of conceptual model, definition, formalization, and sharing. exists in TA_Nown. If so, it indicates that the current n node
*e goal of ontology is to extract domain knowledge, unify is a cargo. List_Neighbor is changed to 0 to prevent further
the common understanding of knowledge in a certain do- writes and is encrypted with the private key to prevent
main, determine the commonly recognized vocabulary in unauthorized merchants from modifying the private key.
the domain, and give a clear definition of these vocabulary Destroy the private key to prevent unauthorized vendors
and the relationship between the vocabulary from the for- from obtaining it. Illegal merchants cannot obtain the
malization mode at different levels. Layer 5 rules and their private key and cannot encrypt the forged or tampered
2629, 2022, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2022/2017827, Wiley Online Library on [23/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
4 Mathematical Problems in Engineering

Trust
Inquire
Rules
Proof
Inquire

Semantic query model


Data Set
Logic

Signature
Data Set
Conceptualization explicit Formal share
Self-
description RDF Model RDF Schema RDF Syntax

XML Namespaces XML Schema XML Query

Identifier: Uniform Resource Identifier Character set: Unicode

Figure 1: Semantic Web framework diagram.

commodity information legally. *e query algorithm can paper, the traceability algorithm is analyzed from two as-
easily detect whether the commodity information has been pects of network delay and route hop count. As can be seen
modified. If n does not exist, it indicates that n is a parallel from Figure 2, the network delay of the traceability algo-
object and is encrypted with its private key. *e private key is rithm in this paper is mostly distributed between 0 and
not published, so the information encrypted with the private 0.05 s. *e route hop count between nodes is 1, and the
key cannot be decrypted and can be identified as parallel traceability algorithm is simple and the transmission delay is
goods. small, which meets the real-time requirements of the In-
ternet of *ings.

3.3. Traceability Query Algorithm. After receiving the pur-


chased product, the consumer obtains the public key and 3.4. Quality Safety Traceability System Construction. Due to
private key through official channels and starts the query the virtual network nature of cross-border e-commerce,
algorithm in the perception node to determine whether the consumers are unable to know the specific location and
purchased product is genuine or not [15]. Query algorithm product quality of sellers, which easily leads to sellers selling
description public key decryption. If the decryption fails, it inferior goods, causing damage to consumers [16]. Cross-
indicates that the static information of the product is border electric business platform to establish perfect credit
tampered or forged by an illegal middleman. *e query evaluation system, promotes the integrity of cross-border
result shows that Nordex is fake. If the decryption is suc- sellers of goods, save the record cross-border buyer for goods
cessful, obtain the ID and query it on the official website. If it of evaluation, to build the brand effect of cross-border
is consistent, the result shows that Nordex is genuine; sellers, which makes more and more cross-border sellers to
otherwise, it is fake. Decryption with the private key may choose the good faith management, will consider their own
require several times. If the decryption fails, the dynamic interests to maximize and choose and buy good faith
information of the commodity is tampered or forged by an transactions. *e unique distributed consensus algorithm
illegal middleman, or is identified as parallel goods by other and timestamp technology of traceability system can ensure
nodes. *e query result shows that the no-dex is parallel the authenticity of data in quality traceability system. *e
goods. If the decryption is successful, obtain TA and check information generated by each node above will be uploaded
on the official website. If the decryption is consistent, the to the quality traceability system in the form of files, data, or
result shows that no-dex is an existing product, otherwise it videos for encryption, and the traceability algorithm ensures
is a parallel product. the authenticity of the encrypted information. As the
It can be seen from the process of the traceability al- product-related information that consumers can query, such
gorithm that the query node sends the request QK and TA to information can deepen consumers’ understanding of cross-
the node with the surrounding path of 1. Since the queried border commodities. In order to ensure that the cross-
information is stored by itself, it can directly respond to the border product information queried by consumers is
query node. Let the total number of sensing nodes be N. In unique, a special process has been adopted to make the
the information writing stage, the writing node successively product traceability code to ensure that it cannot be forged
searches for the destination node that meets the condition in and copied. By scanning the source code of goods, con-
the neighbour node whose path is 1. In the one-off tracing sumers can obtain the production, quality inspection,
algorithm, each node is written only once. Open-source transportation and other information of cross-border goods,
modular component-based open network simulation plat- so as to identify the authenticity of goods, guarantee the
form can simulate the traceability algorithm well. In this authenticity of cross-border goods for consumers, and
2629, 2022, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2022/2017827, Wiley Online Library on [23/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Mathematical Problems in Engineering 5

