Artificial Intelligence-Based Strategies for Enhancing Supply Chain Resilience in Emerging Economies
Main Article Content
Abstract
Supply chains in emerging economies face significant challenges due to infrastructural constraints, geopolitical instability, fluctuating market demands, and disruptions such as natural disasters or pandemics. Building resilience in these supply chains is crucial to ensure continuity, adaptability, and long-term sustainability. Artificial Intelligence (AI) has emerged as a transformative technology capable of enhancing supply chain resilience through predictive analytics, real-time monitoring, intelligent automation, and decision support. This study investigates the application of AI-based strategies tailored to the unique conditions of emerging economies. It explores how machine learning models, natural language processing, and optimization algorithms can improve risk assessment, demand forecasting, supplier management, and disruption recovery. Special emphasis is placed on integrating AI within existing supply chain infrastructure that may have limitations in technology adoption. The research adopts a mixed-method approach, analyzing secondary data from industry reports and case studies across sectors such as agriculture, manufacturing, and retail in emerging markets. It also includes the development of an AIdriven framework designed to enhance visibility, responsiveness, and flexibility in supply chains. Key findings indicate that AI enables proactive risk management by predicting potential disruptions and optimizing inventory levels. Intelligent automation reduces human error and accelerates response times during crises. However, challenges like data quality, digital literacy, and cost barriers affect widespread adoption. The study concludes that AI-based strategies offer considerable potential for enhancing supply chain resilience in emerging economies, provided that implementation is context-aware and supported by policy frameworks that encourage digital transformation. Future work should focus on scalable AI solutions, capacity building, and collaboration among stakeholders to overcome existing challenges.
Article Details
Section
How to Cite
References
1. Sheffi, Y. (2005). The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage. MIT Press.
2. Christopher, M., & Peck, H. (2004). Building the resilient supply chain. The International Journal of Logistics Management, 15(2), 1-14.
3. Choi, T. M., Wallace, S. W., & Wang, Y. (2018). Big Data Analytics in Operations Management. Production and Operations Management, 27(10), 1868-1883.
4. Wang, G., Gunasekaran, A., Ngai, E. W. T., & Papadopoulos, T. (2016). Big data analytics in logistics and supply chain management: Certain investigations for research and applications. International Journal of Production Economics, 176, 98-110.
5. Baryannis, G., Dani, S., & Antoniou, G. (2019). Predictive analytics and artificial intelligence in supply chain management: Review and implications for the future. Computers & Industrial Engineering, 137, 106024.
6. Potel, R. (2019). A Real-Time Analytics Architecture for Enterprise Order Lifecycle Visibility and Backlog Management. International Journal of Research and Applied Innovations, 2(6), 2460-2469.
7. Ivanov, D., & Dolgui, A. (2018). A digital supply chain twin for managing the disruption risks and resilience in the era of Industry 4.0. Production Planning & Control, 29(11), 903-918.
8. Saghafian, S., & Van Oyen, M. P. (2019). Operations management in healthcare: strategy and practice. Springer.
9. Kshetri, N. (2018). 1 The Emerging Role of Big Data in Key Development Issues: Opportunities, Challenges, and Concerns. Big Data for Development, 3-28.
10. Kumar, A., Singh, R., & Prakash, A. (2017). Developing resilient supply chains: a conceptual framework and empirical investigation. Benchmarking: An International Journal, 24(1), 228-253.
11. Murugeshwari, B., & Sujatha, R. (2014). Preservation of Privacy for Multiparty Computation System with Homomorphic Encryption. International Journal of Emerging Technology and Advanced Engineering, 4(3), 530-535.
12. Garg, V. K., Soundappan, S. J., & Kaur, E. M. (2020). Enhancement in intrusion detection system for WLAN using genetic algorithms. South Asian Research Journal of Engineering and Technology, 2(6), 62–64. https://doi.org/10.36346/sarjet.2020.v02i06.003
13. Santhoshini, G., & Anbazhagan, K. (2014, February). An object based software tool for software measurement. In International Conference on Information Communication and Embedded Systems (ICICES2014) (pp. 1-5). IEEE.
14. Deivendran, P., Anbazhagan, K., Sailaja, P., Sujatha, E., Babu, M. R., & Sudhakar, S. (2020). Scalability service in data center persistent storage allocation using virtual machines. International Journal of Scientific & Technology Research, 9(02), 2135-2139.
15. Ranjith Rajasekharan. (2019). Hybrid cloud architecture for enterprise database system. International Journal of Science, Research and Technology (IJSRAT), 2(6), 2513–251.
16. Pushparathi, V. G., Sudha, M., David, D. J., Anbazhagan, K., & Vethamani, S. E. (2020). A Continuous Decision Based Multi Kernel Median Filter for Noise Removal on Brain MRI Images. Advanced imaging, 1(3), 5.
17. Rajurkar, P. R. A. S. H. A. N. T. (2019). Green Hydrogen Production from Industrial Wastewater Using Microbial Electrolysis. Iconic Research And Engineering Journals, 2(12), 280-293.
18. Watham, S. D., & Vimal, V. R. (2013). Design and Implementation of Data Sanitization Technique For Effective Filtering With Enhanced Medical Support System in Cloud Architecture Diagram. International Journal of Emerging Technology and Advanced Engineering, 3(12), 471-473.
19. Kumar, J. (2013). Preservation of the Privacy for Multiple Custodian Systems with Rule Sharing. Journal of Computer Science.
20. Vimal Raja, G. (2021). Mining Customer Sentiments from Financial Feedback and Reviews using Data Mining Algorithms. International Journal of Innovative Research in Computer and Communication Engineering, 9(12), 14705-14710.
21. Murugeshwari, B., Amirthavalli, R., Sri, C. B., & Pari, S. N. (2023). Hybrid key authentication scheme for privacy over adhoc communication. arXiv preprint arXiv:2304.14652.
22. Jagadeesh, S., & Sugumar, R. (2017). Optimal knowledge extraction system based on GSA and AANN. International Journal of Control Theory and Applications, 10(12), 153–162.
23. Jayaraman, S., Rajendran, S., & P, S. P. (2019). Fuzzy c-means clustering and elliptic curve cryptography using privacy preserving in cloud. International Journal of Business Intelligence and Data Mining, 15(3), 273-287.