Tópicos Sugeridos dentro de su búsqueda.
Tópicos Sugeridos dentro de su búsqueda.
Buscar alternativas:
identificacion processes » identification processes (Expander búsqueda), identification process (Expander búsqueda), identificacion forense (Expander búsqueda)
para identificacion » la identificacion (Expander búsqueda), de identificacion (Expander búsqueda), e identificacion (Expander búsqueda)
identificacion processes » identification processes (Expander búsqueda), identification process (Expander búsqueda), identificacion forense (Expander búsqueda)
para identificacion » la identificacion (Expander búsqueda), de identificacion (Expander búsqueda), e identificacion (Expander búsqueda)
1
artículo
Publicado 2004
Enlace
Enlace
The paper addresses the processes of identification between the actor and the characters he creates. Starting from a chronological review of the concept of identification in the psychoanalytic literature, and intending to differentiate the concept from others than are related, we move towards a review of the scarce existing works on identification applied directly to the acting phenomenon. Since the objective of this research is to observe how the processes of identification effectively take place in the practice of the actor while creating his characters, we interview five respected actors to know their opinions and experience on the subject. The results are based on the experiences shared by the participants.
2
artículo
Publicado 2004
Enlace
Enlace
The paper addresses the processes of identification between the actor and the characters he creates. Starting from a chronological review of the concept of identification in the psychoanalytic literature, and intending to differentiate the concept from others than are related, we move towards a review of the scarce existing works on identification applied directly to the acting phenomenon. Since the objective of this research is to observe how the processes of identification effectively take place in the practice of the actor while creating his characters, we interview five respected actors to know their opinions and experience on the subject. The results are based on the experiences shared by the participants.
3
artículo
Publicado 2007
Enlace
Enlace
The forensic anthropology in Perú has a recent development, because of the investigations assumed around the Armed Conflict Internal 1980-2000. One of the main issues in such tasks is the search of the missing persons and the identification of the victims exhumed, many of them remaining unidentified. The document pretends to illustrate about each one of the methods used for identification and its application, as well as its validity and its acceptance inside the legal processes, emphasising on the need of use reliable systems, to assurance a minimum of confidence to all those who are involved. The text tries to be exhaustive regarding to the systems of the facial reconstruction and the skull/photo superimposition, due to the over estimation of its effectiveness as reliable identification methods, during a considerable time. In that sense, the article tries to explain how and why it is n...
4
artículo
Publicado 2024
Enlace
Enlace
In current supply chains, the use of AIDC technologies allows the information that flows to be standardized and reliable, as well as obtaining a series of advantages related to saving time and costs. In Cuba, the use of these technologies is not regulated by national laws and most companies do not use them, considering ignorance of their effectiveness as the cause. This article analyzes AIDC technologies: specifically, bar code systems and radio frequency systems, their operation and benefits of their use in supply chains. Based on the existing need, a tool was designed based on a procedure that establishes a guide for the selection of technologies to be implemented in logistics processes. The tool designed is used for Case Studies to know its application and mode of use.
5
artículo
Publicado 2024
Enlace
Enlace
In current supply chains, the use of AIDC technologies allows the information that flows to be standardized and reliable, as well as obtaining a series of advantages related to saving time and costs. In Cuba, the use of these technologies is not regulated by national laws and most companies do not use them, considering ignorance of their effectiveness as the cause. This article analyzes AIDC technologies: specifically, bar code systems and radio frequency systems, their operation and benefits of their use in supply chains. Based on the existing need, a tool was designed based on a procedure that establishes a guide for the selection of technologies to be implemented in logistics processes. The tool designed is used for Case Studies to know its application and mode of use.
6
tesis de grado
Publicado 2025
Enlace
Enlace
La presente investigación tiene como objetivo identificar y priorizar los procesos organizacionales críticos mediante la metodología de Business Process Management (BPM), en la empresa Distribuidora Almacenes Sevillano S.R.L., ubicada en Huánuco, Perú. Enfrentando limitaciones en su gestión operativa, como informalidad, demoras en la atención de pedidos y baja sistematización, se desarrollaron las dos primeras fases del ciclo BPM: identificación y descubrimiento de procesos. El estudio fue de tipo tecnológico, con diseño no experimental y nivel descriptivo, utilizando un enfoque mixto. Como resultado, se priorizaron tres procesos clave: “Recepción y verificación de mercancías”, “Gestión de ventas y despachos” y “Gestión de TI”. Estos procesos fueron caracterizados y evaluados con indicadores de eficacia, sentando las bases para una futura implementación de BP...
