936
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Design and Implementation of an Enterprise Credit Risk Assessment Model Based on Improved Fuzzy Neural Network

&
Article: 2181517 | Received 29 Dec 2022, Accepted 10 Feb 2023, Published online: 21 Feb 2023

ABSTRACT

In order to improve the effect of enterprise credit risk assessment, this paper combines the improved fuzzy neural network to construct the enterprise credit risk assessment model. The various jamming patterns that can threaten the credit data transmission system include various blocking jamming and tracking jamming. Moreover, this paper analyzes the bit error performance of the credit data transmission system against various interferences, and obtains the bit error curves against various interferences through program simulation. In addition, this paper builds a variable-speed credit data transmission system based on Simulink, analyzes the key technologies in variable-speed credit data transmission, and simulates the anti-interference performance of variable-speed credit data transmission technology. The simulation study verifies that the enterprise credit risk assessment model proposed in this paper has good risk assessment effect and risk response strategy effect.

Introduction

Credit risk returns have obvious asymmetry. For unsecured loans, under normal circumstances, banks can obtain normal interest income. However, once the credit risk occurs, the losses suffered by the bank will be much larger than the interest income. Obviously, the likelihood of credit risk can be reduced if it is thoroughly reviewed (Krabec, Čižinská, and Rýdlová Citation2021). This asymmetry of gains and losses determines that the probability of credit risk is skewed to the left, and there will be thick tails on the left. It is because of this basic characteristic of credit risk that we cannot assume that it obeys the normal distribution, which brings great difficulties to the measurement of credit risk (Johnson, Lopez, and Sorensen Citation2021).

From the point of view of a single loan, since the credit risk is affected by the borrower’s operating ability, moral level, repayment willingness and financial status, its uncertainty is relatively large, and it has strong non-systematic characteristics; on the other hand, the macroeconomic All businesses will be affected by the same conditions, industry development trends, national policies, natural disasters, etc. These factors can lead to changes in the credit status of loan companies, so credit risk has certain systemic characteristics (Pechlivanidis, Ginoglou, and Barmpoutis Citation2021).

Since the term of most loans is relatively long, several uncertain factors will impact the loan’s repayment schedule and amount throughout its duration. Therefore, it is difficult to analyze the credit risk of commercial banks quantitatively; secondly, the impact of the financial crisis is even more challenging. The debtor is in control of modifying the unfavorable aspects of loan repayment. The lender can’t observe changes in credit risk due to information asymmetry directly (Wang et al. Citation2021).

Under normal circumstances, in order to obtain loans from commercial banks, borrowers are likely to provide false or incomplete information to commercial banks, so it is difficult for commercial banks as creditors to fully understand the true status of borrowers. After the commercial bank grants credit, for the borrower, driven by the maximization of its own interests, if the benefits brought by default are far greater than the risks to be undertaken, the possibility of moral hazard will increase and the borrower chooses to default. Banks not only cannot get the interest income of the credit, what is even worse is that the original credit funds cannot be repaid (Gietzmann and Wang Citation2020).

The credit paradox refers to the contradiction between commercial banks’ academic requirements for credit decentralization and the actual phenomenon of credit concentration. Because only through long-term business relationships can a customer’s credit status be fully understood, banks prefer to centralize loans. For the small number of old customers, this has the advantage that the bank understands the customer’s credit management situation, making it simple to grasp these situations. This approach, however, contradicts the decentralization principle of risk management. Once a default occurs, the loss will be enormous if the credit risk is too concentrated (Starko Citation2018).

The remainder of this paper is organized as follows: Section 2 provides the research approach’s connected work. Section 3 presents the basic theory of enterprise financial credit data transmission. Section 4 includes the enterprise credit risk assessment model. Finally, part 5 brings the study to a conclusion.

