Tópicos Sugeridos dentro de su búsqueda.
https://purl.org/pe-repo/ocde/ford#2.11.04 1,726 https://purl.org/pe-repo/ocde/ford#5.02.00 889 https://purl.org/pe-repo/ocde/ford#5.02.04 772 Control de inventarios 602 Control interno 542 Logística 519 Rentabilidad 478 más ...
Mostrando 1 - 20 Resultados de 13,510 Para Buscar 'para access control', tiempo de consulta: 0.93s Limitar resultados
1
artículo
The main objective of this article is the development of a system that allows the facial recognition of a person for access control through Artificial Intelligence. For the development of the system, the Convolutional Neural Networks algorithm was used, which is a recognition model. Likewise, the Python programming language and the following libraries such as Numpy, Os, OpenCV and Imutils were used for its implementation. The results obtained according to the hit and using a dataset of 4500 images are approximately 88% in terms of the prediction per person, concluding that the recognition system is effective and has greater efficiency by increasing the size of datasets generated by individuals.
2
artículo
This article presents a web information system that will facilitate the management of professional practices at the National University of Trujillo. For this, an agile SCRUM methodology was applied because it is adaptable to the constant changes in the software development process and the access controls provided by the ISO 27001:2013 standard with the aim of guaranteeing the integrity, authenticity and availability of data. the information assets that the system possesses. The results obtained support the implementation of two-factor authentication and digital signature as essential controls for information management according to the calculated reliability. It is concluded that the access controls provide security in the information handled in the system according to the trust tests.
3
artículo
The purpose of this article is a proposal for a facial recognition system with liveness techniques for access control using neural networks. The main focus has been aimed at improving the security of access to a system through the application of artificial intelligence in biometrics, avoiding any type of fraud and impersonation. Python was used along with the following libraries like Tkinter, Cv2, Numpy, PIL, Imutils, Mediapipe, Os, Math, Dlib, Face-recognition, Csv, Tkcalendar and Bcrypt. The results obtained by carrying out 40 tests with a real person were a similarity accuracy of 82,11%, on the other hand, to verify that the person is carrying out a live recognition, 20 tests were carried out with the photograph of that person, in this case, the system did not allow entry since the liveness verification was not met, thus concluding that the recognition system is effective and guarante...
4
artículo
In today’s dynamic cybersecurity scenario, effective managementof access to critical systems and data is essential to safeguardthe integrity and confidentiality of information. This articlepresents a systematic review of the most prominent accesscontrol techniques in the last five years (2019-2023), with theaim of providing an updated view of trends in informationsecurity. The review, based on a meticulous selection of articlesfrom Scopus, SciELO, IEEE and Google Scholar, adheres tothe PRISMA methodology to ensure a rigorous and completesystematic review. Advanced techniques such as CP-ABE,ABAC, RBAC, ACE-BC, ABSE, among others, were identifiedand evaluated, which represent significant advances in accesscontrol and the protection of sensitive information. The resultsobtained highlight the critical importance of these techniquesin information security, providing a clear overview of the ...
5
artículo
In this project, image recognition will be applied through neural networks for facial identification, which will be used for the implementation of systems computerized access control of people, where the identification of faces of people, which will be captured in real time with cameras located at points Strategic access in restricted areas. Based on this experience, the solution to the facial identification problem, based on the facial recognition problem patterns. It is worth mentioning that this research, in addition to solving the problem of Facial identification also considers the creation of software in the form of libraries or modules that can be used for future applications in commonly used language like C++ in any of its presentations and with this it is hoped to create a base for the development of commercial software And finally we also intend to analyze the general problem of...
6
tesis de grado
En mina Toquepala se ha identificado deficiencias en la administración de base de datos de EXSA S.A., por lo cual se creó una base de datos en Microsoft Access, el Sistema Integrado de Voladura (SIV). El diseño de la investigación es de tipo cuantitativa por los cálculos que se hace y el nivel se considera del tipo experimental por tratarse de data real. Los datos considerados para el Sistema Integrado de Voladura son de todos los proyectos de producción (excluye pre corte) desde el 01-11-17 a la actualidad. Como marco teórico se trata el funcionamiento de base de datos como la creación de tablas, consultas relacionadas, formularios para el ingreso de datos y los informes para la emisión de reportes. Para poder crear las tablas del SIV inicialmente se empezó estableciendo un orden a la información manejada por EXSA S.A., así nuestro sistema se basa en tres principales pilares...
