<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>H. SCORE FUSION OF FINGER VEIN AND FACE
FOR HUMAN RECOGNITION BASED ON CONVOLUTIONAL NEURAL NETWORK
MODEL. International Journal of Computing</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1109/IDAACS.2017.8095208</article-id>
      <title-group>
        <article-title>Krysovatyy, Hrystyna Lipyanina-Goncharenko, Svitlana Sachenko and Oksana</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>West Ukrainian National University</institution>
          ,
          <addr-line>Lvivska Str., 11, Ternopil, 46000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <volume>688</volume>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Fictitious business - is the creation or acquisition of business entities in order to cover up illegal activities or activities that are prohibited. Investigation of economic crime takes a lot of time for law enforcement officers, so in this regard, the development of an algorithm for detecting a fictitious enterprise based on the classic method of machine learning, namely Support Vector Machine Classification, will develop a single software environment for rapid detection of economic crimes. To build the method, data from 1,100 companies operating in Ukraine were used. The data presented in in the set logical binary values are from 355 fictitious enterprises. Modeling of the Support Vector Machine was performed by 3 approaches: linear, polynomial and radial. The best results are obtained from classification by polynomial approach. The training sample showed evaluation results at 100%, and the test sample showed evaluation at 99.7%. Also, the confusion matrix showed quite good results. Machine Classification. fictitious enterprises, business entities, classification, machine learning, Support Vector MoMLeT+DS 2021: 3rd International Workshop on Modern Machine Learning Technologies and Data Science, June 5, 2021, Lviv-Shatsk,</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Desyatnyuk</title>
    </sec>
    <sec id="sec-2">
      <title>Andriy Krysovatyy, Hrystyna Lipyanina-Goncharenko, Svitlana Sachenko and Oksana</title>
      <p>
        [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
crimes.
Ukraine
      </p>
      <sec id="sec-2-1">
        <title>1. Introduction</title>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>A fictitious enterprise in Ukraine should be understood the following: a business entity that is</title>
      <p>registered in violation of the established procedure (legal norms) of registration with state bodies, the
constituent documents of which do not comply with applicable law, or to carry out activities contrary
to law or constituent documents, or violation of the procedure for tax accounting and deadlines for filing
tax returns and financial statements, or violation of the deadlines for submission of information to
government agencies about the change of name, organizational form, form of ownership and location</p>
    </sec>
    <sec id="sec-4">
      <title>The main reasons for the emergence and existence of economic crime and fictitious entrepreneurship are: imperfection of legislation governing economic activity, high levels of corruption, bondage of taxes, control of corrupt individuals in major industries, low professional level of law enforcement officers in detecting, documenting, investigating these crimes.</title>
    </sec>
    <sec id="sec-5">
      <title>However, the investigation of economic crime often takes a lot of time for law enforcement officers, so in this regard, the development of an algorithm for detecting a fictitious enterprise based on the classical method of machine learning, namely Support Vector Machine Classification, will develop a single software environment that is one of the most promising areas for the rapid detection of economic</title>
    </sec>
    <sec id="sec-6">
      <title>This article is devoted to this topic, the rest of which is distributed as follows. Section 2 discusses the analysis of related work; section 3 presents the algorithm for detecting a fictitious enterprise based</title>
      <p>2021 Copyright for this paper by its authors.
on Support Vector Machine Classification; in section 4 the implementation of the algorithm itself.</p>
    </sec>
    <sec id="sec-7">
      <title>Section 5 presents the conclusions of the study.</title>
      <sec id="sec-7-1">
        <title>2. Related work</title>
        <p>
          Paper [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] forms the basis for the analysis of the interaction of legal and illegal entities: the definition
of the terms “international crime” and “cross-border crime”; separates for analytical purposes
“enterprise crime” from “political crime”. Organized crime focuses on the “model” of the enterprise,
which is really [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] an approach to the study of organized crime, based on the idea that legal and illegal
business are quite similar. Based on the paradigm of organized crime, paper [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] presents the concept of
criminal entrepreneurship, the work developed a research model that links the degree of
entrepreneurship with the stage of organized crime growth. The article [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] has the application of known
theories of organized crime, such as agency theory, alliance theory, network theory, resource-based
theory and other organizational theories to shed light on criminal organizations. Theoretical and applied
aspects of the impact of criminal activity on the economic security of business structures have been
studied [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]; the structural and dynamic tendency of the main threats to the economic security of
enterprises on the basis of the application of integrated assessment depending on partial indicators is
studied; the peculiarities of the multi-vector mechanism of counteracting crime with the help of
economic security of enterprises are substantiated as the base of measures set choosing.
