ANALISYS BENFORD LAW FOR COMPANY EVIDANCE FROM INDONESIA
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 4
Abstract
This study aims to see how the auditors in accounting and IT must apply to the various procedures in the audit of financial statements with IT-assisted. When viewed as a whole all the computer-assisted audit tools (CAATs) has its own command as an example of this Benford law. The aim of this study was to try to describe how exactly the Benford's Law, when the Benford law can apply and what constraints should be considered before applying the financial audit of companies with IT-assisted. However, in this study the authors used a model for large-scale data analysis of financial statements.
Authors and Affiliations
Taufik Hidayat*,
INFLUENCE OF WELDING SPEED AND GROOVE ANGLE ON STRENGTH OF V-GROOVE BUTT WELD JOINT USING TIG WELDING
Welding is the metal joining process in which two or more metal having same material or different can be joined by heating to a plastic state .It is mostly used for joining metals in process industry, in fabricati...
A PRE-FLOW PUSH ALGORITHM TO GENERALIZED MAXIMUM FLOW PROBLEM
This work presents an algorithm for the generalized maximum flow problem. First, we describe the traditional maximum flow problem. Pre-flow Push algorithms work in a more localized manner than the Ford-Fulkerson m...
Governing Equation of Heat And Mass Transfer In Wet-Cooling Tower Fills.
A wet-cooling tower fill performance evaluation model developed by Reuter is derived in Cartesian coordinates for a rectangular cooling tower and compared to cross Reuter model is found to effectively give the sa...
HUMIDITY & TEMPERATURE MONITORING BY USING CLOUD NETWORK
http: // www.ijesrt.com© International Journal of Engineering Sciences & Research Technology [59] IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY HUMIDITY & TEMPERATURE MONITORI...
An Enhanced Paillier’s Algorithm Using Homomorphic Encryption
Homomorphic encryption is a form of encryption text and obtain an encrypted result which decrypted matches the result of operations performed on the the data is transferred to the sink we use standard encryption...