7
artículo
El acceso a tratamiento óptimo está determinado por varios factores como disponibilidad, precios/financiamiento y aceptabilidad. América latina es una de las regiones con mayores disparidades en el mundo, particularmente en el sector del cuidado de la salud; el acceso está afectado por diversos factores, incluyendo factores sociodemográficos como pobreza, vivir en zonas rurales y cobertura de la salud. Respecto a la artritis reumatoide, un inadecuado acceso a especialistas conduce a que el diagnóstico y tratamiento se retrace disminuyendo la probabilidad de remisión y control. Desafortunadamente, en casi todos los países de América Latina hay ciudades de más de 100,000 habitantes sin reumatólogos, además, el sistema de atención primaria de referencia está presente aproximadamente en la mitad de los países. En el sistema de salud pública la cobertura de fármacos antirreum...
8
tesis de grado
Esta investigación tuvo como objetivo Determinar la relación que existe entre la implementación de un sistema para el control de acceso y la seguridad de la Escuela Militar de Chorrillos "Coronel Francisco Bolognesi" 2022. Como metodología fue enfoque cuantitativo, tipo de investigación fue básico, método hipótesis-deductivo, alcance descriptivo-correlacional, diseño no experimental de carácter transversal, la población estuvo conformada por 1272 cadetes y la muestra fue no probabilístico de tipo accidental resultando 34 cadetes; tienes como técnica e instrumento de recolección de datos fue la encuesta y el cuestionario de escala de Likert. Los resultados fue la mayoría de los cadetes siendo el 74.66% (221/296) tienen un nivel alto sobre la implementación de un sistema para el control de acceso. Así mismo, se puede observar que el 51.01% (151/296) de los cadetes tienen u...
9
tesis de grado
Mejorar el proceso controlado para la gestión y uso de accesos privilegiados en los servidores de entorno productivo implementados dentro de la infraestructura de la entidad bancaria y adicionar controles que brinden una capa adicional de seguridad. Se realizó la implementación de una tecnología integral de seguridad como es el caso del sistema Privileged Access Management (PAM), se inició con una reingeniería de los procesos actuales que abarcaba la gestión de accesos en general. Así también, se obtuvo la información de los diferentes tipos de sistemas operativos que tenían instalados los servidores para poder adaptarlos hacia el uso de esta nueva tecnología. Como resultado de la implementación se pudo manejar las cuentas privilegiadas de una manera centralizada y automatizada, así como poder supervisar, limitar y controlar el acceso y uso de estas cuentas de una mejor man...
10
artículo
The main objective of this paper is the development of a model that allows the authentication of a user for access control using the Two-Factor Authentication model. For the development of such a model we present a secure two-factor authentication (TFA) scheme based on the user's possession of a password and a cryptographically capable device. The security of this model is end-to-end in the sense that whoever wants to access in a fraudulent way is going to find it difficult and thus guarantee the security of the user of the system, the algorithm used was Cryptographic Networks, which is a double authentication model. Also the programming language cakephp 4.0 was used, in addition to using the visual studio code program to perform the algorithms required for the double authentication model to work.
11
artículo
This article analyzes the National Penitentiary Policy Master Plan and the Strategic Plan of the Federal Penitentiary Service 2016/2020, and their merits and shortcomings in the Argentine prison context. Based on these instruments, and following the Brasilia Rules, it is proposed policies to prevent crime through four types of reforms: a) normative, regarding the progressiveness of the sentence, the regulation of the work activity of persons deprived of liberty in the penitentiary situation, the education and training of personnel, as well as the procedure regarding their entry, promotion, and discharge, in addition to the assimilation of the gender perspective in institutional policy; b) infrastructural, that is, the construction of prisons and their organization to reduce overcrowding; c) resocialization of inmates in penitentiary establishments; and finally, d) integration for the str...
12
artículo
Objectives: To study the knowledge abilities and access characteristics to the Internet in undergraduate medical students from a Peruvian University. Methods: Development and application of a questionnaire to medical students, report of the results and nested case-control analysis of data to identify variables related to the ability to surf the Internet. Results: The students enter the Internet mainly from home. The most visited websites were those from web mail services and entertainment sites. The quality of the medical information available on the net was overrated, even though there was a poor knowledge of the online tools related to health, as well as a deficient ability with basic tools of navigation and e-mail. Being skillful on the Internet was significantly related to a long experience on the net, the presence of access to the Internet from home and the frequent use of e-mail an...
13
tesis de grado
El objetivo principal de este trabajo es determinar cómo el diseño de ZTNA mejora la seguridad informática en una empresa tecnológica, frente a las actuales amenazas cibernéticas en sus servicios y redes. La investigación sigue un enfoque cuantitativo de tipo aplicativo, utilizando encuestas aplicadas a una muestra de 20 empleados, que coincide con la población total. Se empleó un muestreo no probabilístico por conveniencia para analizar la efectividad de ZTNA en la confidencialidad, integridad y disponibilidad de la infraestructura tecnológica actual, en comparación con el fortalecimiento de la seguridad informática. Como resultado, tras la propuesta de un diseño de arquitectura Zero Trust Network Access (ZTNA), se obtuvo una correlación del 85.4%, evidenciando la relación entre ZTNA y la seguridad informática. La solución demostró ser efectiva, alcanzando un 95% en mi...
