<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>International Journal of Production Research 58 (2020) 2054</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1080/00207543.2020.1736428</article-id>
      <title-group>
        <article-title>Optimizing file routing in EDI using the new naming</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>National Technical University «Kharkiv Polytechnic Institute»</institution>
          ,
          <addr-line>Kyrpychova str. 2, Kharkiv, 61002</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National University of Radio Electronics</institution>
          ,
          <addr-line>Kharkiv, Nauky Ave. 14, 61166</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Olha Yanholenko</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2054</year>
      </pub-date>
      <volume>2483</volume>
      <fpage>2054</fpage>
      <lpage>2062</lpage>
      <abstract>
        <p>The use of electronic data interchange is becoming a de facto standard of organizational interaction. The number of documents transferred between counterparties in the network is constantly increasing. Large volumes of files circulating between counterparties, in the event of an emergency that causes a stop in processing in document exchange systems, provoke the accumulation of a message processing queue. Different types of messages affect business processes of enterprises in different ways, and prompt delivery of important messages should be a priority for data analysis and processing. Unfortunately, to distribute messages depending on the recipient and message type, it is necessary to analyze the file contents. The purpose of this study is to propose a method for increasing the speed of message distribution between data exchange participants based on the analysis of document data transferred in the network. In order to comply with the service level agreement (SLA), as well as to reduce the impact of accidents that occur during document exchange, the article presents a principle of file naming in electronic data interchange, which allows you to prioritize message processing without reading the file contents, get improved routing and change the priority of document processing depending on the message type, its sender and recipient, as well as its format.</p>
      </abstract>
      <kwd-group>
        <kwd>file routing</kwd>
        <kwd>file naming algorithm</kwd>
        <kwd>electronic data interchange</kwd>
        <kwd>identification</kwd>
        <kwd>information system</kwd>
        <kwd>processing priority</kwd>
        <kwd>network data analysis 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Electronic document management systems have been in use for quite a long time, but they have
not lost their relevance, even with the advent of new technologies such as Applicability Statement
2. This can be seen from data forecasting the growth of the electronic data interchange (EDI)
software market to USD 5.30 billion by 2032; in 2025, this market is estimated at USD 2.31
billion [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>The first attempts at EDI date back to the 1980s, which marked the beginning of enterprise
computerization. Over time, technology has evolved, and message transmission has become
increasingly automated. Whereas previous messages were sent from supplier to client or in a
similar manner, now the exchange occurs between systems. These may still be suppliers and
consumers, enterprises, legal entities, or government agencies; in general, electronic document
flow does not stop. What remains constant in this process is the ever-increasing volume of files
transferred and the wide variety of file formats in which data is transmitted.</p>
      <p>There may be an opinion that modern powerful computers can easily cope with the task of
determining file recipients, routing, and sending such significant volumes of files. However, this is
not always the case. For example, in retail chains, problems with the transfer of urgent orders often
occur, especially during the cold start of the system or after a shutdown due to a failure. In such
situations, the system must work very quickly and distribute files to recipients. But to route orders
correctly, you need to open the file and read the recipient information inside it. It can be argued
that this operation can be entrusted to additional resources, but this also requires some time, which
may be too long compared to what is permissible in a particular situation. One area of change in
EDI to improve productivity is the unification of procedures and methods.</p>
      <p>
        There are internationally accepted messaging standards such as X12, EDIFACT, ODETTE, VDA,
XML, EANCOM, IDOC, and TRADACOMS [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5 ref6">2 – 6</xref>
        ]. However, providers of electronic document
flow have thousands or even hundreds of thousands of counterparties with different business
processes and must account for all their nuances in their workflows, as well as the interaction of
each with their counterparty. In general, the exchange of different types of messages between
counterparties is shown in Figure 1.
      </p>
      <p>Thus, the large number and variety of formats used in EDI document exchange complicate the
timely delivery of messages to recipients and ultimately cause system failures in some cases.