0.055

0.050

0.045

Increasing Density→
Delay time (S)
0.040

0.035

0.030

0.025

0.020
10 20 30 40 50 60 70 80
Run time (S)
Figure 2: Network delay graph of traceability algorithm.

improve consumers’ trust in cross-border goods. *e quality information traceability, all parties in the supply chain need
traceability system ensures the authenticity of cross-border to actively participate and cooperate with each other. On the
goods from the source through product production infor- basis of focusing on customer management and different
mation and traceability source code, the authenticity of methods to deal with different products, it establishes
information through monitoring videos uploaded in quality product information traceability and anticounterfeiting
inspection and transportation links, and the upchain of mechanism, collaborates in all links of the product supply
information in the whole process of purchasing goods chain, and conducts open and transparent information
provides consumers with channels to query the real infor- management. In terms of customer dynamic management in
mation of goods and evidence to protect their rights. It has the product information traceability model, cross-border
successfully established a traceability system that can control e-commerce platforms contact numerous suppliers to fa-
the quality of cross-border goods and solved the trust cilitate one-stop shopping. At this stage, e-commerce
problem faced by cross-border e-commerce. *e overall platforms rely on powerful data processing and storage
architecture of the traceability system is designed in this capabilities. *e consumer account management function of
paper, as shown in Figure 3. e-commerce platform uses traceability algorithm to track the
*e input of this design is the source code of the project product information of the system [19]. In terms of the
being tested. In this stage, the function call relation of the whole design of traceability model of physical product information,
project is calculated, the global information is collected, and the the products provided by e-commerce platform can be di-
global modification summary is calculated and generated. *e vided into physical products and nonphysical products.
visitor design pattern is then used to traverse the abstract syntax Traceability algorithms prevent false information from re-
tree to obtain the control flow diagram [17]. *e intermediate cording product information from the product source. *e
results in the preprocessing are saved for future use in the product traceability model of cross-border e-commerce on
traceability process. Traceability process is the core of trace- business platforms is shown in Figure 4.
ability analysis, which includes three modules, namely node *e data in the data layer of the Internet of *ings are
analysis module, fixed-value information identification mod- supported by the traceability algorithm. Traceability can be
ule, and precursor node calculation module. *e node parsing used to monitor multiple links of products to ensure the
module is used to parse the node content. *e constant value authenticity of data. At the same time, the electronic
information identification module is used to determine transaction information of products will also be stored in the
whether the current analysis variable is the terminal, so as to product supply chain data block storage system, and then the
determine whether to terminate the traceability analysis. When product information provided by the Internet of *ings and
the updated target point is determined as the terminator in the e-commerce online transaction information will be inte-
fixed-value information identification module, the traceability grated to form a closed-loop system of physically integrated
analysis is stopped; otherwise, the iterative analysis is contin- e-commerce transaction information [20]. Products in every
ued. *e precursor node computing module is used to calculate link of the supply chain traceability model under the en-
the next traceability node of the current analysis node. vironment of existing information sharing, if e-commerce
platform company is used as a building product traceability
4. Cross-border e-Commerce Product and information security system of the central coordination
Traceability Model mechanism, coupled with the e-commerce platform with
mass of data, rich management experience, and advantages
In the current mainstream e-commerce transaction mode, of a large number of active users, it can better solve the
every transaction subject is changing, especially customers current problems. *e traceability of product information
with great randomness and liquidity [18]. In product lays a solid foundation for the realization of product
2629, 2022, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2022/2017827, Wiley Online Library on [23/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
6 Mathematical Problems in Engineering

Product production
Function call relationships
information

Static commodity
Collect global information
information

Commodity logistics
Modify summaries
information

Pretreatment analysis Google Product traceability results


Cloud Platform

Information parsing Website query

Information identification Hotline query

Node calculation Scan code query

Roots algorithm Commodity information

Figure 3: Quality safety traceability system diagram.

