<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Donetsk National University named Vasyl Stus</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vinnitsa</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>-richchia str.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine t.neskorodieva@donnu.edu.ua</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cherkasy State Technological University</institution>
          ,
          <addr-line>Cherkasy, Shevchenko blvd., 460, 18006</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The problem of automation of audit data analysis the prerequisite "Compliance of costs and incomes" based on the forecast is considered. A neural network model for forecast based on a gateway recurrent unit is proposed. For parametric identification of this model, adaptive cross entropy is proposed. This allows you to increase the forecast efficiency by reducing computational complexity and improving the forecast accuracy. Software was developed using the Matlab package that implements the proposed method. The developed software is studied when solving the problem of forecasting indicators in the task of analyzing the data mapping “settlements with suppliers - settlements with customers”.</p>
      </abstract>
      <kwd-group>
        <kwd>automatic analysis</kwd>
        <kwd>audit data</kwd>
        <kwd>"settlements with suppliers - settlements with customers" mapping</kwd>
        <kwd>forecast</kwd>
        <kwd>neural network</kwd>
        <kwd>gateway recurrent unit</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        In the process of international and national economies development and industry of IT
in particular, it is possible to distinguish the following basic tendencies: digital
transformations realization, digital economy forming, socioeconomic processes
globalization of and of IT accompanying them [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. These processes result in the origin of
global, multilevel hierarchical structures of heterogeneous, multivariable,
multifunction connections, interactions and cooperation of managing subjects (objects of audit),
the large volumes of information about them have been accumulated in the informative
systems of account, management and audit. Thus, the intercommunications mentioned
above, have a network structure at every level.
      </p>
      <p>
        In relation to the enterprises of Ukraine, in the publications of Ukraine State
Financial Inspection [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] it is marked that in the conditions of swift infrastructure development
and deepening of informatization of economic processes efficiency of enterprises
activity, establishments and organizations are all more depend on the information
technologies (IT) used in management system. Now environment of information
technologies (IT-environment) as a structural constituent of organization is the difficult system,
that unites various informative, programmatic, technical, human and other types of
resources for the achievement of aims of organization, enterprise.
      </p>
      <p>According to the Law of Ukraine "On Amending the Law of Ukraine" On
Accounting and Financial Reporting in Ukraine "regarding the improvement of certain
provisions" dated October 05, 2017 No. 2164-VIII and the Law of Ukraine "On Auditing
Financial Statements and Auditing" dated 21.12. 2017 No. 2258-VIII (Audit Law),
enterprises of public interest and medium-sized enterprises must conduct an annual audit
and publish financial statements together with an audit report (Table 1).</p>
      <p>According to the Law of Ukraine "On Amending the Law of Ukraine" On
Accounting and Financial Reporting in Ukraine "regarding the improvement of certain
provisions" dated October 05, 2017 No. 2164-VIII and the Law of Ukraine "On Auditing
Financial Statements and Auditing" dated 21.12. 2017 No. 2258-VIII (Audit Law),
enterprises of public interest and medium-sized enterprises must conduct an annual audit
and publish financial statements together with an audit report (Table 1).</p>
    </sec>
    <sec id="sec-2">
      <title>Enterprise</title>
    </sec>
    <sec id="sec-3">
      <title>Book value of assets</title>
    </sec>
    <sec id="sec-4">
      <title>Net income from sales of products (goods, works, services)</title>
    </sec>
    <sec id="sec-5">
      <title>Average number of employees</title>
      <p> enterprises - issuers of securities whose securities are admitted to trading on stock
exchanges;
 banks, insurers, non-state pension funds, other financial institutions (except for other
financial institutions and non-state pension funds related to microenterprises and
small enterprises);
 large enterprises;
 public joint stock companies.</p>
      <p>
        These tendencies determine conceptions of modern audit development and
corresponding to them information technologies of treatment of financial and economic
information about activity of enterprise and decision support systems in an audit [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>Consequently, nowadays the scientific and technical issue of the modern information
technologies in financial and economic sphere of Ukraine is forming of the
methodology of planning and creation of the decision support systems (DSS) at the audit of
enterprises in the conditions of application of IT and with the use of information
technologies on the basis of the automated analysis of the large volumes of data about financial
and economic activity and states of enterprises with the multi-level hierarchical
structure of heterogeneous, multivariable, multifunction connections, intercommunications
and cooperation of objects of audit with the purpose of expansion of functional
possibilities, increase of efficiency and universality of IT-audit.</p>
      <p>Automated DSS audit means the automatic forming of recommendable decisions,
based on the results of the automated analysis of data, that improves quality process of
audit. Unlike the traditional approach, computer technologies of analysis of data in the
system of audit accelerate and promote the process accuracy of audit, that extremely
critical in the conditions of plenty of associate tasks on lower and middle levels, and
also amounts of indexes and supervisions in every task.</p>
      <p>
        According to the international standard of audit № 520 "Analytical procedures" [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ],
analytical procedures are the procedures, suggesting the analysis of financial indexes
and tendencies with the subsequent study of rejections and relations that conflict with
other corresponding information or deviate from the forecast sums.