        </p>
        <p>
          The study [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] considered the measure of corporate tax evasion, which reduces both financial and
taxable income, which is called tax evasion. Simulation analyzes, transformations of US LIFO / FIFO
inventory methods, and samples from private and public firms are used to confirm the results. The
results indicate that the measure of compliance with tax avoidance successfully records transactions
that comply with the accounting tax. As expected, it was found that the degree of participation of
stateowned firms in compliance with tax evasion systematically changes depending on the pressure on the
capital market.
        </p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>It has been studied [2] as illegal mining, which is very common in Colombia, to overcome the</title>
      <p>
        problem of measuring illegal activity, a new data set has been built using machine learning methods on
the satellite images functions. The study [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] listed opportunities in the virtual environment through ICT,
such as FinTrack software, etc. to prevent financial crime. Face recognition plays a central role in many
security programs [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], which are used to establish a huge system of social credit to control the entire
population.
      </p>
    </sec>
    <sec id="sec-9">
      <title>A generalized structure of a high-performance adaptive system for detecting cyberattacks based on</title>
      <p>
        neural networks and artificial immune systems has been developed [
        <xref ref-type="bibr" rid="ref15">15, 28</xref>
        ]. Various data from machine
learning technologies applied to crime data to monitor the impact of the economic crisis on crime in
India have been investigated in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Possibilities of detailed study of data from huge repositories,
analysis of various socio-economic factors related to crime incidents, detection of deviations,
classification of patterns and development of effective computational models for crime prediction using
data analysis and machine learning have been studied [17]. The proposed [18] system is tested for the
problem of predicting crimes using data, and experimental results show that the proposed system
provides better results and search for possible solutions and patterns of crime. The experiment [19-21]
collected data on the crime scenario from the police, which were then simulated on the data set using
machine learning algorithms to predict some attributes.
      </p>
    </sec>
    <sec id="sec-10">
      <title>The researches [11, 23, 24] present a modern, structured and well-organized review of one-class</title>
      <p>
        support classifiers. The study [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] used the methods of vector support machines (SVM) and neural
networks, where the SVM model received the highest efficiency among the classifiers for each data set.
Research [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] provides an understanding of the use of stochastic gradient descent algorithms for large
data applications, for example, to accelerate SVM or controlled regression on a large scale, or to
increase the effectiveness of online learning or real-time forecasting (control). [22, 29] proposed an
approach to machine learning for crime detection and crime location, through Twitter posts and
vectorbased filtering to eliminate noise.
