Abstract
The traditional recognition method of whitewash behavior of accounting statements needs to analyze a large number of special data samples. The learning rate of the algorithm is low, resulting in low recognition accuracy. To solve the aforementioned problems, this article proposes a method to identify the whitewash behavior of university accounting statements based on the FCM clustering algorithm. This article analyzes the motivation of university accounting statement whitewashing behavior, studies the common means of statement whitewashing, and establishes a fuzzy set for the identification of university accounting statement whitewashing behavior. By calculating the fuzzy partition coefficient, the membership matrix of whitewash behavior recognition is established, and the whitewash behavior is classified through the iteration of the FCM algorithm. The comparative experimental results show that the recognition method has good recognition performance, low recognition error rate, and recognition accuracy of 82%.
1 Introduction
Accounting statements serve as a carrier of information transmission on the daily operation status of universities, receiving subsidies from state education grants, financial expenditures, and development potential of universities’ scientific research capability. With the increasing attention of the state to higher education and the increasing investment of financial support to scientific research activities of colleges and universities, a large number of accounting statement whitewashing behaviors have appeared in colleges and universities driven by interests. Through the whitewashing of accounting statements of colleges and universities, the amount of property can be obtained in different amounts. This accounting statement whitewashing has not only a great impact on the authenticity of accounting statements but also seriously infringes on the rights and interests of universities and teachers and students, and even increases the unstable factors of the university financial system and affects the normal operation of university financial system [1]. Therefore, effective identification of accounting statement whitewashing behavior in colleges and universities not only protects the rights and interests of teachers and students of colleges and universities but also plays a warning role to the relevant stakeholders of accounting financial statements, so as to maintain the smooth and normal operation of the financial system of colleges and universities.
With the change of time and economic development, the forms and means of accounting statement whitewashing have become more and more diversified. The problem of accounting statement whitewashing not only brings troubles to users of accounting statements and damages their interests but also brings great challenges to the relevant regulatory authorities. Ref. [2] uses a logistic regression model to establish a regression statistical model of sample characteristics by analyzing a large number of samples of accounting statement whitewashing behaviors and completes the identification under the classification process of the model. This whitewashing behavior identification method requires a large number of accounting statement whitewashing behavior samples, and its identification accuracy is also greatly related to the richness of the samples. Ref. [3] achieves recognition by using support vector machines to classify behavioral datasets with nonlinear characteristics on a two-dimensional space and by determining the classification threshold of whitewashing behaviors according to the values taken by the support vector machine kernel function. This recognition method has high recognition accuracy for nonlinear and limited samples, but its recognition efficiency and accuracy are extremely limited for the increasingly complex and diverse accounting statement whitewashing behaviors, and the recognition effect is not ideal. Ref. [4], after extracting and establishing the feature set of accounting statement whitewashing behavior samples, the k-Means clustering algorithm is used to cluster the behavioral features in the mapping space several times, so as to achieve the recognition of specific statement whitewashing behavior. Due to the low processing efficiency of k-means clustering algorithm for high-dimensional data, the method can only identify a certain type of whitewashing means in actual use, and there are limitations. Ref. [5] proposed a unified form of fuzzy C-means and k-means algorithms and its partial implementation. This article proposes the unified form (UF) clustering algorithm as an element of novelty, which treats Fuzzy C-Means (FCM) and k-Means (KM) algorithms as a single configurable algorithm. UF algorithm was designed to facilitate the FCM and KM algorithms software implementation by offering a solution to implement a single algorithm, which can be configured to work as FCM or KM. The second element of novelty of this article is the partitional implementation of unified form (PIUF) algorithm, which is built upon the UF algorithm and designed to solve in an elegant manner the challenges of processing large datasets in a sequential manner and the scalability of the UF algorithm for processing datasets of any size. PIUF algorithm has the advantage of overcoming any possible hardware limitations that can occur if large volumes of data are processed (required to be stored, loaded in memory, and processed by a certain specified computational system). PIUF algorithm is designed and formulated to be used on a single machine if the processed dataset is very big, and it cannot be entirely loaded in the memory; at the same time, it can be scaled to multiple processing nodes for reducing the processing time required to find the optimal solution. UF and PIUF algorithms are implemented and validated in a BigTim platform, which is a distributed platform developed by the authors, and offer support for processing various datasets in a parallel manner, but they can be implemented in any other data processing platforms. The Iris dataset is considered and next modified to obtain different datasets of different sizes to test the implementation of algorithms in a BigTim platform in different configurations. The analysis of the PIUF algorithm and the comparison with FCM, KM, and DBSCAN clustering algorithms are carried out using two performance indices; three performance indices are employed to evaluate the quality of the obtained clusters.
Therefore, according to the aforementioned analysis, to ensure the normal operation of the university financial system and maintain the normal operation of the accounting system, this article will use the FCM clustering algorithm to identify the whitewash behavior of university accounting statements. The fuzzy C-means algorithm is a clustering algorithm based on division. Its basic idea is to divide the maximum similarity between targets into the same clusters to minimize the similarity between different clusters. Compared with other clustering algorithms, the FCM algorithm can improve the membership of sample classification and improve the processing accuracy.
