Cloud service and interactive IoT system application in the service management mode of logistics enterprises

In order to standardize the functions of the Internet of Things interactive system, such as cost constraints, probability, and speed, the basic principle is to expand the ability to express data flow or cost behavior, and to build logic to describe the nature of the Internet of Things. In order to integrate the MODEST automatic verification tool, this article investigates the mechanism of converting PPTCA reaction models into action programs using random time automata, theoretically supporting the use of the tool. This paper studies the theory and technology of enterprise logistics service management and introduces the B/S system structure, the database technology used, and the current research status at home and abroad. When analyzing program requirements, first use dynamic and static functional models to explain system business requirements and distinguish systems. The general design and detailed design of the system are carried out, and the functional structure of the system is established. The system performs user management module, company information management, customer service, transaction order and report management, user management module, user connection and registration, employee personal information management, order management, and other functions of the customer service module. In addition, users and developers conduct transactions by accessing the cloud computing service platform created by operators, and there are factors that promote each other between users and developers. Sending and completing service functions, the transaction control module performs order management, order comparison management and other functions, and the report management module performs the reporting function of customer information and user information reports.


Introduction
The use of enterprise service management information system can provide enterprises with advanced management methods, encourage enterprises to collect all kinds of information, and effectively promote the development of enterprise production chains (Chen and Metawa 2020). Information systems are based on contemporary science and technology, combined with social needs and other factors, and cover multiple fields of social research. It has formed an advanced system with a high degree of social recognition, which can support various processes such as production, management and sales, and collect data required for operations to help companies achieve production goals and budget expenditures, and increase their sales globally (Hsieh et al. 2012). Competitiveness in the market and concepts reflects the greatest business profit. In the context of increasingly fierce market competition, companies must improve their competitiveness, increase market share, develop the industrial chain and improve their own management (Holjevac 2010). However, in actual operation, the company is blindly growing, not paying attention to market demand, and insufficiently connected with the company's suppliers, which will affect the improvement of corporate governance and production efficiency (Lu et al. 2012). The slow communication with the external environment has resulted in the company's inability to adapt well to the fierce competition in the market, which has a negative impact on the smooth operation of the business. When formally modeling a largescale interactive Internet of Things system, the generated model usually has a larger state space. Before proceeding to the next formal analysis, a well-known method is usually used to simulate each other to simulate the system model, and the state space is reduced. Similarly, when checking the internal behavior of the model, use the weak mutual simulation method (Wang 2013). This method ignores internal behavior, judges equivalence based on whether the two models show the same visual behavior, and then successfully applies to a probabilistic system called lowprobability mutual simulation. However, as far as the author knows, there is no literature that considers the preserved difference of the weak mutual simulation of probabilistic systems (Shi et al. 2018a). In an interactive IoT system with parallelism, differences may lead to inequality of the two models. It can be understood that this means that by considering initiative (that is, ''good things will happen''), the divergent state will cause ''good things'' to happen. Due to the execution of internal behavior, this situation will not happen, but the state of non-disagreement is full natural. Therefore, when determining the mutual simulation equivalents of the interactive IoT system model, behavioral deviations should be considered. In addition, operators must adapt their price structure to market changes in order to attract users and developers to cloud computing (Lin et al. 2015). This is in line with the basic characteristics of the bilateral market. According to Evens analysis, this article believes that the cloud computing service market is a bilateral market coordinated by demand (Pal and Hui 2013).