Therefore, further research into methods for improving data processing speed in EDI systems
remains a relevant and important task.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of recent research and publications</title>
      <p>
        It is entirely natural to strive to make such processes simpler and more understandable, so research
continues on the use of EDI, for example, to reduce order variations and administrative costs for
management [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. One of the challenges in commerce is the so-called bullwhip effect, which refers
to the amplification of orders along the supply chain, meaning that small variances in customer
demand lead to increasing oscillations further upstream. Recent studies [
        <xref ref-type="bibr" rid="ref10 ref11 ref8 ref9">8 – 11</xref>
        ] propose the use of
artificial intelligence to address this issue. However, EDI systems themselves have also proven to
be highly effective in mitigating this problem [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        Today, EDI remains a widely used technology and forms the foundation of many
interorganizational information systems. In various industrial sectors, alongside EDI, blockchain
technology is employed to enhance transparency, security, and operational efficiency. In the study
[
        <xref ref-type="bibr" rid="ref13">13, 14</xref>
        ], a comparison of these two technologies was conducted based on existing literature,
leading to the conclusion that replacing EDI with blockchain technology is not advisable.
Blockchain can increase trust, security, and reduce errors associated with EDI; however, it can only
complement rather than fully replace EDI, despite the fact that blockchain enables simplified data
formats and automation. The synergy of EDI and blockchain technologies allows us to maximize
the benefits these technologies offer, yet the challenge of dealing with diverse data formats
remains.
      </p>
      <p>The integration of EDI with Industry 4.0 technologies, such as the Internet of Things (IoT), is
being implemented on modern, high-performance platforms like IBM [15], and there are already
practical examples of its use [16, 17].</p>
      <p>The issue of receiving a large number of files of various types and formats arises as a
consequence of increased demand for products or the failure of system components. In [18], an
attempt was made to address the problem of system overload by classifying messages through the
assignment of attributes and converting one message format into another. For example, the authors
worked with the EDIFACT format and transformed it into XML. However, their approach is
limited to simulating message flows with the ability to redistribute messages across infrastructure
nodes. This solution cannot be applied in real-world scenarios, yet the study once again highlights
the complexity and importance of the existing problem.</p>
      <p>A sudden surge of messages in different formats often leads to failures in EDI systems, resulting
in serious issues. Rapid recovery of the system after a failure is highly desirable. In [19], the
authors suggest treating an error as a network intrusion and applying class balancing, which may
yield results but slows down file transmission within the system. As the number of documents that
must be processed in the shortest possible time increases, challenges arise regarding processing
speed, the speed of restoring system nodes after a failure, and the need to establish and resolve
priorities for processing and routing critical messages.</p>
      <p>The question of file naming has been around for quite some time and is already well-established
in IT. We can look at the following examples. File naming is regulated within operating systems,
which impose limitations on file name length, prohibited characters, and rules for constructing
paths. In programming, names are governed by language standards and corporate conventions.