Merchant
Web Server Manufacturers

IoT
Certificate Azure
Web manager Blockchain
Consumer WAF services
Merchants

Platform
manager Consumer
Regulators
physical distribution
Figure 4: Merchandise traceability model of cross-border e-commerce on business platform.

anticounterfeiting. *e real-time dynamics of product in- market regulators are also important factors affecting the
formation can also track all gaps in the production process traceability and anticounterfeiting of product information.
and fill in the information gaps. Product security also needs
to be strengthened. E-commerce platform relies on its 5. Analysis of Cross-border e-Commerce
dominant position in the supply chain and powerful data Commodities in Internet of Things
processing ability to build the product information system.
E-commerce platforms combine the strengths of manu- 5.1. Sample Selection and Data Collection. *is paper collects
facturers and carriers to build traceable IoT products. *e logistics list data from November 2018 to December 2018 to
Internet of *ings collects all product information through a analyze the choice preferences of consumers of different
unified coded identification system and enters product in- genders and ages in different regions in cross-border
formation into the system. *ese data are safe, reliable, shopping according to the data characteristics and analyzes
authentic, and tamper-proof [21]. Consumers can use the differences of consumers of different genders and ages in
e-commerce platform application terminals to query the different regions in purchasing the same goods in different
information of purchased products. Improving the legal countries. Skin care products in cross-border market are
knowledge of consumers in all aspects of the transaction indispensable necessities for women, with a large import
process, strengthening market supervision, and clarifying volume. Moreover, there are many skin care product sellers
2629, 2022, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2022/2017827, Wiley Online Library on [23/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Mathematical Problems in Engineering 7

