Search results for: Privacy and Data Protection Law
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26326

Search results for: Privacy and Data Protection Law

25846 Unlocking Health Insights: Studying Data for Better Care

Authors: Valentina Marutyan

Abstract:

Healthcare data mining is a rapidly developing field at the intersection of technology and medicine that has the potential to change our understanding and approach to providing healthcare. Healthcare and data mining is the process of examining huge amounts of data to extract useful information that can be applied in order to improve patient care, treatment effectiveness, and overall healthcare delivery. This field looks for patterns, trends, and correlations in a variety of healthcare datasets, such as electronic health records (EHRs), medical imaging, patient demographics, and treatment histories. To accomplish this, it uses advanced analytical approaches. Predictive analysis using historical patient data is a major area of interest in healthcare data mining. This enables doctors to get involved early to prevent problems or improve results for patients. It also assists in early disease detection and customized treatment planning for every person. Doctors can customize a patient's care by looking at their medical history, genetic profile, current and previous therapies. In this way, treatments can be more effective and have fewer negative consequences. Moreover, helping patients, it improves the efficiency of hospitals. It helps them determine the number of beds or doctors they require in regard to the number of patients they expect. In this project are used models like logistic regression, random forests, and neural networks for predicting diseases and analyzing medical images. Patients were helped by algorithms such as k-means, and connections between treatments and patient responses were identified by association rule mining. Time series techniques helped in resource management by predicting patient admissions. These methods improved healthcare decision-making and personalized treatment. Also, healthcare data mining must deal with difficulties such as bad data quality, privacy challenges, managing large and complicated datasets, ensuring the reliability of models, managing biases, limited data sharing, and regulatory compliance. Finally, secret code of data mining in healthcare helps medical professionals and hospitals make better decisions, treat patients more efficiently, and work more efficiently. It ultimately comes down to using data to improve treatment, make better choices, and simplify hospital operations for all patients.

Keywords: data mining, healthcare, big data, large amounts of data

Procedia PDF Downloads 53
25845 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 434
25844 Deep Well-Grounded Magnetite Anode Chains Retrieval and Installation for Raslanuf Complex Impressed Current Cathodic Protection System Rectification

Authors: Mohamed Ahmed Khalil

Abstract:

The number of deep well anode ground beds (GBs) have been retrieved due to unoperated anode chains. New identical magnetite anode chains (MAC) have been installed at Raslanuf complex impressed current Cathodic protection (ICCP) system, distributed at different plants (Utility, ethylene and polyethylene). All problems associated with retrieving and installation of MACs have been discussed, rectified and presented. All GB-associated severely corroded wellhead casings were well maintained and/or replaced by new fabricated and modified ones. The main cause of the wellhead casing's severe internal corrosion was discussed and the conducted remedy action to overcome future corrosion problems is presented. All GB-connected anode junction boxes (AJBs) and shunts were closely inspected, maintained and necessary replacement and/or modifications were carried out on shunts. All damaged GB concrete foundations (CF) have been inspected and completely replaced. All GB-associated Transformer-Rectifiers Units (TRU) were subjected to thorough inspection and necessary maintenance was performed on each individual TRU. After completion of all MACs and TRU maintenance activities, each cathodic protection station (CPS) has been re-operated, alternative current (AC), direct current (DC), voltage and structure to soil potential (S/P) measurements have been conducted, recorded and all obtained test results are presented. DC current outputs have been adjusted and DC current outputs of each MAC have been recorded for each GB AJB.

Keywords: magnetite anodes, deep well, ground beds, cathodic protection, transformer rectifier, impressed current, junction boxes

Procedia PDF Downloads 102
25843 Protection of the Rights of Outsourced Employees and the Effect on Job Performance in Nigerian Banking Sector

Authors: Abiodun O. Ibude

Abstract:

Several organizations have devised the strategy of engaging the services of staff not directly employed by them in their production and service delivery. Some organizations also engage on contracting another organization to carry out a part of service or production process on their behalf. Outsourcing is becoming an important alternative employment option for most organizations. This paper attempts an exposition on the rights of workers within the more specific context of outsourcing as a human resource management phenomenon. Outsourced employees and their rights are treated conceptually and analytically in a generic sense as a mere subset of the larger whole, that is, labor. Outsourced employees derive their rights, like all workers, from their job context as well as the legal environment (municipal and global) in which they operate. The dynamics of globalization and the implications of this development for labor practices receive considerable attention in this exposition. In this regard, a guarded proposition is made, to examine the practice and effect of engaging outsourcing as an economic decision designed primarily to cut down on operational costs rather than a Human Resources Management decision to improve worker welfare. The population of the study was selected from purposive and simple random sampling techniques. Data obtained were analyzed through a simple percentage, Pearson product-moment correlation, and cross-tabulation. From the research conducted, it was discovered that, although outsourcing possesses opportunities for organizations, there are drawbacks arising from its implementation of job securities. It was also discovered that some employees are being exploited through this strategy. This gives rise to lower motivation and thereby decline in performance. In conclusion, there is need for examination of Human Resource Managers’ strategies that can serve as management policy tools for the protection of the rights of outsourced employees.

Keywords: legal environment, operational cost, outsourcing, protection

Procedia PDF Downloads 121
25842 The Concentration of Natural Alpha Emitters Radionuclides in Fish and Their Contribution to the Internal Dose

Authors: Wagner Pereira, Alphonse Kelecom

Abstract:

Mining can impact the environment, and the major impact of some mining activities is the radiological impact. In human populations, such impact is well studied and regulated. For biota, this assessment always had as focus the protection of human food chain. The protection of biota itself is a new approach, still developing. In order to contribute to this new approach, fish collecting was carried out in areas of naturally occurring radioactive materials (NORM), where a uranium mine is in decommissioning phase. The activity concentrations were analyzed, in Bq/kg wet weight, for Uranium (Unat), Th-232 and Ra-226 in the lambari fish Astyanax bimaculatus L. (omnivorous fish) and in the traíra fish Hoplias malabaricus Bloch, 1794 (carnivorous fish). Seven composite samples (that is: a sufficient number of individuals to reach at least 2 kg of fresh weight) were collected every six months between 2013 and 2015. The mean activity concentrations (AC) for uranium ranged from 1.12 (lambari) to 0.60 (lungfish). For Th, variations ranged from 0.30 to 0.05 (lambari and traíra, respectively). Finally, the Ra-226 means ranged between 0.08 and 0.03. No temporal trends of accumulation could be identified. Systematically, the AC values of radionuclides were higher in omnivorous fish when compared to the carnivore ones.