      </p>
      <p>In the standard mentioned, recommendations on application of analytical procedures
during public accountant verification are also given. The analytical procedures consist
of comparison of financial information of enterprise, for example with the following
indexes:
 by analytical information for past periods;
 by the planned calculations of enterprise, such, as budgets, forecast, expectations of
public accountant;
 to similar information on industry, such as, comparison of amount of sales, to the
account receivable with middle indexes on industry or with data after other similar
enterprises.</p>
      <p>The basic condition of application of analytical procedures is the supposition, that there
is certain intercommunication between data and it continues to be saved in default of
proofs opposite.</p>
      <p>
        In the last few years among analytical procedures of exposure of financial fraud the
class of procedures, based on the methods of intellectual analysis of data, was formed.
In practice different methods of extraction of data, namely: K-nearest neighbors,
decision tree, fuzzy logic, logistic model, Bayesian belief networks, naive Bayes algorithm,
Beneish M-Score, Benford’s law, Altmann Z-Score, are being used for the
improvement of accuracy of the fraud finding out [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">6 - 8</xref>
        ].
      </p>
      <p>
        One of the elements of analysis among the tasks of audit is a forecast of economic
indicators. Methods of short-term forecast, such as regressive [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], structural [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ],
logical [
        <xref ref-type="bibr" rid="ref12 ref13 ref14">12 - 14</xref>
        ] conduct forecast on the basis of indexes in current moment to time.
Methods of long-term forecast, such as autoregressive [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ], exponential smoothing
out [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] can conduct a forecasts on the basis of long temporal row. A compromise
between the above-mentioned groups of methods is connectionist [
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21">18 - 21</xref>
        ], that can use
neural networks both for a short-term and for long-term forecasts. At the same time
connectionist methods usually use parametric identification on the basis of local search,
that reduces forecast accuracy.
      </p>
      <p>The aim of study is to increase the efficiency of automatic data analysis in DSS audit
based on the forecast method due to the model of the gateway recurrent unit and the
method of its parametric identification.</p>
      <p>For the achievement of the aim it is necessary to solve the following tasks:
 to offer the forecast neural network model due to the model of the gateway recurrent
unit;
 to choose the criterion of estimation of efficiency of forecast neural network model;
 to offer a method for parametric identification of a neural network prediction model
based on adaptive cross-entropy;
 to offer the method for automatic analysis of audit data;
 to conduct numeral researches.
2</p>
      <sec id="sec-5-1">
        <title>Formal Problem Statement</title>
        <p>
          In the DSS of audit, the verification of precondition “Compliance of expenses and
income” of accounting provisions (standards) [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] at the average level is decomposed on
the verification tasks of mapping of generalized values indicators: “settlements with
suppliers - settlements with customers”, “accounts payable - debt".
