Journal of Machine and Computing


Operating Cash Flow Ranking Using Data Envelopment Analysis with Network Security Driven Blockchain Model



Journal of Machine and Computing

Received On : 16 March 2025

Revised On : 20 April 2025

Accepted On : 17 June 2025

Published On : 05 July 2025

Volume 05, Issue 03

Pages : 1839-1851


Abstract


Accurate evaluation of innovative financial performance, primarily Operating Cash Flow (OCF), is crucial for informed decision-making. While Data Envelopment Analysis (DEA) is commonly used for efficiency evaluation, it challenges computational inefficiencies, data integrity problems, and a lack of transparency. This study proposes a DEA + Blockchain Technology that integrates DEA + BT to ensure data integrity, Tamper Detection (TD), and transparency through decentralized validation and cryptographic methods. Evaluated on the Securities and Exchange Commission (SEC)-Financial Statement Data Set and the Kaggle Financial Data Set, the DEA + BT achieves higher transaction Network Throughput (NT) (up to 1253 TPS), lower End-to-End Delay (EED) (as low as 120 ms), and superior technical efficiency accuracy (95.2%). This work proved enhanced security effectiveness with a 99.9% Consensus Rate (CR) and TD rates. Compared to traditional methods, the model provides higher ranking consistency (Spearman's correlation of 0.864 and 0.857). This DEA-BT proposes a robust, secure, and transparent method for enterprise OCF ranking, addressing key limitations of DEA and advancing financial performance evaluation methodologies.


Keywords


Network Security, Blockchain Technology, Operating Cash Flow, Data Envelopment Analysis, Tampering Detection.