2 An FCM clustering algorithm based on the identification of accounting statement whitewashing behavior in universities
2.1 The motives and causative factors of accounting statement whitewashing behavior in colleges and universities
2.1.1 The motives of accounting statement whitewashing behavior
In the development process of university financial system, the separation of financial management, and general university operation and management responsibilities, this information asymmetry, combined with the management’s need to maximize their own interests, the degree of progress of scientific research projects, the transparency of the financial situation of universities and other factors, will lead to the financial-related interests to conceal or even distort the information unfavorable to their own interests and make certain packaging of the financial accounting statements of universities. The financial accounting statements of universities are packaged or whitewashed so that the information delivered to the outside world is beneficial to their own interests [6].
Usually, the financial income of universities mainly comes from tuition fees, national and governmental appropriations, special funds, bank loans, donations from channels, and revenue from university-related industries. Among them, the state and government appropriation and the revenue of university-related business industry are the most important sources of financial income of universities. To get more financial allocations, university management will adjust and whitewash some information in accounting statements to magnify the scientific research investment and achievements of universities and cover up the problems in the process of the daily management of schools. In addition, the imbalance of internal and external check and balance mechanisms in the financial management system of universities is also likely to lead to the whitewashing of accounting statements of universities [7,8]. The form of incomplete separation between the overall administrative management system and financial management of colleges and universities leads to the inability of the financial management supervision function to be carried out effectively. The generation of accounting statement whitewashing behavior in colleges and universities not only needs the aforementioned motives but also needs the inducement of certain factors to realize.
2.1.2 Causes of accounting statement whitewashing
This article will analyze the causative factors of accounting statement whitewashing behavior in colleges and universities according to the GONE theory, which believes that the accounting statement whitewashing behavior in colleges and universities consists of four factors: greed (G), opportunity (O), need (N), and exposure (E), which are closely related and interact with each other, and the weights of the four factors in the accounting statement whitewashing behavior are the same, and they jointly determine the degree of risk of the statement whitewashing behavior. They jointly determine the degree of risk of the statement whitewashing behavior [9]. Figure 1 shows the GONE theoretical framework.

GONE theoretical framework of accounting statement whitewashing behavior.
A complex set of reasons contribute to accounting statement whitewashing behavior by whitewash perpetrators, but the most basic of these reasons is need. The need factor is also known as the motivation factor. Motivation is the key to the creation of accounting behavior. Whether the motivation is justified is a fundamental factor in the creation of accounting whitewash. Proper motivation will produce proper behavior; improper motivation, stimulated by undesirable factors, may form undesirable behavior, which is reflected in accounting statement management operations as accounting whitewash [10,11].
The opportunity factor is related to the hierarchy of the person implementing the whitewash in the enterprise. The higher the level of the whitewasher, the more information he has, the less likely he is to be constrained by external supervision, and then the greater the possibility of realizing benefits through the act of statement whitewashing [12,13,14]. Therefore, it is more likely for the whitewashing practitioner to carry out the whitewashing behavior.
The exposure factor consists of two parts: the likelihood that the whitewashing behavior will be discovered and the degree of punishment for the perpetrators of whitewashing. First, whitewashing behavior is deceptive and covert, and the probability of whitewashing occurring is negatively related to the probability of whitewashing being discovered. In other words, the easier the whitewash is to be discovered, the less likely the whitewash is to be committed. The perpetrators of whitewashing will decide whether to commit whitewashing by judging the likelihood of whitewashing being discovered. The severity of the penalty is also negatively correlated with the probability of a whitewash. A whitewash practitioner considers the severity of the penalty if the whitewash is discovered and measures the ratio of risk to benefit. If the penalty is sufficiently severe, it will deter management from trying to commit a whitewash.
Greed means more than just the literal meaning of the word, it means a low level of morality. The level of morality is negatively correlated with the probability of a whitewash. It is expressed as an individual value judgment. People perform actions that they believe to be in line with their values and stagnate when they believe otherwise. When the ethical level of management is high, it is internally constrained. If managers’ own ethical level is low, they will easily find various excuses for their own whitewashing behaviors, thus greatly increasing the likelihood of whitewashing occurring.
After determining the motives and inducements of accounting statement whitewashing behavior in colleges and universities, the main behavioral means of accounting statement whitewashing in colleges and universities are analyzed.
2.2 Accounting statement whitewashing techniques
2.2.1 Use of government subsidy income to whitewash statements
In the link of local science and education field development, the government and locally owned colleges and universities are a kind of mutually beneficial patron relationship. Local governments often increase the support for universities for the development of local science and technology and teaching level and encourage universities to carry out various scientific research and teaching activities. However, the funds invested by the government for the improvement of scientific research ability and teaching ability of colleges and universities are easily appropriated by some people through modifying the amount and the flow of accounting statements. This kind of statement whitewashing such as modification of the amount of government appropriation and fictitious use of appropriation is the most common kind of whitewashing behavior [15].
