You are on page 1of 6

Microprocessors and Microsystems 83 (2021) 103973

Contents lists available at ScienceDirect

Microprocessors and Microsystems


journal homepage: www.elsevier.com/locate/micpro

Corporate accounting information disclosure based on FPGA and


neural network
Xingfu Zhang
School of Finance and Economics, Anhui Technical College of Industry and Economy, Hefei, Anhui, 230051, China

A R T I C L E I N F O A B S T R A C T

Keywords: Corporate accounting information is a measure of the company’s accounting and external reporting systems. It is
Corporate accounting information routinely disclosed, which is quantitative data on its financial position and performance audit. The corporate
Neural network (NN) accounting information system contains confidential information that needs to be secured. The consequences of
FPGA
unauthorized access are data loss from identity theft issues. To solve the problem, encrypt and decrypt the
Authorized person
Unauthorized person
sensitive corporate accounting information and product the data using the proposed algorithm Neural Network
Encryption (NN) and Field Programmable Gate Array (FPGA) is used to classify the corporate accounting information
Decryption authorized person and unauthorized person. When one authorized user accesses the corporate account infor­
mation, it generates the secret critical process. The proposed algorithm unauthorized person cannot access the
information is not allowed for stealing. Encryption is the process of converting to something as random and
meaningless as direct text data. Decryption is the process of restoring the ciphertext plaintext.

1. Introduction systematically implement appropriate measures to systematically pro­


tect the confidentiality, integrity, and availability of information man­
Corporate accounting information is the essential inputs to the agement. Technical control is through identity management, access
economy of decision-making based on any of the information. The pri­ control, enhanced technology, firewall technology, and encryption
mary input attributes, but it is a respectable decision-making task or technology.
assigned, do not know whether there is any structure in one research if Voluntary disclosure of corporate information is a way necessary for
there is a need to play the assumed role. The same top reputation desire outsiders to manage corporate governance and performance. Under the
has been shown to collapse, and so on in the world-class financial in­ Financial Accounting Standards Board, in addition to the meaning of
stitutions who need to increase the pressure a little bit of the best of the "voluntary disclosure," there is no mandatory scope without the finan­
recent increase has been disclosed. Still, the company report, which uses cial statements that are required by generally accepted accounting
a recently expanded amount of information disclosed in the report, in­ principles. If the company selects voluntary information, its profits as­
creases the financial and investment community’s pressure to disclose sume that it would outweigh the costs—the basis of two corporate
the primary source. governance principles and accounting interconnected on transparency
Corporate accounting information can pursue a specific purpose, and accountability. Performance is expected to strengthen, resulting in a
such as availability, integrity, confidentiality, accountability, and ensure significant operation and management mechanism of the capital market.
an increase in corporate finance and banking operations. Security pol­ One of the many strategies used to attract investors is occupied publi­
icies can be achieved by monitoring and updating and monitoring pro­ cation limited time enterprise performance predictions. However, the
cesses, information security risk assessment, and control strategy extent that this bulge is achieved will depend on the following ac­
implementation monitoring and updating the creative process instead of counting information’s reliability. More specifically, accurate account­
a series of one-time events. Variable of security risk, threat, contains ing information plays its role as a reliable trust need to capture the
vulnerability attack technique, Mumbai, the expected frequency of the current investment and future economic conditions.
India of the attack, the defenses’ posture of business and technology, and Using the company’s characteristics as an independent variable in
financial institutions of financial institutions. These standards use the the disclosure of both developed and developing countries and for
best control, quantify the level of risk acceptable practice, and example, using nine variables (company size, profitability, leverage,

E-mail address: Zhang3688fu@163.com.

https://doi.org/10.1016/j.micpro.2021.103973
Received 15 December 2020; Received in revised form 5 January 2021; Accepted 11 January 2021
Available online 12 January 2021
0141-9331/© 2021 Elsevier B.V. All rights reserved.
X. Zhang Microprocessors and Microsystems 83 (2021) 103973

Fig. 1. Proposed Diagram.

government ownership, institutional ownership, foreign ownership, in­ possible.