      </p>
    </sec>
    <sec id="sec-11">
      <title>It should be noted that the above-mentioned works do not describe the detection of fictitious</title>
      <p>enterprises with the help of information technology. Accordingly, the aim of this article is to develop a
method of detecting a fictitious enterprise based on Support Vector Machine Classification, which will
further develop a software environment for public sector employees to prevent economic crimes and
quickly track fictitious enterprises.</p>
    </sec>
    <sec id="sec-12">
      <title>There are several close analogues to the purpose of the study [5, 6, 17], which analyze the applied area, but they do not investigate the use of information technology in this matter and further software development.</title>
      <sec id="sec-12-1">
        <title>3. Materials and methods</title>
      </sec>
    </sec>
    <sec id="sec-13">
      <title>The above-described factors in the study lead to mass shadowing of the Ukrainian economy [30].</title>
      <p>Accordingly, there is an urgent need to develop special state programs to combat crime in the economic
sphere (public procurement, use of state budget funds, taxation of economic entities, works, services at
the expense of the state budget, etc.), certain areas of the national economy.</p>
    </sec>
    <sec id="sec-14">
      <title>In order to properly organize the activities of law enforcement agencies to detect, promptly verify</title>
      <p>and investigate crimes committed using the capabilities of economic entities with signs of fictitiousness,
it is necessary to determine their characteristics and features of the content of criminal activity and types
of such entities. In such case the developed method may be used (Fig. 1.) to identify a fictitious
enterprise on the basis of Support Vector Machine Classification, which will allow to quickly make
decisions about the performance of an individual enterprise.</p>
      <p>Request to identify a fictitious enterprise 1
User data entry: ID,</p>
      <p>Company, Address,
FAddress1 Faddressn,</p>
      <p>KVEDPIPKER1</p>
      <p>PIPKERn, Foto
2</p>
      <p>Data collection:
EDR, P, PO, K, VKK, L, K205, ZMI, ZD3,</p>
      <p>TovZ, SP, A, E, F, AR, ZR, KR, LB,</p>
      <p>NM, NS, FR, FC</p>
    </sec>
    <sec id="sec-15">
      <title>Comparison of parameters: 4</title>
      <p>FR, Address, FAddress1 FAddressn -&gt; Foto = FF,
A-&gt;SP = A&amp;SP</p>
    </sec>
    <sec id="sec-16">
      <title>At the first stage (block 1) the user needs to submit a request to identify a fictitious enterprise.</title>
      <p>To build a method based on Support Vector Machine Classification, it is first needed to obtain a set
of data on which the Support Vector Machine Classification algorithm will be formed. In future research
it is planned to develop ready-made software. Accordingly, the required data to be entered (block 2)
directly by the user into the system (Table 1): company code (generated automatically in the system),
legal address, physical address, codes of economic activities, names of managers (maybe several),
photos of equipment with geolocation. All these parameters can be supplemented with new ones and
generalize the existing ones, the algorithm is easily adapted.</p>
    </sec>
    <sec id="sec-17">
      <title>Based on the data entered by the user, the analysis of the following parameters (Table 2) (block 3) and search for appropriate values from sources of information created using the appropriate API and photo processing method of pattern recognition, which is the purpose of further research.</title>
      <p>bool
bool
bool
Data type
int64
object
object
object
object
object
object.jpg</p>
      <p>Data source
https://usr.minjust.gov.ua/
https://cabinet.sfs.gov.ua/c
abinet/faces/public/reestr.j
spx
https://cabinet.sfs.gov.ua/c
abinet/faces/public/reestr.j
spx
https://youcontrol.com.ua/
landing_002/
https://public.nazk.gov.ua/
http://irc.gov.ua/ua/Poshu
k-v-YeLR.html
http://www.reyestr.court.g
ov.ua/
http://dzmi.informjust.ua/
http://map.land.gov.ua/kad
astrova-karta
http://www.uipv.org/ua/ba
ses2.html
https://mail.mtibu.kiev.ua/
Login.aspx?ReturnUrl=/Cbd
/MTSBU_Pages/Tree.aspx</p>
      <sec id="sec-17-1">
        <title>Company code</title>
      </sec>
      <sec id="sec-17-2">
        <title>Determining the fictitiousness of the enterprise.</title>
      </sec>
      <sec id="sec-17-3">
        <title>Availability of a register of legal entities and individuals in a single database</title>
      </sec>
      <sec id="sec-17-4">
