Back to learning exercises hit list
Search all MERLOT
Click here to go to your profile
Select to go to your workspace
Click here to go to your Dashboard Report
Click here to go to your Content Builder
Click here to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II


    

Learning Exercise


Material: State of the art Web service ontology engineering
Submitted by: Amin Elsaleh on Oct 27, 2011
Date Last Modified: Oct 27, 2011
Title: SECURING THE SUPPLY CHAIN
Description: REQUIREMENTS : Concepts and methods for security management along the entire commodity chain, with the aim of identifying and assessing failure risks and damage potential, detecting security gaps at an early stage, recognizing technical and organizational deficits, and identifying potential for the reduction of dependencies from delivery failures. SCENARIO ACTORS: End users include public authorities, security and emergency services (police, customs, disaster relief, and others) and infrastructure operators (e.g. transport and logistics providers, commercial enterprises, and operators of storage facilities and transportation hubs for goods and commodities). EDIAUDIT LEARNING EXERCISE : HOW TO ELABORATE INNOVATIVE DESIGN COLLABORATIVE SUPPLY CHAIN SECURING PROCESS USING INTELLIGENT DOCUMENT CONCEPT? http://www.mlfcham.com/images/stories/pdf/securingsupplychain.pdf
Type of Task: Group, Supervised
Time Required 3-6 months
Topics: Serious Games
Course: Standard Process Description Format
Audience: Graduate School
Prerequisites Skills: UNIX environment, JAVA programming languge, XML standard
Learning Objectives: Design & Monitoring automated process
Technical Notes: Some technical documents shall be provided to those who apply for the above learning exercise.
Text of Learning Exercise: HOW TO ELABORATE INNOVATIVE DESIGN COLLABORATIVE SUPPLY CHAIN SECURING PROCESS USING INTELLIGENT DOCUMENT CONCEPT?
Additional Information URL: http://www.mlfcham.com/images/stories/pdf/securingsupplychain.pdf
Bookmark and Share