Literature Review

Literature (Bauman and Shaw Citation2018) proposes a Credit Metrics model to measure credit risk, which is a credit risk management model based on the VaR method, which estimates the credit risk VaR of individual securities and investment portfolios on a mark-to-market basis, fully considering Credit rating ups and downs and default events also take into account that the portfolio can play a role in diversifying risk, which is a good complement to the Basel Accord, because it recognizes the diversification effect of credit risk when assessing the market value of assets. Significance. The basic idea of this model is to calculate the default probability of certain loans based on the credit rating, and at the same time, it can calculate the probability that the above-mentioned loans will be transformed into bad debts. model to manage credit risk becomes possible. Since commercial bank loans cannot be publicly traded directly, it is difficult to obtain the market value of the loan, and the volatility of the loan value cannot be observed. The probability of change, the rate of return of the loan, etc. are used to calculate the market value and volatility of the loan for non-trading loans, and then calculate the risk reserve (Dugar and Pozharny Citation2021).

The neural network model consists of an input layer, several hidden intermediate layers, and an output layer. It applies neuropsychology and cognitive science research findings. The performance of the parallel distributed mode processing system created by mathematical methods is impressive. The capacity for parallel computing, fault tolerance, and self-learning. It was initially used to predict bank failure and was subsequently trained with a three-layer BP neural network. After training, any newly input company can be separated into non-bankrupt and bankrupt companies based on the weights provided by the network’s input samples (Ghosh and Xing Citation2021). The distribution of the model is free, which is applicable in practical problems, especially when the distribution of variables is unknown and the covariance structure is unequal, it can provide accurate classification, and financial data has the characteristics of reflecting various life characteristics of enterprises. The law of change has certain similarities with the theory of evolution. The advantage of neural network lies in its versatility, which can handle absolute variables and continuous variables well, and also has a good prediction effect in complex fields (Cordazzo and Rossi Citation2020). However, its work is relatively random, and in practical application, in order to obtain a better neural network structure, it needs to be continuously debugged, which consumes manpower and time, so its practical application is limited to a certain extent. Literature (Oliveira, Lustosa, and Oliveira Gonçalves Citation2021) compared the neural network method with the discriminant analysis method, and concluded that in the identification and prediction of credit risk, the neural network has no substantial superiority compared with the linear discriminant model, and the neural network model lacks explanation. Artificial neural networks are incapable of determining the relative weights of input variables. Due to the complexity of the neural network model, it is difficult to find a suitable model to study particular problems, which necessitates more time, manpower, and material resources and is inefficient. It is a significant innovation in research methods, but its actual effect is quite unstable. When the academic (Alexandra and Oleg Citation2021) uses the neural network model to discriminate and analyze 47 crisis enterprises and 47 normal enterprises, the accuracy rate of the prediction of crisis enterprises reaches 100%. The accuracy rate of multivariate discriminant analysis is only 72%: Literature (Nichita Citation2019) believes that the neural network model is generally more effective than the multivariate discriminant analysis and logistic regression analysis models.

Technical efficiency is an important part of studying the effectiveness of production behavior. By measuring the actual input (output) of the decision-making unit compared with its minimum (large) value, the operation status of the enterprise, the operation efficiency and the development level of the society are studied. Through the evaluation, the source and degree of ineffective production behavior can be analyzed (Pozdnyakov, Zoryana, and Tetiana Citation2020). In contrast, technical efficiency measures the extent to which the output of a decision-making unit is compared to the maximum work under the same factor input conditions. The greater the distance, the less efficient the technique. The conventional method for calculating technical efficiency is based on single-factor productivity. Although it is easy to calculate and analyze, it does not consider the internal relationship between factors. However, the factors’ composition will also have a more significant impact on technical efficiency (KAYGUSUZOĞLU, KARAHAN, And YILMAZ). Breaking through the single factor productivity measurement method, it will be more scientific and comprehensive to use a variety of input indicators to measure and analyze the technical efficiency of enterprises (Okoye, Offor, and Juliana Citation2019). According to the different methods of determining the production frontier, the technical efficiency measurement is divided into parametric methods and non-parametric methods. The parametric method requires that the form of the production function, the distribution form of the error term, the statistical characteristics of the sample, etc., be assumed in advance. The unknown parameters in the production function are estimated using the regression analysis method and the probability and statistics method. Comparison is performed to determine the respective efficiency values (Karpenko et al. Citation2019).