7
artículo
Publicado 2018
Enlace
Enlace
ABSTRACT Health systems are designed to improve the health of the population and therefore require rapid identification of the most relevant events that affect it. Given this, they have seen the obligation and need for establishing surveillance systems that must be optimized permanently; to do so, they must identify the processes that must be monitored and evaluated. Key words: Health systems; Epidemiological surveillance; Identification of processes. (source: MeSH NLM) DOI: 10.25176/RFMH.v18.n3.1593
8
tesis de grado
Publicado 2021
Enlace
Enlace
El informe de suficiencia profesional tiene como objetivo el desarrollo de un sistema electrónico de identificación de herramientas en tiempo real para la empresa Process Automation & Drive SAC ubicada en la provincia constitucional del Callao, con la finalidad de mejorar el control interno de sus activos fijos. Además, se desea alcanzar la información de las herramientas en tiempo real dentro de la empresa para una mejor toma de decisiones. El proyecto emplea un enfoque cuantitativo, debido a que se consigue reducir el porcentaje de pérdidas. Un enfoque correlacional ya que el proyecto se realiza por medio de causas y efectos. Y se utiliza una investigación de carácter exploratorio ya que se recogen resultados en base a una encuesta realizada a los colaboradores de la empresa donde se desarrolló el proyecto, para medir aspectos cuantitativos. Al concluir el desarrollo del sistem...
9
tesis de grado
Publicado 2025
Enlace
Enlace
La tenencia de mascotas consideradas peligrosas representa una serie de desafíos tanto para los propietarios como para la sociedad. Estas mascotas debido a su tamaño, fuerza y capacidad de causar daño pueden constituir un riesgo para la salud y seguridad de las personas y otros animales. A menudo, se les asocia con estereotipos negativos, lo que genera discriminación hacia sus propietarios. En el contexto peruano, la Ley que regula el régimen jurídico de canes Nº 27596, promulgada el 16 de febrero de 2022, en el Artículo 5, señala que las municipalidades tienen la autoridad para realizar acciones de control de las mascotas consideradas de riesgo. Una de las principales obligaciones es la identificación y registro de los canes considerados peligrosos, bajo la responsabilidad de sus propietarios o custodios. Este registro se debe realizarse ante la autoridad municipal corre...
10
tesis de grado
Publicado 2019
Enlace
Enlace
Actualmente, las complejidades de la cadena de suministro imponen enormes desafíos en las organizaciones. Esto ha intensificado la necesidad y búsqueda constante de una gestión eficiente y resiliente. No obstante, los riesgos que la amenazan surgen de forma agresiva en cualquier localización de la cadena logística y su impacto podría no ser siempre superado favorablemente por las empresas (Mulyati, 2015). Asimismo, los gerentes del área de gestión de riesgos de la cadena de suministros deben gestionar muchos riesgos en sus entornos cada vez más competitivos, esto significaba amortiguar las incertidumbres y las probables disrupciones. La gestión de riesgos puede ser un enfoque eficaz para hacer frente a estas incertidumbres (David Simchi-Levi, 2015). El propósito de este documento es explorar el fenómeno de la gestión de riesgos, así como las posibles estrategias aplicadas a...
11
artículo
Today, the complexities of the supply chain pose enormous challenges for organizations. This has intensified the need and constant search for resilient management. The risks that threaten it arise unexpectedly and aggressively at any point in the logistics chain and their impact may not always be favorably outweighed by companies. Likewise, those responsible must manage various contingency factors in increasingly competitive environments, this has meant until today the establishment of methods of how to shield the probable disruptions in various scenarios. However, comprehensive risk management can be an effective approach to address these uncertainties. In this sense, the information developed aims to be useful to various organizations and especially their managers in charge of management, so that they make decisions based on shared and reflective experience, aimed at business com...
12
artículo
Today, the complexities of the supply chain pose enormous challenges for organizations. This has intensified the need and constant search for resilient management. The risks that threaten it arise unexpectedly and aggressively at any point in the logistics chain and their impact may not always be favorably outweighed by companies. Likewise, those responsible must manage various contingency factors in increasingly competitive environments, this has meant until today the establishment of methods of how to shield the probable disruptions in various scenarios. However, comprehensive risk management can be an effective approach to address these uncertainties. In this sense, the information developed aims to be useful to various organizations and especially their managers in charge of management, so that they make decisions based on shared and reflective experience, aimed at business com...
13
artículo
Publicado 2017
Enlace
Enlace
El primer sensor con observación multibanda en la región infrarroja térmica (8-12 micrómetros) con 90 metros de resolución espacial y 5 bandas espectrales especialmente diseñadas para discriminar rocas de la corteza terrestre. Se aplicaron diferentes procedimientos para discriminar minerales de alteración y grupos de roca utilizando no sólo la banda infrarroja térmica sino también las bandas visible e infrarroja cercana.El área de estudio se encuentra ubicada en el Departamento de Cuzco en la porción sur del Cinturón Volcánico Terciario del Perú y ubicada a 170 kilómetros al noroeste de Arequipa. La zona se encuentra dentro del altiplano peruano a una altitud de 4.470 a 5.370 metros. La disponibilidad de datos multiespectrales a partir del satélite ASTER (radar espacial de reflexión radiométrica) ha proporcionado y aumentado el potencial para la cartografía de los sis...
