2022
DOI: 10.4018/joeuc.306270
|View full text |Cite
|
Sign up to set email alerts
|

The Impact of SIPOC on Process Reengineering and Sustainability of Enterprise Procurement Management in E-Commerce Environments Using Deep Learning

Abstract: In order to better promote the healthy and long-term development of enterprise procurement management process, under the background of e-commerce environment, Suppliers-Inputs-Process-Outputs-Customers (SIPOC) model, deep learning and related theories of enterprise procurement management are expounded and proposed. Then, D electric power enterprise is studied as samples. After understanding the current situation of procurement management of the enterprise, there are a series of problems in the enterprise, such… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(29 citation statements)
references
References 22 publications
0
29
0
Order By: Relevance
“…In the first three sets of data auditing process, the searchable encryption algorithm takes the least execution time. When the number of elements reaches 150, the execution time of the searchable encryption algorithm is nearly the same as that of the homomorphic encryption algorithm (Zhang et al, 2022). The execution time of the database security audit algorithm based on bypass monitoring is the highest from beginning to end.…”
Section: Discussionmentioning
confidence: 98%
“…In the first three sets of data auditing process, the searchable encryption algorithm takes the least execution time. When the number of elements reaches 150, the execution time of the searchable encryption algorithm is nearly the same as that of the homomorphic encryption algorithm (Zhang et al, 2022). The execution time of the database security audit algorithm based on bypass monitoring is the highest from beginning to end.…”
Section: Discussionmentioning
confidence: 98%
“…The data are input into the BPNN, processed by the hidden layer after they go through the input layer, transmitted to the output layer, and processed and output by the output layer. When the output result and the expected result differ significantly, the error data will propagate back, returning the error along the original path, adjusting the network threshold and weight, and repeating this operation until the error reaches the allowable range or the most significant number of iterations of the algorithm (Park et al, 2020; Zhang et al, 2022).…”
Section: Methodsmentioning
confidence: 99%
“…Modelling and coding. Through the feature extraction and coding of the sample data and the architecture analysis of the confusion matrix, the vector quantization programming can be quickly carried out on the Matlab platform to accelerate the operation speed (Zhang et al, 2022). 6.…”
Section: Construction Of Ims Evaluation Modelmentioning
confidence: 99%