on taobao global shopping platform, and the market want to know in a short time and improve the shopping
transaction volume is large enough to be used as samples for efficiency of consumers. However, as the total amount of
research. *e quality of skin care products of the same brand traceability information increases, the query time based on
varies greatly, and the price also varies greatly. In the traditional query methods will increase slowly.
transaction, cross-border buyers and sellers have different
levels of understanding of information. *erefore, cross-
5.3. Accuracy of Product Traceability Information. In this
border buyers are at an information disadvantage and do not
paper, the function call relationship of different algorithms
know whether the real quality of goods is consistent with
was analyzed, and each algorithm was sampled. *e number
what the seller describes, thus causing adverse selection.
of samples of each algorithm was 100. *en, the accuracy of
Research on trust mechanism of cross-border e-commerce
the system was obtained through system analysis. Cross-
can reduce the occurrence of adverse selection to a certain
border e-commerce system uses the traceability character-
extent.
istics of traceability algorithm and time stamp technology to
establish cross-border goods warehousing and trans-
portation monitoring system. *e accuracy of the system can
5.2. Selection and Descriptive Statistics of Commodity
be obtained by sampling and comparing the detection results
Variables. Data traceability collects and stores the trace-
of the traceability algorithm. *e sampling experiment re-
ability information of specific contents of individual data.
sults are shown in Figure 6.
When it is necessary to trace a certain data, specific trace-
*rough the analysis of the experimental results, it can
ability methods are used to trace and display the source and
be known that the calculation results of the traditional al-
production process of data. *erefore, the realization of real
gorithm are not very accurate when analyzing the target
and effective data traceability is often inseparable from the
point traceability algorithm. In this paper, 100 sampling
safe and effective management of traceability information.
points were selected in each project, totaling 300 abstract
When using the data traceability model to realize data
points. *e traceability algorithm of these abstract points is
traceability, it mainly focuses on the management of
analyzed, and 300 sampling points are found to be correct. It
traceability information, and the management of traceability
can be known that the accuracy rate of the traceability
information mainly includes the collection, storage, and
analysis of the target points by this method is about 90%.
query of traceability information. *e corresponding
After analyzing the traditional tracing algorithm, 159
implementation method has been explained for traditional
sampling points were found to be correct, with an overall
tracing information query, but due to the response time
accuracy of 82.5%. *rough the cross-border e-commerce
delay, the tracing information is not true and the validity is
system, consumers can query logistics information in real
low, and finally the true and effective data tracing cannot be
time, monitor the whole process of cross-border commodity
realized. In order to test the tracing information query rate,
transportation, and provide information such as commodity
this paper compares the tracing information query method
quality inspection and logistics real-time monitoring.
with the traditional tracing algorithm in the case of different
total amount of tracing information. *is paper compares
the query time of the two different methods when the total 5.4. Descriptive Product Analysis. According to the data
amount of experimental traceability information is 2000, characteristics from the perspective of commodity cate-
3000, 5000, and 7000. *e abscissa is the number of gories, such as consumer age, respectively, on cross-border
traceability information corresponding to the traceability descriptive analysis the clinch a deal the quantity, clinch a
object, and the ordinate represents the query time. *e test deal the price of a commodity in the SPSS software, will be
comparison figure is shown in Figure 5. selected as a variable quantity, commodity categories se-
As can be seen from the above test figure, when the total lected as the grouping variable, you can get goods between
amount of traceability information is certain, the time of categories and clinch a deal the quantity case summary.
information query based on traceability is much lower than According to the data characteristics, it can be found that
that of traditional query methods. *e traceability system of classified data, namely qualitative data, are the main data and
cross-border e-commerce makes it easy to record com- the sample size is large. If the sample type factor analysis is
modity information and ensures the reliability of com- selected, the capacity and speed are not adequate. *erefore,
modity data information. *e use of traceability algorithm on the basis of descriptive analysis, the classification data are
combined with Semantic Web to realize the entry of numbered or represented by numerical codes, and simple
commodity information can enable consumers to have a correspondence analysis and multiple correspondence
comprehensive understanding of the source and agents of analysis are carried out to obtain the internal relationship
cross-border commodities and ensure the authenticity and between users with different characteristics and product
reliability of commodities. Cross-border e-commerce sys- selection. According to the correspondence analysis of
tems have increased consumers’ access to commodity in- different characteristic variables, the factor load plans of
formation. *rough the blockchain system, consumers can different line variables and column variables are obtained,
not only know the information of commodity production respectively. Due to the large categories of goods, this paper
enterprises but also obtain detailed information of com- only analyzes the relationship between the user character-
modity production, packaging, quality inspection, and other istics of luggage products, beauty products, medicine and
processes, so that consumers can query the information they health care, clothing, shoes and hats, and milk powder. In
2629, 2022, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2022/2017827, Wiley Online Library on [23/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
8 Mathematical Problems in Engineering

0.8
0.7
0.6

Query time (S)


0.5
0.4
0.3
0.2
0.1
0.0
0 1000 2000 3000 4000 5000 6000
Number of trace information items

Traditional method
The Present Research
Figure 5: Tracing algorithm to compare the query time test results.

70
60
Collection capacity

50
40
30
20
10
0
0 20 40 60 80 100
Accuracy
Accuracy
Method 1
Traceability method
Figure 6: Diagram of sample experiment results.

180

160

140

120
Variate

100

80

60

40
60
20 55
8 45 50
40
12 35
16 25 30 e
Cla 20 Ag
ssifi 20 15
cati 10
on 24 5
0

Figure 7: Plane graph of factor loading.