2.2.2 Reconciliation of report data using related transactions
Related transactions mainly refer to the related revenue industries of universities to adjust the income and expense data on accounting statements through related transactions, so as to realize the whitewashing of accounting statements. In practice, the values of accounting accounts such as “other operating profit,” “other accounts receivable,” or “nonoperating income” are usually changed to whitewash the accounting statements. The specific means of operation are as follows [16,17].
Fictitious business items can be established by signing contracts with third parties that can reasonably avoid accounting standards and at the same time increase the amount of expenses and income in accounting statements. In addition, the purchase of research equipment and teaching assets by universities is also the main entry point for fictitious business items. Teaching assets are purchased from certain designated companies to increase the profit of the purchasing company while also whitewashing the expenses of teaching assets as fixed asset purchases on the accounting statements. Usually, these designated companies overprice the teaching assets, and there are also universities that depreciate teaching assets that have not reached their useful life, and there are also many false markups in depreciation treatment. Fictitious accounting and reporting items are also common accounting statement whitewashing behaviors. By fictitious invoicing, fictitious revenue, and fictitious profit, financial falsification is carried out to whitewash the report data.
2.2.3 Use of accounting policies to disguise financial statements
Since China does not have accounting policies for the accounting of college financial system, the current accrual accounting system makes many accounting elements very manipulative in the process of determination and measurement, providing room for the operation of accounting statement whitewashing. Use the university fund flow analysis to change the approval authority and responsibility, handover and the difference of financial audit operation, and change the account information according to the difference results. From time to time, colleges and universities may apply for loan business from banks in the normal operation and management due to capital turnover and other problems. In the process of loan business, through the management of liability items, the uncertainty of hidden assets formed after the capitalization treatment of liability items is used to manipulate expenses and fictitious accounting items to achieve the purpose of whitewashing [18].
The impact of the aforementioned analyzed means of accounting statement whitewashing in universities and the motives and inducements of the whitewashing behavior are used as the indicators of accounting statement whitewashing behavior identification, and the FCM algorithm is used to classify and identify the statement whitewashing behavior.
2.3 FCM algorithm classification to identify accounting statement whitewashing
The core idea of the FCM algorithm is to classify the training sample set into C classes according to their good or bad weight, and the class affiliation of each sample forms a fuzzy identification matrix. Meanwhile, there exist m indicators in the training sample set. These m indicators and C classes can be trained to obtain the fuzzy clustering center matrix S. Then, the test sample set can invert its own fuzzy identification matrix through the fuzzy clustering center matrix S, so as to obtain the good and bad severity levels of the test samples.
Since there are differences in the magnitude of the eigenvalues of each whitewashing behavior identification index of the selected college accounting statement samples, they must be specialized to eliminate the influence of the magnitudes between the eigenvalues of the indexes. The calculation formula is shown as follows [19].
In the formula, X is the raw data corresponding to the indicators for identifying the whitewashing of statements. X′ is the normalized data, X min is the minimum value in the indicator data, and X max is the maximum value in the index data. After processing, the affiliation values of each data were calculated according to equation (2).
where b is the number of iterations of the algorithm,
where u ij is the element in the relative affiliation matrix of the data set. According to the principle of fuzzy partitioning, F(U:c) takes the value on the interval [1/c,1], and the partition coefficient F(U:c) obtains its maximum value 1 when each data belongs to only one individual whitewashing behavior class. The partition coefficient F(U:c) obtains the minimum value when each data have an equal affiliation to all whitewashing behavior classes and are of the same value 1/c. The partition coefficients of different numbers of clustering classes are ranked, and the one with the least uncertainty c is selected as the best number of clustering classes [20]. The total number of data to be processed and the number of whitewashing behavior identification categories are determined, and the clustering template matrix is calculated according to the following equation [21].
where m is the weighted index, which usually takes the value of 2. The aforementioned two-step algorithm is repeated in cumulative iterations in steps of 1 until the minimum value of the objective function is approximated in accordance with the following equation, resulting in the clustering matrix U and the clustering statistical probability P of accounting statement whitewashing.
where ε is the iterative approximation of the minimum value of the objective function. After determining the clustering division matrix and clustering statistical probability, the FCM algorithm classification process determined by the parameters is used to obtain the corresponding results according to the classification requirements [22,23]. The accounting statement data of target universities are processed according to the aforementioned process, and the classification result of the FCM clustering algorithm is the recognition result of accounting statement whitewashing behavior of universities, so that the research on the recognition method of accounting statement whitewashing behavior of universities based on FCM clustering algorithm is completed.
3 Identification method validation
The FCM clustering algorithm-based identification method of accounting statement whitewashing behavior in universities was studied earlier, and the effectiveness of this identification method will be verified by means of empirical validation in this section.