Keywords: biota dose, NORM, fish, environmental protection

Procedia PDF Downloads 237
25841 Numerical Aeroacoustics Investigation of Eroded and Coated Leading Edge of NACA 64- 618 Airfoil

Authors: Zeinab Gharibi, B. Stoevesandt, J. Peinke

Abstract:

Long term surface erosion of wind turbine blades, especially at the leading edge, impairs aerodynamic performance; therefore, lowers efficiency of the blades mostly in the high-speed rotor tip regions. Blade protection provides significant improvements in annual energy production, reduces costly downtime, and protects the integrity of the blades. However, this protection still influences the aerodynamic behavior, and broadband noise caused by interaction between the impinging turbulence and blade’s leading edge. This paper presents an extensive numerical aeroacoustics approach by investigating the sound power spectra of the eroded and coated NACA 64-618 wind turbine airfoil and evaluates aeroacoustics improvements after the protection procedure. Using computational fluid dynamics (CFD), different quasi 2D numerical grids were implemented and special attention was paid to the refinement of the boundary layers. The noise sources were captured and decoupled with acoustic propagation via the derived formulation of Curle’s analogy implemented in OpenFOAM. Therefore, the noise spectra were compared for clean, coated and eroded profiles in the range of chord-based Reynolds number (1.6e6 ≤ Re ≤ 11.5e6). Angle of attack was zero in all cases. Verifications were conducted for the clean profile using available experimental data. Sensitivity studies for the far-field were done on different observational positions. Furthermore, beamforming studies were done simulating an Archimedean spiral microphone array for far-field noise directivity patterns. Comparing the noise spectra of the coated and eroded geometries, results show that, coating clearly improves aerodynamic and acoustic performance of the eroded airfoil.

Keywords: computational fluid dynamics, computational aeroacoustics, leading edge, OpenFOAM

Procedia PDF Downloads 207
25840 Bioinformatics High Performance Computation and Big Data

Authors: Javed Mohammed

Abstract:

Right now, bio-medical infrastructure lags well behind the curve. Our healthcare system is dispersed and disjointed; medical records are a bit of a mess; and we do not yet have the capacity to store and process the crazy amounts of data coming our way from widespread whole-genome sequencing. And then there are privacy issues. Despite these infrastructure challenges, some researchers are plunging into bio medical Big Data now, in hopes of extracting new and actionable knowledge. They are doing delving into molecular-level data to discover bio markers that help classify patients based on their response to existing treatments; and pushing their results out to physicians in novel and creative ways. Computer scientists and bio medical researchers are able to transform data into models and simulations that will enable scientists for the first time to gain a profound under-standing of the deepest biological functions. Solving biological problems may require High-Performance Computing HPC due either to the massive parallel computation required to solve a particular problem or to algorithmic complexity that may range from difficult to intractable. Many problems involve seemingly well-behaved polynomial time algorithms (such as all-to-all comparisons) but have massive computational requirements due to the large data sets that must be analyzed. High-throughput techniques for DNA sequencing and analysis of gene expression have led to exponential growth in the amount of publicly available genomic data. With the increased availability of genomic data traditional database approaches are no longer sufficient for rapidly performing life science queries involving the fusion of data types. Computing systems are now so powerful it is possible for researchers to consider modeling the folding of a protein or even the simulation of an entire human body. This research paper emphasizes the computational biology's growing need for high-performance computing and Big Data. It illustrates this article’s indispensability in meeting the scientific and engineering challenges of the twenty-first century, and how Protein Folding (the structure and function of proteins) and Phylogeny Reconstruction (evolutionary history of a group of genes) can use HPC that provides sufficient capability for evaluating or solving more limited but meaningful instances. This article also indicates solutions to optimization problems, and benefits Big Data and Computational Biology. The article illustrates the Current State-of-the-Art and Future-Generation Biology of HPC Computing with Big Data.

Keywords: high performance, big data, parallel computation, molecular data, computational biology

Procedia PDF Downloads 353
25839 Applying Intelligent Material in Food Packaging

Authors: Kasra Ghaemi, Syeda Tasnim, Shohel Mahmud

Abstract:

One of the main issues affecting the quality and shelf life of food products is temperature fluctuation during transportation and storage. Packaging plays an important role in protecting food from environmental conditions, especially thermal variations. In this study, the performance of using microencapsulated Phase Change Material (PCM) as a promising thermal buffer layer in smart food packaging is investigated. The considered insulation layer is evaluated for different thicknesses and the absorbed heat from the environment. The results are presented in terms of the melting time of PCM or provided thermal protection period.