  1. A. Olayinka, “Financial statement analysis as a tool for investment decisions and assessment of companies’ performance,” International Journal of Financial, Accounting, and Management, vol. 4, no. 1, pp. 49–66, Jun. 2022, doi: 10.35912/ijfam. v4i1.852.
  2. Barauskaite, G., & Streimikiene, D. (2021). Corporate social responsibility and financial performance of companies: The puzzle of concepts, definitions and assessment methods. Corporate Social Responsibility and Environmental Management, 28(1), 278-287.
  3. M. Karas and M. Režňáková, “Cash Flows Indicators in the Prediction of Financial Distress,” Engineering Economics, vol. 31, no. 5, pp. 525– 535, Dec. 2020, doi: 10.5755/j01.ee.31.5.25202.
  4. Chou, J. S., & Chen, K. E. (2024). Optimizing investment portfolios with a sequential ensemble of decision tree-based models and the FBI algorithm for efficient financial analysis. Applied Soft Computing, 158, 111550.
  5. K. G. Eze and C. M. Akujuobi, “Design and Evaluation of a Distributed Security Framework for the Internet of Things,” Journal of Signal and Information Processing, vol. 13, no. 01, pp. 1–23, 2022, doi: 10.4236/jsip.2022.131001.
  6. X. Zhang, “How Digital Transformation of Enterprises Can Improve Labor Productivity: Evidence from Chinese-Listed Companies,” Proceedings of the 2023 2nd International Conference on Artificial Intelligence, Internet and Digital Economy (ICAID 2023), pp. 50–61, 2023, doi: 10.2991/978-94-6463-222-4_5.
  7. E. Mosbah, L. Zaibet, and P. S. Dharmapala, “A new methodology to measure efficiencies of inputs (outputs) of decision making units in Data Envelopment Analysis with application to agriculture,” Socio-Economic Planning Sciences, vol. 72, p. 100857, Dec. 2020, doi: 10.1016/j.seps.2020.100857.
  8. Lakhan et al., “BEDS: Blockchain energy efficient IoE sensors data scheduling for smart home and vehicle applications,” Applied Energy, vol. 369, p. 123535, Sep. 2024, doi: 10.1016/j.apenergy.2024.123535.
  9. M. Salas-Velasco, “Nonparametric efficiency measurement of undergraduate teaching by university size,” Operational Research, vol. 24, no. 1, Feb. 2024, doi: 10.1007/s12351-024-00816-x.
  10. Rashid, C. A. (2021). The efficiency of financial ratios analysis to evaluate company’s profitability. Journal of Global Economics and Business, 2(4), 119-132.
  11. A. Entezami, H. Shariatmadar, and S. Mariani, “Early damage assessment in large-scale structures by innovative statistical pattern recognition methods based on time series modeling and novelty detection,” Advances in Engineering Software, vol. 150, p. 102923, Dec. 2020, doi: 10.1016/j.advengsoft.2020.102923.
  12. A. Lakhan et al., “Sustainable Secure Blockchain Assisted AIoT and Green Multi-Constraints Supply Chain System,” IEEE Internet of Things Journal, pp. 1–1, 2025, doi: 10.1109/jiot.2025.3548037.
  13. M. A. Mohammed et al., “Energy-efficient distributed federated learning offloading and scheduling healthcare system in blockchain based networks,” Internet of Things, vol. 22, p. 100815, Jul. 2023, doi: 10.1016/j.iot.2023.100815.
  14. A. Lakhan et al., “A multi-objectives framework for secure blockchain in fog–cloud network of vehicle-to-infrastructure applications,” Knowledge-Based Systems, vol. 290, p. 111576, Apr. 2024, doi: 10.1016/j.knosys.2024.111576.
  15. Y. Gu et al., “Predicting medication adherence using ensemble learning and deep learning models with large scale healthcare data,” Scientific Reports, vol. 11, no. 1, Sep. 2021, doi: 10.1038/s41598-021-98387-w.
  16. Rane, J., Mallick, S. K., Kaya, O., & Rane, N. L. (2024). Enhancing black-box models: advances in explainable artificial intelligence for ethical decision-making. Future Research Opportunities for Artificial Intelligence in Industry 4.0 and 5, 2.
  17. A. Waheed, S. Kousar, M. I. Khan, and T. B. Fischer, “Environmental governance in Pakistan: Perspectives and implications for the China- Pakistan economic corridor plan,” Environmental and Sustainability Indicators, vol. 23, p. 100443, Sep. 2024, doi: 10.1016/j.indic.2024.100443.
  18. V. Jain, A. Balakrishnan, D. Beeram, M. Najana, and P. Chintale, “Leveraging Artificial Intelligence for Enhancing Regulatory Compliance in the Financial Sector,” International Journal of Computer Trends and Technology, vol. 72, no. 5, pp. 124–140, May 2024, doi: 10.14445/22312803/ijctt-v72i5p116.
  19. S.-I. Chang, L.-M. Chang, and J.-C. Liao, “Risk factors of enterprise internal control under the internet of things governance: A qualitative research approach,” Information & Management, vol. 57, no. 6, p. 103335, Sep. 2020, doi: 10.1016/j.im.2020.103335.
  20. A. Lakhan et al., “Secure blockchain assisted Internet of Medical Things architecture for data fusion enabled cancer workflow,” Internet of Things, vol. 24, p. 100928, Dec. 2023, doi: 10.1016/j.iot.2023.100928.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: Hayder M Ali, Jean Justus J, Sravanthi G, Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan; Methodology: Hayder M Ali, Jean Justus J and Sravanthi G; Writing- Original Draft Preparation: Hayder M Ali, Jean Justus J, Sravanthi G, Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan; Visualization: Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan; Investigation: Hayder M Ali, Jean Justus J and Sravanthi G; Supervision: Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan; Validation: Hayder M Ali, Jean Justus J and Sravanthi G; Writing- Reviewing and Editing: Hayder M Ali, Jean Justus J, Sravanthi G, Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


The author(s) received no financial support for the research, authorship, and/or publication of this article.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Hayder M Ali, Jean Justus J, Sravanthi G, Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan, “Operating Cash Flow Ranking Using Data Envelopment Analysis with Network Security Driven Blockchain Model”, Journal of Machine and Computing, vol.5, no.3, pp. 1839-1851, July 2025, doi: 10.53759/7669/jmc202505144.


Copyright


© 2025 Hayder M Ali, Jean Justus J, Sravanthi G, Thirumoorthy Palanisamy, Venubabu Rachapudi and Sudhakar Sengan. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.