3.1 Experiment content
The experiments are in the form of a comparison between the recognition method based on the FCM algorithm and the recognition methods mentioned in refs. [3,4]. To ensure the authenticity of the experimental results, the same experimental data are used, and the experimental data are uniformly processed using SPSS software. The comparison indexes of the comparison experiments are the recognition effect of the three whitewashing behavior recognition methods and the learning rate of the algorithms used by the three methods. The effectiveness of the identification methods is determined by the accuracy of the identification and the cost of misclassification (first type misclassification cost and second type misclassification cost), where the first type error is the omission, which means that the fraudulent accounting statements cannot be identified, and the second type error is the misclassification, which means that the normal accounting statements are judged to be fraudulent. The algorithm learning rate is characterized by the decreasing gradient of the algorithm. The experimental data are analyzed to draw the corresponding conclusions.
3.2 Data preparation
The financial data of colleges and universities with accounting statement whitewashing behaviors were selected as the research data sources from the data disclosed by government information departments. In the process of data source selection, colleges and universities with accounting statement whitewashing behaviors in compliance with the Financial System of Higher Education and Accounting System of Higher Education were selected, and companies with missing data were excluded, and finally, 10 data samples of colleges and universities with whitewashing behaviors were identified. Five of the samples are used as training samples to train the parameters of the identification method, and the other five groups are used as identification objects for experiments.
Note that the selected data samples with accounting statement whitewashing behaviors are as similar as possible to the size of the colleges and universities from which the samples to be processed come from, to avoid the interference of other factors on the experimental results.
3.3 Experimental results
When testing the learning rate of the algorithms, the gradient descent percentages for all algorithms at different iteration steps and iteration numbers are shown in Figure 2(a–c).

Algorithm learning rate comparison results: (a) support vector machine algorithm, (b) k-means clustering algorithm, and (c) FCM clustering algorithm.
As shown in Figure 2, under the same iteration step, with the increase of iteration number, the gradient decline percentage of the FCM clustering algorithm keeps the value of relatively stable growth trend, and the growth speed is accelerated after the iteration number is greater than 85, and the overall gradient decline percentage is higher than the other two algorithms. In addition, the gradient drop percentage of the support vector machine algorithm is slightly higher than that of the k-means clustering algorithm. At the same number of iterations, the gradient drop percentage of the FCM clustering algorithm remains relatively stable with the increase of the iteration step length, while the gradient drop percentage of the other two algorithms shows negative growth with the increase of the iteration step length and has a certain tendency to rise when the step length is greater than 10. The aforementioned analysis content indicates that the FCM clustering algorithm has a higher learning rate.
In this experiment, three kinds of whitewashing behavior identification methods are used to identify the selected university accounting statements, and the identification results are presented in Tables 1–3.
Recognition results based on support vector machine algorithm
Sample type | First type of error (%) | Second type of error (%) | Recognition rate (%) |
---|---|---|---|
Training samples | 12.35 | 10.29 | 72.83 |
Identification samples | 14.59 | 14.37 | 73.26 |
Identification results based on k-means clustering algorithm
Sample type | First type of error (%) | Second type of error (%) | Recognition rate (%) |
---|---|---|---|
Training samples | 14.62 | 10.87 | 68.79 |
Identification samples | 17.41 | 15.69 | 70.56 |
Identification results based on FCM clustering algorithm
Sample type | First type of error (%) | Second type of error (%) | Recognition rate (%) |
---|---|---|---|
Training samples | 6.95 | 7.03 | 82.96 |
Identification samples | 7.59 | 7.88 | 84.25 |
In the process of practical application, the cost of missing the results (i.e., the first category of errors) is more serious than the consequences of misclassification (i.e., the second category of errors). The analysis of the data in Tables 1–3 shows that the misjudgment rate of the recognition methods based on the FCM clustering algorithm is higher than the misjudgment rate of the first category of errors, while the misjudgment rates of the other two recognition methods are higher than the misjudgment rates of the second category of errors. Meanwhile, the effective recognition rate of the recognition methods based on the FCM algorithm is greater than 82%, which is much higher than the other two methods.
4 Analysis and discussion
The identification method of university accounting statement whitewashing behavior based on the FCM clustering algorithm has a high learning rate. At the same time, the misjudgment rate of the research method is higher than that of the first kind of error, and the effective recognition rate is more than 82%. To sum up, the FCM clustering algorithm proposed in this article has a high learning rate, 82% recognition accuracy, and low misclassification cost in the recognition of accounting statement whitewash. Compared with other recognition methods, this method is more effective in practical application.
5 Conclusion
Currently, colleges and universities are facing new situations and requirements such as modern university governance, “eight provisions” and special inspection, “double first-class” construction and comprehensive education reform, scientific research system and fund management reform, and budget reform and performance budget. Basic financial services such as accounting statements run through the whole process of university fund management and operation. The identification of accounting statement fraud is the basic supervision work to prevent integrity risks in colleges and universities. To improve the accuracy and efficiency of accounting statement whitewashing behavior recognition, a method of university accounting statement whitewashing behavior recognition based on FCM clustering algorithm is proposed, and the feasibility of this method is verified by experiments. The method studied has good recognition performance, low recognition error rate, and high recognition accuracy. This method is more effective in practical application. For future research, we can do more in-depth research on how to reduce the identification time of whitewash behavior in university accounting statements.
