#### Abstract

To improve the effect of regional financial and economic data processing, this study combines the distributed decoding technology to construct the regional financial data processing system. Furthermore, this study combines the technical characteristics of cooperative communication and unitary space-time codes to design a non-differential distributed space-time code based on cyclic unitary matrix groups. In addition, this study uses the particularity of trigonometric functions to design a non-differential distributed space-time code based on trigonometric functions. Finally, according to the characteristics of the distributed space-time code of trigonometric functions, this study obtains a decoding algorithm with low decoding complexity and uses MATLAB to conduct simulation experiments to verify the financial data processing and economic analysis effect of the system in this study. The experimental analysis results show that the regional financial and economic data processing system based on distributed decoding technology proposed in this study can play an important role in the analysis of financial and economic data.

#### 1. Introduction

The Internet financial data mining system obtains the required financial data from a specific financial website and then performs a series of extraction processing on these financial data to form structured financial data, which are stored in the database of the target server for query and use by users dealing with financial services. In the current complex economic situation at home and abroad, people need to use the open network to obtain real-time and effective financial data. The Internet financial data collection and analysis system can provide enterprises or individual users with real-time and accurate financial data through the Internet, so that users can observe the data changes in various financial information in real time and obtain the most humanized information recommendation, and it provides a data basis for users to carry out various financial business activities. At the same time, under the current complex economic situation at home and abroad, people need to obtain a large amount of data to realize accurate mining of financial data. Therefore, it is very necessary to design an efficient, simple, and accurate Internet financial data mining system.

How to obtain the required information on a specific website, store the useful information, and display it in a certain form is beneficial to the financial data research, which makes the Web financial data mining technology a hot spot of current research. Since the establishment of China’s security market for more than ten years, with the continuous development of computer technology, informatization, and networking, various financial institutions in the financial industry have stored and accumulated a large amount of original financial data. How to continuously improve financial data mining management has also become a problem. It has become a hot topic. At present, multidimensional data are ubiquitous, especially in the economic field. The cumbersome multidimensional financial data bring great difficulties to users’ analysis and understanding. With the increasing capacity and complexity of financial data, traditional visualization technology is difficult to meet the needs of users. Fast and convenient visualization and analysis of multidimensional information data have become a research hotspot in the financial field.

To effectively improve the cognitive law of parallel coordinates and reduce visual clutter, clustering is widely used in various fields, and most of the clustering methods are based on single data or based on visual space. Data-based clustering is to preprocess and classify the data before drawing, but due to the large range of the dataset, the results drawn in parallel coordinates after clustering may still be very messy, and it is difficult to identify the data characteristics of each classification and trends. The clustering method based on visual space transforms and classifies by analyzing the geometric relationship between line segments in parallel coordinates, which often leads to the clustering results without considering the actual meaning of the data itself, which affects the accuracy of clustering. Since the single visual space-based clustering method simply relies on the results of the visualization of parallel coordinates, clustering by analyzing the geometric relationship between line segments does not integrate the meaning represented by the data itself, which reduces the accuracy of classification to a certain extent and affects the application and promotion of parallel coordinate technology in the financial field.

This study combines distributed decoding technology to construct a regional financial data processing system to improve the effect of regional financial data processing and promote the reliability of financial analysis.

#### 2. Related Work

Traditional financial data analysis methods mainly use mathematical statistics to establish corresponding mathematical-statistical models for analysis and prediction [1]. The proposed multivariate discriminant analysis model for financial data is also known as the *Z* score model [2]. The multiple discriminant analysis model is to select one or two most representative indicators from the indicators such as asset liquidity, profitability, solvency, and operating capacity. The coefficients in the model are relative to each indicator obtained according to the statistical results. Measure of importance: a large number of empirical studies have shown that the model has a good early warning function for corporate financial crisis [3]. However, its prediction effect is also different due to the length of time. The shorter the prediction period, the stronger the prediction ability. Therefore, this model is more suitable for the judgment of short-term risks of enterprises. According to Altman’s financial ratio discriminant analysis model to expand and improve, the financial ratio discriminant analysis and logit regression method are used to establish and estimate the early warning model, and a good prediction effect has been achieved [4]; the component financial early warning model, because the principal component analysis method in the field of artificial intelligence is introduced into the judgment model, improves the rationality of the selection of indicators, thus greatly improving the accuracy of financial early warning [5]. For financial time-series data, commonly used statistical analysis methods include autoregressive moving average model, correlation coefficient analysis, asset pricing portfolio analysis, and ARCH model analysis. Among them, the ARCH model is considered to be the most concentrated model that reflects the characteristics of variance changes and is widely used in the time-series analysis of financial data. It is the most important innovation in the development of financial econometrics [6]. Among all volatility models, ARCH models are unique in terms of the depth of theoretical research and the breadth of empirical application. These analysis methods play an objective and quantitative analysis role in the study of financial markets and corporate financial status, so they have been widely used [7]. Usually, the method of data statistics is used to establish a mathematical model. It must be assumed in advance that the observed data satisfy a certain type of model, and then, statistical tests are used to determine whether the assumed model conforms to the actual situation of the data. If it does not conform, the model must be adjusted until predictive analysis can only be performed if the assumptions are met [8]. Every mathematical model is established under certain constraints and only applies to a specific range. The financial market is a complex dynamic system, so a statistical model determined only by limited parameters cannot be comprehensive and accurate. To describe the real situation of the market, it cannot effectively predict the future development trend of the market [9]. In recent years, machine learning methods, data mining methods, and related dynamic methods in the field of artificial intelligence have been unprecedentedly developed, and data analysis methods based on artificial intelligence have also been effectively and widely used in the financial field [10].

