Brainstorming has been a common approach in many industries where the result is not always accurate, especially when procuring automobile spare parts. This approach was replaced with a scientific and optimized method that is highly reliable, hence the decision to optimize the inventory inflation budget based on spare parts and miscellaneous costs of the typical automobile industry. Some factors required to achieve this goal were investigated. Through this investigation, spare parts (consumables and non-consumables) were found to be mostly used in Innoson Vehicle Manufacturing (IVM), Nigeria but incorporated miscellaneous costs to augment the cost of spare parts. The inflation rate was considered first due to the market's price increase. Different types of vehicles were used to implement the Non-preemptive goal programming model and to predict the cost of procurement of the spare parts and miscellaneous and the profit for the current year. The result proved that the solution did not fully achieve the goals since the objective function is not equal to zero, but deviations for going below the profit goal and above the cost of procurement goal were significantly minimized.
تسعى المحاسبة الى مسايرة القفزات الهائلة والمتسارعة في تطور العلوم الصرفة والتطبيقية والتقدم التكنولوجي، والتي ادت على ظهور مفاهيم جديدة الغت مسلمات وبديهيات كانت سائدة لمدة طويلة، فعلى سبيل المثال: كان مخزون المواد الاولية والبضاعة التامة في المؤسسات الصناعية او التجارية يشكل العمود الفقري لها بتكاليفه ومشاكله، حتى اذا ما جاء نظام (JIT) الغى بتطبيقاته هذه المفاهيم واعتمد م
... Show MoreThis research Sought to Determine the Relationship and impact between the tax knowledge in dimensions of the tax compliance costs (monetary costs, time costs, psychic costs) Since the sample included 81 individuals represented by the Executive directors and Financial and Accountant working in the Joint-stock company, A questionnaire was used as a tool for data collection and its analysis. For the purpose of analyzing the research data the statistical package for social science, SPSS. The most important tools used in the statistical analysis are:(standard deviation, and simple linear regression, percentages, arithmetic mean, Cronbach's alpha, F-test, T- Test). The research found a weakness attenti
... Show MoreIn this research, the multi-period probabilistic inventory model will be applied to the stores of raw materials used in the leather industry at the General Company for Leather Industries. The raw materials are:Natural leather includes cowhide, whether imported or local, buffalo leather, lamb leather, goat skin, chamois (raw materials made from natural leather), polished leather (raw materials made from natural leather), artificial leather (skai), supplements which include: (cuffs - Clocks - hands - pockets), and threads.This model was built after testing and determining the distribution of demand during the supply period (waiting period) for each material and completely independently from the rest of the materials, as none of the above mate
... Show MoreThe research aims to prepare a report by the external auditor (Federal Office of Financial Supervision) for the control environment it is includes financial control, commitment and performance of the North Oil Company (extractive) according to the causes of pollution. The research problem it is not the Federal Office of Financial Supervision preparation a report on the things the environment include the prevent or reduction failure the administration of the causes of the pollution caused by oil mining industry by both bad planning or operational or related to efficient human resources as well as of technology to use and resulting from non-compliance local laws and instructions, as well as the inefficiency of spending on environme
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More