        </p>
        <p>The conversion of the data of settlements with suppliers into the data on the receipt
of funds from customers in the accounting system can be represented as a functional
structure of the data subsets transformation at the stages of operating activities (Fig. 1).</p>
        <p>Denote:
Ql11 (t) , l1  1, L1 are data sets of calculations by type of supplier l1 ,
Ql22 (t) , l2  1, L2 are data sets of stocks by type of raw material l2 ,
Ql33 (t) , l3  1, L3 are production datasets by type l3 ,
Ql44 (t) , l4  1, L4 are data sets of calculations by type of finished product l4 ,
t t jm ,Tm , j  1, Jm , m  1, M ,T .</p>
        <p>The verification of sets mappings of the functional structure (Fig. 1) is preceded by
an analysis of the values of quantitative indicators for the verification period with the
purpose of exposure of values that deviate from the forecast. The forecast values are
determined on the basis of conformities to law, that is formed from the tested data for
other (as a rule, preceding) periods that is imported from the database of the system of
account of enterprise in DSS of audit.</p>
        <p>We will distinguish the first mapping «settlements with suppliers - settlements with
customers». The values of the audit data at the verification stage of this mapping are
formed on the basis of a set of quantitative indicators characterizing the transfer of
funds to suppliers (raw materials and / or components) and the receipt of funds from
customers for goods sold:
Vu , u  , u U ,
V ,  </p>
        <p>g g , g  G ,
where:</p>
        <p>V - quantitative indicator (in physical units),
 - monetary indicator (amounts transferred by suppliers / customers),
u - type of raw material,
U - set of types of raw material,
g - type of finished product,
G - set of types of finished products.</p>
        <p>raw materials
capitalization
raw materials
supply to
production
finished products
posting
At the analysis of this mapping (in direct and reverse direction) as elements of pairs of
learning set can be chosen:
x  (Vu (t),Vu (t 1),K Vu (t  M ), u U g ) , y  (Vg (t)) , g  G ,
x  (u (t), u (t 1),K u (t  M ), u U g ) , y  (g (t)) , g  G ,
x  (Vg (t),Vg (t 1),K Vg (t  M ), g  Gu ) , y  (Vu (t)) , u U ,
x  (g (t), g (t 1),K , g (t  M ), g  Gu ) , y  (u (t)) , u U ,
where:
x is input signal,</p>
        <p>M is time of delay or lead,
the type g ,
u ,</p>
        <p>Ug - set of raw materials that are used in the manufacture of finished products of
Gu - finished products set , the production of which uses raw materials of the type
y – is output signal.</p>
        <p>As the value of the lag M or lead can be selected the value of the indicator of the
difference of the operating cycle (the average time between the operation of purchasing
raw materials and the sale of finished products made from this raw material) and the
production cycle. This indicator depends on the industry, type of production and range
of products ( 1  M  30 ).</p>
        <p>Direct analysis will reveal patterns of sales of finished products depending on the
purchase of raw materials by type of finished product for the periods preceding the
inspection period.</p>
        <p>The reverse analysis will reveal patterns of raw material procurement for finished
products sold, by type of raw material for the periods preceding the verification period.</p>
        <p>Information for prior to the verification period is considered reliable. Therefore, the
corresponding data can be selected as a training set.</p>
        <p>A comparison of the predicted value for the model and the value of the control
sample will allow us to identify the types of finished products and stocks and quantization
periods for which there are significant deviations and which will be recommended by
the decision maker for detailed study at the lower level.</p>
        <p>So, for a forecast a learning set is given S  {(x , d )} ,  1, P .</p>
        <p>Then, problem of increase of forecast accuracy on the model of the gateway
recurrent unit (GRU) g(x,W ) , here x - an input signal, W is a vector of parameters,
appears as a problem of being for this model of such vector of parameters W * , that
satisfies to the criterion</p>
        <p>F 
1 P</p>
        <p>P 1(g(x ,W *)  d )2  min .
3</p>
      </sec>
      <sec id="sec-5-2">
        <title>Literature Review</title>
        <p>
          Regressive methods [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] conduct a forecast on the basis of regressive linear and
nonlinear model. The advantages of these methods are simplicity of construction of model,
design transparency. The disadvantages of these methods are high computational
complexity of parametric identification, the absence of possibility of long-term forecast,
that results in insufficient forecast accuracy.
        </p>
        <p>
          Autoregressive methods [
          <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
          ] conduct a forecast on the basis of autoregressive
linear model. The advantages of these methods are simplicity of construction of model,
design transparency. The disadvantages of these methods are high computational
complexity of parametric identification, absence of ability of design of nonlinear processes,
that results in insufficient forecast accuracy.