On the basis of the original industrial theoretical model, the relationship between financial agglomeration and the industrial structure formed by financial development is studied [11]; the combination of financial big data and algorithms provides an ideal technical foundation for the transformation and upgrading of traditional financial services. The perspective of different types of financial structures to study their impact on the industry [12]. The combination of the two provides an ideal technological foundation for the transformation and upgrading of traditional financial services. In the field of banking and finance, big data financial algorithms are widely used in customer marketing, product innovation, risk control, operation optimization, etc. [13]; through the algorithmic processing of customer financial information, a panoramic portrait of customers is obtained and the acquisition rate of new customers is improved. The marketing model of financial business is improved through cross-marketing algorithm analysis, precision marketing algorithm analysis, personalized recommendation algorithm analysis, etc.; through financial market risk algorithm analysis, SME risk assessment algorithm analysis, real-time fraud transaction algorithm analysis, anti-money laundering activity algorithm analysis, etc., to improve financial risk management and control capabilities [14]; and through channel optimization algorithm analysis, market hotspot algorithm analysis, and other big data methods to optimize the quality of financial operations. In the field of securities, the widespread application of artificial intelligence investment advisors driven by big data financial algorithms has become an important business model for modern security trading [15]. In the insurance industry, big data financial algorithms play an important role in insurance innovation, customer marketing, effective use of insurance funds, and risk control. In traditional financial fields such as the trust industry, financial leasing industry, and guarantee industry, big data financial algorithms are also constantly optimizing and reconstructing the business model of traditional finance. The field has gained a broad application space [16].

#### 3. Distributed Decoding Technology

A non-differential distributed unitary space-time coding based on a cyclic unitary matrix group is proposed, and a partially coherent distributed differential code under the multi-hop model is constructed. The performance comparison of two-hop and multi-hop modes is analyzed and compared, and it is concluded that the system performance in multi-hop mode is better at a high signal-to-noise ratio.

*Definition 1. *we assume that a is an element of group *G*, and the smallest positive integer *n* that makes (identity element of group *G*) is called the order of element *a*. The order of an element *a* is usually represented by |*a*|.

*Definition 2. *we assume that *G* is a group and *H* is a non-empty subset of *G*. If the multiplication of *G* by *H* itself also acts as a group, it is called a subgroup of *G*.

*Definition 3. *if a group *G* can be generated by an element a, that is, , then *G* is called a cyclic group generated by *a*, and this process is called a generator of *G* [17].

*Definition 4. *we assume that is a cyclic group of finite order then the power of the element with base a is called the element index of the cyclic group.

Lemma 1. *we assume that the order of the element a in the group G is n, and then, .*

Lemma 2. *if the order of element a in the group is n, then 1, where k is any integer.*

Lemma 3. *a subgroup of a cyclic group is also a cyclic group.**We assume that is the set of L different west matrices; that is, .*

The easiest way to construct a commutative group with *L* elements is to construct a cyclic group; that is,where is the generator matrix of the cyclic group, and it is a diagonal matrix, which can be expressed as follows:

In the formula, .

Then, any element in the cyclic group can be expressed as follows:

The source node maps bits of information to a certain matrix of the set. Without loss of generality, we apply the following formula when constructing a circulant matrix [18]:

In this study, , and then, . Because the system models built in this section have only one source node, we assume that is a column vector, which can be expressed as .