ternal audit activities, the dual leadership, auditing, and type). Volun­ Return on Equity (RoE) also develops and implements its financial
tary Disclosure factor in determining China’s stock market is (company strategy point of view of an important factor [5]. Provided that the
size, in situ assets, liquidity, leverage type of audit, the diffusion of effectiveness of the use of capital for investors. Its decline may signal the
ownership, state ownership, non-executive directors, the legal envi­ company’s financial situation deteriorated, but the increase in revenues
ronment, and the use of intermediaries in return) researchers share­ can be seen as a shareholder wealth symptom [6]. If the stock price will
holders’ equity variables. be displayed an upward trend, it results obtained by, in the case, which
The disclosure’s effect increased to the stock price is likely to be of is the payment of dividends to earnings, investment in the company, will
interest to investors and stakeholders, such as significant policymakers be attractive to investors.
and regulatory authorities. Two levels of information play a vital role in It provides evidence suggesting that entrepreneur cognitive out­
a disclosure to find the relationship between the variables is; also, the comes across the material objects, the fuselage interaction, and recursive
type of disclosure is the only. For high-analysts and the company, under social system drug interactions. The research results show that the
the company’s understanding of the history and background, prospects unilateral consideration of the creative cognitive system cannot capture
and non-financial information to analysts and company information low the integrity of entrepreneurs’ cognition [7]. Thus, research results have
as information disclosure, disclosure of additional needs. The integra­ been adopted to find entrepreneurs’ perceptions in the empirical en­
tion of to meet users’ diverse information needs as financial, non- trepreneur’s individuals and context [8].
financial" information. The term non-financial is the relationship be­ In recent years, online social networks’ security has become a matter
tween such resources, environmental issues, and information. The ex­ of common concern [9]. In olfactory neurons seek and find account theft
pectations of management for future performance refer to it requires is to ensure the safety of the online social platform is very important. The
that they be guaranteed an accurate user report. At the same time, you authors describe a new method to detect, based on the analytic hierar­
can identify the business, financial performance, and location connec­ chy, teacher account damage [10]. Detection decisions are taken, and
tion. The corporate accounting information report is not considered a change the threshold value is used to obtain different detection results.
costly burden to keep the information needs of more complete stake­ A theory of legitimacy indicates that the company’s communication
holders. At first glance, this is why it is a step forward with tangible strategy is to maintain or restore a lousy news agency [11]. Previous
benefits to many commercial entities. That’s why 80% of large com­ studies on socially responsible disclosure focused on selecting and
panies have continued mainly due to starting per the Global Reporting omitting information rather than presenting it [12]. The performance’s
Initiative (GRI) guidelines reported in 40 countries worldwide. A group actual organization’s lack of consideration, recorded in the following
of eight and a twenty-first group is committed to reforming these strategies, uses the reality distorted that the company is feasible.
countries to improve transparency and disclosure. Transparency Inter­ The method of extending the sensitivity range of the fuzzy expert
national started this movement from the oil and gas industry, has wit­ analysis (evaluation) and having the characteristics of integrity, trans­
nessed a significant improvement of the mandatory and voluntary parency, and reliability of a process for details or decision-maker
disclosure of levels because of it. The new law has had a slower impact, (management) prediction [13]. Finally, the method makes the cabin a
but it has led to the first improvement. relatively fast estimate and will light a different value than just a release
(most likely) the possibility of value [14].
2. Related work The slotting effect is incorporated from the sub-model. The 3-D
boundary condition and current vector represent the three-
A legal strategy is to find a positive performance evaluation and dimensional spiral current imposed on the potential magnet loop [15].
corrective measures stressed to eliminate or minimize the bad news [1]. Proposed with polarity, the sample axis, and magnetic loss will act as
The so-called derived in this study of great concern, experts from the permanent magnets on rare earth in a computer program setting pro­
display information, is an essential indicator of the quality of monitoring gram by tracking the activity in sections of the circular arc [16].
and reporting on Corporate Social Responsibility (CSR) [2]. Findings A feed-forward multilayer perceptron neural network structure
have considered only one type of corporate social responsibility because it is suitable as a simple classification and to achieve a serial
Disclosure Company. computer [17]. Compared to pre-neural network accounts and joint
The value of the continuous or terminal, for example, image results management, the study also focused on selecting useful and robust
in most of the interesting suggests (impressions) visualized as a financial learning algorithms [18]. In combination with the characteristics of
number viewed through the dismantling, the value of the entire zoom dispersion of complexity and fiscal data in question, the scale of the
enterprise lenses [3]. Addiction, although the absolute conclusion value problem, the learning algorithm must ensure convergence without
of the company is excluded, the feasibility is still sufficient [4]. Several oscillation. It is to be used in such problems before you can need a
levels show a plurality of ambiguity in the number of aggregates; it is relatively high speed.