        </p>
        <p>
          Methods of the exponential smoothing [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] conduct a forecast on the basis of linear
model with one (single smoothing), two (double smoothing) or by three (triple
smoothing) parameters. The advantages of these methods are simplicity of construction of
model, design transparency, a result can be got quicker, than at the use of other models.
The disadvantages of these methods are a subzero adaptivity, absence of ability of
design of nonlinear processes, that results in insufficient forecast accuracy.
        </p>
        <p>
          Structural methods [
          <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
          ] conduct a forecast on the basis of Markov chain. The
advantages of these methods are simplicity of construction of model, design
transparency. The disadvantages of these methods are absence of possibility of long-term
forecast, that results in insufficient forecast accuracy.
        </p>
        <p>
          Logical methods [
          <xref ref-type="bibr" rid="ref12 ref13 ref14">12 - 14</xref>
          ] conduct a forecast on the basis of regressive tree. The
advantages of these methods are design transparency, speed of process of construction
of tree. The disadvantages of these methods are the problem of construction of optimal
tree, the absence of possibility of long-term forecast, that results in insufficient forecast
accuracy.
        </p>
        <p>
          Connectionist methods [
          <xref ref-type="bibr" rid="ref18 ref19 ref20">18 - 20</xref>
          ] conduct a forecast on the basis of nonlinear model
of neural network. The advantages of these methods are scalability, high adaptivity.
The disadvantages of these methods are absence of design transparency; complexity of
choice of model structure; hard requirements to training sample; problem of choice of
method of parametric identification; that results in insufficient forecast accuracy high
computational complexity of parametric identification.
        </p>
        <p>The general feature of all the methods mentioned above is that they possess a high
computational complexity and/or do not give high forecast accuracy.</p>
        <p>Therefore an actual task is an increase of forecast efficiency by reducing
computational complexity and improving forecast accuracy.
4</p>
      </sec>
      <sec id="sec-5-3">
        <title>Forecast Model Based on a Gateway Recurrent Unit</title>
        <p>
          Gateway recurrent block (GRU) [
          <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
          ] has two gateways. Instead of a hidden neuron,
a hidden block h is used, which is connected to the reset gateway r and update z .
Gateways determine how much information to skip.
        </p>
        <p>If the reset gateway is close to 1 and the update gateway is close to 0, then we get an
Elman neural network (ENN), in which there is no control over the amount of
information. If the reset gateway and update gateway are close to 0, then we get a multilayer
perceptron (MLP), in which information from the hidden block (long-term) is ignored.
If the update gateway is close to 1, then the input (short-term) information is ignored.</p>
        <p>The forecast model based on the gateway recurrent unit is defined as follows:
yin (n)  x ,
i i
 M N h 
rj (n)  f  br   winr yiin (n)   uhr hi (n 1)  , j 1, N h ,
 j i1 ij i1 ij 
 M N h 
z j (n)  f  bz   winz yiin (n)   uhz hi (n 1)  , j 1, N h ,</p>
        <p> j i1 ij i1 ij 
h%j (n)  g  bh% M winh%yiin (n)  Nh uhh%ri (n)hi (n 1)  , j 1, N h ,</p>
        <p> j i1 ij i1 ij 
h j (n)  z j (n)h j (n 1)  (1 z j (n))h%j (n) , j 1, N h ,</p>
        <p>h j (n)  z j (n)h j (n 1)  (1 z j (n))h%j (n) ,
were:</p>
        <p>M – number of unit delays of the input layer,
N h – hidden layer neurons number,
winr – weights between the input layer and the reset gateway,</p>
        <p>ij
winz – weights between the input layer and the update gateway,</p>
        <p>ij
winh%– weight between input and candidate layer,</p>
        <p>ij
uhr – weights between the hidden layer and the reset gateway,
ij
uhz – weights between the hidden layer and the update gateway,
ij
uhh% – weight between hidden and candidate layer,
ij
wihout – weight between the hidden and the output layer
5</p>
      </sec>
      <sec id="sec-5-4">
        <title>Criterion Selection for Evaluating the Effectiveness of a</title>
      </sec>
      <sec id="sec-5-5">
        <title>Gateway Recurrent Unit</title>
        <p>In paper for model training GRU the target function is selected, which means the choice
of such values of the parameter vector
W  (w1in1r ,..., wMinNrh , uhr ,..., uhr</p>
        <p>11 N hN h , w1in1z ,..., wMinNzh , u1h1z ,..., uNhhzN h ,
w1in1h%,..., wMinNh%h, u1h1h%,..., uNhhhN%h , w1hout ,..., wNhhout ) , which deliver a minimum of the
standard error (the difference between the model output and the test output)
F </p>
        <p>P 1
1 P</p>
        <p> ( yout  d )2  mWin ,
were:
yout is  -model output,

d is  -test output.