Databases often require adding prefixes, unique application identifiers, and specific delimiter
characters to table names. In web development and DevOps, standards exist to ensure
crossplatform compatibility, readability, and automated file processing. Finally, in the realm of
integration with external systems and file exchange between systems (for example, via FTP, SFTP,
cloud storage), corporate or industry-specific file naming standards are frequently introduced to
automate processing, versioning, and status tracking. As shown above, standards in EDI systems
also exist, but they are related to file structure and industry standards.</p>
      <p>The current level of integration between exchange systems and the existence of businesses that
simultaneously operate in various industrial sectors has significantly complicated the situation and
substantially impacts the efficiency of file routing. Below, we will illustrate the problems in this
area. The aim of this research is to propose a file naming method for exchange within a system that
increases the routing speed of large volumes of files in provider systems.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Problem description</title>
      <p>The principles of routing files over communication channels influence the quality and speed of
exchange, the presence of single points of failure and bottlenecks in the exchange process, and the
ability to collect metrics. In general terms, the message processing procedure on the side of an
electronic document management provider or an intermediary message flow distribution system
can be seen in Figure 2. It shows that the system takes files for processing from one storage
location, the incoming messages (inbox/IN), processes them, and then transfers them to a storage
location for further transmission of the message to the partner.</p>
      <p>In modern EDI systems, file analyzers are necessary to examine the content of files for routing
purposes. The large number of file formats being transmitted makes the work of analysts a
complex task. Figure 3 schematically illustrates the mechanisms of an Electronic Data Interchange
provider that supports the processing of both documents in the system's native format (for
example, XML) and other formats.</p>
      <p>The electronic document management provider's system receives the file and saves it in its
storage. If the file format is the main one for the system, then the message is saved in the
“inbox/IN” storage. Figure 3 shows the additional directory “cinbox/CIN”, which is used only for
messages that are not specific to the main message processing system.</p>
      <p>The "file finder" component looks for files in storage and sends them to a message queue for
processing by the processing service, which analyzes the file structure. However, each file with a
non-standard format has an additional processing function that helps the processing service
understand that this file needs to be handled with a preliminary conversion using mapping
transformations. This pre-processing is performed by the processing service itself; that is, it first
converts the file from a format atypical for the system into a typical format that is already analyzed
by the system for further transmission.</p>
      <p>The need to handle different message formats has led to the widespread use of Extensible
Stylesheet Language Transformations and similar procedures for transforming the primary
message into the resulting message format. Such conversion systems are integrated into the file
processing service and use a separate conversion map created for each message type and format.
Over time, systems developed as part of the transition to microservice architectures [20], as a
result, the conversion procedure was separated into a separate service. Figure 4 demonstrates how
the message conversion procedure became an independent service. Given the diverse formats and
the need to enhance system resilience, the service received its separate queue for processing, and a
separate message finder, which formed a queue based only on files of a message format not typical
for the system, taking them from the cinbox/CIN directories.</p>
      <p>After conversion, the file enters the inbox/IN directory, from where it enters the internal format
file processing service, from the queue formed by a file finder that checks only the inbox/IN
directory. Thus, converting to a separate service made it possible to distribute the responsibility of
services, the developers of these services, for processing messages that the system should process.
In the system architecture, it is possible to scale individual elements by increasing the number of
processors using SAAS services and saving additional resources when not involved.</p>
      <p>However, any system is susceptible to failures. Let's consider the previous diagram; in the event
of a queue mechanism failure (message queuing failure), Figure 5 demonstrates that the number of
unprocessed messages in the cinbox/CIN directory increases. Similarly, the connection for
processing messages in the system's typical format could also fail. Given that the average message
processing time is 0.04 seconds, which on average corresponds to the message processing rate [16,
21], a backlog of messages forms, and the system may require a significant amount of time to
process them.</p>
      <p>It's also important to consider that resolving an outage takes time. Depending on the response
speed and the failure's cause, the recovery process can take seconds, minutes, or even hours or
days. The provider is very likely to fail to meet the Service Level Agreement (SLA). Depending on
the business process and the terms of the counterparty, the provider risks incurring penalties. To
ensure Service Level Agreement (SLA), a mechanism is required to process messages in priority
mode depending on their type, format, recipient, and sender. However, the modern systems we've
examined operate in FIFO mode. Determining the priority of a particular message can only be done
indirectly through the message type (if correctly specified) in the file name and the sender's
directory. This approach results in SLA violations in case of message processing failures.</p>
      <p>The idea of the research is to add useful information to the file name, which allows to speed up
the routing, as well as change the priority of message processing without the need to read the
contents of the file. The application of a new principle of file naming helps to increase the amount
of information that can be obtained in the intellectual analysis of data of the work of the service of
the service transmission. And this, in turn, allows to get more metrics for a correct assessment of
the effectiveness of routing.</p>
      <p>The new naming principle is aimed at improving the routing of messages, in distribution
systems, which should have great bandwidth. Such systems are usually the workflow providers and
retail networks.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Solution of the problem</title>
      <sec id="sec-4-1">
        <title>To achieve the stated goal:</title>
        <p>1. The principles of indication of information about the recipients and senders, and the type of
notice, are analyzed.</p>
        <p>2. A new format EDI message name is proposed.</p>
        <sec id="sec-4-1-1">
          <title>4.1. Analysis of current principles for defining the sender and receiver</title>
          <p>The Global Location Number (GLN) [22] is an identifier for both the recipient and the sender.