Keywords: food packaging, phase change material, thermal buffer, protection time

Procedia PDF Downloads 71
25838 Reconceptualising the Voice of Children in Child Protection

Authors: Sharon Jackson, Lynn Kelly

Abstract:

This paper proposes a conceptual review of the interdisciplinary literature which has theorised the concept of ‘children’s voices’. The primary aim is to identify and consider the theoretical relevance of conceptual thought on ‘children’s voices’ for research and practice in child protection contexts. Attending to the ‘voice of the child’ has become a core principle of social work practice in contemporary child protection contexts. Discourses of voice permeate the legislative, policy and practice frameworks of child protection practices within the UK and internationally. Voice is positioned within a ‘child-centred’ moral imperative to ‘hear the voices’ of children and take their preferences and perspectives into account. This practice is now considered to be central to working in a child-centered way. The genesis of this call to voice is revealed through sociological analysis of twentieth-century child welfare reform as rooted inter alia in intersecting political, social and cultural discourses which have situated children and childhood as cites of state intervention as enshrined in the 1989 United Nations Convention on the Rights of the Child ratified by the UK government in 1991 and more specifically Article 12 of the convention. From a policy and practice perspective, the professional ‘capturing’ of children’s voices has come to saturate child protection practice. This has incited a stream of directives, resources, advisory publications and ‘how-to’ guides which attempt to articulate practice methods to ‘listen’, ‘hear’ and above all – ‘capture’ the ‘voice of the child’. The idiom ‘capturing the voice of the child’ is frequently invoked within the literature to express the requirements of the child-centered practice task to be accomplished. Despite the centrality of voice, and an obsession with ‘capturing’ voices, evidence from research, inspection processes, serious case reviews, child abuse and death inquires has consistently highlighted professional neglect of ‘the voice of the child’. Notable research studies have highlighted the relative absence of the child’s voice in social work assessment practices, a troubling lack of meaningful engagement with children and the need to more thoroughly examine communicative practices in child protection contexts. As a consequence, the project of capturing ‘the voice of the child’ has intensified, and there has been an increasing focus on developing methods and professional skills to attend to voice. This has been guided by a recognition that professionals often lack the skills and training to engage with children in age-appropriate ways. We argue however that the problem with ‘capturing’ and [re]representing ‘voice’ in child protection contexts is, more fundamentally, a failure to adequately theorise the concept of ‘voice’ in the ‘voice of the child’. For the most part, ‘The voice of the child’ incorporates psychological conceptions of child development. While these concepts are useful in the context of direct work with children, they fail to consider other strands of sociological thought, which position ‘the voice of the child’ within an agentic paradigm to emphasise the active agency of the child.

Keywords: child-centered, child protection, views of the child, voice of the child

Procedia PDF Downloads 125
25837 Mapping a Data Governance Framework to the Continuum of Care in the Active Assisted Living Context

Authors: Gaya Bin Noon, Thoko Hanjahanja-Phiri, Laura Xavier Fadrique, Plinio Pelegrini Morita, Hélène Vaillancourt, Jennifer Teague, Tania Donovska

Abstract:

Active Assisted Living (AAL) refers to systems designed to improve the quality of life, aid in independence, and create healthier lifestyles for care recipients. As the population ages, there is a pressing need for non-intrusive, continuous, adaptable, and reliable health monitoring tools to support aging in place. AAL has great potential to support these efforts with the wide variety of solutions currently available, but insufficient efforts have been made to address concerns arising from the integration of AAL into care. The purpose of this research was to (1) explore the integration of AAL technologies and data into the clinical pathway, and (2) map data access and governance for AAL technology in order to develop standards for use by policy-makers, technology manufacturers, and developers of smart communities for seniors. This was done through four successive research phases: (1) literature search to explore existing work in this area and identify lessons learned; (2) modeling of the continuum of care; (3) adapting a framework for data governance into the AAL context; and (4) interviews with stakeholders to explore the applicability of previous work. Opportunities for standards found in these research phases included a need for greater consistency in language and technology requirements, better role definition regarding who can access and who is responsible for taking action based on the gathered data, and understanding of the privacy-utility tradeoff inherent in using AAL technologies in care settings.

Keywords: active assisted living, aging in place, internet of things, standards

Procedia PDF Downloads 119
25836 Development of an Systematic Design in Evaluating Force-On-Force Security Exercise at Nuclear Power Plants

Authors: Seungsik Yu, Minho Kang

Abstract:

As the threat of terrorism to nuclear facilities is increasing globally after the attacks of September 11, we are striving to recognize the physical protection system and strengthen the emergency response system. Since 2015, Korea has implemented physical protection security exercise for nuclear facilities. The exercise should be carried out with full cooperation between the operator and response forces. Performance testing of the physical protection system should include appropriate exercises, for example, force-on-force exercises, to determine if the response forces can provide an effective and timely response to prevent sabotage. Significant deficiencies and actions taken should be reported as stipulated by the competent authority. The IAEA(International Atomic Energy Agency) is also preparing force-on-force exercise program documents to support exercise of member states. Currently, ROK(Republic of Korea) is implementing exercise on the force-on-force exercise evaluation system which is developed by itself for the nuclear power plant, and it is necessary to establish the exercise procedure considering the use of the force-on-force exercise evaluation system. The purpose of this study is to establish the work procedures of the three major organizations related to the force-on-force exercise of nuclear power plants in ROK, which conduct exercise using force-on-force exercise evaluation system. The three major organizations are composed of licensee, KINAC (Korea Institute of Nuclear Nonproliferation and Control), and the NSSC(Nuclear Safety and Security Commission). Major activities are as follows. First, the licensee establishes and conducts an exercise plan, and when recommendations are derived from the result of the exercise, it prepares and carries out a force-on-force result report including a plan for implementation of the recommendations. Other detailed tasks include consultation with surrounding units for adversary, interviews with exercise participants, support for document evaluation, and self-training to improve the familiarity of the MILES (Multiple Integrated Laser Engagement System). Second, KINAC establishes a force-on-force exercise plan review report and reviews the force-on-force exercise plan report established by licensee. KINAC evaluate force-on-force exercise using exercise evaluation system and prepare training evaluation report. Other detailed tasks include MILES training, adversary consultation, management of exercise evaluation systems, and analysis of exercise evaluation results. Finally, the NSSC decides whether or not to approve the force-on-force exercise and makes a correction request to the nuclear facility based on the exercise results. The most important part of ROK's force-on-force exercise system is the analysis through the exercise evaluation system implemented by KINAC after the exercise. The analytical method proceeds in the order of collecting data from the exercise evaluation system and analyzing the collected data. The exercise application process of the exercise evaluation system introduced in ROK in 2016 will be concretely set up, and a system will be established to provide objective and consistent conclusions between exercise sessions. Based on the conclusions drawn up, the ultimate goal is to complement the physical protection system of licensee so that the system makes licensee respond effectively and timely against sabotage or unauthorized removal of nuclear materials.