This paper combines the improved fuzzy neural network to construct the enterprise credit risk assessment model, and combines the practical data to verify the effect of the enterprise credit risk assessment model.

The Basic Theory of Enterprise Financial Credit Data Transmission

The Basic Concept of Enterprise Financial Credit Data Transmission

Enterprise financial credit data transmission is an important spread spectrum communication method. The theoretical basis of spread spectrum comes from Shannon’s information theory.

(1) C=Blog21+SN(1)

In formula (1), the logarithm is replaced by a natural number e as the base to obtain

(2) CB=1.44ln1+SN(2)

In the actual situation S/N1, we do a power series expansion of formula (1). Because the high-order term has little effect, the high-order term is omitted to get

(3) CB1.44SN(3)

When the transmission of white noise with power spectral density n0 is considered in the channel of bandwidth B, and the noise power is N=n0B, the available channel capacity is

(4) C=Blog21+Sn0B(4)

Shannon’s second theorem points out that by properly coding the information symbols, the error probability of the system can be reduced. From formula (1) and formula (3), it can be found that in addition to coding, if the bandwidth can be increased, the error probability of information transmission can also be reduced. When the bandwidth B approaches infinity, we have

(5) limBC=limBBlog21+Sn0B=limBn0BSlog21+Sn0BSn0(5)

Since there is limxx1xlog2(1+x)=log2e=1.44, we have

(6) limBC=1.44Sn0(6)

According to the relationship S=REhbetween the information energy S and the symbol rate R and the symbol energy Eh, whenB,

(7) Ehn0=Sn0Rmax=11.44=1.6(dB)(7)

The frequency hopping spread spectrum processing gain is defined as

(8) GP=output signalSignal to noise ratio of input signal=(S/N)out(S/N)in=RsRd(8)

The interference tolerance is defined to evaluate the enterprise financial credit data transmission system’s performance in an interference environment by GP and system loss L, as shown in formula (9)

(9) Mj=GpL(S/N)out(9)

The principle of enterprise financial credit data transmission system is shown in .

Figure 1. Schematic diagram of the transmission principle of corporate financial credit data.

Figure 1. Schematic diagram of the transmission principle of corporate financial credit data.

The enterprise financial credit data transmission system mainly includes: modulator, pseudo code generator, frequency synthesizer, intermediate frequency filter, demodulator, etc.

Mathematical Model of Enterprise Financial Credit Data Transmission System

If the burst information d(t) to be transmitted is a bipolar digital signal, it is expressed as

(10) d(t)=n=0dngdtnTd(10)

The information code is dn=1 or −1, the symbol duration is Td,gd(t) is a rectangular function, and there is gd(t)=1,0tTd0,Td<t<0. First, d(t) is digitally modulated, and the modulated expression is m(t), and then m(t) is subjected to frequency-hopping modulation, there are

(11) s1(t)=m(t)cosw0+nwTt+φn(11)

In , n(t) represents noise and J(t) represents interference. Among them, S1(t) is

Figure 2. Mathematical model of enterprise financial credit data transmission system.

Figure 2. Mathematical model of enterprise financial credit data transmission system.

(12) Sl(t)=S1(t)+j=1kSj(t)+n(t)+J(t)(12)

The expression after de-hop processing is

(13) Sp(t)=S1(t)+j=1kSj(t)+n(t)+J(t)coswrmwTt+φr=12m(t)cosωlt+φJ+cosω0+wr+2nwrt+φnφn+j=2kSj(t)+n(t)+J(t)coswrmwrt+φr(13)

The signal after passing through the bandpass filter can be expressed as

(14) S12(t)=12m(t)coswltφ1(14)

Main Parameters and Performance Indicators of Enterprise Financial Credit Data Transmission System

Enterprise financial credit data transmission primarily employs the following performance indicators to evaluate a frequency hopping system:

(1) Frequency hopping bandwidth

In the field of communication, the frequency band bandwidth occupied by the frequency hopping system is called the frequency hopping bandwidth, denoted as BFR. Among them, BlR=fmaxfmin,fmax is the maximum frequency and fmin is the minimum frequency.