Examples of GLNs are shown in Figure 6.</p>
          <p>Currently, information about the recipient and sender of the message and the type of message is
in the file's body. Here is an example of the contents of a file for an order with recipient and sender
identifiers in XML format in Figure 7.</p>
          <p>The file contents in Figure 7 provide another example of recipient and sender IDs in EDIFACT
format.</p>
          <p>Essentially, to route a file, it's necessary to read it and locate the sender and recipient
information within the document's body. Therefore, to determine the route a document should
take, the following steps are required:


</p>
          <p>Take the document for processing. There's usually a message queue from which documents
are retrieved for processing.</p>
          <p>Determine the file format. In the case of EDI, common formats include X12, EDIFACT,
ODETTE, VDA, XML, EANCOM, IDOC, and TRADACOMS, although files in other formats
may also be received. Each of these formats has its unique structure and specifications.
Identify the sender and receiver. Depending on the format of the file being transferred,
these identifiers may be located in different tags, segments, or other elements within the
file.</p>
          <p>So, to identify the parties involved in the exchange, it is necessary to analyze the file's contents,
which requires opening and reading the file. All of this takes time. The time needed to process
different formats affects the speed of analysis and identification.</p>
          <p>Based on the above, we can identify the following factors of influence on the speed of file
distribution from the sender to the recipient: type of message, the need to read the file, the need to
analyze the file, file format, file structure, and file volume.</p>
        </sec>
        <sec id="sec-4-1-2">
          <title>4.2. Principles of file names</title>
          <p>Currently, the filenames being used contain information about the sender and recipient identifiers
within the message body, and they appear as follows:

</p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>ORDER_e35v8b72bv92b8ceos.edifact ORDER_1147.edifact</title>
        <p>

</p>
        <p>We observe that the filename contains only the message type (ORDER, INVOICE), and the
sequence of letters and numbers is unclear. This sequence is generated randomly to prevent
duplication of previously created filenames. The fourth example is slightly different, with its name
including the type, file creation time, and document identifier within the system where it was
created. However, this information is unhelpful for file processing and does not improve routing.
The fifth example provides no information whatsoever about the file's contents. The filename in
the fifth example is formed by the sender according to some internal rules that are unlikely to be
known by the provider. Thus, we see that there are no clear rules within the EDI systems that
allow for the use of information from the filename for routing purposes.</p>
        <p>It is proposed to include additional information in the filename that is found within the message
body, specifically the sender and recipient identifiers, in addition to the file type, file identifier, and
file format.</p>
        <p>Counterparties may need to prioritize processing specific messages amidst the plethora of
documents traversing electronic document management systems. Hence, the proposed solution is
in incorporating an additional message "importance" indicator in the file name – a monogram. This
attribute is typically unspecified by default. Utilize English alphabet letters as symbols, where "a"
denotes the highest priority, followed by "b," and so forth in alphabetical order. This hierarchical
marking system is intuitively logical and easily comprehensible, facilitating seamless interpretation
by involved parties. Consequently, stakeholders in the exchange process and the facilitating
providers gain the capacity to process vital messages labeled with this attribute sequentially,
streamlining the handling of queued messages.</p>
        <p>In this case, the name’s format will be as follows:</p>
        <p>_ _ _ _ .  ,
where MesType – type of message,
priSign, – message priority symbol (monogram), optional,
recGLN – recipient GLN,
senGLN – sender GLN,
UUID - Universally Unique IDentifier,
fmt – format (specified as a file extension).</p>
        <p>Let's illustrate the new name format with the following (Figure 9):
(1)</p>
        <p>In this example, the values with the payload are separated by the lower underlining symbol. The
name "ORDER" indicates the message type, "3367434567135" – GLN recipient, "3367434567134"–
GLN sender, and "33be8203-5794-4c31-a788-46687572813d" – message ID. Version 4 of UUID
provides a unique name for each file among many files created and can be used as a message
identifier on the sender's system.</p>
        <p>Other useful information may also be added to the file name, depending on the type of message
and the agreement of the counterparties, for example:
</p>
      </sec>
      <sec id="sec-4-3">
        <title>File creation date.</title>
        <p>



</p>
      </sec>
      <sec id="sec-4-4">
        <title>Date of product delivery.</title>
        <p>Date of expected payment on the account.</p>
        <p>Number of items with information about the product in the document's body.</p>
        <p>Number of retail outlets.</p>