        <title>Availability of VAT, SSC and a single tax in the database</title>
      </sec>
      <sec id="sec-17-5">
        <title>Carrying out timely payment of taxes PO P K</title>
        <p>L
VKK
K205
ZMI
ZD</p>
      </sec>
      <sec id="sec-17-6">
        <title>TovZ SP</title>
      </sec>
      <sec id="sec-17-7">
        <title>Availability of settlements with co-agents</title>
      </sec>
      <sec id="sec-17-8">
        <title>Information on the presence of company executives bool in the state register of declarations</title>
      </sec>
      <sec id="sec-17-9">
        <title>Availability of licenses in accordance with the NACE bool</title>
      </sec>
      <sec id="sec-17-10">
        <title>The presence of criminal cases under Art. 205 of the</title>
      </sec>
      <sec id="sec-17-11">
        <title>Criminal Code of Ukraine</title>
      </sec>
      <sec id="sec-17-12">
        <title>Presence of mentions of company executives with keywords: criminal case, corruption, offshore accounts, etc.</title>
      </sec>
      <sec id="sec-17-13">
        <title>Availability of land at the legal or physical address bool bool bool</title>
      </sec>
      <sec id="sec-17-14">
        <title>Availability of registered trademarks and services, bool</title>
        <p>database of industrial marks, database of inventions
and other databases of the Institute of Industrial</p>
      </sec>
      <sec id="sec-17-15">
        <title>Property of Ukraine</title>
      </sec>
      <sec id="sec-17-16">
        <title>Availability of issued motor third party insurance bool policies, MTIBU policy check, motor third party database, search by state car number, check of the</title>
        <p>Parameter
A
A&amp;SP
E
F
AR
ZR
KR
LB
NM
NS
FR
FC
Explanation
Data
type
status of the Green Card policy for cars owned by the
company</p>
      </sec>
      <sec id="sec-17-17">
        <title>The presence of cars and their owners issued to the bool company.</title>
      </sec>
      <sec id="sec-17-18">
        <title>Coincidence of registered cars with insurance policies bool</title>
      </sec>
      <sec id="sec-17-19">
        <title>Availability in the database of exporters bool</title>
      </sec>
      <sec id="sec-17-20">
        <title>Availability in the stock market database bool</title>
      </sec>
      <sec id="sec-17-21">
        <title>The presence of cars and their owners registered for bool the company is wanted</title>
      </sec>
      <sec id="sec-17-22">
        <title>The presence of weapons of the owners of the bool company is wanted</title>
      </sec>
      <sec id="sec-17-23">
        <title>The presence of cultural values of the owners of the bool company is wanted</title>
      </sec>
      <sec id="sec-17-24">
        <title>Availability of building licenses in the company bool</title>
      </sec>
      <sec id="sec-17-25">
        <title>The presence of real estate in the company bool</title>
      </sec>
      <sec id="sec-17-26">
        <title>Availability of the company's website bool</title>
      </sec>
      <sec id="sec-17-27">
        <title>Availability of equipment, recognition of equipment bool by the available photo and determination of compliance of geolocation with the production address</title>
      </sec>
      <sec id="sec-17-28">
        <title>Availability of the company's social networks and bool affiliates</title>
        <p>https://igov.org.ua/service/
1397/general
http://ukrexport.gov.ua/rus
/ukr_export_exporters/?co
untry=ukr
http://www.nssmc.gov.ua/f
und/registers
http://wanted.mvs.gov.ua/
searchtransport/
http://wanted.mvs.gov.ua/
searchorj/
http://wanted.mvs.gov.ua/
searchart/
http://dabi.gov.ua/license/l
ist.php
https://kap.minjust.gov.ua/
services?keywords=&amp;produ
ct_id=1&amp;usertype
www.google.com</p>
      </sec>
      <sec id="sec-17-29">
        <title>Photo of equipment with geolocation</title>
      </sec>
      <sec id="sec-17-30">
        <title>Facebook.com</title>
      </sec>
    </sec>
    <sec id="sec-18">
      <title>Next, a comparison of data (block 4) with each other, namely: FR with Foto, to determine whether the geolocation coincides with one of the addresses of the company and whether the photo shows the relevant equipment; SP with A to check whether the registered car companies match the insurance policies.</title>
    </sec>
    <sec id="sec-19">
      <title>Then all the data are transferred to the storage database (block 5) after which the data is converted into binary values (block 6).</title>
    </sec>
    <sec id="sec-20">