(2) Number of frequency hopping frequencies

The number of frequency hopping frequencies is the number of all candidate frequency hopping frequencies in the frequency hopping frequency set, which is usually denoted as N. The anti-jamming performance of the frequency hopping system is positively related to the frequency of the frequency hopping.

(3) Frequency hopping processing gain

Although there are multiple carrier frequencies in enterprise financial credit data transmission, only one carrier frequency is selected for frequency hopping modulation at a specific moment, and then IF modulation is performed. These two frequencies together determine the instantaneous spectral bandwidth BI at this time. Its ratio with the frequency hopping bandwidth (radio frequency bandwidth) BlRR is the frequency hopping processing gain Gp, which is expressed as Gp=BlRR/Blt.

(4) Frequency hopping rate

The frequency hopping rate R is referred to as the hopping rate, which is defined as the number of RF frequency hopping per second, and the unit is hops/s (hops/s). The duration of each hop is the hop period, and the hop speed and the hop period are reciprocal. If the hopping speed is 200hops/s, the hopping period is 5ms. Usually, the hopping speed lower than 100hops/s is called slow frequency hopping, 100/1000hops/s is called medium speed frequency hopping, and 1000hops/s above is called fast frequency hopping. In addition, it can also be defined according to the relationship between the information rate and the hopping speed.

(5) Frequency hopping cycle

The frequency hopping period Th refers to the continuous working time of each carrier frequency, that is, the time that each frequency remains unchanged in the frequency domain. It consists of frequency hopping dwell time Tdw and channel switching time Tds, as shown in .

Figure 3. Remuneration relationship during the frequency hopping period.

Figure 3. Remuneration relationship during the frequency hopping period.

(6) Frequency hopping sequence period

The hopping frequency varies based on the pseudo-random code, and since the frequency set is limited, the frequency sequence is eventually reused. As the sequence period, we record the maximum length of the sequence without repetition.

(7) Frequency hopping synchronization

Frequency hopping synchronization means that the sending and receiving parties use the same frequency to communicate at the same time. Usually, the frequency hopping frequency table, network number, system time information TOD, frame synchronization and bit synchronization information are required.

(8) Frequency hopping pattern

The frequency hopping varies over time, and the resulting time-frequency variation graph is known as the frequency hopping pattern. In transmitting corporate financial credit data, frequency hopping pattern design is crucial. If the enemy captures the frequency-hopping way, waveform tracking will likely interfere with it. Different frequency hopping pattern algorithms are typically employed on various occasions to improve communication security.

(9) Networking method of enterprise financial credit data transmission

In order to enhance the anti-interference performance of enterprise financial credit data transmission, frequency hopping radio stations usually exist in the form of networking in use. According to different networking basis, it is divided into two categories: frequency packet network and code packet network. There are three networking modes: synchronous orthogonal networking, synchronous non-orthogonal networking, and asynchronous non-orthogonal networking. The call mode between network stations is shown in the figure below.

In , Figure (a) is a network call of different subnet radio stations in the same group of networks, that is, a radio station calls all radio stations in this network or other networks. Figure (b) is the network call of the same group of network radio stations. Figure (c) shows the selective calling of radio stations in the same subnet, that is, a radio station calls another radio station in the network to realize the transmission of enterprise financial credit data.

Figure 4. Frequency hopping radio call mode.

Figure 4. Frequency hopping radio call mode.