        <p>Other.</p>
        <p>Generally, it's recommended to include information in the filename that counterparties believe
could expedite processing or allow for changes in the order of processing or message routing. At
the same time, the filename length should not exceed 255 characters, unless this contradicts the
counterparties' systems.</p>
        <p>Thus, the file name, using UTF-8 encoding, may contain: Latin alphabet characters, both upper
and lower case, numbers from 0 to 9, lower underlining characters (_); dash (-); dot (.) And in
general, without specifying the type of message and other parts that will depend on the format of
the document and the business process, it can be described by a regular expression:
(\ | − |_){1, }_((\ ){13}_){2}(\ ){8} − ((\ ){4}−){3}(\ ){12}. (\ ){1, }. (2)
It is not recommended to change the file name during its subsequent transfer, so downstream
participants in the file transfer and processing chain can also utilize the additional useful
information contained within the file name.</p>
        <p>It is important to note that the file content typically contains commercially sensitive
information, and based on the suggested file name, it is possible to identify the counterparties with
whom a particular company has agreements. Therefore, it is recommended that all this information
be transmitted through secure information systems that are protected against leakage. Similarly,
when storing information, it is necessary to employ mechanisms to prevent information leakage. If
a subsequent recipient in the transfer chain is not trustworthy, it is recommended that both the file
content and its name be encrypted.</p>
        <p>Using the file-naming principle mentioned above, avoiding the need to parse the message is
possible. This means routing and setting processing priority can be done without reading the
content of the file. As a result, an element can be added to the scheme shown in Figure 5 that can
perform processing queue formation, considering the message processing priority. Figure 10
presents this new distribution element capable of reordering the message queue.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Experimental results</title>
      <p>For conducting experiments, a model of an EDI system, analogous to industrial systems, was
developed. During the preparation for the experiment, a database of messages typical of the trade
sector was created. The most frequently used formats in this sector are ORDER, which corresponds
to the GS1 XML standard version 3.6; APERAK, which corresponds to the GS1 XML standard
version 3.4.1; and INVOICE, which corresponds to the GS1 XML standard version 3.6. The message
database contains 1000 messages of each format. The file sizes are ORDER – 4214 bytes; APERAK –
1046 bytes; INVOICE – 7563.</p>
      <p>Ten experiments were conducted in each of two modes:</p>
      <sec id="sec-5-1">
        <title>Distribution (file routing) based on information from the file name.</title>
        <p>Distribution (file routing) based on information extracted from the file content.</p>
        <p>For each of the 1000 iterations in every experiment, the transmission time of each specific
message was recorded, from the element that created the message to the element that received it in
its role as a client. Among the obtained data, the average, minimum, and maximum message
processing times were determined for each dataset. The experimental results are presented in Table
1 and illustrated in Figure 11.</p>
        <p>The experiment results demonstrate an increase in the speed of message processing due to
changing the principle of file naming. For APERAK format files with a size of 1046 bytes, the
improvement was 16.69%; for ORDER with a size of 4214 bytes, the improvement was 22.51%; for
INVOICE with a size of 7563 bytes, the improvement was 34.01%. It can be noted that the larger the
size of the message and the more complex the procedure for extracting identifiers from the body of
the file, the more effectively the proposed principle of file naming demonstrates itself, also the size
of the message still affects the speed of processing due to the need to transfer files through the
network and other elements of the information system.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Discussion</title>
      <sec id="sec-6-1">
        <title>6.1. Information security and anonymity</title>
        <p>It should be noted that the file content typically contains information constituting a commercial
secret, and based on the proposed file name, it's possible to identify the counterparties with whom
a specific company has contracts. Therefore, a security concern arises. It is advisable to transmit all
such information through securely protected information systems that prevent leaks. However, it's
important to recognize that the nature of a GLN identifier inherently does not guarantee
anonymity.</p>
        <p>GLN addresses found in files and file names are publicly available information accessible
through the GS1 service system. If anonymity is required, parties should resort to alternative
identifiers. Data transmission within corporate networks generally occurs by default in secure
systems, and data storage, including messages, also occurs in protected databases. In cases of
message transmission or storage via compromised communication channels, changing the file
naming format does not fundamentally increase risks, as intercepted messages can still be read.