-
Conflict of interest: The author states no conflict of interest.
References
[1] Muhibudeen L, Abdulrahman S. Compliance with statement of accounting standard 14 by listed oil and gas firms in Nigeria. Appl Financ Account. 2019;6(1):15–24.10.11114/afa.v6i1.4632Search in Google Scholar
[2] Vassiliadis VG, Spyroglou II, Rigas AG, Rosenberg JR, Lindsay KA. Dealing with the phenomenon of quasi-complete separation and a goodness of fit test in logistic regression models in the case of long data sets. Stat Biosci. 2019;11(3):567–96.10.1007/s12561-019-09249-zSearch in Google Scholar
[3] Bhavan A, Chauhan P, Hitkul, Shah RR. Bagged support vector machines for emotion recognition from speech. Knowl Syst. 2019;184(3):104–10.10.1016/j.knosys.2019.104886Search in Google Scholar
[4] Rao W, Xia J, Lyu W, Lu Z. Interval data-based k-means clustering method for traffic state identification at urban intersections. IET Intell Transp Syst. 2019;13(7):1106–15.10.1049/iet-its.2018.5379Search in Google Scholar
[5] Borlea ID, Precup RE, Borlea AB, Iercan D. A unified form of fuzzy C-means and k-means algorithms and its partitional implementation. Knowl Syst. 2021;214:106731.10.1016/j.knosys.2020.106731Search in Google Scholar
[6] Verma H, Gupta A, Kumar D. A modified intuitionistic fuzzy C-means algorithm incorporating hesitation degree. Pattern Recognit Lett. 2019;122:45–52.10.1016/j.patrec.2019.02.017Search in Google Scholar
[7] Jaber AN, Rehman SU. FCM-SVM based intrusion detection system for cloud computing environment. Clust Comput. 2020;23(9):3221–31.10.1007/s10586-020-03082-6Search in Google Scholar
[8] Salar A. Fuzzy C-means clustering algorithm for data with unequal cluster sizes and contaminated with noise and outliers: review and development. Expert Syst Appl. 2020;165:113–20.10.1016/j.eswa.2020.113856Search in Google Scholar
[9] Mirghasemi S, Andreae P, Zhang MJ. Domain-independent severely noisy image segmentation via adaptive wavelet shrinkage using particle swarm optimization and fuzzy C-means. Expert Syst Appl. 2019;133:126–50.10.1016/j.eswa.2019.04.050Search in Google Scholar
[10] Pérez AE, González NG, Torres JJG. Spectral overlapping estimation based on machine learning for gridless Nyquist-wavelength division multiplexing systems. Optical Eng. 2020;59(7):116–26.10.1117/1.OE.59.7.076116Search in Google Scholar
[11] Sahoo RC, Pradhan SK. An efficient approach for enhancing contrast level and segmenting satellite images: HNN and FCM approach. Wirel Personal Commun. 2020;113(8):651–67.10.1007/s11277-020-07247-9Search in Google Scholar
[12] Dhas E, Gomathi S. A novel clustering algorithm by clubbing GHFCM and GWO for microarray gene data. J Supercomputing. 2020;76(10):5693–979.10.1007/s11227-019-02953-zSearch in Google Scholar
[13] Liu X, Li J. The research on active boost PFC. J Comput Methods Sci Eng. 2020;20(3):839–52.10.3233/JCM-194041Search in Google Scholar
[14] Geetha A, Gomathi N. A robust grey wolf-based deep learning for brain tumour detection in MR images. Biomed Eng/Biomed Tech. 2020;65(2):191–207.10.1515/bmt-2018-0244Search in Google Scholar PubMed
[15] Sujil A, Kumar R, Bansal RC. FCM Clustering-ANFIS-based PV and wind generation forecasting agent for energy management in a smart microgrid. J Eng. 2019;2019(18):4852–7.10.1049/joe.2018.9323Search in Google Scholar
[16] Abolfazl K, Hadi E, Ali G, Robust FCM. clustering algorithm with combined spatial constraint and membership matrix local information for brain MRI segmentation. Expert Syst Appl. 2020;146(2):113–9.10.1016/j.eswa.2019.113159Search in Google Scholar
[17] Abernathy JL, Guo F, Kubick TR, Masli A. Financial statement footnote readability and corporate audit outcomes. Auditing: A J Pract Theory. 2019;38(2):1–26.10.2308/ajpt-52243Search in Google Scholar
[18] Demmer M, Pronobis P, Yohn TL. Mandatory IFRS adoption and analyst forecast accuracy: the role of financial statement-based forecasts and analyst characteristics. Rev Account Stud. 2019;24(3):1022–65.10.1007/s11142-019-9481-7Search in Google Scholar
[19] Muhibudeen L, Abdulrahman S. Compliance with statement of accounting standard 14 by listed oil and gas firms in Nigeria. Appl Financ Account. 2020;6(1):15–24.10.11114/afa.v6i1.4632Search in Google Scholar
[20] Ratmono D, Darsono D, Cahyonowati N. Financial statement fraud detection with beneish M-score and dechow F-score model: an empirical analysis of fraud pentagon theory in Indonesia. Int J Finan Res. 2020;11(6):154–60.10.5430/ijfr.v11n6p154Search in Google Scholar
[21] Susilo A, Masitoh E, Suhendro S. Fraud pentagon in the act of cheating financial statements with the M-Score method. Jambura Sci Manag. 2021;3(1):36–45.10.37479/jsm.v3i1.7142Search in Google Scholar
[22] Khumawala SB, Ranasinghe T, Yan CJ. Real effects of governmental accounting standards: evidence from GASB statement No. 53 – Accounting and financial reporting for derivative instruments. J Account Public Policy. 2020;39(5):106719.10.1016/j.jaccpubpol.2020.106719Search in Google Scholar
[23] Ferreira FA, Castro C. The impact of terrorism and corruption on tourism in Turkey: a regression analysis. J Comput Methods Sci Eng. 2020;20(2):583–90.10.3233/JCM-194002Search in Google Scholar
© 2022 Qihao Yang, published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.