Typical Interference Patterns in the Anti-Interference System of Enterprise Financial Credit Data Transmission

The frequency of the interference signal is fixed, and the frequency hopping of the frequency hopping signal is of no concern. The blocking interference bandwidth can be made as wide or narrow as necessary. The bandwidth is primarily divided into the following categories based on its width.

(1) Broadband Noise Blocking Interference (BBNJ)

Broadband noise interference needs to estimate the target signal bandwidth, set the interference signal according to the target bandwidth, and cover the entire target signal spectrum bandwidth as much as possible, which is also called full-band interference or blocking interference. Usually, J0 represents the interference level, and the unit is W/Hz. Shannon channel capacity represents the maximum data transfer rate that the channel can sustain at an arbitrarily small error rate. If we want to transmit more than this rate, the reception of the information is bound to go wrong. This disturbed channel capacity is defined as

(15) C=Wsslog21+SP1(15)

W1 is the signal bandwidth, S is the average power of the signal, and Pr=WssN0+J0 is the total average power of the existing noise and interference.

(2) Partial Band Noise Blocking Interference (PBNJ)

Partial frequency band interference differs from broadband interference because the jammer concentrates interference power on a portion of the enterprise financial credit data transmission channel. Target channels may be adjacent or scattered. In this way, the interference is more targeted, the interference power is loaded on a part of the frequency hopping bandwidth Ww, the interference power of the interfered channel is large, and the interference effect is good. Part-band interference is also very convenient to adjust the interference bandwidth. The partial frequency band interference factor ρ is defined here to represent the interference bandwidth ratio.

(16) ρ=WJWs(16)

Partial frequency band interference power is evenly distributed, and its unilateral power spectral density is

(17) JWJ=JWssWsSWJ=JρWss(17)

When the frequency hopping signal hops into the interfered channel, the noise power spectral density has interference power in addition to the noise power, that is, Nn=N0+Nj, otherwise there is Nn=N0. For the FH/BFSK system, there are

(18) Pˉb=(1ρ)PbEbN0+ρEbN0+Nj=1ρ2expEb2N0+ρ2expEb2N0+JρWss(18)

In the interference environment, there is usually NjN0, so there is

(19) Pˉbρ2expρEb2NJ(19)

(3) Comb blocking jamming (CNJ)

Comb-blocking interference must first detect the minimum frequency interval between adjacent frequency points of enterprise financial credit data transmission, then adjust the interference frequency interval to the target frequency interval, and finally, concentrate the limited power on each frequency point of the frequency hopping signal. Its utilization is high and efficient, positively impacting enterprise financial credit data transmission interference.

(4) Narrow Band Interference (NBNJ)

Narrowband noise interference refers to the interference signal whose bandwidth is much smaller than the bandwidth of the target communication system. The transmission of corporate financial credit data has an inhibitory effect on narrowband interference.

Performance Analysis of Low Signal-To-Noise Ratio of Conventional Enterprise Financial Credit Data Transmission System

It is difficult to maintain phase coherence in the transmission of corporate financial credit data. Therefore, the information modulation technique adopted is usually Multi-ary Frequency Shift Keying (MFSK) or DPSK. MFSK modulation uses the mutual transformation between M carrier frequencies to transmit log2M-bit digital signals, which are generally expressed as

(20) st(t)=cosw1t+φ1(20)

wi is M discrete values, φ1 is the phase constant. When the BFSK modulated signal is coherently demodulated, the bit error rate is

(21) Ph=12erfEb2N0(21)

Eb is the signal energy per bit, and N0 is the additive white Gaussian noise power spectral density. If non-coherent demodulation is used, the bit error rate is

(22) Ph=12expEh2N0(22)

Coherent demodulation needs to generate exactly the same coherent carrier, which is difficult to realize especially in phase, so non-coherent demodulation is often used in enterprise financial credit data transmission system.