      <title>Add the fit parameter (block 7), which shows the value relative to whether the company is fictitious or not. Of course, machine learning algorithms operate on numerical values, so we assign the corresponding discrete values 0 or 1.</title>
    </sec>
    <sec id="sec-21">
      <title>It is needed always display the basic statistical characteristics of each numerical feature to verify</title>
      <p>that all data are displayed correctly. Accordingly, we display (block 8): the number of values, the
average value, the minimal and maximal values. The std line shows the standard deviation (which
measures how scattered the values are). 25%, 50% and 75% of the rows show the corresponding
percentages of values in the corresponding parameter. With the correct visualization of the data, it is
clear trends and patterns, the ratio of variables, which allows very well notice the trends in the figures.</p>
    </sec>
    <sec id="sec-22">
      <title>Therefore, graphs of data density are also displayed.</title>
    </sec>
    <sec id="sec-23">
      <title>Before data investigation based on machine learning, one of the most important steps should be to distribute the data (block 9). The data are divided into two groups: training set 80%, test set 20%. The training kit should be used to build machine learning models. The test kit (block 10) should be used to see how well the model works on unfamiliar data.</title>
    </sec>
    <sec id="sec-24">
      <title>Next, we classify the data using the method of the classical method of machine learning Support</title>
      <p>
        Vector Machine Classification (block 11) [25, 26]. For the purpose of fictitious enterprises selection, it
is necessary to solve the problem of binary classification. Initially, the algorithm is trained on objects
(block 10) from the training sample, for which the class labels are known in advance. Next, the already
learned algorithm predicts the class label for each object from the deferred test sample. Class labels can
take the values  = {−1, +1}.Object – is a vector with N signs х= (х1, х2, … , х ) in the  n space.
When learning, the algorithm must construct a simple function  ( ) =  , where the argument  is an
object from the  n space and gives a label of class i. The main goal of Support Vector Machine (SVM)
as a classifier is to find the equation that divides the hyperplane [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]  1 1 +  2 2 + ⋯ +     +
 0 = 0 in  n space, which would divide the two classes optimally. General view of the transformation

of an
object 
into
a label of
      </p>
      <p>class  :  ( ) = 
( 1,  2, … ,   ),  = − 0. After adjusting the weights of the algorithm 
( 
−  ).</p>
      <p>And
denote</p>
      <p>=
and  w and b, all objects
that fall on one side of the constructed hyperplane will be defined as the first class, and objects that fall
on the other side – the second class. Inside the function 
() is a linear combination of object features
with algorithm weights, that is why SVM refers to linear algorithms. The hyperplane partition can be
constructed in different ways, but in SVM the weights 
and  are adjusted so that the class objects lie
as far as possible from the hyperplane distribution. In other words, the algorithm maximizes the gap
(Margin) between the hyperplane and the objects of the classes that are closest to it (Fig. 2). Such objects
are called reference vectors. If we consider the positive and negative sides of SVM, the positive thing
is that: SVM</p>
      <p>works well with a space of features of large size, with data of small volume; SVM
maximizes the separation of the hyperplane and objects, which reduces the number of classification
errors; also, the algorithm is reduced to solving the problem of quadratic programming in the 3D
domain, which makes it possible to divide the hyperplane with certain hyperparameters of the
algorithm. The disadvantages of this method include the fact that: it takes a long time to learn, especially
for large data sets; instability to noise.</p>
      <p>Support vector
learning algorithms is to ensure that each algorithm is evaluated equally on the same data.</p>
      <sec id="sec-24-1">
        <title>4. Experimental results and discussion</title>
      </sec>
    </sec>
    <sec id="sec-25">
      <title>Python was chosen as programming language, as this programming language works best with machine-based data analysis. The following libraries were used for analysis: pandas, numpy, train_test_split, SVC and cross_val_score.</title>
    </sec>
    <sec id="sec-26">