2629, 2022, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2022/2017827, Wiley Online Library on [23/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Mathematical Problems in Engineering 9

the factor load diagram obtained, coordinate points of of cross-border commodity transportation, and provide
different categories are connected with the origin, which is goods quality inspection and logistics real-time monitoring
temporarily called the class line, and the vertical distance information. *ere is a lack of collected Internet of *ings
between coordinate points of other characteristic variables data set, transaction data, and backup traceability infor-
and the class line is judged. *e distance is inversely pro- mation in the design. In the future, in-depth research on
portional to the correlation, and the shorter the distance, the real-time monitoring efficiency will reduce the difficulty and
greater the correlation. Factor loading diagram is shown in increase the speed of traceability.
Figure 7.
As can be seen from the figure, the gender and age Data Availability
coordinate point with a short vertical distance from the
origin crossing ray where the goods category is located is 38, *e data used to support the findings of this study are
followed by 46. Among them, the corresponding gender and available from the corresponding author upon request.
age code is 35 for males aged 36–40 years, and the corre-
sponding code is 45 for females aged 36–40 years. *e sex Conflicts of Interest
and age coordinates with a short vertical distance from the
product category for beauty makeup and skin care are 37,47. *e author declares that there are no conflicts of interest.
*e sex and age coordinates with a short vertical distance
from the origin ray of medical and health products are 44
and 34. *e coordinates of gender and age with the shortest
Acknowledgments
vertical distance from the origin ray of clothing, shoes, and *is work was supported by Zhejiang Industry and Trade
hats are 45 and 35. *e gender and age coordinate point with Vocational College.
a short vertical distance from the origin crossing ray of milk
powder is 442, 33, 43. It can be concluded that bags are the
most popular among men aged 35–40 years and have the References
greatest demand, followed by women aged 35–40 years. *e [1] M. Li, S. Shao, Q. Ye, G. Xu, and G. Q. Huang, “Blockchain-
customer base of beauty products is distributed between 45- enabled logistics finance execution platform for capital-
and 50-year-old women and the same age group of men. constrained E-commerce retail,” Robotics and Computer-In-
Medical products are most popular among women aged 30 tegrated Manufacturing, vol. 65, Article ID 101962, 2020.
to 35 years, followed by men in the same age group. *e [2] A. Valarezo, T. Pérez-Amaral, and T. Garı́n-Muñoz, “Drivers
main customers of clothing, shoes, and hats are consumers and barriers to cross-border e-commerce: evidence from
aged 36–40 years, and the purchasing power of women is Spanish individual behavior,” Telecommunications Policy,
higher than that of men. *e main customers of milk powder vol. 42, no. 6, pp. 464–473, 2018.
[3] M. Zhang, L. Lin, and Z. Chen, “Lightweight security scheme
are women under 20 years old and 21–25 years old, followed
for data management in E-commerce platform using dynamic
by 26–30 years old. data management using blockchain model,” Cluster Com-
puting, vol. 1, pp. 1–15, 2021.
6. Conclusion [4] S. S. Abosuliman and A. O. Almagrabi, “Computer vision
assisted human computer interaction for logistics manage-
As domestic consumers’ enthusiasm for overseas shopping ment using deep learning,” Computers & Electrical Engi-
rises, cross-border e-commerce industry stands out in this neering, vol. 96, Article ID 107555, 2021.
wave of cross-border shopping, bringing a fierce impact on [5] P. Pauwels, S. Zhang, and Y.-C. Lee, “Semantic web tech-
traditional trade worldwide. *is paper proposes a seman- nologies in AEC industry: a literature overview,” Automation
tically based product traceability algorithm for e-commerce in Construction, vol. 73, pp. 145–165, 2017.
[6] S. Wang, D. Li, Y. Zhang, and J. Chen, “Smart contract-based
online purchase in the Environment of Internet of *ings.
product traceability system in the supply chain scenario,”
*e innovation of this traceability algorithm relies on se- IEEE Access, vol. 7, pp. 115122–115133, 2019.
mantic traceability algorithm to prevent illegal merchants [7] A. Bernstein, J. Hendler, and N. Noy, “A new look at the
from tampering and forging commodity information and semantic web,” Communications of the ACM, vol. 59, no. 9,
help consumers to quickly judge whether the purchased pp. 35–37, 2016.
goods are genuine goods or not. Cross-border electricity [8] J. Qian, L. Ruiz-Garcia, B. Fan et al., “Food traceability system
data as the research object, through the data mining, based from governmental, corporate, and consumer perspectives in
on the Semantic Web to IoT cross-border e-commerce the European Union and China: a comparative review,”
framework, traceability queries, and the empirical analysis Trends in Food Science & Technology, vol. 99, pp. 402–412,
was carried out on the goods, reduce the risk prevention and 2020.
control of cross-border e-commerce, in certain cases, [9] J. Wang, H. Yue, and Z. Zhou, “An improved traceability
system for food quality assurance and evaluation based on
traceability information total based on the time of the query
fuzzy classification and neural network,” Food Control, vol. 79,
information much lower than the traditional query method. pp. 363–370, 2017.
*e accuracy of the system is up to 90% through the de- [10] G. Alfian, J. Rhee, H. Ahn et al., “Integration of RFID, wireless
tection results of the traceability algorithm. *rough the sensor networks, and data mining in an e-pedigree food
cross-border e-commerce system, consumers can query traceability system,” Journal of Food Engineering, vol. 212,
logistics information in real time, monitor the whole process pp. 65–75, 2017.
2629, 2022, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2022/2017827, Wiley Online Library on [23/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
10 Mathematical Problems in Engineering