Then, the transmission matrix can be expressed as follows:

To get better system performance, we need to obtain the optimal parameters and obtain the optimal constellation, and the constellation parameter group is denoted as the vector .

Without loss of generality, is set, which is chosen in this study according to the following criteria:

In the formula, . To associate with the singular value , we assume that is the mean of the squares of these singular values; that is, , so that . For a given fixed mean , the error probability is minimized when the singular values are equal (i.e., uniformly distributed). Therefore, if two groups have the same , the group of parameters with more agreement should be selected.

As shown in Figure 1, in the first stage of cooperative communication, the source node transmits the code words in the codebook with transmit power, where . The signal received by the *i*th relay node can be expressed as follows:

In the second stage, the information obtained after the relay node performs linear processing on the received information can be expressed as , and then, all *n* relay nodes simultaneously forward the processed information to the destination node *D* with power . Among them, is the west matrix constructed according to the Hadamard matrix criterion.

The signal received by destination node *D* can be expressed as [19]follows:

In the formula, is additive white Gaussian noise, which obeys a cyclic symmetric Gaussian distribution with mean 0 and variance . The equivalent channel coefficient can be expressed as . The code word sent by the relay end is expressed as .

The signal matrix decoded by the maximum-likelihood decoding algorithm can be expressed as follows:

The signal matrix decoded by the maximum-likelihood decoding algorithm can be expressed as follows:

According to formula (5) and formula (6), formula (10) is simplified, and the maximum-likelihood decoding in the partially coherent two-hop network is obtained, as follows:

In the formula, .

According to formula (11), it can be equivalent to as follows:

Among them, , , and is a Hermitian matrix of , and the *i*th row *j* column in the matrix is .

To verify that the selection of the parameter matrix has a certain influence on the performance of the west space-time coding, *L* = 16 is selected. The channel coefficient and noise are both independent and identically distributed complex Gaussian random variables with mean 0 and variance 1. Both the source node and the destination node are one antenna, and there are four antennas at the relay to participate in the cooperation. Five groups of different parameter matrices were selected, . The performance simulation results are shown in Figure 2.

Comparing the non-differential cyclic unitary matrix group code with the differential cyclic group code, the simulation result of the bit error rate is shown in Figure 3. The results show that the differential coding does not require channel estimation in the decoding process, which saves the time and power of sending training sequences, but its performance is about 3 dB worse than that of coherent distributed space-time coding.

In the actual communication environment, sometimes the two communication devices do not have the conditions for direct communication, and the communication between the source node and the destination node must rely on multiple relay nodes to be forwarded many times before it can be realized. This is the multi-hop relay in cooperative communication. The multi-hop relay cooperative communication model is shown in Figure 4.

A multi-hop non-differential distributed space-time code based on unitary group code is proposed, and the three-hop communication system model is shown in Figure 5.

In this model, we assume that the wireless communication system has *m* + *n* + 2 nodes, one of which is the source node and the other is the destination node, and *m* + *n* relay nodes assist the source node to communicate. Among them, *m* is the number of first-hop relay nodes and *n* is the number of second-hop relay nodes. The whole communication process can be divided into three stages. In the first stage, the source node transmits the signal to the relay node . The signal received at the *i*th relay node is represented as follows:

In the formula, is an -dimensional transmission data vector under the power constraint condition , where *L* = *n*, and represents the Frobenius norm. Without loss of generality, we assume that the channel of the relay node is symmetric; that is, for represents the channel gain between the source node and the th relay node.

In the second stage, the relay node sends the received signal to the relay node after linear processing. This uses to represent the west transformation matrix at the ith relay node. In addition, the power of the received signal needs to be normalized to ensure that the signal sent from the relay node can meet the power limit condition. Normalizing this ensures that the average transmit power per symbol is . The signal after linear processing is , where is the average transmit power of each relay, and the processed signal is sent to .

The signal received at relay node is as follows:

In the formula, the equivalent channel is is the noise vector at the relay node , and is the additive white Gaussian noise at the node, which includes the noise forwarded from the relay node and the noise at the node itself. Therefore, the linear transformation at the relay node is finally selected as the west linear transformation to ensure that the noises are independent of each other. The code word matrix in the formula reflects the role of distributed space-time code here.

In the third stage, the relay node sends the received signal through the west linear transformation again, and represents the west transformation matrix at the *j*th relay node. The signal after the western linear transformation is as follows:

In the formula, is the average transmit power of each relay in the relay node, and the processed signal is sent to the destination node *D*.