Related work
The literature mainly introduces the meaning and background of the entire service management system of logistics companies, as well as the research and development of this system in the market, and explains the main work and organizational structure of this article. The literature mainly describes the requirements of the user management, report management, customer service and other modules of the logistics company's service management system, and describes the system's goals, troubleshooting and system requirements, such as using UML diagrams for each modules for analysis and display (Hu and Sheng 2014). In the literature, the goals and principles of system design are defined, and the technical architecture of the system, the structure and development model of the system, and the basic technology for designing system functional modules are defined. On the basis of the system, the structural modeling and definition of functional modules are introduced (Wu and Chaipiyaphan 2019). Design and implement specific modules of the logistics company's service management system, and test the entire system. The main direction of testing is functional testing and non-functional testing. The literature studied the mutual simulation equivalence of the interactive system model of the Internet of Things. The huge scale of the interactive Internet of Things system will inevitably increase the complexity of the formal model, making quantitative verification and analysis very difficult (Huang et al. 2022;Sangaiah et al. 2021). In order to appropriately reduce the scale of the model, this paper studies the strong mutual simulation and weak mutual simulation from the perspective of whether to consider the internal behavior of the system. In order to conduct powerful mutual simulation, this paper studies the behavioral equivalence of constrained automata models with characteristics of probability, time, and cost (Battigalli et al. 2020;Sangaiah et al. 2023). For weak mutual simulations, this article focuses on probabilistic models and considers the huge impact of divergent behavior (that is, infinite internal behavior) the related theories and corresponding verification methods of low-probability divergence mutual simulation are studied from three perspectives (Shi et al. 2018b). The subdivision is refined by combining inductive ideas and classic methods, and a polynomial time algorithm is designed to calculate with the smallest probability and have the largest guaranteed divergence. The literature presents a case of an interactive Internet of Things system, which has two workstations operating independently in a remote environment. Using the model and logic provided in this article, you can model the interactive IOT system and specify its properties in a logical manner (Ardito et al. 2020). The literature found by analyzing the supply chain of the cloud computing industry that the general market of cloud computing services is mainly composed of users, developers, and operators. Users and developers conduct transactions by accessing the cloud computing service platform created by operators, and there are factors that promote each other between users and developers (Wei and Blake 2010;Miri et al. 2023). In addition, operators must adapt their price structure to market changes in order to attract users and developers to cloud computing. This is in line with the basic characteristics of the bilateral market. According to Evens analysis, this article believes that the cloud computing service market is a bilateral market coordinated by demand.
3 Cloud computing services and interactive internet of things system

Cloud computing service terminal design
This article provides a platform-based mobile virtual desktop application service. The management platform and application service of cloud computer virtualized mobile devices are composed of three parts. The architecture of the mobile cloud computing-based application service is shown in Fig. 1.
The hardware architecture layer provides basic processing power, storage, network, and computing resources, which enable users to deploy and run any software. Users do not have to manage and control the underlying cloud infrastructure, but can control storage resources, operating systems, and deployed applications. The basic cloud platform is mainly composed of hardware, including node servers, redundant servers, front-end servers, routers, and hardware firewalls. The hardware functions are shown in Fig. 2.
Nowadays, many PCs improve storage and other resources to provide service interfaces. However, most mobile terminals currently do not support these functional navigation systems. For mobile devices, it is difficult to access certain resources of the virtual cloud computing system through the Internet. However, you can install a remote desktop client on a mobile device and then use remote desktop protocol technologies such as VNC and RDP to access the virtual desktop system of the remote desktop host, as shown in Fig. 3.