6</p>
      </sec>
      <sec id="sec-5-6">
        <title>Method for Parametric Identification of a Model of a</title>
      </sec>
      <sec id="sec-5-7">
        <title>Gateway Recurrent Unit Based on Adaptive Cross Entropy</title>
        <p>
          Cross entropy method (CE) [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] consists of two phases - the generation of a new
population of potential solutions and the modification of the Gaussian distribution
parameters.
        </p>
        <p>In this paper, to control the convergence rate of CE and to ensure that the entire
search space is investigated at the initial iterations and the search becomes directional
at the final iterations, the iteration number is taken into account when generating
potential solutions.</p>
        <p>The proposed method consists of the following steps:
1. Initialization
1.1. Setting a parameter  that controls the rate of change of the Gaussian
distribution parameters, and 0    1 .</p>
        <p>1.2. Setting a parameter  for generating a standard deviation vector, and
0    1.</p>
        <p>1.3. Setting the maximum number of iterations N , population size K ,
solution length M (corresponds to the length of the GRU model parameter vector), the
maximum number of best solutions selected.</p>
        <p>1.4. Random creating a vector of mathematical expectations
  (1,..., M ) ,  j
 xmin  (x mjax  xmin )U (0,1) ,</p>
        <p>
          j j
were U (0,1) – function that returns a uniformly distributed random number in a range
[
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          ] .
        </p>
        <p>1.5. Create a standard deviation vector randomly
  (1,..., M ) ,  j
 (x mjax  xmin )U (0,1)
j
*
1.6. Determine the best solution (best GRU model parameter vector) x   .
2. Iteration number n  1 .
3. Create a current population of potential solutions P .
3.1. Solution number k  1 , P   .
3.2. Generate a new potential solution xk .</p>
        <p>xkj   j   j  NN n  N (0,1) , j 1, M ,
were N (0,1) – function that returns a standard normally distributed random number.
3.3. If k  K , then P  P U{xk } , k  k 1 , go to step 3.2.
3.4. Sort P by target function, i.e.. F (xk )  F (xk 1) .
3.5. k*  arg min F ( xk ) .</p>
        <p>k
3.6. If F (xk* )  F (x*) , then x*  xk*
4. Modification of the Gaussian distribution parameters (based on the first B ,
i.e. best, new potential solutions from the population P ).</p>
        <p>1 B
4.1.  j   j  (1 )%j , %j  B k1 xkj , j 1, M .
4.2.  j   j  (1 )%j , %j  B1 kB1( xkj  %j )2 , j 1, M .
5. If n  N , then n  n  1 , go to step 3.</p>
        <p>The result is x* .
7</p>
      </sec>
      <sec id="sec-5-8">
        <title>Experiments and Results</title>
        <p>Numerical experiments were carried out using the package Matlab. The number of
single delays (time lag) M  10 , neurons number of hidden layer N h  2M .</p>
        <p>To determine the structure of the forecast model based on the gateway recurrent unit
(GRU), a number of experiments were carried out, the results of which are presented in
Fig. 2.</p>
        <p>As the initial data for determining the values of the parameters of the forecast model
over the neural network, calculation indicators with suppliers and customers of a
machine-building enterprise were used with a two-year sampling depth with daily time
intervals, the values of which are Indicators representing trade secrets, and they are
scaled.</p>
        <p>The criterion for choosing the structure of the neural network model was the
minimum mean square error of the forecast. As can be seen from Fig. 1, with an increase in
the number of hidden neurons, the error value decreases. For prediction, it is enough to
use 10 time delays in the input layer and 20 hidden neurons, since with a further increase
in the number of delays and hidden neurons, the error value changes insignificantly.
