Fraud detection and counterfeit prevention in medical equipment supply chains using big data and machine learning
1 Business Analytics Program (MSBA), University of Louisville, Kentucky, USA.
2 Department of Mathematics, University of Lagos, Akoka, Lagos State, Nigeria.
Research Article
World Journal of Advanced Research and Reviews, 2024, 24(02), 808–818
Publication history:
Received on 29 September 2024; revised on 03 November 2024; accepted on 06 November 2024
Abstract:
Introduction: The integrity of the medical equipment supply chain is essential for patient safety and regulatory compliance, particularly in high-demand environments like the United States. Rising incidents of counterfeit medical equipment have highlighted vulnerabilities within this chain, underscoring the need for a robust, data-driven approach to fraud detection.
Methodology: A diverse dataset was acquired, encompassing supplier transaction records, IoT-generated environmental metrics, and digital footprint data. Machine learning models, including Isolation Forests, support vector machines, and recurrent neural networks, were employed to identify anomalies across multiple dimensions. Privacy-preserving techniques like homomorphic encryption and federated learning were integrated to comply with data protection standards.
Results: The framework achieved high detection accuracy, with a significant reduction in false positives across a wide range of transaction and environmental anomalies. Real-time IoT monitoring enabled prompt detection of tampering and environmental fluctuations, enhancing the algorithm’s fraud detection capabilities.
Conclusion: This framework provides a scalable, compliance-focused solution for securing the medical equipment supply chain. Its relevance to the U.S. healthcare industry is underscored by its ability to ensure the authenticity of medical devices, ultimately supporting patient safety and regulatory mandates.
Keywords:
Fraud detection; Medical equipment supply chain; Machine learning; Big data analytics; IoT monitoring
Full text article in PDF:
Copyright information:
Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0