Interactive IoT system
Time function, for example, the smart stylus promptly informs the user and probability function within 0.1 s after detecting an input error. Distributed components (such as certain physical objects) are connected to each other and interact with each other through different types of communication, so Reo and limited PLC can be used as a modeling model or a semantic model. In the Reo model, components are modeled as different nodes, and their internal behavior is abstract. In this way, Reo and restricted machines must be expanded accordingly to meet these two new requirements. For example, if FIFO-1 error timeout is allowed, it is very likely that data will be lost when writing data to the buffer, and if the specified timeout period is exceeded, the data will also be lost. For such a channel, Reo time and TCA can be used to characterize the time limit part, and Reo and PCA probability can be used to characterize the loss probability part. However, so far, there is no limit to the expansion of the machine, and these two functions are effectively combined.
They hope that if the power consumption of each connection in the current system is acceptable, certain attributes can be analyzed or verified for each physical object (for example, the entire interactive system of the Internet of Things). Under certain equity conditions, in order to achieve these goals, this article expands the basic atomic channel in the classic Reo framework and enhances its I/ by adding cost features (specifically divided into instantaneous price and price rate), time constraints, and probability selection. O operation. The extended Reo is called Reo cost probability time. In particular, $ [ R is used to represent the current cost on the channel, and $ [ R is used  to represent the cost consumption rate on the buffer or time node. For the sake of intuitiveness, all current costs and tariffs are clearly stated in this article, including the value 0.
The semantic model of PPTReo is an extended restricted automaton. The effective combination of TCA and PCA increases the cost ratio corresponding to the model position (to describe the revenue or cost of staying in that position per unit of time) the operating cost of each branch (Used to describe the cost or revenue generated in the execution process) I/O operations. In the definition given below, the symbolic representation that uses data allocation instead of data restriction is shown. It should match the classic definition of PCA.
Definition: The automata with cost probability time constraints are a seven-tuple, as in formula (1): The N data distributions that use the Dirac distribution for migration are called deterministic migration, which is called formula (2): Given PPTCA A, the destination route r from A represents a finite sequence of consecutive migration instances, without delay, and terminates at the destination, as in formula (3): The following conditions, such as formula (4) (5) (6): After two matching migrations (or one migration and multiple matching migrations) are performed at the same time, the instantaneous cost of each probability branch in the combined migration is the sum of the instantaneous costs of the corresponding original probability branches. The specific formal definition is as follows: Definition: given PPTCA, as shown in formula (7): Among them, as shown in formula (8): The product of A1 and A2 is, as shown in formula (9): Among them, as shown in formulas (10) and (11): ic l 1 ; l 2 ð Þ¼ic 1 l 1 ð Þ^ic 2 l 2 ð Þ ð10Þ The ct expression is shown in formula (12): Defined as the formula as formula (13): If the above mixed migration conditions are true, as shown in formula (14): In particular, it must be proved that in all cases, the results of Baier's definition of productB in PCA are consistent with the results of the definition of productH given in this article, and the definition given in this article supports the definition given by Baier. First, the form of these two definitions is described as follows: (1) ProductB defined by Baier: first, two important concepts are given: simple combined migration and complex combined migration. Simple combined migration: for two PCAs, if the following conditions are met, the latter is called the paired migration of the former, as shown in formulas 15 and 16: Contains formula 17: And formula 18: The calculation formula of A is shown in Eq. 19: Then further calculate formula 20: This is called simple compound migration.
(2) The product H defined in this article is formula 21: The product H of A 1 and A 2 is Formula 22: Cloud service and interactive IoT system application in the service management mode of… 9055 ? is defined as Eq. 23: If M = 0, there are certain conditions, such as A [ M, as shown in Eq. 24: If M = 0, as in formula 25: The semantics corresponding to the series operation of PPTReo is the hidden operation of pPTCA. PCA extends the shielding operation of pPTCA and adds the time structure and cost structure. The specific conditions of join and hide operations are shown in Fig. 4. 4 System design and implementation of logistics enterprise service management mode

