Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 3

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  ANP
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
This academic paper presents results of research conducted in 2012 in a production business in south Poland where the Analytic Network Process (ANP) method was applied. The objective of the research was to establish the level of risk for selected factors resulting from higher production output of the business in focus. Moreover, selection of the decision-making variant burdened by the lowest risk priority for the achievement of goals set comprised an important research criterion. The application of ANP facilitated a comprehensive approach to the issue in focus. The overriding goal was to demonstrate the efficacy of the method in solving multi-criteria decision problems, especially those which require risk analysis.
EN
In this article, we describe and assess the implementation of several methods of multi-criteria decision-making using a web-based computer application. Such an application makes it easier to determine the effectiveness of decisions. The methods adopted in this application are SMART (Simple Multi-Attribute Rating Technique), AHP (Analytic Hierarchy Process), and ANP (Analytic Network Process). Each of these methods has distinctive characteristics in determining the best alternative for the user. This study assesses the feasibility of each method in the application. The application is assessed based on functionality, reliability, efficiency, and usability. (1) Functionality is tested according to the appropriateness of the decisions made, (2) Reliability is assessed using stress testing, (3) Efficiency is assessed according to the computational effort, and (4) System usability is tested according to the user's answers to the Computer System Usability Questionnaire authored by J.R. Lewis. This research results in a decision support system based on SMART that has been appropriately tested and is ready for use.
PL
W związku z ogłoszeniem terminu zakończenia misji ISAF na 31 grudnia 2014 r. niezbędnym stało się szybkie przygotowanie sprawnych afgańskich sił bezpieczeństwa zdolnych do przejęcia odpowiedzialności za bezpieczeństwo w Afganistanie. Talibowie podjęli działania, które miały w zamyśle storpedowanie powyższego procesu. Głównym ich celem było podkopanie wzajemnego zaufania między siłami ISAF a afgańskimi siłami bezpieczeństwa (Afghan National Security Forces – ANSF). Jednym z takich działań były ataki dokonywane przez członków afgańskich sił bezpieczeństwa przeciwko swoim sojusznikom z ISAF, określane w nomenklaturze międzynarodowej jako „Green-on-Blue” („GoB”) lub „Inside the Wire Threat”. W artykule zdefiniowano problem ataków do 2012 r., przedstawiono ich przyczyny, konsekwencje oraz środki zaradcze, które zostały podjęte dla neutralizacji zagrożenia. Publikacja niniejsza jest w całości oparta na treściach anglojęzycznego artykułu, zamieszczonego w The Magazine of the Joint Force Training Centre, March 2013, Issue No. 3, s. 33–39.
EN
Due to the fact that final date of ISAF (International Security Assistance Forces) operation had been establish for 31 December 2014, it was necessary to train Afghan Security Forces that could take over the responsibility for security in Afghanistan after the ISAF forces have withdrawn. Taliban began offensive aiming to paralyze that process. Their main goal was to undermine the trust between ISAF and ANSF forces. One of their main activity was to conduct attacks which are often referred to as „Green on Blue” („GoB”) or „Inside the Wire Threat”. The author tries to define the problem till the 2012, present its causes, consequences and countermeasures undertaken to neutralize.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.