The information contained within the message body far outweighs the business value of any data
that could be illicitly extracted from the file name. The research proposal helps expand potential
ways to protect information within the message body; for example, encrypting the message body
allows EDI providers to perform routing based on information in the message name without
accessing the message body. In existing systems, routing requires extracting information about the
exchanging parties from the message body, involving all intermediate exchange links, such as
multiple EDI providers, who may gain access to and potentially use sensitive information from the
message body.</p>
      </sec>
      <sec id="sec-6-2">
        <title>6.2. Expose of information about existing systems</title>
        <p>According to this work proposal file name formation should occur within the system responsible
for the initial file creation to achieve maximum efficiency of the proposed solution. At the time of
file formation, the system generating it already possesses all the necessary information to craft the
proposed file name (excluding priority, as this parameter may not be typical for existing systems).
Additionally, the file name can be adjusted to the proposed one at any subsequent stage of message
transfer, such as by an electronic document management provider. Systems that do not support
deriving useful information from a file name will continue to process messages as before the file
naming format change. Systems that integrate filename processing logic with the proposed
changes may benefit from the advantages outlined in this article.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusion</title>
      <p>This work presents a network data analysis of electronic message exchange within a document
circulation system. By examining the patterns and characteristics of this communication network,
we identified key opportunities for optimization. Specifically, our analysis led to the proposal of a
novel file naming convention designed to embed critical metadata directly within the filename. The
implications of this network-aware file naming scheme are significant for data flow and
processing. We posit that it can lead to: reduced network latency in file routing; elimination of the
need for content-based parsing at initial routing stages; the ability to implement priority queuing
based on sender/recipient relationships observed within the network, without requiring deep
packet inspection; and a simplified network path selection logic leveraging inherent network
structure information encoded in the filename. To validate the efficacy of the proposed approach,
we developed a simulation system for message transmission. This allowed for an experimental
comparison between traditional routing methods and our proposed approach. The results of
experiments demonstrate a substantial improvement in file routing performance across the
simulated system.</p>
    </sec>
    <sec id="sec-8">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used Grammarly to check Grammar and spelling.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Fortune</given-names>
            <surname>Business</surname>
          </string-name>
          <string-name>
            <surname>Insights</surname>
          </string-name>
          ,
          <article-title>The global Electronic Data Interchange (EDI) software market size</article-title>
          ,
          <year>2025</year>
          . URL: https://www.fortunebusinessinsights.com/electronic
          <article-title>-data-interchange-edisoftware-market-103690.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>[2] Structure of an EDIFACT Interchange</source>
          ,
          <year>2020</year>
          . URL: https://www.odette.org/uploads/resources/document/OS11_Structure_
          <article-title>of_an_EDIFACT_Interc hange_</article-title>
          <year>v1</year>
          .0_
          <fpage>2021</fpage>
          -05-07-125201.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] XML specification for electronic data interchange</article-title>
          ,
          <year>2023</year>
          . URL: https://www.gs1.org/standards/gs1-xml/3-0.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>ORDER-XML Specification</surname>
          </string-name>
          ,
          <year>2024</year>
          . URL: https://wiki.edin.ua/en/latest/Distribution/EDIN_
          <article-title>2_0/XML/XML_structure.html#orderdocument-order.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>EDIFACT</surname>
          </string-name>
          ,
          <source>EANCOM Syntax 4</source>
          ,
          <year>2020</year>
          . URL: https://gs1.se/wpcontent/uploads/sites/2/2020/08/edifact-syntax-eancom.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>X12</given-names>
            <surname>EDI Specification</surname>
          </string-name>
          ,
          <year>2020</year>
          . URL: https://www.stedi.com/edi/x12.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bahija</surname>
          </string-name>
          ,
          <article-title>The prevention and reduction of the bullwhip effect by electronic data interchange and collaborative forecasting</article-title>
          ,
          <source>European Scientific Journal</source>
          <volume>17</volume>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .19044/esj.