Keywords: Force-on-Force exercise, nuclear power plant, physical protection, sabotage, unauthorized removal

Procedia PDF Downloads 131
25835 Geosynthetic Containment Systems for Coastal Protection: An Indian Perspective

Authors: Tom Elias, Kiran G. Shirlal

Abstract:

Coastal erosion is one of the major issue faced by maritime countries, globally. More than 1200 km stretch of Indian coastline is marked eroding. There have been numerous attempts to impede the erosion rate and to attain equilibrium beach profiles. High cost and unavailability of natural rocks forced coastal engineers to find alternatives for conventional hard options like seawalls and groynes. Geosynthetic containment systems, emerged in the mid 20th century proved promising in catering coastal protection in countries like Australia, Germany and United States. The present study aims at reviewing Indian timeline of protection works that uses geosynthetic containment systems. Indian exploration regarding geosynthetic containment system dates back to early 2000s. Generally, protection structures use geosynthetics in the form of Geotubes, Geocontainers, and Geobags with Geotubes being most widely used in the form of submerged reefs, seawalls, groynes and breakwaters. Sand and dredged waste are used to fill these containment systems with calculated sand fill ratio. Reviewing the prominent protection works constructed in the east and west coast of India provides an insight into benefits and the difficulties faced by the practical installation. Initially, geosynthetic structures were considered as a temporary protection method prior to the construction of some other hard structure. Later Dahanu, Hamala and Pentha experiences helped in establishing geotubes as an alternative to conventional structures. Nearshore geotubes reefs aimed to attain equilibrium beach served its purpose in Hamala and Dahanu, Maharashtra, while reef constructed at Candolim, Goa underwent serious damage due to Toe Scour. In situ filling by pumping of sand slurry as in case of Shankarpur Seawall, West Bengal remains as a major concern. Geosynthetic systems supplemented by gabions and rock armours improves the wave dissipation, stability and reflection characteristics as implied in Pentha Coast, Odisha, Hazira, Gujarat and Uppada, Andhra Pradesh. Keeping improper design and deliberate destruction by vandals apart, geosynthetic containment systems offer a cost-effective alternative to conventional coastal protection methods in India. Additionally, geosynthetics supports marine growth in its surface which enhances its demand as an eco-friendly material and encourages usage.

Keywords: coastal protection, geotubes, geobags, geocontainers

Procedia PDF Downloads 136
25834 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 62
25833 Improving the Utility of Social Media in Pharmacovigilance: A Mixed Methods Study

Authors: Amber Dhoot, Tarush Gupta, Andrea Gurr, William Jenkins, Sandro Pietrunti, Alexis Tang

Abstract:

Background: The COVID-19 pandemic has driven pharmacovigilance towards a new paradigm. Nowadays, more people than ever before are recognising and reporting adverse reactions from medications, treatments, and vaccines. In the modern era, with over 3.8 billion users, social media has become the most accessible medium for people to voice their opinions and so provides an opportunity to engage with more patient-centric and accessible pharmacovigilance. However, the pharmaceutical industry has been slow to incorporate social media into its modern pharmacovigilance strategy. This project aims to make social media a more effective tool in pharmacovigilance, and so reduce drug costs, improve drug safety and improve patient outcomes. This will be achieved by firstly uncovering and categorising the barriers facing the widespread adoption of social media in pharmacovigilance. Following this, the potential opportunities of social media will be explored. We will then propose realistic, practical recommendations to make social media a more effective tool for pharmacovigilance. Methodology: A comprehensive systematic literature review was conducted to produce a categorised summary of these barriers. This was followed by conducting 11 semi-structured interviews with pharmacovigilance experts to confirm the literature review findings whilst also exploring the unpublished and real-life challenges faced by those in the pharmaceutical industry. Finally, a survey of the general public (n = 112) ascertained public knowledge, perception, and opinion regarding the use of their social media data for pharmacovigilance purposes. This project stands out by offering perspectives from the public and pharmaceutical industry that fill the research gaps identified in the literature review. Results: Our results gave rise to several key analysis points. Firstly, inadequacies of current Natural Language Processing algorithms hinder effective pharmacovigilance data extraction from social media, and where data extraction is possible, there are significant questions over its quality. Social media also contains a variety of biases towards common drugs, mild adverse drug reactions, and the younger generation. Additionally, outdated regulations for social media pharmacovigilance do not align with new, modern General Data Protection Regulations (GDPR), creating ethical ambiguity about data privacy and level of access. This leads to an underlying mindset of avoidance within the pharmaceutical industry, as firms are disincentivised by the legal, financial, and reputational risks associated with breaking ambiguous regulations. Conclusion: Our project uncovered several barriers that prevent effective pharmacovigilance on social media. As such, social media should be used to complement traditional sources of pharmacovigilance rather than as a sole source of pharmacovigilance data. However, this project adds further value by proposing five practical recommendations that improve the effectiveness of social media pharmacovigilance. These include: prioritising health-orientated social media; improving technical capabilities through investment and strategic partnerships; setting clear regulatory guidelines using multi-stakeholder processes; creating an adverse drug reaction reporting interface inbuilt into social media platforms; and, finally, developing educational campaigns to raise awareness of the use of social media in pharmacovigilance. Implementation of these recommendations would speed up the efficient, ethical, and systematic adoption of social media in pharmacovigilance.

