A Counterfeit Solution for Pharma Supply Chain
Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2017, Vol 3, Issue 11
Abstract
This paper provides a detailed overview of the blockchain technology and how it can be used to build a foolproof system in eliminating counterfeit products in pharmaceutical industries. Study by various reports indicate that counterfeit products entering the mainstream supply is by far one of the major issue faced by the pharmaceutical industries. By using blockchain across the whole value chain, various pitfalls and challenges faced by the stakeholders can be resolved as blockchain, by design is (i) robust, (ii) improves transparency, (iii) immutable, (iv) authentic, (v) reliable and (vi) secure. Overall, this paper attempts to provide a roadmap on how blockchain transactions can help various stakeholders improve the counterfeit situation, challenges one might face in implementing a blockchain solution and steps for further research.
Authors and Affiliations
Soundarya K. , Priyanka Pandey, R. Dhanalakshmi
Modeling user and topic interactions in social networks using Hawkes processes
We present in this paper a framework to model information diffusion in social networks based on linear multivariate Hawkes processes. Our model exploits the effective broadcasting times of information by users, which gua...
Necessary & Sufficient Conditions for Consistency of Haar Wavelet Expressions to their resizable Hadoop Cluster Channels and Complexity
Abstract—We develop a novel technique for resizable Hadoop cluster’s lower bounds, the bipartite matching rectangular array of Haar Wavelet expressions. Specifically, fix an arbitrary hybrid kernel function 𝒇 ∶ {𝟎, 𝟏}𝒏 →...
Palladio Optimization Suite: QoS optimization for component-based Cloud applications
One important issue in software engineering is to find an effective way to deal with the increasing complexity of software computing system. Modern software applications have evolved in terms of size and scope. Specific...
Adapting Data Popularity in Mobility-Based Proactive Caching Decisions for Heterogeneous Wireless Networks
The current paper presents extensions to a distributed user mobility-based proactive caching scheme that supports individual users’ requests, and a brief discussion of the benefits from exploiting user-centric features....
Extensible and fine-grained characteristics-positioned information storage in cloud computing
With the improvement of distributed computing, outsourcing information to cloud server pulls in loads of considerations. To ensure the security and accomplish adaptable fine-grained record access control, (ABE) was propo...