Systematic detailed design of service management mode of logistics enterprises
It mainly includes user information management and account management. User information management mainly involves the filling and management of users' personal information. After the user successfully logs in to the system, user management can be performed. Employees use the customer service module to manage the service ordering process, which is mainly divided into service distribution, service submission and service payment modules. First, the manager assigns the task after receiving the task; the employee analyzes and implements the task, and then submits it. The manager reviews the task. After the task is successfully completed, the manager will re-run the task and finally confirm whether it is completed. The company information management module mainly Fig. 4 Examples of join and hide operations and their semantics manages company announcements and positions, and is divided into advertising management and position management modules. Post, edit and delete announcements, and notify new customers to avoid losing important information. Job management involves the company's executives posting and editing jobs, assigning jobs to each employee, and rewarding employees for ways to increase their enthusiasm for work. According to the interface description provided, the manager needs to connect to the successful system, enter the advertisement publishing interface, enter the published information, click the ''OK'' button, and then click the ''OK'' button when the new situation needs to be communicated to the employees. Confirm to send and return some information to receive information from this packet to confirm that the transmission is successful. After the information is released, the system will automatically open a box to remind employees that the information has been released. The transaction order module contains the following fact: all payment transactions are managed in the form of orders through the order module. The transaction order function is mainly divided into order management, order review and order verification management. Customers can inquire about orders, and employees can perform order management and order verification management after authorization, mainly to ensure the security of user payments.
Among them, trade payment manager service is a transaction management class, which is mainly responsible for many operations on the invoice during the transaction, such as asking whether the invoice exists, otherwise creating a new invoice, completing the payment, transaction processing logic, etc. In this article, specific features have been scanned and participated in the payment process. The Trade payment query service mainly provides order query services for back-end systems and merchant operating platforms, recording according to bank order numbers and cash flow numbers, requesting payment record methods, page request payment order methods, page request payment record methods, transaction flow report methods and transactions method report method. The main function of the trade reconciliation service is to provide an interface for processing trade order module reconciliation errors, which is mainly responsible for the success of the platform. If the bank registration does not exist or the bank processing method fails, how to deal with the bank's success but the platform failure and the processing method for the exception of the number of mismatches (all exceptions should be adjusted according to the bank details). For details on handling fee mismatch errors, refer to the reconciliation process function. The above three services constitute the application layer of the transaction order module, and trade payment order and trade payment record constitute the data layer of the transaction order module, which are mainly used for the persistence of orders and order records. There are pay goods details entity, trade payment order entity and trade payment record entity, used to encapsulate data between the application layer and the data layer.
The typical functional scheme of the transaction order module is to modify the order information according to the payment result. In the Result method, first obtain the user's payment configuration, and then obtain the user's transaction order information and transaction process information according to the payment configuration. Under other methods, according to third-party payment, after reporting the transaction result and updating the transaction flow data, the transaction order is updated according to the final result of the data transaction flow, and the transaction order is finally retained. The specific process sequence diagram is shown in Fig. 5.
The report management module mainly collects, counts and processes the reports required by the system. It mainly includes functions such as adding, deleting, querying, and monitoring reports. The purpose is to improve the efficiency of looking up forms, increase the speed of personnel serving customers, and ensure the security of customer information. In terms of communication, they are Socket and WebSocket to communicate with smart gateway and web front end, respectively. Socket processing is similar to the socket used in this article. The main function of WebSocket is to maintain a long-distance connection between the background and the foreground. The specific class diagram is shown in Fig. 6.
In order to maintain a one-to-one correspondence between the report displayed by the upper-level application and the actual report of the lower-level, the system uses a semi-automatic method: only after receiving a message, Smart Gateway can use it on the user interface to add a report user interface, and the user can add The report is added to the database. It first calls the service to add new report messages to the database to save data when no users are online. After the user is online, the query database will prompt the user to complete the report without any complete information.
System storage information includes user information, customer transaction information, service procedures and related operations, status, processing results, event time registration information, service information, user identification and system log information, etc. You can use a database diagram to clearly show each database table, which takes over the MySQL database. MySQL is a relational database management system, the source code is open, using SQL language. It supports multiple operating systems, multiple threads, optimized SQL algorithms, multiple connection methods, management tools, multiple languages and multiple storage engines, rich APIs and beautiful system structures, etc. It is a large developer and enterprise user and the first choice for free software enthusiasts. In particular, the integration with PHP/PERL and Apache provides website technology based on dynamic databases, which has become one of the most popular relational database management systems today. In addition, MySQL uses a dual authorization model for the community and commercial versions. For developers targeting R&D, please use the free and open source version of the community. Due to the use of open source code, anyone can meet the requirements of the GPL agreement and needs personalized development.
The first version of MySQL is mainly used for small and medium-sized websites to meet the business needs of users. With the continuous improvement of MySQL and the application of distributed technology, the new version has developed into a large database that can handle tens of millions of records and supports single point, replication and clustering, requiring several architectures of different scales. The project composed of Linux ? Apache ? MySQL has attracted the attention of many IT companies because of its low development cost, short cycle time, high speed, reliability and adaptability. It is precisely because the open source MySQL has good compatibility, excellent performance and low cost to meet the needs of use, it is the first choice for many developers to manage relational databases. The ER diagram of the main database table of the system is shown in Fig. 7: 4.2 The table structure design of the database

User information table
The user information table records information about users, including user ID, user name, address, registered company name, password, customer address, name user name, password information, email address, and phone number. User user_id is the ID of the user, which is automatically generated according to the time of user registration, and is uniquely determined during the entire life cycle of the system. The user name is the user's nickname, which can be customized. The login name is the user's login name, and there is only one. The user logs in to the system with a user name and password, and can access the system only when the login name matches the login password. The structure of the user information table is shown in Table 1.