Keywords: adverse drug reaction, drug safety, pharmacovigilance, social media

Procedia PDF Downloads 64
25832 Afghan Women’s Perceptions on Domestic Violence and Child Protection in Finland

Authors: Laleh Golamrej Eliasi

Abstract:

Finland is the second most violent country for women in the European Union (EU). 47% of women in Finland claimed to have experienced domestic violence against women (DVAW), compared to an average of 33% in the EU. Although the statistics in Finland are transparent, to the author’s best knowledge, there are no statisticsonDV by nationality in Finland. On the other hand, being a Muslim woman in a non-Muslim-majority country represents a position of double vulnerability to violence. There are 10404 Afghan refugees in Finland who are Muslim. Barriers such as unfamiliarity with support services, fear of the police, racism, language, economic and practical dependence, social isolation, and family commitments all lead to a lack of reporting of DVAW among migrants. Although witnessing and experiencing DV have devastating effects on women’s and children’s health and well-being, there is a lack of studies about DVAW among Afghan families in Finland. To fill this knowledge gap, Afghan women living in Finland are selected as the target group to assess their views on DVAW and child protection. This study is implemented in the socio-ecological approach framework to assess the impacts of individual characteristics, interpersonal relationships, community, and society components on DVAW in Afghan families. Interviews with Afghan women and content analysis are used to find out participants' views on DVAW, its risk factors, and approaches and methods to improve protection for women and children. Main purpose is to obtain information about participants' views on the subject. The findings can be used to improve culturally safe social work knowledge and practices with a bottom-up approach to reduce DV and increase child protection. Therefore, this research can have important effects on the sustainable development of services and supports the welfare and inclusion of immigrant families. The expected results will contribute to sustainable gender equality, which is in line with the fifth goal of the Sustainable Development Goals.

Keywords: domestic violence, immigrant women, immigrant child protection, social work

Procedia PDF Downloads 73
25831 Developments in corporate governance and economic growth in Sub Saharan Africa

Authors: Martha Matashu

Abstract:

This study examined corporate governance and economic growth trends in Sub Saharan African (SSA) countries. The need for corporate governance arise from the fact that the day to day running of the business is done by management who in accordance with the neoclassical theory and agency theory have inborn tendencies to use the resources of the company to their advantage. This prevails against a background where the endogenous economic growth theory hold the assumption that economic growth is an outcome of the overall performance of all companies within an economy. This suggest that corporate governance at firm level determine economic growth through its impact on the overall performance. Nevertheless, insight into literature suggest that efforts to promote corporate governance in countries across SSA since the 1980s to date have not yet yielded desired outcomes. The board responsibilities, shareholder rights, disclosure and transparency, protection of minority shareholder, and liability of directors were thus used as proxies of corporate governance because these are believed to be mechanisms that are believed to enhance company performance their effect on enhancing accountability and transparency. Using panel data techniques, corporate governance and economic growth data for 29 SSA countries from the period of 2008 to 2019 was analysed. The findings revealed declining economic growth trend despite an increase in corporate governance aspects such as director liability, shareholders’ rights, and protection of minority shareholder in SSA countries. These findings are in contradiction to the popularly held theoretical principles of economic growth and corporate governance. The study reached the conclusion thata nonlinearrelationship exists between corporate governance and economic growth within the selectedSSA countries during the period under investigation. This study thus recommends that measures should be taken to create conditions for corporate governance that would bolster significant positive contributions to economic growth in the region.

Keywords: corporate governance, economic growth, sub saharan Africa, agency theory, endogenous theory

Procedia PDF Downloads 132
25830 Sustainable Composites for Aircraft Cabin Interior Applications

Authors: Fiorenzo Lenzi, Doris Abt, Besnik Bytyqi

Abstract:

Recent developments in composite materials for the interior cabin market provide more sustainable solutions for industrial applications. One contribution comes from epoxy-based prepregs recently developed to substitute phenolic prepregs in order to reduce the environmental impact of their production process and to eliminate health and safety issues related to their handling. Another example is the use of Mica-based products for improving the fire protection of interior cabin parts. Minerals, such as Mica, can be used as reinforcement in composites to reduce the heat release rate or, more traditionally, to improve the burn-through performance of fuselage and cargo lining components.

Keywords: prepreg, epoxy, Mica, battery protection

Procedia PDF Downloads 69
25829 Optimizing Protection of Medieval Glass Mosaic

Authors: J. Valach, S. Pospisil, S. Kuznecov

Abstract:

The paper deals with experimental estimation of future environmental load on medieval mosaic of Last Judgement on entrance to St. Vitus cathedral on Prague castle. The mosaic suffers from seasonal changes of weather pattern, as well as rains, their acidity, deposition of dust and sooth particles from polluted air and also from freeze-thaw cycles. These phenomena influence state of the mosaic. The mosaic elements, tesserae are mostly made from glass prone to weathering. To estimate future procedure of the best maintenance, relation between various weather scenarios and their effect on the mosaic was investigated. At the same time local method for evaluation of protective coating was developed. Together both methods will contribute to better care for the mosaic and also visitors aesthetical experience.

Keywords: environmental load, cultural heritage, glass mosaic, protection

Procedia PDF Downloads 266
25828 Forum Shopping in Biotechnology Law: Understanding Conflict of Laws in Protecting GMO-Based Inventions as Part of a Patent Portfolio in the Greater China Region

Authors: Eugene C. Lim

Abstract:

This paper seeks to examine the extent to which ‘forum shopping’ is available to patent filers seeking protection of GMO (genetically modified organisms)-based inventions in Hong Kong. Under Hong Kong’s current re-registration system for standard patents, an inventor must first seek patent protection from one of three Designated Patent Offices (DPO) – those of the People’s Republic of China (PRC), the Europe Union (EU) (designating the UK), or the United Kingdom (UK). The ‘designated patent’ can then be re-registered by the successful patentee in Hong Kong. Interestingly, however, the EU and the PRC do not adopt a harmonized approach toward the patenting of GMOs, and there are discrepancies in their interpretation of the phrase ‘animal or plant variety’. In view of these divergences, the ability to effectively manage ‘conflict of law’ issues is an important priority for multinational biotechnology firms with a patent portfolio in the Greater China region. Generally speaking, both the EU and the PRC exclude ‘animal and plant varieties’ from the scope of patentable subject matter. However, in the EU, Article 4(2) of the Biotechnology Directive allows a genetically modified plant or animal to be patented if its ‘technical feasibility is not limited to a specific variety’. This principle has allowed for certain ‘transgenic’ mammals, such as the ‘Harvard Oncomouse’, to be the subject of a successful patent grant in the EU. There is no corresponding provision on ‘technical feasibility’ in the patent legislation of the PRC. Although the PRC has a sui generis system for protecting plant varieties, its patent legislation allows the patenting of non-biological methods for producing transgenic organisms, not the ‘organisms’ themselves. This might lead to a situation where an inventor can obtain patent protection in Hong Kong over transgenic life forms through the re-registration of a patent from a more ‘biotech-friendly’ DPO, even though the subject matter in question might not be patentable per se in the PRC. Through a comparative doctrinal analysis of legislative provisions, cases and court interpretations, this paper argues that differences in the protection afforded to GMOs do not generally prejudice the ability of global MNCs to obtain patent protection in Hong Kong. Corporations which are able to first obtain patents for GMO-based inventions in Europe can generally use their European patent as the basis for re-registration in Hong Kong, even if such protection might not be available in the PRC itself. However, the more restrictive approach to GMO-based patents adopted in the PRC would be more acutely felt by enterprises and inventors based in mainland China. The broader scope of protection offered to GMO-based patents in Europe might not be available in Hong Kong to mainland Chinese patentees under the current re-registration model for standard patents, unless they have the resources to apply for patent protection as well from another (European) DPO as the basis for re-registration.

Keywords: biotechnology, forum shopping, genetically modified organisms (GMOs), greater China region, patent portfolio

Procedia PDF Downloads 310
25827 UNHCR and the International Refugee Protection: An Analysis of Its Actions in Protecting Mozambican Refugees in Malawi

Authors: Marcia Teresa Gildo

Abstract:

The United Nations High Commissioner for Refugees (UNHCR) is responsible to provide international protection and humanitarian assistance to refugees and to seek permanent solutions to their situation. To fulfil this mandate, the agency works in collaboration with its partners and governments. This paper aims to analyse the agency's actions to protect and provide assistance to Mozambican refugees in Malawi. Since July 2015, approximately 12.000 people have fled Mozambique to neighbouring Malawi due to the political-military conflict between the government of Mozambique and RENAMO (the country’s largest opposition party). This led to a series of military clashes between the two parties and the consequent flight of some Mozambicans to Malawi, in search of asylum. Most arrived from the province of Tete, in the central region of Mozambique, and, to a lesser extent, from the province of Zambezia. The asylum seekers arrived in small groups and settled in the village of Kapise in the Mwanza district of Thambani, as well as in Chikwawa and Nsanje districts in Malawi. UNHCR led an interinstitutional response action to manage the flow of Mozambican asylum seekers to Malawi. In view of these aspects and the ongoing challenge of protecting refugees and finding permanent solutions to their situation, UNHCR remains an indispensable international organization. However, there are significant gaps in the international refugee protection regime, and there have been many occasions when UNHCR has failed to fulfill its mandate. The analysis was carried out through qualitative research methods and techniques based essentially on consultation of books, newspapers and scientific articles, television and journalistic reports and interviews with the people who were involved in the process. From the data obtained, it was concluded that UNHCR worked in coordination with its partners and the government of Malawi to provide protection and emergency assistance to the refugees. However, existing funds covered only the immediate needs of refugees, more funds had to be allocated. That was made through an interinstitutional appeal. Although the funds allocated were not sufficient, they allowed the agency to protect and assist the refugees until a permanent solution was found. UNHCR also worked in coordination with the governments of Malawi and Mozambique so that a tripartite agreement was signed between the parties for the voluntary repatriation of Mozambican refugees, since security conditions were guaranteed and the refugees had expressed their willingness to return to their country of origin. UNHCR's actions to protect Mozambican refugees in Malawi have enabled humanitarian conditions to be respected and the rights of refugees to be guaranteed. Cooperation with the different actors involved in the response has allowed UNHCR to fulfil its mandate.

Keywords: assistance , cooperation, international protection, refugees

Procedia PDF Downloads 94
25826 The Human Process of Trust in Automated Decisions and Algorithmic Explainability as a Fundamental Right in the Exercise of Brazilian Citizenship

Authors: Paloma Mendes Saldanha

Abstract:

Access to information is a prerequisite for democracy while also guiding the material construction of fundamental rights. The exercise of citizenship requires knowing, understanding, questioning, advocating for, and securing rights and responsibilities. In other words, it goes beyond mere active electoral participation and materializes through awareness and the struggle for rights and responsibilities in the various spaces occupied by the population in their daily lives. In times of hyper-cultural connectivity, active citizenship is shaped through ethical trust processes, most often established between humans and algorithms. Automated decisions, so prevalent in various everyday situations, such as purchase preference predictions, virtual voice assistants, reduction of accidents in autonomous vehicles, content removal, resume selection, etc., have already found their place as a normalized discourse that sometimes does not reveal or make clear what violations of fundamental rights may occur when algorithmic explainability is lacking. In other words, technological and market development promotes a normalization for the use of automated decisions while silencing possible restrictions and/or breaches of rights through a culturally modeled, unethical, and unexplained trust process, which hinders the possibility of the right to a healthy, transparent, and complete exercise of citizenship. In this context, the article aims to identify the violations caused by the absence of algorithmic explainability in the exercise of citizenship through the construction of an unethical and silent trust process between humans and algorithms in automated decisions. As a result, it is expected to find violations of constitutionally protected rights such as privacy, data protection, and transparency, as well as the stipulation of algorithmic explainability as a fundamental right in the exercise of Brazilian citizenship in the era of virtualization, facing a threefold foundation called trust: culture, rules, and systems. To do so, the author will use a bibliographic review in the legal and information technology fields, as well as the analysis of legal and official documents, including national documents such as the Brazilian Federal Constitution, as well as international guidelines and resolutions that address the topic in a specific and necessary manner for appropriate regulation based on a sustainable trust process for a hyperconnected world.