Then, the signal received by destination node *D* is as follows:

According to the equivalent transformation of the matrix, the above formula can be transformed into

In the formula, there are

For the generalized Butson–Hadamard matrices, must be satisfied, where is an -dimensional matrix whose elements satisfy .

In this section, we assume that *D* is a generalized Butson–Hadamard matrix of , and matrix *D* is used to construct a diagonal west matrix , such that . Each of the diagonal elements is the element of the *i*th row and the *j*th column of the matrix *D*.

The first-hop relay node sends the vector of to the second-hop relay node, that is, in formula (14), which is recorded as follows:

In the formula, satisfies .

In the same way, the second-hop relay matrix is designed. We assume that is a generalized Butson–Hadamard matrix of dimension, and the matrix is used to construct the diagonal west matrix , so that , where each diagonal element is the element in the *i*th row and the *j*th column of the matrix . Then, the second-hop relay node sends to the destination node; that is, in formula (17) is obtained, as shown as follows:

In the formula, .

The relay matrices in formula (16) are west matrices, and the random vectors , and all obey the Gaussian distribution, and they are independent of each other. We assume that the number of relay nodes in the first hop is the same as the number of relay points in the second hop; that is, *m* = *n* = *R*.

Then, the covariance matrix of additive noise is as follows:

Since this study is based on a partially coherent network, we assume that the destination node only knows about and but not . From this, it can be concluded that

Since *m* = *n* = *R*, we have

In the formula, .

is set, and formula (23) and formula (25) are substituted into formula (24), and the covariance matrix of the received signal is expressed as follows:

In the formula, and it satisfies .

Finally, the conditional probability density function under the partially coherent network can be obtained, which is expressed as follows:

At the receiving end, the maximum likelihood is used for decoding, and the decoding decision information of the partially coherent distributed space-time code is obtained.

According to the matrix inversion lemma, if the matrices are non-singular matrices, and the matrices are , then the matrix has the inverse matrix , and the equivalent formula . We get

Formula (28) simplifies to

Now, the simulation and comparison of the bit error rate performance of the partially coherent distributed space-time code under the multi-hop multi-relay cooperative communication system are carried out. The channel fading coefficient and noise are both independent and identically distributed complex Gaussian random variables with mean 0 and variance 1.

We assume that the unitary matrix selects 4 sets of different parameter matrices, which are, respectively, = [5555], = [1357], = [1111315], and = [551113]. The simulation results are shown in Figure 6. It can be seen from the figure that under the same system model and the same *L*, the performance obtained by the selection of the unitary matrix parameters will also be different, and the selection of the parameter matrix has a greater impact on the system performance. To optimize the system performance, it is necessary to select an appropriate parameter matrix according to the actual situation during encoding.

The bit error rate performance of the proposed three-hop multi-relay distributed space-time code and the two-hop multi-relay system is simulated and compared. In the simulation, L16, the parameter matrix used is v551113. Comparison of bit error rate performance under multi-hop multi-relay and two-hop relay networks is shown in Figure 7, and the simulation results are shown in Figure 8. The simulation results show that the bit error rate of the two-hop communication system model is slightly better than that of the three-hop model under the condition of a low signal-to-noise ratio. However, the three-hop communication model is better than the two-hop under a high signal-to-noise ratio. When the bit error rate is 10–5, the difference between the two is about 3 dB.

We assume that the wireless communication system model is shown in Figure 9, which is a multisource two-hop distributed space-time code system with a total of *M* + *N* + 1 nodes. Among them, *M* source nodes are denoted as relay nodes are denoted as respectively, and a destination node is denoted as D. There is no direct link between source node S and destination node *D*. The channel coefficient from source node to relay node is denoted as , and the channel coefficient from relay node to destination node *D* is denoted as . We assume that the channel is a flat Rayleigh channel, all nodes are half-duplex, and they are synchronized at the symbol level, the channel coefficients and are independent of each other, and they obey a complex Gaussian distribution with mean 0 and variance 1.

The structure of the designed western space-time constellation diagram based on trigonometric functions is expressed as follows:

In the formula, represents the *l* + 1th constellation matrix in the constellation diagram. Both and are diagonal matrices of , and the diagonal elements are and , respectively.

The matrix in formula (31) satisfies the following formula:

Therefore, the matrix is a west space-time matrix based on trigonometric functions.

In the relay phase, the signal received at the *j*th relay node is as follows:

In the formula, represents the signal code word matrix sent by the source node, and is the column vector, which represents the element to be sent by each antenna of the source node.