In this work, we studied neural networks for prediction by the criterion of the minimum
mean square error (RMS) of the forecast. The following neural networks were used in
the experiments (tabl.2): JNN (Jordan neural network), ENN (Elman neural network)
also called SRN (Simple recurrent network), NARMA (nonlinear
autoregressive-moving average), BRNN (bidirectional recurrent neural network), LSTM (long short-term
memory), GRU (gated recurrent unit). According to tab. 2, LSTM and GRU have the
greatest prediction accuracy, however, LSTM requires more computational complexity
due to more connections between neurons.
This is due to the fact that the LSTM and GRU neural networks use control over the
amount of information passed through.</p>
        <p>According to the XYZ-analysis for classification of resources of enterprise
depending on character of their consumption and forecast accuracy of changes in their
necessity during a certain temporal cycle three categories are distinguished. Category of
Xresources is characterized by the stable size of consumption, insignificant vibrations in
their expense and high forecast accuracy. The coefficient value of variation is in an
interval from 0 to 10 %. Category of Y- resources is characterized by the well-known
tendencies of determination of requirement in them (for example, by seasonal
fluctuations) and middle possibilities of their forecast. The coefficient value of variation is
from 10 to 25 %. Category of Z - the consumption of resources is irregular, some
tendencies are absent, forecast accuracy is not high. The coefficient value of variation
is over 25 %.</p>
        <p>This model was approved on the values of indexes of category of X. Comparing the values
of coefficient of variation for the category of resources of X and an error of forecast on the
network of GRU, that made 5%, it is possible to draw the conclusion, that this network befits
for this category of resources.
8</p>
      </sec>
      <sec id="sec-5-9">
        <title>Conclusions</title>
        <p>The article considers the problem of increasing the efficiency of automatic data analysis
in DSS of audit based on the forecast due to the gateway recurrent unit (GRU). Reached
the further development of the method of parametric identification of the model GRU,
which is based on adaptive cross entropy (ACE), which increases the accuracy of the
forecast, because at the initial iterations the entire search space is investigated, and at
the final iterations the search becomes directional. Software implementing the proposed
method in the package Matlab, was developed and researched on the indicators of
supply and payment of stocks of a machine-building enterprise with a two-year sampling
depth with daily time intervals. The experiments confirmed the operability of the
developed software and allow us to recommend it for use in practice in the automated
analysis subsystem of the DSS of audit to verify the totality of the displays of the sets
of calculation sets with suppliers and customers. The prospects for further research are
to test the proposed methods on a wider set of test databases.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <source>The World Bank: World Development Report 2016: Digital Dividends</source>
          . https://www.worldbank.org/en/publication/wdr2016 (
          <year>2016</year>
          ).
          <source>Accessed 12 February 2020</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Ukrainian</surname>
          </string-name>
          <article-title>Institute for the Future: Ekonomichna stratehiia Ukrainy 2030: Ukraina 2030E - kraina z peredovoiu tsyfrovoiu ekonomikoiu (Ukraine economic Strategy 2030: Ukraine 2030E is a country with advanced digital economy)</article-title>
          . https://strategy.uifuture.org/index.html (
          <year>2018</year>
          )
          <article-title>Accessed 12 February 2020</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>3. The State Audit Service of Ukraine: Praktychna metodolohiia IT-audytu. (Practical methodology of ІТ-audit)</article-title>
          . http://dkrs.kmu.gov.ua/kru/doccatalog/ document (
          <year>2015</year>
          ).
          <source>Accessed 12 February 2020</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Zhu</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Research on the application of big data in audit analysis program</article-title>
          .
          <source>Paper presented at the International Seminar on Automation, Intelligence</source>
          , Computing, and Networking. Paris, 29 April - 2 May
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .25236/isaicn.
          <year>2019</year>
          .047
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. The International Auditing and Assurance Standards Board:
          <article-title>International standards of account and audit</article-title>
          . https://www.iaasb.org/standards-pronouncements (
          <year>2016</year>
          ).
          <source>Accessed 12 February 2020</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Alex</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pereira</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pappa</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <article-title>A customized classification Algorithm for Credit card Fraud Detection</article-title>
          .
          <source>Engineering Applications of Artificial Intelligence</source>
          , vol.
          <volume>72</volume>
          : pp.