Keywords: artificial intelligence, ethics, citizenship, trust

Procedia PDF Downloads 47
25825 Use of Recycled PVB as a Protection against Carbonation

Authors: Michael Tupý, Vít Petránek

Abstract:

The paper is focused on testing of the poly(vinyl butyral) (PVB) layer which had the function of a CO2 insulating protection against concrete and mortar carbonation. The barrier efficiency of PVB was verified by the measurement of diffusion characteristics. Two different types of PVB were tested; original extruded PVB sheet and PVB sheet made from PVB dispersion which was obtained from recycled windshields. The work deals with the testing CO2 diffusion when polymer sheets were exposed to a CO2 atmosphere (10% v/v CO2) with 0% RH. The excellent barrier capability against CO2 permeability of original and also recycled types of PVB layers was observed. This application of PVB waste can bring advantageous use in civil engineering and significant environmental contribution.

Keywords: windshield, poly(vinyl butyral), mortar, diffusion, carbonatation, polymer waste

Procedia PDF Downloads 410
25824 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 344
25823 The Use of Hearing Protection Devices and Hearing Loss in Steel Industry Workers in Samut Prakan Province, Thailand

Authors: Petcharat Kerdonfag, Surasak Taneepanichskul, Winai Wadwongtham

Abstract:

Background: Although there have not been effective treatments for Noise Induced Hearing Loss (NIHL), it can be definitely preventable with promoting the use of Hearing Protection devices (HPDs) among workers who have been exposed to excessive noise for a long period. Objectives: The objectives of this study were to explore the use of HPDs among steel industrial workers in the high noise level zone in Samut Prakan province, Thailand and to examine the relationships of the HPDs use and hearing loss. Materials and Methods: In this cross-sectional study, eligible ninety-three participants were recruited in the designated zone of higher noise (> 85dBA) of two factories, using simple random sampling. The use of HPDs was gathered by the self-record form, examined and confirmed by the researcher team. Hearing loss was assessed by the audiometric screening at the regional Samut Prakan hospital. If an average threshold level exceeds 25 dBA at high frequency (4 and 6 Hz) in each ear, participants would be lost of hearing. Data were collected from October to December, 2016. All participants were examined by the same examiners for the validity. An Audiometric testing was performed with the participants who have been exposed to high noise levels at least 14 hours from workplace. Results: Sixty participants (64.5%) had secondary level of education. The average mean score of percent time of using HPDs was 60.5% (SD = 25.34). Sixty-seven participants (72.0%) had abnormal hearing which they have still needed to increase lower percent time of using HPDs (Mean = 37.01, SD = 23.81) than those having normal hearing (Mean = 45.77, SD = 28.44). However, there was no difference in the mean average of percent time of using HPDs between these two groups.Conclusion: The findings of this study have confirmed that the steel industrial workers still need to be motivated to use HPDs regularly. Future research should pay more attentions for creating a meaningful innovation to steel industrial workers.

Keywords: hearing protection devices, noise induced hearing loss, audiometric testing, steel industry

Procedia PDF Downloads 237
25822 The Copyright Eligibility of Sports Events and Performances

Authors: Emre Bayamlıoğlu

Abstract:

Apart from being the subject of neighboring rights when broadcasted on TV or of cinematographic work when fixed to a tangible medium including a hard drive, the copyright eligibility of a sports performance, and eventually the sporting event has once again given rise to controversy following the CJEU judgment in the Murphy case. Most of the arguments which deny copyright protection for sports performances focus on the fact that unlike movies, plays, television programs, or operas, athletic events are competitive and have no underlying script. The first part of the paper aims to explain that such rhetoric is rather weak simply for the fact that, several types of performances such as improvised musical or dramatic shows are still protected by copyright despite the fact that they are not based on a script. The second part argues that the core reason for the denial copyright protection was the functionality aiming certain practical results such as winning the game, scoring, eliminating an opponent, obstructing a shot and etc., but no scientific or artistic expression in whatsoever form. The paper further argues that expanding copyright protection to functional performances would give rise to unintended copyright claims by the athletes on tackles, shoots, passes, crosses etc. resulting with further restrictions on reporting and photographing of sporting events. The final part provides a policy analysis of the trend to broaden the scope of copyright to cover sports performances. It is argued that such expansion will clearly undermine the ratio legis of copyright laws since it will give rise to excessive commodification of information beyond the needs of a viable market economy. Therefore, remedies other than copyright protection such as unfair competition and unjust enrichment provides sufficient redress for the damages to be sustained by the investors of sporting events.

Keywords: copyright eligibility, idea-expression dichotomy, sports performance

Procedia PDF Downloads 461
25821 Application of Voltammetry as a Non-Destructive Tool to Quantify Cathodic Protection of Steel in Simulated Soil Solution

Authors: Mandlenkosi G. R. Mahlobo, Peter A. Olubambi

Abstract:

Cathodic protection (CP) has been widely considered as a suitable technique for mitigating corrosion of steel structures buried in soil. Plenty of efforts have been made in developing techniques, in particular non-destructive techniques, for monitoring and quantifying the effectiveness of CP to ensure the sustainability and performance of buried steel structures. This study was aimed at using a specifically modified voltammetry approach as a non-destructive tool to monitor and quantify the effectiveness of CP of steel in simulated soil. Carbon steel was subjected to electrochemical tests with NS4 solution used as simulated soil conditions for four days before applying CP for further 11 days. A specifically modified voltammetry technique was applied at various time intervals of the experiment to monitor the corrosion behaviour and therefore reflect CP effectiveness. The voltammetry results revealed that the application of CP reduced the corrosion rate from the highest value of 410 µm/yr to 8 µm/yr between days 5 and 14 of the experiments. The microstructural analysis of the steel surface performed using x-ray diffraction identified calcareous deposit as the dominant phase protecting the surface from corrosion. It was deduced that the formation of calcareous deposits was linked with the effectiveness of CP of steel.