      <title>To build the method, data from 1,100 companies operating in Ukraine were used. The data are presented in logical binary values (Fig. 3.). There are 355 fictitious enterprises in the set (Fig. 4).</title>
    </sec>
    <sec id="sec-27">
      <title>The degree of dependence between the indicators with the definition of a fictitious enterprise is</title>
      <p>presented in the form of a correlation matrix (Fig. 5). The matrix shows that the fit indicator has a low
correlation with other parameters, so it is difficult to clearly determine the dependence on individual
parameters of whether the company is conducting economic crime or not. Therefore, it is advisable to
use machine learning algorithms that will more accurately determine economic crime. To do this,
modeling using the method of classical machine learning Support Vector Machine.</p>
    </sec>
    <sec id="sec-28">
      <title>Modeling of the Support Vector Machine was performed by 3 approaches: linear (Fig. 6),</title>
      <p>polynomial (Fig. 7) and radial (Fig. 8). Other approaches also exist, but are used less frequent.</p>
    </sec>
    <sec id="sec-29">
      <title>We will first consider the linear approach (Fig. 6), the evaluation of the simulation was performed</title>
      <p>on a test sample and training. The training sample showed evaluation results at 98.05%, and the test
sample showed evaluation at 97.88%. The standard deviation is 98% for both samples.</p>
      <p>An important result is the Confusion Matrix. The different values of the Confusion matrix will be as
follows for the training sample:
• True positive (TP) = 143; this means that 143 indicators of positive class data are correctly
classified by the model;
• True negative (TN) = 612; this means that 612 data points of negative class were correctly
classified by the model;
• False positive (FP) = 15; this means that 15 indicators of negative class data were incorrectly
classified as models belonging to the positive class;
• False negative (FN) = 0; this means that 0 data indicators of the positive class were incorrectly
classified as models belonging to the negative class.</p>
    </sec>
    <sec id="sec-30">
      <title>For the test calibration, the confusion matrix shows that 158 and 268 indicators of correctly defined positive and negative class, respectively, 7 indicators of incorrectly defined negative class and 0 indicators of data of positive class were incorrect.</title>
    </sec>
    <sec id="sec-31">
      <title>Next, consider the polynomial approach (Fig. 7). The training sample showed evaluation results at</title>
      <p>100%, and the test sample showed evaluation at 99.7%. The standard deviation is close to 100% for
both samples. For the training calibration, the confusion matrix shows that 158 and 612 indicators of
correctly defined positive and negative class, respectively, and 0 indicators are incorrectly defined. In
the test sample, the confusion matrix showed that 61 and 268 indicators were defined correctly in the
positive and negative classes, respectively, and 1 indicator was determined incorrectly.</p>
    </sec>
    <sec id="sec-32">
      <title>The last approach is radial (Fig. 8), which showed not very good results. The training sample showed</title>
      <p>evaluation results at 79.8%, and the test sample showed evaluation at 81.21%. The standard deviation
is close to 80% for both samples. For the training calibration, the confusion matrix shows that 158
indicators are incorrectly defined, 612 indicators are correctly defined and 0 indicators are defined
correctly and incorrectly. In the test sample, the confusion matrix showed that 268 indicators were
defined correctly, but 62 indicators were determined incorrectly.</p>
    </sec>
    <sec id="sec-33">
      <title>When considering 3 approaches of the Support Vector Machine, the best results are obtained when</title>
      <p>classifying by the polynomial approach. The training sample showed evaluation results at 100%, and
the test sample showed evaluation at 99.7%. Also, the confusion matrix showed quite good results.</p>
    </sec>
    <sec id="sec-34">
      <title>Thus, returning to the analogues discussed above [5, 6, 17], the developed method makes it possible to develop a single software environment for public sector employees to prevent economic crimes and quickly track fictitious enterprises.</title>
      <sec id="sec-34-1">
        <title>5. Conclusions</title>
      </sec>
    </sec>
    <sec id="sec-35">
      <title>A method of detecting a fictitious enterprise based on the Support Vector Machine is proposed,</title>