(1) Analysis of anti-broadband blocking interference performance

In an environment of broadband noise interference, since the entire working frequency band is filled with additive white Gaussian noise:

(23) Ps(M)=1MexpEs2N0+NJi=2MMi(1)iexpEs(2i)2N0+NJi(23)

The bit error rate BER is

(24) Pb=12(M1)expnEb2N0+NJi=2MMi(1)expnEb(2i)2N0+NJi(24)

For the FH/DPSK system, the bit error rate is the same as the conventional DPSK system in Gaussian white noise, which is

(25) Ph=12expEbNn=12exp1N0RP+JPRW(25)

Among them, J/P is the interference signal ratio, that is, the ratio of the interference power to the signal power, and R/W is the frequency hopping processing gain.

(2) Analysis of anti-narrowband noise interference performance

The narrowband interference frequency points are randomly distributed without any regularity. When the interfering signal coincides with the target channel, a large number of bit errors will be generated. If there are K narrowband interferences in the frequency hopping bandwidth, their powers are J1,J2,,JK, and the single interference bandwidth is W. For a certain interference, the power spectral density is NJ1=PJ1/W. At this time, the signal-to-noise ratio of the system is r1=Eb/N0+NJ1, then the average bit error rate of the conventional enterprise financial credit data transmission system is

(26) Pˉc=NKNFr0+i=1KFriN(26)

In the above formula, there is r0=Eh/N0.

(3) Analysis of anti-partial frequency band interference performance

Part-band interference is a special kind of narrowband interference. The interfering signal can be replaced with narrow-band white Gaussian noise. The interference factor ρ=K/N,K is the number of selected interference frequency slots, and N is the total number of frequency hopping frequency slots. The total interference power is set to J, then the interference power spectral density is NJ=J/ρWH,WH is the bandwidth of a single frequency system. For the FH/BFSK system, the average bit error rate of the frequency hopping system is

(27) Pˉc=(1ρ)PcEbN0+ρPcEbN0+NJ=(1ρ)2expEb2N0+ρ2expEb2N0+J/ρWH(27)
(28) Pˉcρ2expρEh2N,(28)

For FH/MFSK systems, the average bit error rate is

(29) Pˉc=(1ρ)PcEhN0+ρPcEbN0+Nȷ=(1ρ)PcPRN0+ρPcEbRN0P+JPRW1ρ(29)

In a disturbed environment, there is NJN0, so the effect of the noise term is ignored

(30) Pˉc=ρPcρEbNȷ=ρ2(M1)i=2MMi(1)expnρEb(1i)N,j(30)

Simulation condition: The frequency hopping bandwidth 50MHz is set. According to the interval of each frequency slot 1MHz, the entire frequency hopping bandwidth is divided into N = 50 frequency slots. The AWGN channel is used in the simulation, and the noise power spectral density is set to N0=1010(W/Hz). For narrowband interference, the number of interference channels is set to K, and the interference power spectrum is −30dBW. We set the narrowband interference bandwidth NJ to be the same as the frequency slot bandwidth, and the partial frequency band interference factor is ρ=K/N. The interference is randomly distributed in K frequency slots, the modulation method is MFSK, the frequency hopping speed is 1000hop/s, and the symbol rate is Rs=2MHz.

The propagation time difference between the transmitter reaching the receiver and the transmitter reaching the jammer is denoted as Tδ, and the time it takes the jammer to process the signal is denoted as Tproc. The generation and activation of the interference signal itself also requires a certain time, which is denoted by Tproc. The jammer processing time is Tpr, the target dwell time is Td, and the effective jamming time coefficient is η(0η1). Because tracking interference requires Tpr and location processing, there will be a certain delay Tn when the target receives the signal containing interference.