Keywords: carbon steel, cathodic protection, NS4 solution, voltammetry, XRD

Procedia PDF Downloads 52
25820 The Role of BPSK (Consumer Dispute Settlement Body) in the Monitoring of Standard Clause Inclusion within Indonesian Customer Protection Law

Authors: Deviana Yuanitasari

Abstract:

The rapid development of world commerce and trade nowadays has created fast-paced demand in every business activities and transactions. That also includes the need for ready to use and practical form of standard contract. For the company or business owner, the use of standard contract is an alternative way to achieve economic goals faster, effectively and efficiently. In the other hand, for the consumer the practice of using standard contract usually unfavorable, because the contract clauses usually have been defined by the company and cannot be individually negotiated. That means consumer cannot influence the substances of the contract clauses. The purpose of this study is to get deeper understanding and analyze the role of Consumer Dispute Settlement Body in the monitoring of standard clause inclusion by businesses and industries within the context of practicing consumer protection law. Furthermore, this study will focus on the procedure of sanction and the effectiveness of the sanction for the business practitioners which disregard the inclusion of the prohibited standard clause. Therefore, this study will depict the law issues and other phenomenon that related with the role of Consumer Dispute Settlement Body in monitoring the inclusion of standard clause and procedure of sanction for the business practitioners that still use exemption clause within Consumer Protection Law System. This study results that BPSK has been assigned to monitor the inclusion of standard clause and settle consumer dispute. At this stage, BPSK role is passive, which means BPSK only takes an action if there are consumer complaints. The procedure of sanction is not part of BPSK tasks, since should there be a violation of standard clause; BPSK can only ask the business practitioners to remove the prohibited clause and not give a sanction. As a result, the procedure of sanction rule for the Standard Clause violation in this context can be considered as ineffective.

Keywords: standard contract, standard clause, consumer protection law, consumer dispute settlement body

Procedia PDF Downloads 313
25819 The Principle of the Protection of Legitimate Expectation: Analysis the Adjudications of Thailand Court

Authors: Paiboon Chuwatthanakij

Abstract:

In reference to the legal state in the Thai legal system, most people understand the minor principles of the legal state form, which are the principles that can be explained and understood easily and the results can be seen clearly, especially in the legitimacy of administrative acts. Therefore, there is no awareness of justice, which is the fundamental value of Thai law. The legitimacy of administrative acts requires the administration to adhere to the constitution and legislative laws in enforcement of the laws. If it appears that the administrative acts are illegitimate, the administrative court, as the court of justice, will revoke those acts as if they had never been set in the legal system, this will affect people’s trust as they are unaware as to whether the administrative acts that appoint their lives are legitimate or not. Regarding the revocation of administrative orders by the administrative court as if those orders had never existed, the common individual surely cannot be expected to comprehend the security of their juristic position. Therefore, the legal state does not require a revocation of the government’s acts to terminate its legal results merely because those acts are illegitimate, but there should be considerations and realizations regarding the “The Principle of the Protection of Legitimate Expectation,” which is a minor principle in the legal state’s content that focuses on supporting and protecting legitimate expectations of the juristic position of an individual and maintaining justice, which is the fundamental value of Thai law

Keywords: legal state, rule of law, protection of legitimate, adjudication

Procedia PDF Downloads 375
25818 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem

Procedia PDF Downloads 337
25817 AI-Enabled Smart Contracts for Reliable Traceability in the Industry 4.0

Authors: Harris Niavis, Dimitra Politaki

Abstract:

The manufacturing industry was collecting vast amounts of data for monitoring product quality thanks to the advances in the ICT sector and dedicated IoT infrastructure is deployed to track and trace the production line. However, industries have not yet managed to unleash the full potential of these data due to defective data collection methods and untrusted data storage and sharing. Blockchain is gaining increasing ground as a key technology enabler for Industry 4.0 and the smart manufacturing domain, as it enables the secure storage and exchange of data between stakeholders. On the other hand, AI techniques are more and more used to detect anomalies in batch and time-series data that enable the identification of unusual behaviors. The proposed scheme is based on smart contracts to enable automation and transparency in the data exchange, coupled with anomaly detection algorithms to enable reliable data ingestion in the system. Before sensor measurements are fed to the blockchain component and the smart contracts, the anomaly detection mechanism uniquely combines artificial intelligence models to effectively detect unusual values such as outliers and extreme deviations in data coming from them. Specifically, Autoregressive integrated moving average, Long short-term memory (LSTM) and Dense-based autoencoders, as well as Generative adversarial networks (GAN) models, are used to detect both point and collective anomalies. Towards the goal of preserving the privacy of industries' information, the smart contracts employ techniques to ensure that only anonymized pointers to the actual data are stored on the ledger while sensitive information remains off-chain. In the same spirit, blockchain technology guarantees the security of the data storage through strong cryptography as well as the integrity of the data through the decentralization of the network and the execution of the smart contracts by the majority of the blockchain network actors. The blockchain component of the Data Traceability Software is based on the Hyperledger Fabric framework, which lays the ground for the deployment of smart contracts and APIs to expose the functionality to the end-users. The results of this work demonstrate that such a system can increase the quality of the end-products and the trustworthiness of the monitoring process in the smart manufacturing domain. The proposed AI-enabled data traceability software can be employed by industries to accurately trace and verify records about quality through the entire production chain and take advantage of the multitude of monitoring records in their databases.

Keywords: blockchain, data quality, industry4.0, product quality

Procedia PDF Downloads 167