Articles in the same Issue
- Research Articles
- Construction of 3D model of knee joint motion based on MRI image registration
- Evaluation of several initialization methods on arithmetic optimization algorithm performance
- Application of visual elements in product paper packaging design: An example of the “squirrel” pattern
- Deep learning approach to text analysis for human emotion detection from big data
- Cognitive prediction of obstacle's movement for reinforcement learning pedestrian interacting model
- The application of neural network algorithm and embedded system in computer distance teach system
- Machine translation of English speech: Comparison of multiple algorithms
- Automatic control of computer application data processing system based on artificial intelligence
- A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing
- Application of mining algorithm in personalized Internet marketing strategy in massive data environment
- On the correction of errors in English grammar by deep learning
- Research on intelligent interactive music information based on visualization technology
- Extractive summarization of Malayalam documents using latent Dirichlet allocation: An experience
- Conception and realization of an IoT-enabled deep CNN decision support system for automated arrhythmia classification
- Masking and noise reduction processing of music signals in reverberant music
- Cat swarm optimization algorithm based on the information interaction of subgroup and the top-N learning strategy
- State feedback based on grey wolf optimizer controller for two-wheeled self-balancing robot
- Research on an English translation method based on an improved transformer model
- Short-term prediction of parking availability in an open parking lot
- PUC: parallel mining of high-utility itemsets with load balancing on spark
- Image retrieval based on weighted nearest neighbor tag prediction
- A comparative study of different neural networks in predicting gross domestic product
- A study of an intelligent algorithm combining semantic environments for the translation of complex English sentences
- IoT-enabled edge computing model for smart irrigation system
- A study on automatic correction of English grammar errors based on deep learning
- A novel fingerprint recognition method based on a Siamese neural network
- A hidden Markov optimization model for processing and recognition of English speech feature signals
- Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq
- Convex optimization for additive noise reduction in quantitative complex object wave retrieval using compressive off-axis digital holographic imaging
- CRNet: Context feature and refined network for multi-person pose estimation
- Improving the efficiency of intrusion detection in information systems
- Research on reform and breakthrough of news, film, and television media based on artificial intelligence
- An optimized solution to the course scheduling problem in universities under an improved genetic algorithm
- An adaptive RNN algorithm to detect shilling attacks for online products in hybrid recommender system
- Computing the inverse of cardinal direction relations between regions
- Human-centered artificial intelligence-based ice hockey sports classification system with web 4.0
- Construction of an IoT customer operation analysis system based on big data analysis and human-centered artificial intelligence for web 4.0
- An improved Jaya optimization algorithm with ring topology and population size reduction
- Review Articles
- A review on voice pathology: Taxonomy, diagnosis, medical procedures and detection techniques, open challenges, limitations, and recommendations for future directions
- An extensive review of state-of-the-art transfer learning techniques used in medical imaging: Open issues and challenges
- Special Issue: Explainable Artificial Intelligence and Intelligent Systems in Analysis For Complex Problems and Systems
- Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction
- Evaluating OADM network simulation and an overview based metropolitan application
- Radiography image analysis using cat swarm optimized deep belief networks
- Comparative analysis of blockchain technology to support digital transformation in ports and shipping
- IoT network security using autoencoder deep neural network and channel access algorithm
- Large-scale timetabling problems with adaptive tabu search
- Eurasian oystercatcher optimiser: New meta-heuristic algorithm
- Trip generation modeling for a selected sector in Baghdad city using the artificial neural network
- Trainable watershed-based model for cornea endothelial cell segmentation
- Hessenberg factorization and firework algorithms for optimized data hiding in digital images
- The application of an artificial neural network for 2D coordinate transformation
- A novel method to find the best path in SDN using firefly algorithm
- Systematic review for lung cancer detection and lung nodule classification: Taxonomy, challenges, and recommendation future works
- Special Issue on International Conference on Computing Communication & Informatics
- Edge detail enhancement algorithm for high-dynamic range images
- Suitability evaluation method of urban and rural spatial planning based on artificial intelligence
- Writing assistant scoring system for English second language learners based on machine learning
- Dynamic evaluation of college English writing ability based on AI technology
- Image denoising algorithm of social network based on multifeature fusion
- Automatic recognition method of installation errors of metallurgical machinery parts based on neural network
- An FCM clustering algorithm based on the identification of accounting statement whitewashing behavior in universities
- Emotional information transmission of color in image oil painting
- College music teaching and ideological and political education integration mode based on deep learning
- Behavior feature extraction method of college students’ social network in sports field based on clustering algorithm