(31) Tmj=minTpr+d2+d3d1c,Td(31)

Therefore, the effective interference time is Ts=TdTnj, and the interference is effective only when there is Tnj<Td. Whether the target frequency hopping signal can be interfered is affected by the probability P1 that the interferer detects the target signal and the probability P2 of successful release of the interference, that is, PJ=P1P2. The bit error rate of enterprise financial credit data transmission under interference is set to BJ, and the bit error rate is Bnj when there is no interference, then B is related to the receiver signal-to-interference ratio, and Bnj is related to the signal-to-noise ratio. Therefore, in the presence of interference, the bit error rate is PfBf+1PfBnj, and when there is no interference, the bit error rate is Bnj, then the average bit error rate is,

(32) Pˉc=TsTdPȷBȷ+1PȷBnj+TdBnj=TdTnjTdPȷBJ+1TdTnjTdPJBnj(32)

Enterprise Credit Risk Assessment Model

shows the historical evolution of credit risk assessment methods.

Figure 5. Historical evolution of credit risk assessment methods.

Figure 5. Historical evolution of credit risk assessment methods.

The problems existing in the current enterprise credit risk prediction index system are analyzed, and based on the previous research results, a new index system including financial and non-financial indicators is constructed. Among them, the financial indicators include five aspects: solvency, profitability, operating ability, growth ability and cash acquisition ability. The non-financial indicators include four aspects: development prospects, basic quality of enterprises, innovation capabilities, and performance of contracts. This paper presents a model for predicting credit risk based on the enhanced GoogleNet neural network. In light of the problem posed by the volume of sample data, an excessive number of input indicators will not only waste computing resources but also reduce operational efficiency. Still, it will also result in the multicollinearity of hands and diminish the training effect. Therefore, in this paper, the financial indicators are first screened twice, and then combined with the processed non-financial indicators as the model input, as shown in .

Figure 6. The overall design of the enterprise credit risk prediction model based on the convolutional neural network method.

Figure 6. The overall design of the enterprise credit risk prediction model based on the convolutional neural network method.

Credit risk assessment methods have undergone a transition from traditional assessment methods to modern assessment methods. However, the modern evaluation method is mainly based on quantitative analysis with the help of modern financial theory and mathematical tools, as shown in .

Figure 7. Credit risk assessment method.

Figure 7. Credit risk assessment method.

Before establishing the primary credit risk assessment indicators for small and medium-sized businesses in the economic environment of the supply chain, the primary content of the direct credit risk assessment and debt credit risk assessment indicators must be confirmed. By reading pertinent literature and gaining an in-depth understanding of supply chain finance, it is possible to conclude that the primary credit risk assessment indicators are financing enterprises, i.e., small and medium-sized businesses. As depicted in , debt credit risk indicators mainly include core enterprises, assets under financing, and supply chain operations.

Figure 8. Selection of main evaluation indicators for credit risk.

Figure 8. Selection of main evaluation indicators for credit risk.

On the basis of the above model, the effect of the enterprise credit risk assessment model proposed in this paper is verified, and the Matlab simulation is used to test the effect of statistical credit risk assessment and risk response strategy. The results are shown in .

Figure 9. Validation of the effect of the enterprise credit risk assessment model.

Figure 9. Validation of the effect of the enterprise credit risk assessment model.

Through the above research, it is verified that the enterprise credit risk assessment model proposed in this paper has good risk assessment effect and risk response strategy effect.

Conclusion

Credit risk refers to the possibility that the borrower who has obtained the bank’s credit support will be unable or unwilling to repay the loan according to the terms of the contract, causing the bank to incur losses. Another prevalent theory holds that credit risk stems from the fluctuating value of the debt market, which is likely to result in certain bank losses. A significant drawback of Fuzzy Logic control systems is that they depend entirely on human knowledge and expertise. A fuzzy system must regularly update the rules of a control system, which is time-consuming and require massive computational resources. The former perspective focuses on whether firms default, whereas the latter examines the value changes of credit assets. Credit risk encompasses, in a broad sense, losses incurred by commercial banks due to a variety of uncertain factors. This paper combines an improved fuzzy neural network with a credit risk assessment model for enterprises. The simulation study demonstrates that the enterprise credit risk assessment model proposed in this paper has a practical risk assessment and response effects.

Disclosure Statement

No potential conflict of interest was reported by the authors.