2
X. Zhang Microprocessors and Microsystems 83 (2021) 103973

Fig. 2. FPGA based corporate accounting information.

The encrypted image is reconstructed and restored to the image to encrypt data for security purposes. Neural Network classifies the
network’s original image decrypted image [19]. To facilitate the authorized person or unauthorized person, and authorized persons
exploitation of data directly from the privacy protection of the envi­ decrypt the accounting information.
ronment, the region of interest mining network has to extract the
encrypted image made things interesting.
3.1. Corporate accounting information disclosure
Selective encryption is Data Stream Manager (DSM) methods,
confidentiality, ensuring multiple atmospheric sensed data streams meet
Management of corporate accounting information is related to the
the data integrity [20]. The method is based on two essential concepts:
implementation of control responsibilities, the relationship between
the shared key is re-initialized without re-transmission, the shared key is
accountability, shareholders, board members, and managers to achieve
updated using the DSM, encryption within the uninterrupted data its target company’s internal facilities. Corporate accounting informa­
stream, it will be a seamless critical refresh process of
tion management is a company guidance and management system.
encoding/decoding. Challenges in corporate management, treatment of accountability
trading rights and the shareholders, the Board of Directors, and infor­
3. Materials and methods mation disclosure are shareholders’ roles.

Corporate financial information asymmetry in reducing agency costs


between management and investors plays a vital role in disclosing in­ 3.2. Encryption using advanced hash encryption standard algorithm
formation. It also reduces the cost of capital, increases the volume of
communication, and reduces share output fluctuations, resulting in in­ Encryption is maintaining confidentiality because it ensures unau­
formation disclosure quality. Rapidly improve the corporate account thorized access to information on the prevention and data security; the
information; to continue to grow, they need security and privacy fea­ Advanced Hash Encryption Standard (AHES) algorithm, to provide the
tures. The proposed algorithm Neural Network (NN) is used to classify best security, uses a unique structure to encrypt data. AHES is the best
the corporate account information authorized person or unauthorized ability to protect sensitive data from the attacker and not steal encrypted
person. Encryption is the encoding, only legitimate users can access data data. AHES keys having three different sizes, such as AHES processing
and information on the way it is, and an unauthorized person cannot capacity of 128,192,256 bits, and each of these has a password block size
process. of 128 bits. The first stage of each round begins with the sub bytes
Fig. 1 shows the corporate accounting information authorized users conversion. This position depends on the state of the nonlinear S-box
instead of another byte. Multiplication and Confusion According to

3
X. Zhang Microprocessors and Microsystems 83 (2021) 103973

Fig. 3. Circuit Diagram.

Shannon’s policy, encryption algorithms’ design plays a vital role in


Table 1
obtaining more security. AHES algorithm generates the secret key. It
Simulation Parameters.
encrypts the accounting information for secure data communication.
Algorithm Steps Parameters Values
Start Tool Visual Studio
Step 1: Generate secret key (s) Language C#
Step 2: Calculate the length of the message Protocol TCP
Database SQL
Step 3: Encrypt the information using AHES
Stop
The algorithm steps provide corporate accounting information
encryption for secure data communication process.

3.3. Decryption

Decryption processing involves encryption data back into the orig­


inal format of the recipient’s understanding. Similarly, the delete key
from the password encrypted part of the same private location at the
receiver side generates the described execution start side while sending
the encryption and decryption processes (connection establishment).

3.4. Neural network

With the flexibility of Neural Networks, it is possible to analyse the Fig. 4. Analysis of encryption and decryption performance.
incomplete data, an advantage that - will be added. The nonlinear flow
of data in a communication network is another aspect that affects this 4. Result and discussion
selection. Because they represent the Neural Network’s output as a
probability, the NN’s output can work as a prediction. So, the Neural This section describes the proposed implementation process of the
Network (NN) classifies corporate accounting information as an autho­ proposed algorithm Neural Network (NN), compared to other existing
rized person or unauthorized person. The proposed algorithm of unau­ Data Stream Manager (DSM) and Support Vector Machine (SVM).
thorized persons cannot access the information and is not allowed for This Fig. 3 describes the design and digital modulation scheme and
stealing. implemented on the FPGA. The simulation system in MATLAB Simulink
Fig. 2 shows Field Programmable Gate Array (FPGA) also stores a environment and System Generator, FPGA design tools to be made.
plurality of bitstreams in the external flash memory. Then, you can Table 1 shows the simulation parameters using a visual studio with
choose between tracks and provides multiple functions. Master Serial SQL proposed algorithm compared to other existing methods.
Peripheral Interface (SPI) and Bits per inch mode are supported, multi-
boot, to FPGA re-configuration, will start by using the internal program
command.