          <fpage>21</fpage>
          -
          <lpage>29</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Zgurovsky</surname>
            ,
            <given-names>M.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaychenko</surname>
            ,
            <given-names>Y.P.:</given-names>
          </string-name>
          <article-title>The fundamentals of computational intelligence: system approach</article-title>
          . Springer International Publishing Switzerland (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Vlasenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vlasenko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vynokurova</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bodyanskiy</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>A Novel ensemble neuro-fuzzy model for financial time series forecasting</article-title>
          .
          <source>Data</source>
          <volume>4</volume>
          (
          <issue>3</issue>
          ),
          <fpage>126</fpage>
          . (
          <year>2019</year>
          )
          <volume>10</volume>
          .3390/data4030126
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Khrystyianivsky</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neskorodieva</surname>
            ,
            <given-names>T.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polshkov</surname>
            ,
            <given-names>Yu.N.</given-names>
          </string-name>
          :
          <article-title>Ekonomiko-matematicheskie metodyi i modeli: praktika primeneniya v kursovyih i diplomnyih rabotah (Economic and mathematical methods and models: application practice in term papers and dissertations)</article-title>
          .
          <source>DonNU</source>
          ,
          <string-name>
            <surname>Donetsk</surname>
          </string-name>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Grimshaw</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alexander</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Markov chain models for Delinquency: Transition matrix estimation and forecasting</article-title>
          .
          <source>Applied Stochastic Models in Business and Industry</source>
          .
          <volume>27</volume>
          (
          <issue>3</issue>
          ),
          <fpage>267</fpage>
          -
          <lpage>279</lpage>
          (
          <year>2011</year>
          ) https://doi.org/10.1002/asmb.827
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Tymofieieva</surname>
            ,
            <given-names>H.А.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tymofieiev</surname>
            ,
            <given-names>N.А.</given-names>
          </string-name>
          :
          <article-title>Prohnozyrovanye sostavliaiushchykh kredytnoho portfelia na osnove modely markovskoi tsepy (Prognostication of constituents of credit briefcase on the basis of model of Markov chain)</article-title>
          .
          <source>Automatics and Telemechanic</source>
          .
          <volume>4</volume>
          ,
          <fpage>47</fpage>
          -
          <lpage>65</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseyeva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Preface: modern machine learning technologies and data science (MoMLeT&amp;DS-2019</article-title>
          ) In: CEUR Workshop Proceedings vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bodyanskiy</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Tyshchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Self-Learning and adaptive algorithms for business applications</article-title>
          .
          <source>Emerald Publishing Limited</source>
          (
          <year>2019</year>
          ) https://doi.org/10.1108/978-1-
          <fpage>83867</fpage>
          -171- 620191001
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Lytvynenko</surname>
            ,
            <given-names>T.I.</given-names>
          </string-name>
          :
          <article-title>Problem of data analysis and forecasting using decision trees method</article-title>
          .
          <source>Programming problems. 2</source>
          ,
          <fpage>220</fpage>
          -
          <lpage>226</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Baillie</surname>
          </string-name>
          , R. T.,
          <string-name>
            <surname>Kapetanios</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Papailias</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Modified information criteria and selection of long memory time series models</article-title>
          .
          <source>Computational Statistics and Data Analysis</source>
          .
          <volume>76</volume>
          .
          <fpage>116</fpage>
          -
          <lpage>131</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Bidyuk</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prosyankina-Zharova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Terentiev</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Modelling nonlinear nonstationary processes in macroeconomy and finances</article-title>
          . In: Hu,
          <string-name>
            <given-names>Z.</given-names>
            ,
            <surname>Petoukhov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Dychka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>(eds) Advances in Computer Science for Engineering and Education</article-title>
          .
          <source>Advances in Intelligent Systems and Computing</source>
          , vol
          <volume>754</volume>
          , pp.
          <fpage>735</fpage>
          -
          <lpage>745</lpage>
          . Springer, Cham (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          - 91008-6_
          <fpage>72</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Bidyuk</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Terentiev</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Prosyankina-Zharova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Dynamic processes forecasting and risk estimation under uncertainty using decision support systems</article-title>
          .
          <source>In: IEEE First Ukraine Conference on Electrical and Computer Engineering</source>
          ,
          <fpage>795</fpage>
          -
          <lpage>800</lpage>
          . IEEE, Kiev. 29 May-2 June 2017. doi:
          <volume>10</volume>
          .1109/ukrcon.