14
artículo
This article addresses the protection of medical data in health information systems, focusing on the growing adoption of electronic health records (EHRs). It recognises the security challenges inherent in centralised systems and advocates for the secure exchange of medical data. The methodology follows the principles of the PRISMA statement, using search engines such as SCOPUS, PUBMED and IEEE XPLORE to identify 20 relevant documents. These papers focus on key attributes of blockchain technology: access control, data privacy, data security and encryption. The results indicate that access control is the most recurring attribute, followed by data privacy, data security and encryption. The discussion highlights the practical applicability of these attributes, improving patient confidence and medical workflow efficiency. The conclusions affirm the relevance of the blockchain in medical data ...
15
artículo
Increasing digitization and automation demand advanced and secure methods for access control. This study synthesized artificial intelligence (AI) tools applied in this field, through a literature review in databases such as Scopus, SciELO and IEEE Xplore, using PRISMA and VOSviewer. The bibliometric analysis identified China, India, the United States and South Korea as leaders in research, highlighting terms such as machine learning, deep learning, cryptography and biometrics, along with emerging technologies such as blockchain and IoT. Machine learning and deep learning stood out as predominant techniques, while blockchain brought transparency in the management of sensitive data. However, challenges such as high costs, reliance on big data and privacy concerns limit its implementation. It is recommended to explore hybrid methods, optimize AI models and reduce data dependency to improve ...
16
artículo
This paper analyzes changes in community governance in the contextof negotiations with a mining company. We focus on three issues:the role played by the community government on the regulation ofcommunity resources and territory, the diverse and complex intereststhat emerge in the presence of mining activity; and, the communityas a political institution confronting external pressures over its land.We develop a study case focusing on the negotiation process betweenthe Michiquillay peasant community and Anglo American MiningCompany in Cajamarca, Peru. This information was obtained doingfieldwork in the community in 2009. In our analysis we observe thatchanges on community resources regulation, its uses and valorization,as well as changes on the balance of power between economicand political actors, have created a greater level of complexity in thecommunity, creating new levels of community ...
17
artículo
Nowadays victimizations against the LGTBIQ+ community in Europe and more specifically in Spain have increased their numbers worryingly. Public Authorities play a key role in the prevention and struggling areas. In the same sense, they should guarantee this vulnerable group to be able to exercise their right of access to justice without barriers. Nevertheless, the statistics point out an important dark figure, being the distrust in criminal control institutions the main reason for the LGTBIQ+ community not reporting the facts related to their orientation, and/or sexual­gender identity. This paper aims to offer a general overview of this issue in Spain and a review of the main public politics and some examples of good practices in the third sector entities that protect the right of access to justice for this community, strengthening and reforming institutions so they become friendly, conf...
18
artículo
Maintenance proceedings and their versatilities (exoneration, reduction, proration and variation) are one of the litigious problems of high demand in the judicial districts of our country, so much so that there are currently specialized courts of the peace that resolve litigation only in this area. In addition, the judicial processes referred to constitute one of the most sensitive matters within family law, as they are used to provide effective jurisdictional protection to children, adolescents and other vulnerable populations (the disabled, the elderly and others). In this context, we wanted to study article 565-A of the Code of Civil Procedure, which to date has been generating contradictory jurisdictional pronouncements in its application; thus, for example, it is observed that some jurisdictional bodies apply literally the requirement demanded by the article in question and declare ...
19
artículo
Introduction: Prenatal care is the main tool for prevention of complications of pregnancy, childbirth and the puerperium. Nevertheless, rates of deaths and diseases related to gestation remain unacceptably high, especially in developing countries. Objective: To describe the conditions of access to prenatal care in a primary care center in the city of Pasto, Nariño, Colombia. Methods: We conducted a descriptive, cross-sectional study. We interviewed twenty-four women with gestational age between 36 and 40 weeks, attending prenatal care at the Pandiaco Health Center, level I of care in Pasto City, Colombia, during the year 2015. The data obtained were analyzed with the statistical software SPSS 16.0 for Windows. Results: Approximately 50% of pregnant women had less than four prenatal care visits during pregnancy. Labor, home, children care, and economic burden were referred as the main ba...
20
artículo
This article argues that there is a transformation in the relationship between land, peasant communities and its members or comuneros. In the case of the communities of the Peruvian northern coast, this transformation links with a double dynamic: (i) the increasing external pressure on the resource from the private-national and transnational capitals, and (ii) the emergence of new means and motivations of access to land among the communal members. Under these circumstances, the communities seek to develop mechanisms of containment that, nevertheless, escape to their own logics of controland imply the risk of a progressive division of shares of the communal territory.In order to demonstrate this, the article examines new uses (and potential uses) of the land that generates more expectations among the comuneros, and new strategies of access to the resource that different actors compete for...