      <p>which allows to quickly track fictitious enterprises, which is useful for public sector employees to
prevent economic crimes.</p>
      <p>The developed method is implemented on the basis of data of 1100 companies that conducted
economic activity in Ukraine and 355 of which were defined as fictitious. The results of experimental
studies showed that when considering 3 approaches of the Support Vector Machine, the best results
were obtained when classifying the polynomial approach, where the training sample showed evaluation
results at 100%, and the test sample showed evaluation at 99.7%. The confusion matrix for the training
set shows that 158 and 612 indicators of correctly defined positive and negative class, respectively, and
0 indicators are incorrectly defined. In the test sample, the confusion matrix showed that 61 and 268
indicators were defined correctly in the positive and negative classes, respectively, and 1 indicator was
determined incorrectly.</p>
      <p>In further scientific research it is planned to conduct a more detailed analysis of the detection of
fictitious enterprises based on the methods: Gaussian Naive Bayes, Logistic Regression.</p>
      <sec id="sec-35-1">
        <title>6. References</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Yu</surname>
            . Piliukov,
            <given-names>Ю.</given-names>
          </string-name>
          <article-title>Fictitious entrepreneurship in Ukraine. The concept and connection with other economic crimes</article-title>
          .
          <source>Actual problems of jurisprudence</source>
          ,
          <volume>1</volume>
          (
          <year>2019</year>
          ):
          <fpage>140</fpage>
          -
          <lpage>144</lpage>
          . (in Ukrainian)
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Saavedra</surname>
          </string-name>
          , &amp;
          <string-name>
            <surname>M. Romero</surname>
          </string-name>
          ,
          <article-title>Local incentives and national tax evasion: The response of illegal mining to a tax reform in Colombia</article-title>
          , SIEPR Discussion Paper No.
          <fpage>17</fpage>
          -
          <lpage>009</lpage>
          , Stanford Institute for Economic Policy Research, (
          <year>2017</year>
          ). https://siepr.stanford.edu/sites/default/files/publications/17- 009_0.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>N.</given-names>
            <surname>Passas</surname>
          </string-name>
          ,
          <article-title>Cross-border crime and the interface between legal and illegal actors</article-title>
          ,
          <source>Security Journal</source>
          <volume>16</volume>
          (
          <year>2003</year>
          )
          <fpage>19</fpage>
          -
          <lpage>37</lpage>
          . doi:
          <volume>10</volume>
          .1057/palgrave.sj.
          <volume>8340123</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Liddick</surname>
          </string-name>
          ,
          <article-title>The enterprise “model” of organized crime: Assessing theoretical propositions</article-title>
          ,
          <source>Justice Quarterly</source>
          <volume>16</volume>
          (
          <year>1999</year>
          )
          <fpage>403</fpage>
          -
          <lpage>430</lpage>
          . doi:
          <volume>10</volume>
          .1080/07418829900094191.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Gottschalk</surname>
          </string-name>
          ,
          <article-title>Illegal entrepreneurialism as determinant of organised business crime maturity</article-title>
          ,
          <source>International Journal of Business and Systems Research</source>
          <volume>3</volume>
          (
          <year>2009</year>
          )
          <article-title>297</article-title>
          . doi:
          <volume>10</volume>
          .1504/ijbsr.
          <year>2009</year>
          .
          <volume>026185</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Gottschalk</surname>
          </string-name>
          ,
          <article-title>How criminal organisations work: Some theoretical perspectives</article-title>
          ,
          <source>The Police Journal: Theory, Practice and Principles</source>
          <volume>81</volume>
          (
          <year>2008</year>
          )
          <fpage>46</fpage>
          -
          <lpage>61</lpage>
          . doi:
          <volume>10</volume>
          .1350/pojo.
          <year>2008</year>
          .