The relay node firstly performs maximum-likelihood decoding on the received signal and decodes to obtain the signal . If the decoding is correct, the decoded information is re-encoded to obtain a new code word matrix and then forwarded. If the decoding is wrong, it will not be forwarded.

No matter what kind of relay processing method is used, the signal processed by the relay node is uniformly expressed as follows:

The system block diagram of the destination receiver firstly combines the signal code words sent by the relay node using the maximum ratio combining method and then performs west space-time demodulation, and finally, it inversely maps the corresponding bit sequence. The signal information received by the receiver under the two cooperation modes will be different, which are as follows:(1)In AF cooperation mode, the signal received by the destination receiver is as follows: In the formula, is the additive white Gaussian noise at the destination receiver.(2)In DF cooperation mode, the signal received by the receiver is as follows:

In the formula, is the additive white Gaussian noise at the destination receiving end.

When the transmitted signal is *S*, the conditional probability density of the received signal is shown in formula (39). Therefore, when the channel fading factor is unknown, the destination node adopts the maximum-likelihood decoding:

In the formula, is the conditional probability that the receiving matrix is *Y* when the transmitting signal is . represents the trace of the matrix, .

Formula (37) describes the maximum-likelihood decoding algorithm for western space-time modulation. Because of the special structure of the constellation diagram proposed in this study, its ML demodulation algorithm can be simplified.

We assume that the transmitted signal matrix is is the corresponding receiving matrix, and formula (37) can be simplified to obtain the decision signal of the WST modulation:

To facilitate the calculation, at the destination node, the receiving matrix *Y* is written as follows:

In the formula, and are both matrices, because there is only one antenna in the design of the receiving node in the system model. The maximum-likelihood demodulation algorithm can be obtained by substituting formula (31) and formula (39) into formula (38), and the derivation process is as follows:

Therefore, the following formula (41) can obtain the search of the maximum value, as follows:

According to the transformation relationship of trigonometric functions, there are as follows:

Formula (41) can be written as follows:

After further simplification, formula (38) can be expressed as follows:

In the formula, , and and , respectively, represent the *i*th row element in the receiving matrix, where . Therefore, formula (44) can be understood as finding to make the following function achieve the maximum value:

Observing formula (45), it can be seen that to make the function achieve the maximum value, only ; that is, . Therefore, the decoding algorithm only needs to know the value of *l* to determine the signal to be sent.

#### 4. Regional Financial Economic Data Processing Based on Distributed Decoding Technology

The whole mining query system is composed of two parts, the client module and the server module, and adopts the typical B/S mode. The system administrator directly logs in to the background of the financial data mining system through the URL address for data mining management. Moreover, ordinary users in the foreground view the mined data through the data display page. The business flow chart of the system is shown in Figure 10.

Financial data analysis includes two levels of individual analysis and regional analysis. Among them, the individual analysis obtains the potential financial risk factors for a single financial institution by analyzing the operational data and external environment of the individual financial institution. Regional analysis analyzes the operation data and external environment of all financial institutions in a certain region and combines the results of individual analysis to obtain regional financial risk assessment in a certain region. This study focuses on individual risk analysis and introduces external environmental data of financial institutions into individual risk analysis. The overall model design of the system is shown in Figure 11.

The model proposed in this study uses the distributed decoding technique described above for data processing. Through the simulation test of MATLAB, the financial data processing and economic analysis effect of the system in this study are verified, and the results shown in Figure 12 are obtained.

It can be seen from the experimental analysis that the regional financial and economic data processing system based on distributed decoding technology proposed in this study can play an important role in the analysis of financial and economic data.

#### 5. Conclusion

Due to the specific economic meaning contained in the data itself in financial data, a single data-based clustering method can effectively classify the data, thereby effectively assisting domain experts to observe and analyze the initial data. However, due to the large scale of financial data, the results of clustered parallel coordinates are still messy and difficult to distinguish, which brings great challenges to further identifying the characteristics and trends of each classification. This study combines distributed decoding technology to construct a regional financial data processing system to improve the effect of regional financial data processing. The experimental analysis shows that the regional financial and economic data processing system based on distributed decoding technology proposed in this study can play an important role in the analysis of financial and economic data.

#### Data Availability

The labeled dataset used to support the findings of this study is available from the author upon request.

#### Conflicts of Interest

The author declares no conflicts of interest.

#### Acknowledgments

This study was sponsored by the Yellow River Conservancy Technical Institute.