4
X. Zhang Microprocessors and Microsystems 83 (2021) 103973

4.3. Analysis of time complexity

Time how long it is easy to estimate the complexity of a program is


running. Run program run-time compiler and processor accurate
computation) The type of system or the speed, which is table 2 shows the
complexity of the very labour-intensive process for corporate accounting
information.
Fig. 6 shows the analysis of time complexity. The proposed algorithm
provides a 30 Ms. The existing methods results are Support Vector Ma­
chine (SVM) result is 40 Ms, and the Data Stream Manager (DSM) result
is 45 ms.
Fig. 5. Analysis of Classification.
5. Conclusion

Table 2 Corporate accounting information is a measure of the company’s


Analysis of Time complexity. accounting and external reporting systems. It is routinely disclosed,
Time in (ms) NN SVM DSM which is quantitative data on its financial position and performance
10 15 20 25
audit. Corporate accounting information uses data encryption and
20 20 25 30 transaction data to provide security of information records. The pro­
30 25 30 35 posed NN algorithm of unauthorized persons cannot access the infor­
40 30 40 45 mation and is not allowed for stealing. The proposed results are
encryption and decryption performance result is 90%, and the time
complexity result is 30 ms.

Declaration of Competing Interest

We declare that we have no conflict of interest.

Acknowledgement

Key research project of Humanities and Social Sciences in Colleges


and universities of Anhui Province: Research on the development
strategy of accounting service outsourcing industry in Anhui Province
under the background of cloud accounting (Project No.: SK2018A0817).

Reference

[1] Y. Lin, Legitimating negative aspects in corporate social responsibility reporting:


evidence from China, IEEE Trans. Prof. Commun. 62 (3) (2019) 263–278, https://
doi.org/10.1109/TPC.2019.2913917. Sept.
[2] M. Talento, Corporate valuation: looking beyond the Forecast Period through New
Fig. 6. Analysis of Time complexity. “Fuzzy Lenses, IEEE Trans. Eng. Manag. (2000), https://doi.org/10.1109/
TEM.2019.2904955.
[3] R. Dreżewski, S. Kruk, M. Makówka, The evolutionary optimization of a Company’s
4.1. Analysis of encryption and decryption performance return on equity factor: towards the agent-based bio-inspired system supporting
corporate finance decisions, IEEE Access 6 (2018) 51911–51930, https://doi.org/
10.1109/ACCESS.2018.2870201.
The AHES algorithm encryption and decryption algorithm’s goal is to [4] M. Talento, Corporate valuation: looking beyond the forecast period through new
corporate information decrypt and encrypted data generates the secret “Fuzzy Lenses, IEEE Trans. Eng. Manag. (2000), https://doi.org/10.1109/
key. For such an existing algorithm, along key is that the more difficult it TEM.2019.2904955.
[5] S.S. Nair, J. Wang, R. Chin, L. Chen, T. Sun, Analytical prediction of 3-D magnet
is to decrypt the ciphertext block without a key.
eddy current losses in surface mounted pm machines accounting slotting effect,
Fig. 4 shows the encryption and decryption performance in per­ IEEE Trans. Energy Conver. 32 (2) (2017) 414–423, https://doi.org/10.1109/
centage. The proposed algorithm provides a result is 90%. The existing TEC.2016.2638477. June.
methods results are Support Vector Machine (SVM) result is 50%, and [6] M. Roessler, D. Schneckenberg, V.K. Velamuri, Situated entrepreneurial cognition
in corporate incubators and accelerators: the business model as a boundary object,
the Data Stream Manager (DSM) result is 45%. IEEE Trans. Eng. Manag. (2000), https://doi.org/10.1109/TEM.2019.2955505.
[7] T. Falas, A. Charitou, C. Charalambous, The application of artificial neural
networks in the prediction of earnings, in: Proceedings of 1994 IEEE International
Conference on Neural Networks (ICNN’94), Orlando, FL, USA vol.6, 1994,
4.2. Analysis of classification pp. 3629–3633, https://doi.org/10.1109/ICNN.1994.374920.
[8] X. Wang, H. Tang, K. Zheng and Y. Tao, "Detection of compromised accounts for
Corporate accounting information asymmetry in reducing agency online social networks based on a supervised analytical hierarchy process," in IET
Information Security, vol. 14, no. 4, pp. 401–409, 7 2020, 10.1049/iet-
costs between management and investors plays a vital role in disclosing ifs.2018.5286.
information. It also reduces the cost of capital, increases the volume of [9] N.V. Irukulapati, M. Secondini, E. Agrell, P. Johannisson, H. Wymeersch, Improved
communication, and reduces share output fluctuations, resulting in in­ lower bounds on mutual information accounting for nonlinear signal–noise
interaction, J. Lightwave Technol. 36 (22) (2018) 5152–5159, https://doi.org/
formation disclosure quality. The proposed algorithm classifies the
10.1109/JLT.2018.2869109, 15 Nov.15.
authorized person and the unauthorized person. [10] G. Grassi, D. Cafagna, Dynamic properties of a class of cellular neural networks:
Fig. 5 shows the analysis of an authorized person or unauthorized model, stability analysis and design method, Proc. Int. Joint Conf. Neural Netw.
person in percentage. The proposed algorithm provides a result is 92%. vol.1 (2003) 61–65, https://doi.org/10.1109/IJCNN.2003.1223291. Portland, OR,
2003.
The existing methods results are Support Vector Machine (SVM) result is [11] J.P. Dominguez-Morales, et al., Deep spiking neural network model for time-
50%, and the Data Stream Manager (DSM) result is 48%. variant signals classification: a real-time speech recognition approach, in: 2018