Authorization information table
The Authority_db authorization information table is mainly used to store the function menu information of the threat message system, that is, authorization information. The main fields include authorization master key ID, authorization name, authorization description, authorization code and project ID authorization, etc. Code_authority represents the authority level. The authorization name is the authorized name. Table 2 contains several identical role names, but their authorization code field values are different, so different users can standardize different roles and permissions. The authorization information is represented Fig. 5 Sequence diagram of the transaction order module by a tree structure of a data table, which is a self-allocated data table. The sub-authorization has only one top-level authorization. If the permission is the root permission, the permission ID is null, as shown in Table 2.

Account table
The account table stores account information, mainly user login name, password, email address, registration time, organization ID, role and other information. The role ID in Table 3 refers to the primary key in the role table.

Customer service form
The service table mainly stores information about the task process, as shown in Table 4.

Contract form
Code is assigned to contract information and project information. The specific list is shown in Table 5. The specific environment configuration of the system is shown in Table 6. The structure of UserService code is similar to the structure of UserController, which implements the User-Dao object and defines methods for processing user data. Corresponding data manipulation methods are also defined in the UserDao object to directly implement database operations.
This layered architecture makes the logical structure of the code very clear, and each layer is responsible for implementing appropriate functions.
The controller is the control layer, responsible for receiving requests and receiving data. Services are the business logic layer and are responsible. The Dao layer is mainly the database layer, which defines appropriate SQL    (11) The id of the default device statements to implement data operations. In addition to adding, deleting and modifying, the platform also provides the function of exporting enterprise data in batches. In actual company business, we usually include online import and export of data. Here, we will import and export, the method is encapsulated in the code, only need to call it. The report management algorithm is shown in Fig. 8.

Conclusion
Taking into account the current increase in the use of mobile devices and the gradual development of cloud computing technology, this article first proposes a mobile device application model that combines mobile devices and cloud computing, and introduces a virtual application desktop for mobile devices. Under the three-tier architecture of cloud computing, the main mode and operation of virtual application workstations on mobile devices are described. The process is divided into modules according to detailed analysis and design, and the development and implementation are described, including the mobile device part, the desktop part and background management part of the virtual application. Finally, the development of the virtual application desktop will be completed, and ongoing testing can ensure the normal operation and performance improvement of the application services provided by the virtual application desktop. The behavior of interactive IoT systems can be modeled formally. In order to verify and analyze whether these behaviors are correct and reasonable, and whether they meet the needs of users, appropriate attribute standardization methods and formal methods must be found. Taking into account the characteristics of the Internet of Things interactive system, this article combines PCTL* and TSDSL, and adds a revenue structure that describes the cost and forms a logical PPTDL that can adjust the characteristics of cost, probability, time, and  data. By defining the satisfiability relationship between PPTDL and pPTCA, it is possible to check and analyze whether the interactive IoT system satisfies the specified attributes, and tools can be used to automatically check the feasibility of model attributes. However, as far as the author knows, there is no literature that considers the preserved difference of the weak mutual simulation of probabilistic systems. Different behaviors, the intuitive understanding is that the system will not shut down due to the endless execution of internal operations. In an interactive IoT system with parallelism, differences may lead to inequality of the two models. It can be understood that this means that when people consider initiative (that is, ''good things must happen''), the state of divergence may lead to the fact that ''good things'' do not happen. This is not due to the execution of internal behaviors, but the state and nature that do not disagree meet. Therefore, when determining the mutual simulation equivalents of the interactive IoT system model, behavioral deviations should be considered. Users and developers conduct transactions by accessing the cloud computing service platform created by operators, and there are factors that promote each other between users and developers. In addition, operators must adapt their price structure to market changes in order to attract users and developers to cloud computing. This is in line with the basic characteristics of the bilateral market. According to Evens analysis, this article believes that the cloud computing service market is a bilateral market coordinated by demand.
Funding The authors have not disclosed any funding.
Data availability Data will be made available on request.

Declarations
Conflict of interest The authors declare that they have no conflict of interests.
Ethical approval This article does not contain any studies with human participants performed by any of the authors. Cloud service and interactive IoT system application in the service management mode of… 9063