          <volume>81</volume>
          .1.400.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Vivchar</surname>
          </string-name>
          ,
          <article-title>The influence of crime activity on economic security of enterprise structures in postconflict conditions: identification of threats and mechanisms of antiaction</article-title>
          ,
          <source>Actual Problems of Law</source>
          ,
          <volume>1</volume>
          (
          <year>2019</year>
          )
          <fpage>113</fpage>
          -
          <lpage>119</lpage>
          . (in Ukrainian) doi: 10.35774/app2019.
          <fpage>01</fpage>
          .113.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
            <surname>Badertscher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Katz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Rego</surname>
          </string-name>
          , &amp; R. J. Wilson,
          <article-title>Conforming tax avoidance and capital market pressure</article-title>
          ,
          <source>The Accounting Review</source>
          <volume>94</volume>
          (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>30</lpage>
          . doi:
          <volume>10</volume>
          .2308/accr-52359.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>K.</given-names>
            <surname>Olowu</surname>
          </string-name>
          , &amp; P. Gabasa, Financial crime, ICT &amp; E-governance:
          <article-title>Libraries role</article-title>
          ,
          <source>Advances in Social Sciences Research Journal</source>
          <volume>7</volume>
          (
          <year>2020</year>
          )
          <fpage>609</fpage>
          -
          <lpage>612</lpage>
          . https://doi.org/10.14738/assrj.71.7476.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R.T.</given-names>
            <surname>Kreutzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sirrenberg</surname>
          </string-name>
          ,
          <article-title>Fields of application of artificial intelligence - Security sector and military sector</article-title>
          ,
          <source>in: Understanding Artificial Intelligence. Management for Professionals</source>
          , Springer, Cham,
          <year>2020</year>
          , pp.
          <fpage>225</fpage>
          -
          <lpage>233</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -25271-
          <issue>7</issue>
          _
          <fpage>9</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Alam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Sonbhadra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Agarwal</surname>
          </string-name>
          , &amp; P. Nagabhushan,
          <article-title>One-class support vector classifiers: A survey, Knowledge-Based Systems</article-title>
          , (
          <year>2020</year>
          )
          <article-title>105754</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.knosys.
          <year>2020</year>
          .
          <volume>105754</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>N. L.</given-names>
            <surname>Costa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A. G.</given-names>
            <surname>Llobodanin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Castro</surname>
          </string-name>
          , &amp;
          <string-name>
            <surname>R. Barbosa</surname>
          </string-name>
          ,
          <article-title>Using support vector machines and neural networks to classify Merlot wines from South America</article-title>
          ,
          <source>Information Processing in Agriculture 6</source>
          (
          <year>2018</year>
          )
          <fpage>265</fpage>
          -
          <lpage>278</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.inpa.
          <year>2018</year>
          .
          <volume>10</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>W.</given-names>
            <surname>He</surname>
          </string-name>
          , &amp; Y. Liu,
          <article-title>To regularize or not: Revisiting SGD with simple algorithms and experimental studies</article-title>
          ,
          <source>Expert Systems with Applications</source>
          <volume>112</volume>
          (
          <year>2018</year>
          )
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.eswa.
          <year>2018</year>
          .
          <volume>06</volume>
          .026.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Blumer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ehrenfeucht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Haussler</surname>
          </string-name>
          , &amp;
          <string-name>
            <surname>M. K. Warmuth</surname>
          </string-name>
          ,
          <article-title>Learnability and the VapnikChervonenkis dimension</article-title>
          ,
          <source>Journal of the ACM</source>
          <volume>36</volume>
          (
          <year>1989</year>
          )
          <fpage>929</fpage>
          -
          <lpage>965</lpage>
          . doi:
          <volume>10</volume>
          .1145/76359.76371.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Komar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Golovko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bezobrazov</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <article-title>Intelligent system for detection of networking intrusion</article-title>
          .
          <source>Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          , IDAACS'
          <year>2011</year>
          , pp.
          <fpage>374</fpage>
          -
          <lpage>377</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Komar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kochan</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dubchak</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Golovko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bezobrazov</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romanets</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          <article-title>High performance adaptive system for cyber attacks detection</article-title>
          ,
          <source>in: Proceedings of the 2017 9th</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>