FSN Analysis for Inventory Management – Case Study of Sponge Iron Plant
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 2
Abstract
An inventory management is technique which is generally used to manage the company effectively. The company wants to control their inventory cost, material cost, labor cost etc. There are several inventory techniques used in company such as FSN, XYZ, ABC, HML, VED and S-OS. In this study we shall focus on FSN analysis. In FSN analysis the items are classified into F, S and N classes based on Based on Turnover ratio. Data collection is mainly of 1 year through the general store manager of sponge iron plant. In these analysis only generally used items is used for FSN analysis.
Authors and Affiliations
Yogesh Kumar, Rupesh Kumar Khaparde, Komal Dewangan, Gautam Kumar Dewangan, Jalam Singh Dhiwar
Productivity enhancement of Trimdek using Guard Film Roller Stand and Auto-Stacker
This paper addresses the productivity enhancement of Trimdek profile using Guard Film Roller Stand and Auto Stacker. It also consider the topic of formation of trimdek (square-fluted steel cladding) by TRFM (Trimdek Rol...
KIOT Alumni Web Portal Management and Maintenance System Using PHP
A recent trend in society is social networking, a powerful tool for people to meet and interact based on common interests. There are many languages to create social networking sites. Among them PHP is a tool which is us...
Course Saver: Utilizing Course APIs for Exact and Effective Question Preparing At Area Based Administrations
Location based administrations (LBS) empower versatile clients to inquiry purposes of-interest (e.g., eateries, bistros) on different components (e.g., value, quality, assortment). Moreover, clients require precise inqu...
A Review On Software Based Architecture For Cloud Computing Security
Cloud computing is the transfer of computing facilties above the Internet. Cloud amenties permits the consumers to use software and hardware that are accomplished by third parties at isolated positions. The appearances...
Self-Destructing Messages Using Layered Encryption for Mobile Devices
Communication through SMS is very popular now-a-days and it is cheap, fast and simple. However, when confidential information is exchanged using SMS, it is very difficult to protect the information from SMS security thr...