[11] C. A. González-Amarillo, J. C. Corrales-Muñoz, and


M. Á Mendoza-Moreno, “An IoT-based traceability system
for greenhouse seedling crops,” IEEE Access, vol. 6,
pp. 67528–67535, 2018.
[12] S. Appelhanz, V.-S. Osburg, W. Toporowski, and
M. Schumann, “Traceability system for capturing, processing
and providing consumer-relevant information about wood
products: system solution and its economic feasibility,”
Journal of Cleaner Production, vol. 110, pp. 132–148, 2016.
[13] Y. Ren, R. Xie, and F. R. Yu, “Potential identity resolution
systems for the industrial Internet of things: a survey,” IEEE
Communications Surveys & Tutorials, vol. 23, no. 1,
pp. 391–430, 2020.
[14] W. Zhu, J. Mou, and M. Benyoucef, “Exploring purchase
intention in cross-border E-commerce: a three stage model,”
Journal of Retailing and Consumer Services, vol. 51, pp. 320–
330, 2019.
[15] S. Ma, Y. Chai, and H. Zhang, “Rise of cross-border
E-commerce exports in China,” China and World Economy,
vol. 26, no. 3, pp. 63–87, 2018.
[16] P. Olsen and M. Borit, “*e components of a food traceability
system,” Trends in Food Science & Technology, vol. 77,
pp. 143–149, 2018.
[17] Y. Wang, Y. Wang, and S. Lee, “*e effect of cross-border
E-commerce on China’s international trade: an empirical
study based on transaction cost analysis,” Sustainability,
vol. 9, no. 11, p. 2028, 2017.
[18] Y. Wang, F. Jia, T. Schoenherr, Y. Gong, and L. Chen, “Cross-
border e-commerce firms as supply chain integrators: the
management of three flows,” Industrial Marketing Manage-
ment, vol. 89, pp. 72–88, 2020.
[19] X. Cheng, L. Su, and A. Zarifis, “Designing a talents training
model for cross-border e-commerce: a mixed approach of
problem-based learning with social media,” Electronic Com-
merce Research, vol. 19, no. 4, pp. 801–822, 2019.
[20] N. Chen and J. Yang, “Mechanism of government policies in
cross-border e-commerce on firm performance and impli-
cations on m-commerce,” International Journal of Mobile
Communications, vol. 15, no. 1, pp. 69–84, 2017.
[21] Q. Lin, H. Wang, X. Pei, and J. Wang, “Food safety traceability
system based on blockchain and EPCIS,” IEEE Access, vol. 7,
pp. 20698–20707, 2019.

You might also like