5
X. Zhang Microprocessors and Microsystems 83 (2021) 103973

International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, 2018, [18] D. Puthal, X. Wu, N. Surya, R. Ranjan, J. Chen, SEEN: a selective encryption
pp. 1–8, https://doi.org/10.1109/IJCNN.2018.8489381. method to ensure confidentiality for big sensing data streams, IEEE Trans. Big Data
[12] L.D.M. and K. Anton I, Neural network development for IT-users requests 5 (3) (2019) 379–392, https://doi.org/10.1109/TBDATA.2017.2702172, 1 Sept.
processing, in: 2020 IEEE Conference of Russian Young Researchers in Electrical [19] Chunhui Li, Biodiversity assessment based on artificial intelligence and neural
and Electronic Engineering (EIConRus), St. Petersburg and Moscow, Russia, 2020, network algorithms, Microprocess. Microsyst. 79 (2020), 103321. ISSN 0141-9331.
pp. 743–745, https://doi.org/10.1109/EIConRus49466.2020.9039326. [20] Xiaolu Wang, Yao Chen, Music teaching platform based on FPGA and neural
[13] A. Chaudhary, H. Mittal, A. Arora, Anomaly detection using graph neural network, Microprocess. Microsyst. (2020), 103337. ISSN 0141-9331.
networks, in: 2019 International Conference on Machine Learning, Big Data, Cloud
and Parallel Computing (COMITCon), Faridabad, India, 2019, pp. 346–350,
https://doi.org/10.1109/COMITCon.2019.8862186.
[14] Y. He, G.P. Liu, D. Rees, M. Wu, Stability analysis for neural networks with time- Xingfu Zhang, associate professor, graduated from school of
business administration, Anhui University. The main research
varying interval delay, IEEE Trans. Neural Netw. 18 (6) (2007) 1850–1854,
https://doi.org/10.1109/TNN.2007.903147. Nov. directions include enterprise management, financial manage­
ment, financial accounting theory and practice. In recent years,
[15] D. Zhang, X. Zhang, Information security forecast based on artificial neural
networks and grey set pare analysis, in: The Proceedings of 2011 9th International he has published more than 10 papers of various types,
Conference on Reliability, Maintainability and Safety, Guiyang, 2011, participated in the compilation of 3 professional textbooks, and
pp. 473–476, https://doi.org/10.1109/ICRMS.2011.5979346. presided over more than 5 provincial teaching and research
[16] A.M. Samad, A.M. Zain, I. Maarof, K.A. Hashim, R. Adnan, Utilization of artificial projects.
neural network and GIS for property market valuation, in: 2011 IEEE 7th
International Colloquium on Signal Processing and its Applications, Penang, 2011,
pp. 325–331, https://doi.org/10.1109/CSPA.2011.5759897.
[17] Y. Ding, et al., DeepEDN: a deep learning-based image encryption and decryption
network for the internet of medical things, IEEE Internet Things J. (2000), https://
doi.org/10.1109/JIOT.2020.3012452.

You might also like