          <year>2017</year>
          .8100355
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Tkachenko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Izonin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , Greguš,
          <string-name>
            <given-names>ml. M.</given-names>
            ,
            <surname>Tkachenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Dronyuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          :
          <article-title>Committee of the SGTM neural-like structures with extended inputs for predictive analytics in insurance</article-title>
          . In: Youna,s
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Awan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Benbernou</surname>
          </string-name>
          , S. (eds)
          <article-title>Big Data Innovations and Applications</article-title>
          .
          <source>InnovateData</source>
          <year>2019</year>
          .
          <article-title>Communications in Computer and Information Science</article-title>
          . vol.
          <volume>1054</volume>
          . pp
          <fpage>121</fpage>
          -132 Springer, Cham (
          <year>2019</year>
          ) doi:10.1007/978-3-
          <fpage>030</fpage>
          -27355-2
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Leoshchenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliinyk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subbotin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaiko</surname>
            ,
            <given-names>T.:</given-names>
          </string-name>
          <article-title>Using recurrent neural networks for data-centric business</article-title>
          . In: Ageyev,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Radivilova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Kryvinska</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.</surname>
          </string-name>
          <article-title>(eds) Data-Centric Business and Applications</article-title>
          .
          <source>Lecture Notes on Data Engineering and Communications Technologies. 42</source>
          , pp.
          <fpage>73</fpage>
          -
          <lpage>91</lpage>
          Springer, Cham (
          <year>2020</year>
          ) doi:10.1007/978-3-
          <fpage>030</fpage>
          -35649-
          <issue>1</issue>
          _
          <fpage>4</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Tkachenko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tkachenko</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Izonin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vitynskyi</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kryvinska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsymbal</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <article-title>Committee of the Combined RBF-SGTM Neural-Like Structures for Prediction Tasks</article-title>
          . In: Awan,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Younas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Ünal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Aleksy</surname>
          </string-name>
          , M. (eds) Mobile
          <source>Web and Intelligent Information Systems. Lecture Notes in Computer Science</source>
          , vol
          <volume>11673</volume>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>277</lpage>
          . Springer, Cham (
          <year>2019</year>
          ) doi:10.1007/978-3-
          <fpage>030</fpage>
          -27192-3_
          <fpage>21</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Haykin</surname>
            ,
            <given-names>S.S.:</given-names>
          </string-name>
          <article-title>Neural networks and learning machines</article-title>
          .
          <source>Pearson</source>
          , Delhi (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Neskorodieva</surname>
          </string-name>
          , T.V.
          <article-title>Postanovka elementarnykh zadach audytu peredumovy polozhen bukhhalterskoho obliku v informatsiinii tekhnolohii systemy pidtrymky rishen (Formulation of elementary tasks of audit subsystems of accounting provisions precondition IT DSS)</article-title>
          .
          <source>Modern information systems</source>
          .
          <volume>3</volume>
          (
          <issue>1</issue>
          ),
          <fpage>48</fpage>
          -
          <lpage>54</lpage>
          . (
          <year>2019</year>
          ) doi:10.20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2019</year>
          .
          <volume>1</volume>
          .
          <fpage>08</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Bengio</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Goodfellow</surname>
            ,
            <given-names>I.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Courville</surname>
            ,
            <given-names>A. Deep</given-names>
          </string-name>
          <string-name>
            <surname>Learning</surname>
          </string-name>
          . The MIT Press Cambridge, Massachusetts, London, England (
          <year>2016</year>
          ). http://www.deeplearningbook.org
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Cho</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Merrienboer</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gulcehre</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bougares</surname>
            ,
            <given-names>F</given-names>
          </string-name>
          , Schwenk,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Bengio</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          <article-title>Learning phrase representations using RNN encoder-decoder for statistical machine translation</article-title>
          .
          <source>Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP)</source>
          . Doha, Qatar, pp.
          <fpage>1724</fpage>
          -
          <lpage>1734</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Brownlee</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Clever</surname>
          </string-name>
          <article-title>Algorithms: Nature-Inspired Programming Recipes</article-title>
          . Melbourne: Brownlee (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>