Accurate evaluation of innovative financial performance, primarily Operating Cash Flow (OCF), is crucial for informed decision-making. While Data Envelopment Analysis (DEA) is commonly used for efficiency evaluation, it challenges computational inefficiencies, data integrity problems, and a lack of transparency. This study proposes a DEA + Blockchain Technology that integrates DEA + BT to ensure data integrity, Tamper Detection (TD), and transparency through decentralized validation and cryptographic methods. Evaluated on the Securities and Exchange Commission (SEC)-Financial Statement Data Set and the Kaggle Financial Data Set, the DEA + BT achieves higher transaction Network Throughput (NT) (up to 1253 TPS), lower End-to-End Delay (EED) (as low as 120 ms), and superior technical efficiency accuracy (95.2%). This work proved enhanced security effectiveness with a 99.9% Consensus Rate (CR) and TD rates. Compared to traditional methods, the model provides higher ranking consistency (Spearman's correlation of 0.864 and 0.857). This DEA-BT proposes a robust, secure, and transparent method for enterprise OCF ranking, addressing key limitations of DEA and advancing financial performance evaluation methodologies.
A. Olayinka, “Financial statement analysis as a tool for investment decisions and assessment of companies’ performance,” International Journal of Financial, Accounting, and Management, vol. 4, no. 1, pp. 49–66, Jun. 2022, doi: 10.35912/ijfam. v4i1.852.
Barauskaite, G., & Streimikiene, D. (2021). Corporate social responsibility and financial performance of companies: The puzzle of concepts, definitions and assessment methods. Corporate Social Responsibility and Environmental Management, 28(1), 278-287.
M. Karas and M. Režňáková, “Cash Flows Indicators in the Prediction of Financial Distress,” Engineering Economics, vol. 31, no. 5, pp. 525– 535, Dec. 2020, doi: 10.5755/j01.ee.31.5.25202.
Chou, J. S., & Chen, K. E. (2024). Optimizing investment portfolios with a sequential ensemble of decision tree-based models and the FBI algorithm for efficient financial analysis. Applied Soft Computing, 158, 111550.
K. G. Eze and C. M. Akujuobi, “Design and Evaluation of a Distributed Security Framework for the Internet of Things,” Journal of Signal and Information Processing, vol. 13, no. 01, pp. 1–23, 2022, doi: 10.4236/jsip.2022.131001.
X. Zhang, “How Digital Transformation of Enterprises Can Improve Labor Productivity: Evidence from Chinese-Listed Companies,” Proceedings of the 2023 2nd International Conference on Artificial Intelligence, Internet and Digital Economy (ICAID 2023), pp. 50–61, 2023, doi: 10.2991/978-94-6463-222-4_5.
E. Mosbah, L. Zaibet, and P. S. Dharmapala, “A new methodology to measure efficiencies of inputs (outputs) of decision making units in Data Envelopment Analysis with application to agriculture,” Socio-Economic Planning Sciences, vol. 72, p. 100857, Dec. 2020, doi: 10.1016/j.seps.2020.100857.
Lakhan et al., “BEDS: Blockchain energy efficient IoE sensors data scheduling for smart home and vehicle applications,” Applied Energy, vol. 369, p. 123535, Sep. 2024, doi: 10.1016/j.apenergy.2024.123535.
M. Salas-Velasco, “Nonparametric efficiency measurement of undergraduate teaching by university size,” Operational Research, vol. 24, no. 1, Feb. 2024, doi: 10.1007/s12351-024-00816-x.
Rashid, C. A. (2021). The efficiency of financial ratios analysis to evaluate company’s profitability. Journal of Global Economics and Business, 2(4), 119-132.
A. Entezami, H. Shariatmadar, and S. Mariani, “Early damage assessment in large-scale structures by innovative statistical pattern recognition methods based on time series modeling and novelty detection,” Advances in Engineering Software, vol. 150, p. 102923, Dec. 2020, doi: 10.1016/j.advengsoft.2020.102923.
A. Lakhan et al., “Sustainable Secure Blockchain Assisted AIoT and Green Multi-Constraints Supply Chain System,” IEEE Internet of Things Journal, pp. 1–1, 2025, doi: 10.1109/jiot.2025.3548037.
M. A. Mohammed et al., “Energy-efficient distributed federated learning offloading and scheduling healthcare system in blockchain based networks,” Internet of Things, vol. 22, p. 100815, Jul. 2023, doi: 10.1016/j.iot.2023.100815.
A. Lakhan et al., “A multi-objectives framework for secure blockchain in fog–cloud network of vehicle-to-infrastructure applications,” Knowledge-Based Systems, vol. 290, p. 111576, Apr. 2024, doi: 10.1016/j.knosys.2024.111576.
Y. Gu et al., “Predicting medication adherence using ensemble learning and deep learning models with large scale healthcare data,” Scientific Reports, vol. 11, no. 1, Sep. 2021, doi: 10.1038/s41598-021-98387-w.
Rane, J., Mallick, S. K., Kaya, O., & Rane, N. L. (2024). Enhancing black-box models: advances in explainable artificial intelligence for ethical decision-making. Future Research Opportunities for Artificial Intelligence in Industry 4.0 and 5, 2.
A. Waheed, S. Kousar, M. I. Khan, and T. B. Fischer, “Environmental governance in Pakistan: Perspectives and implications for the China- Pakistan economic corridor plan,” Environmental and Sustainability Indicators, vol. 23, p. 100443, Sep. 2024, doi: 10.1016/j.indic.2024.100443.
V. Jain, A. Balakrishnan, D. Beeram, M. Najana, and P. Chintale, “Leveraging Artificial Intelligence for Enhancing Regulatory Compliance in the Financial Sector,” International Journal of Computer Trends and Technology, vol. 72, no. 5, pp. 124–140, May 2024, doi: 10.14445/22312803/ijctt-v72i5p116.
S.-I. Chang, L.-M. Chang, and J.-C. Liao, “Risk factors of enterprise internal control under the internet of things governance: A qualitative research approach,” Information & Management, vol. 57, no. 6, p. 103335, Sep. 2020, doi: 10.1016/j.im.2020.103335.
A. Lakhan et al., “Secure blockchain assisted Internet of Medical Things architecture for data fusion enabled cancer workflow,” Internet of Things, vol. 24, p. 100928, Dec. 2023, doi: 10.1016/j.iot.2023.100928.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Hayder M Ali, Jean Justus J, Sravanthi G, Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan;
Methodology: Hayder M Ali, Jean Justus J and Sravanthi G;
Writing- Original Draft Preparation: Hayder M Ali, Jean Justus J, Sravanthi G, Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan;
Visualization: Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan;
Investigation: Hayder M Ali, Jean Justus J and Sravanthi G;
Supervision: Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan;
Validation: Hayder M Ali, Jean Justus J and Sravanthi G;
Writing- Reviewing and Editing: Hayder M Ali, Jean Justus J, Sravanthi G, Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan; All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
The author(s) received no financial support for the research, authorship, and/or publication of this article.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Sudhakar Sengan
Department of Computer Science and Engineering, PSN College of Engineering and Technology, Tirunelveli, Tamil Nadu, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Hayder M Ali, Jean Justus J, Sravanthi G, Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan, “Operating Cash Flow Ranking Using Data Envelopment Analysis with Network Security Driven Blockchain Model”, Journal of Machine and Computing, vol.5, no.3, pp. 1839-1851, July 2025, doi: 10.53759/7669/jmc202505144.