- Evaluation model of multimedia-aided teaching effect of physical education course based on random forest algorithm
- Venture financing risk assessment and risk control algorithm for small and medium-sized enterprises in the era of big data
- Interactive 3D reconstruction method of fuzzy static images in social media
- The impact of public health emergency governance based on artificial intelligence
- Optimal loading method of multi type railway flatcars based on improved genetic algorithm
- Special Issue: Evolution of Smart Cities and Societies using Emerging Technologies
- Data mining applications in university information management system development
- Implementation of network information security monitoring system based on adaptive deep detection
- Face recognition algorithm based on stack denoising and self-encoding LBP
- Research on data mining method of network security situation awareness based on cloud computing
- Topology optimization of computer communication network based on improved genetic algorithm
- Implementation of the Spark technique in a matrix distributed computing algorithm
- Construction of a financial default risk prediction model based on the LightGBM algorithm
- Application of embedded Linux in the design of Internet of Things gateway
- Research on computer static software defect detection system based on big data technology
- Study on data mining method of network security situation perception based on cloud computing
- Modeling and PID control of quadrotor UAV based on machine learning
- Simulation design of automobile automatic clutch based on mechatronics
- Research on the application of search algorithm in computer communication network
- Special Issue: Artificial Intelligence based Techniques and Applications for Intelligent IoT Systems
- Personalized recommendation system based on social tags in the era of Internet of Things
- Supervision method of indoor construction engineering quality acceptance based on cloud computing
- Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining
- Deep learning technology of Internet of Things Blockchain in distribution network faults
- Optimization of shared bike paths considering faulty vehicle recovery during dispatch
- The application of graphic language in animation visual guidance system under intelligent environment
- Iot-based power detection equipment management and control system
- Estimation and application of matrix eigenvalues based on deep neural network
- Brand image innovation design based on the era of 5G internet of things
- Special Issue: Cognitive Cyber-Physical System with Artificial Intelligence for Healthcare 4.0.
- Auxiliary diagnosis study of integrated electronic medical record text and CT images
- A hybrid particle swarm optimization with multi-objective clustering for dermatologic diseases diagnosis
- An efficient recurrent neural network with ensemble classifier-based weighted model for disease prediction
- Design of metaheuristic rough set-based feature selection and rule-based medical data classification model on MapReduce framework
Articles in the same Issue
- Research Articles
- Construction of 3D model of knee joint motion based on MRI image registration
- Evaluation of several initialization methods on arithmetic optimization algorithm performance
- Application of visual elements in product paper packaging design: An example of the “squirrel” pattern
- Deep learning approach to text analysis for human emotion detection from big data
- Cognitive prediction of obstacle's movement for reinforcement learning pedestrian interacting model
- The application of neural network algorithm and embedded system in computer distance teach system
- Machine translation of English speech: Comparison of multiple algorithms
- Automatic control of computer application data processing system based on artificial intelligence
- A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing
- Application of mining algorithm in personalized Internet marketing strategy in massive data environment
- On the correction of errors in English grammar by deep learning
- Research on intelligent interactive music information based on visualization technology
- Extractive summarization of Malayalam documents using latent Dirichlet allocation: An experience
- Conception and realization of an IoT-enabled deep CNN decision support system for automated arrhythmia classification
- Masking and noise reduction processing of music signals in reverberant music
- Cat swarm optimization algorithm based on the information interaction of subgroup and the top-N learning strategy
- State feedback based on grey wolf optimizer controller for two-wheeled self-balancing robot
- Research on an English translation method based on an improved transformer model
- Short-term prediction of parking availability in an open parking lot
- PUC: parallel mining of high-utility itemsets with load balancing on spark
- Image retrieval based on weighted nearest neighbor tag prediction
- A comparative study of different neural networks in predicting gross domestic product
- A study of an intelligent algorithm combining semantic environments for the translation of complex English sentences
- IoT-enabled edge computing model for smart irrigation system
- A study on automatic correction of English grammar errors based on deep learning
- A novel fingerprint recognition method based on a Siamese neural network
- A hidden Markov optimization model for processing and recognition of English speech feature signals
- Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq
- Convex optimization for additive noise reduction in quantitative complex object wave retrieval using compressive off-axis digital holographic imaging
- CRNet: Context feature and refined network for multi-person pose estimation
- Improving the efficiency of intrusion detection in information systems
- Research on reform and breakthrough of news, film, and television media based on artificial intelligence
- An optimized solution to the course scheduling problem in universities under an improved genetic algorithm