Data Availability Statement

Data will be provided upon request

Additional information

Funding

The authors reported there is no funding associated with the work featured in this article.

References

  • Alexandra, M., and P. Oleg. 2021. Methodology for brand assessment as an intangible asset in agricultural holdings. Наука о человеке: гуманитарные исследования 15 (2):196–816. doi:10.17238/issn1998-5320.2021.15.2.24.
  • Bauman, M. P., and K. W. Shaw. 2018. Value relevance of customer-related intangible assets. Research in Accounting Regulation 30 (2):95–102. doi:10.1016/j.racreg.2018.09.010.
  • Cordazzo, M., and P. Rossi. 2020. The influence of IFRS mandatory adoption on value relevance of intangible assets in Italy. Journal of Applied Accounting Research 21 (3):415–36. doi:10.1108/JAAR-05-2018-0069.
  • Dugar, A., and J. Pozharny. 2021. Equity investing in the age of intangibles. Financial Analysts Journal 77 (2):21–42. doi:10.1080/0015198X.2021.1874726.
  • Ghosh, A. A., and C. Xing. 2021. Goodwill impairment and audit effort. Accounting Horizons 35 (4):83–103. doi:10.2308/HORIZONS-19-055.
  • Gietzmann, M., and Y. Wang. 2020. Goodwill valuations certified by independent experts: Bigger and cleaner impairments? Journal of Business Finance & Accounting 47 (1–2):27–51. doi:10.1111/jbfa.12411.
  • Johnson, P. M., T. J. Lopez, and T. L. Sorensen. 2021. Did SFAS 141/142 improve the market’s understanding of net assets, goodwill, or other intangible assets? Review of Quantitative Finance and Accounting 56 (3):891–915. doi:10.1007/s11156-020-00912-x.
  • Karpenko, L., P. Pashko, P. Voronzhak, H. Kalach, and M. Nazarov. 2019. Formation of the system of fair business practice of the company under conditions of corporate responsibility. Academy of Strategic Management Journal 18 (2):1–8.
  • Krabec, T., R. Čižinská, and B. Rýdlová. 2021. Deconstruction of inherent goodwill generated in owner-managed companies in the Czech republic. International Advances in Economic Research 27 (3):253–55. doi:10.1007/s11294-021-09834-3.
  • Nichita, M. E. 2019. Intangible assets–insights from a literature review. Journal of Accounting and Management Information Systems 18 (2):224–61. doi:10.24818/jamis.2019.02004.
  • Okoye, P. V. C., N. Offor, and M. I. Juliana. 2019. Effect of intangible assets on performance of quoted companies in Nigeria. International Journal of Innovative Finance and Economics Research 7 (3):58–66.
  • Oliveira, K. V., P. R. B. Lustosa, and A. Oliveira Gonçalves. 2021. Goodwill from the appreciative inquiry (AI) perspective: Innovation transforming intangible capital. Revista Contemporânea de Contabilidade 18 (47):03–17. doi:10.5007/2175-8069.2021.e75538.
  • Pechlivanidis, E., D. Ginoglou, and P. Barmpoutis. 2021. Can intangible assets predict future performance? A deep learning approach. International Journal of Accounting and Information Management 30 (1):61–72. doi:10.1108/IJAIM-06-2021-0124.
  • Pozdnyakov, Y. V., S. Zoryana, and G. Tetiana. 2020. Price-forming factors choice grounding at intangible assets with negative depreciation independent valuation/appraising. Independent Journal of Management & Production 11 (6):2112–39. doi:10.14807/ijmp.v11i6.1170.
  • Starko, I. 2018. Normal regulation of the recognition and evaluation of the goodwill. Review of Accounting Studies 17 (4):749–80.
  • Wang, Y., T. Li, D. Wang, and K. Liu. 2021. Has damage from goodwill impairment grown in China? Analysis and response. China Journal of Accounting Studies 9 (2):168–94. doi:10.1080/21697213.2021.1992936.