          <year>2021</year>
          .v17n23p163.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E.</given-names>
            <surname>Weisz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.M.</given-names>
            <surname>Herold</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kummer</surname>
          </string-name>
          ,
          <article-title>Revisiting the bullwhip effect: how can AI smoothen the bullwhip phenomenon?</article-title>
          ,
          <source>The International Journal of Logistics Management</source>
          <volume>34</volume>
          (
          <year>2023</year>
          )
          <fpage>98</fpage>
          -
          <lpage>120</lpage>
          . doi:
          <volume>10</volume>
          .1108/IJLM-02-2022-0078.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Tian</surname>
          </string-name>
          ,
          <string-name>
            <surname>H. Zhang,</surname>
          </string-name>
          <article-title>Digital transformation for sustainability in industry 4.0: alleviating the corporate digital divide and enhancing supply chain collaboration</article-title>
          ,
          <source>Systems</source>
          <volume>13</volume>
          (
          <year>2025</year>
          )
          <article-title>123</article-title>
          . doi:
          <volume>10</volume>
          .3390/systems13020123.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Ghosh</surname>
          </string-name>
          ,
          <article-title>Combating the bullwhip effect in rival online food delivery platforms using deep learning</article-title>
          ,
          <source>Arxiv</source>
          (
          <year>2025</year>
          ). doi:
          <volume>10</volume>
          .48550/arXiv.2503.22753.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sarıcıoğlu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. E.</given-names>
            <surname>Müjde</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Cedolin</surname>
          </string-name>
          ,
          <article-title>Analyzing one-step and multi-step forecasting to mitigate the bullwhip effect and improve supply chain performance</article-title>
          ,
          <source>IEEE Access 12</source>
          (
          <year>2024</year>
          )
          <fpage>180161</fpage>
          -
          <lpage>180174</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2024</year>
          .
          <volume>3510175</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lin</surname>
          </string-name>
          , G. Liu,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>The behavioural causes of bullwhip effect in supply chains: a systematic literature review</article-title>
          ,
          <source>International Journal of Production Economics</source>
          <volume>236</volume>
          (
          <year>2021</year>
          )
          <fpage>108</fpage>
          -
          <lpage>120</lpage>
          . doi:
          <volume>108120</volume>
          .
          <fpage>10</fpage>
          .1016/j.ijpe.
          <year>2021</year>
          .
          <volume>108120</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>K.</surname>
          </string-name>
          <article-title>el Fellah, I. el Azami, A. el Makrani, A comparative analysis of blockchain and Electronic Data Interchange (EDI) in supply chain: Identifying strengths, weaknesses, and synergies</article-title>
          ,
          <source>Journal of Autonomous Intelligence</source>
          <volume>7</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .32629/jai.v7i5.
          <fpage>1481</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>