- An adaptive RNN algorithm to detect shilling attacks for online products in hybrid recommender system
- Computing the inverse of cardinal direction relations between regions
- Human-centered artificial intelligence-based ice hockey sports classification system with web 4.0
- Construction of an IoT customer operation analysis system based on big data analysis and human-centered artificial intelligence for web 4.0
- An improved Jaya optimization algorithm with ring topology and population size reduction
- Review Articles
- A review on voice pathology: Taxonomy, diagnosis, medical procedures and detection techniques, open challenges, limitations, and recommendations for future directions
- An extensive review of state-of-the-art transfer learning techniques used in medical imaging: Open issues and challenges
- Special Issue: Explainable Artificial Intelligence and Intelligent Systems in Analysis For Complex Problems and Systems
- Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction
- Evaluating OADM network simulation and an overview based metropolitan application
- Radiography image analysis using cat swarm optimized deep belief networks
- Comparative analysis of blockchain technology to support digital transformation in ports and shipping
- IoT network security using autoencoder deep neural network and channel access algorithm
- Large-scale timetabling problems with adaptive tabu search
- Eurasian oystercatcher optimiser: New meta-heuristic algorithm
- Trip generation modeling for a selected sector in Baghdad city using the artificial neural network
- Trainable watershed-based model for cornea endothelial cell segmentation
- Hessenberg factorization and firework algorithms for optimized data hiding in digital images
- The application of an artificial neural network for 2D coordinate transformation
- A novel method to find the best path in SDN using firefly algorithm
- Systematic review for lung cancer detection and lung nodule classification: Taxonomy, challenges, and recommendation future works
- Special Issue on International Conference on Computing Communication & Informatics
- Edge detail enhancement algorithm for high-dynamic range images
- Suitability evaluation method of urban and rural spatial planning based on artificial intelligence
- Writing assistant scoring system for English second language learners based on machine learning
- Dynamic evaluation of college English writing ability based on AI technology
- Image denoising algorithm of social network based on multifeature fusion
- Automatic recognition method of installation errors of metallurgical machinery parts based on neural network
- An FCM clustering algorithm based on the identification of accounting statement whitewashing behavior in universities
- Emotional information transmission of color in image oil painting
- College music teaching and ideological and political education integration mode based on deep learning
- Behavior feature extraction method of college students’ social network in sports field based on clustering algorithm
- Evaluation model of multimedia-aided teaching effect of physical education course based on random forest algorithm
- Venture financing risk assessment and risk control algorithm for small and medium-sized enterprises in the era of big data
- Interactive 3D reconstruction method of fuzzy static images in social media
- The impact of public health emergency governance based on artificial intelligence
- Optimal loading method of multi type railway flatcars based on improved genetic algorithm
- Special Issue: Evolution of Smart Cities and Societies using Emerging Technologies
- Data mining applications in university information management system development
- Implementation of network information security monitoring system based on adaptive deep detection
- Face recognition algorithm based on stack denoising and self-encoding LBP
- Research on data mining method of network security situation awareness based on cloud computing
- Topology optimization of computer communication network based on improved genetic algorithm
- Implementation of the Spark technique in a matrix distributed computing algorithm
- Construction of a financial default risk prediction model based on the LightGBM algorithm
- Application of embedded Linux in the design of Internet of Things gateway
- Research on computer static software defect detection system based on big data technology
- Study on data mining method of network security situation perception based on cloud computing
- Modeling and PID control of quadrotor UAV based on machine learning
- Simulation design of automobile automatic clutch based on mechatronics
- Research on the application of search algorithm in computer communication network
- Special Issue: Artificial Intelligence based Techniques and Applications for Intelligent IoT Systems
- Personalized recommendation system based on social tags in the era of Internet of Things
- Supervision method of indoor construction engineering quality acceptance based on cloud computing
- Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining
- Deep learning technology of Internet of Things Blockchain in distribution network faults
- Optimization of shared bike paths considering faulty vehicle recovery during dispatch
- The application of graphic language in animation visual guidance system under intelligent environment
- Iot-based power detection equipment management and control system
- Estimation and application of matrix eigenvalues based on deep neural network
- Brand image innovation design based on the era of 5G internet of things
- Special Issue: Cognitive Cyber-Physical System with Artificial Intelligence for Healthcare 4.0.
- Auxiliary diagnosis study of integrated electronic medical record text and CT images
- A hybrid particle swarm optimization with multi-objective clustering for dermatologic diseases diagnosis
- An efficient recurrent neural network with ensemble classifier-based weighted model for disease prediction
- Design of metaheuristic rough set-based feature selection and rule-based medical data classification model on MapReduce framework