This HTML5 document contains 41 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n10http://localhost/temp/predkladatel/
n14http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n17http://linked.opendata.cz/ontology/domain/vavai/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
rdfshttp://www.w3.org/2000/01/rdf-schema#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n15http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n12http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n13http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n11http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n18http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F60162694%3AG42__%2F12%3A00480841%21RIV13-MO0-G42_____/
n5http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F60162694%3AG42__%2F12%3A00480841%21RIV13-MO0-G42_____
rdf:type
skos:Concept n17:Vysledek
rdfs:seeAlso
http://vavtest.unob.cz/registr
dcterms:description
One of commonly used methods of network analysis of logistic chains is Critical Path Method. For the functionality analysis of the logistics chains of the armed forces, it is appropriate to further extend this method to include safety factors affecting the functionality of individual logistics nodes and edges. The paper describes a possible modification of the Critical Path Method through portfolios of safety factors in the vertices and edges of logistics chains. This method modification can be used during planning process of logistics support of the armed forces’ units operating in multinational operations. One of commonly used methods of network analysis of logistic chains is Critical Path Method. For the functionality analysis of the logistics chains of the armed forces, it is appropriate to further extend this method to include safety factors affecting the functionality of individual logistics nodes and edges. The paper describes a possible modification of the Critical Path Method through portfolios of safety factors in the vertices and edges of logistics chains. This method modification can be used during planning process of logistics support of the armed forces’ units operating in multinational operations.
dcterms:title
Modification of Critical path Method by a Portfolio of Security Criterions Modification of Critical path Method by a Portfolio of Security Criterions
skos:prefLabel
Modification of Critical path Method by a Portfolio of Security Criterions Modification of Critical path Method by a Portfolio of Security Criterions
skos:notation
RIV/60162694:G42__/12:00480841!RIV13-MO0-G42_____
n3:aktivita
n12:I
n3:aktivity
I
n3:cisloPeriodika
1
n3:dodaniDat
n5:2013
n3:domaciTvurceVysledku
n14:8495343 n14:7681410 n14:6512429
n3:druhVysledku
n13:J
n3:duvernostUdaju
n15:S
n3:entitaPredkladatele
n18:predkladatel
n3:idSjednocenehoVysledku
151369
n3:idVysledku
RIV/60162694:G42__/12:00480841
n3:jazykVysledku
n8:eng
n3:klicovaSlova
supply chain security; Critical Path Method; Triplet modification
n3:klicoveSlovo
n4:Triplet%20modification n4:supply%20chain%20security n4:Critical%20Path%20Method
n3:kodStatuVydavatele
RO - Rumunsko
n3:kontrolniKodProRIV
[FE8AC28529FF]
n3:nazevZdroje
The 18th International Conference The Knowledge-Based Organization
n3:obor
n11:KA
n3:pocetDomacichTvurcuVysledku
3
n3:pocetTvurcuVysledku
3
n3:rokUplatneniVysledku
n5:2012
n3:svazekPeriodika
18
n3:tvurceVysledku
Šikolová, Mária Sedlačík, Marek Foltin, Pavel
s:issn
1843-6722
s:numberOfPages
6
n10:organizacniJednotka
G42