14
artículo
Publicado 2022
Enlace
Enlace
This article presents a proposal for the interpretation and organization of the phonetic characteristics of indubitable and dubitative samples using SplitsTree4 software, with the purpose of clarifying an alleged crime of bribery in the exercise of police functions to the detriment of the State. The dubitted samples were provided by the Public Prosecutor's Office and the indubitable samples were obtained by means of voice sampling; likewise, data anonymity was chosen. First, the relevant phonetic features of the samples were categorized; then, they were assigned a binary value of existence and non-existence; then, the binary information was processed by SplitsTree4 software to regroup the features according to the universe of speakers and show the compatibility between the indicated samples. Finally, the results indicate that the SplitsTree4 software complies with the ordering of phoneti...
15
tesis de grado
Publicado 2025
Enlace
Enlace
Universidad Nacional Agraria La Molina. Facultad de Ciencias. Departamento Académico de Ingeniería Ambiental, Física y Meteorología
16
artículo
Publicado 2006
Enlace
Enlace
The present investigation work tries on the control of an analogical system of second order(process), the same one that has been implemented with circuit's operational amplifiers and electronic devices. The system has been built and designed taking like I model to the prototype of the function of transfer of a system of second order. To the process there is been incorporate a stage of white noise with the purpose of effect to experiencing the interference and technical implementing linear control, we used the FST (Finite Settling Time) control. The pattern of the process was obtained in experimental form, for it you apply the identification of parameters; the method using is the parameters of the adjustment of the curve for direct interpolation. The model of accuracy has been fundamental for the technique applied of controlling FST The action of controlling is guided to control the posit...
17
tesis de grado
Publicado 2019
Enlace
Enlace
A medida que pasa el tiempo las TIC han ido evolucionando en cuanto a su implementación en la seguridad por medios biométricos y gracias a ello se han llegado a automatizar o mejorar los procesos que impliquen su utilización. En este caso, el poder automatizar el control de accesos e identificación de usuarios como una mejora a la seguridad de muchas instituciones o empresas. La Asociación Guadalupana actualmente no cuenta con un control de accesos para identificar a todos los usuarios que ingresen a sus instalaciones generando diversos problemas entre ellos robos, pérdidas de información y suplantación de identidad. El presente trabajo de investigación aborda el problema y mediante la aplicación de herramientas tecnológicas para llegar a resolverlo. Para lograr obtener este resultado se utilizará un lector de huellas dactilares junto con la aplicación de una plataforma web....
18
artículo
Publicado 2014
Enlace
Enlace
This document is based on a recent study on the relation between ethnicity, culture, «race» and ancestry among Afro-Peruvians. Findings show that while construction of the «black» or Afrodescendant identity in Peru holds the cultural dimension as a central component, it mainly - and fundamentally- revolves around the idea of the existence of a «black race». According to these «racialized» identity criteria, the boundaries of an Afro-descendant «we» cover only those with certain phenotypic markers that Afro-Peruvians themselves consider as defining membership in the «black race». The phenotypical «evidence» of «blackness» thus appears as a kind of «necessary condition» for the «black»/Afro- Peruvian identity. This form of self-identification poses a threat to the political discourses and projects of Afro-Peruvian organizations seeking to build a «de-racialized...
19
artículo
ABSTRACT Health systems are designed to improve the health of the population and therefore require rapid identification of the most relevant events that affect it. Given this, they have seen the obligation and need for establishing surveillance systems that must be optimized permanently; to do so, they must identify the processes that must be monitored and evaluated. Key words: Health systems; Epidemiological surveillance; Identification of processes. (source: MeSH NLM) DOI: 10.25176/RFMH.v18.n3.1593
20
artículo
Publicado 2025
Enlace
Enlace
The report addresses the management of parallel processes and synchronization in concurrent systems, highlighting common problems in accessing shared resources that affect efficiency and stability. It also highlights the need to optimize the management of large volumes of data and improve academic cooperation to develop advanced solutions.The objective of the study is to identify and analyze synchronization strategies that optimize parallel processes, evaluating their effectiveness in different scenarios and offering recommendations based on recent literature. A systematic review was conducted using the PRISMA methodology, selecting relevant articles published in the last five years and formulating key questions to guide the analysis. The results highlight that non-blocking strategies are more effective for managing shared resources, and techniques such as the use of mutex and actor mode...