959 resultados para Esquema decisional
Resumo:
Esquema sobre la composición del sistema fiscal español desde el punto de vista de los impuestos.
Resumo:
Esquema general aplicable en el ordenamiento jurídico español para la liquidación de impuestos.
Resumo:
El papel del interventor tiene especial importancia por su contribución para que los contratos se conciban, construyan, operen, administren y conserven con calidad, de una manera segura y económica, adicionalmente el interventor es un colaborador de las entidades públicas, velando por los intereses de la comunidad y de los proyectos en los cuales participa. La idea central de la presente cartilla es servir como guía a los residentes de interventoría, en los diferentes proyectos de construcción de obras civiles. Metodológicamente, la cartilla está orientada a describir las obligaciones que debe ejercer la interventoría, en especial los residentes, y la forma cómo se deben controlar y verificar las actividades realizadas por los contratistas, siguiendo los parámetros generales de las normas de calidad ISO 9000.
Resumo:
Este trabalho visa a análise coreográfica das Sevilhanas através da observação sistemática do comportamento motor, pretendendo definir a Estrutura de Composição Coreográfica desta dança, através da identificação de invariantes. Objetivou-se apresentar a coreografia de Sevilhanas de forma esquematizada, numa tabela que indique a estrutura musical, coreográfica e espacial. Para cumprir o objetivo principal, procedeu-se à identificação e descrição dos passos que constituem a coreografia; à apresentação de uma proposta de terminologia para os passos; e à identificação das constantes coreográficas que permitem reconhecer a Estrutura de Composição Coreográfica. Os dados foram obtidos a partir da observação sistemática de 15 coreografias de Sevilhanas Normais retiradas de 15 vídeos didáticos realizados com o intuito de ensinar a dançar Sevilhanas. No decorrer do estudo, foram também observadas 3 coreografias de Sevilhanas Boleras. Os resultados permitem concluir que as Sevilhanas Normais têm uma Estrutura de Composição Coreográfica dividida em duas componentes, a Estrutura Coreográfica Base e a Estrutura Coreográfica Específica, pelo que se avançou com a definição do Esquema Coreográfico das Sevilhanas Normais. Concluiu-se também que a coreografia de Sevilhanas Normais é diferente da coreografia de Sevilhanas Boleras, apesar de a Estrutura Coreográfica Base ser a mesma.
Resumo:
107 p.
Resumo:
Bogotá (Colombia): Universidad de La Salle. Facultad de Ciencias Agropecuarias. Maestría en Ciencias Veterinarias
Resumo:
Bogotá (Colombia): Universidad de La Salle. Facultad de Ingeniería. Programa de Ingeniería Civil
Resumo:
Servicios registrales
Resumo:
Introducción Hoy en día en algunos países latinoamericanos, “liberal” y “liberalismo” ya suenan como malas palabras: lo son en la Argentina en especial. Mas el historiador, por razón de su oficio, no puede desdeñar la importancia que tuviera el liberalismo, sobre todo en el siglo pasado, en el desarrollo de los mismos países. Tiene además la posibilidad de estudiarlo desde muchos enfoques diferentes: como fenómeno intelectual o sea como un capitulo dentro de la historia de las ideas, como fenómeno social y económico o sea como expresión de los valores e intereses de grupos determinados de la población, como fenómeno bélico, es decir como una de las partes contendientes en las luchas civiles de la época, y de otras maneras, mas que fácilmente puede imaginarse.
Resumo:
The aims of this chapter are twofold. First, we show how experiments related to nonlinear dynamical systems theory can bring about insights on the interconnectedness of different information sources for action. These include the amount of information as emphasised in conventional models of cognition and action in sport and the nature of perceptual information typically emphasised in the ecological approach. The second aim was to show how, through examining the interconnectedness of these information sources, one can study the emergence of novel tactical solutions in sport; and design experiments where tactical/decisional creativity can be observed. Within this approach it is proposed that perceptual and affective information can be manipulated during practice so that the athlete's cognitive and action systems can be transposed to a meta-stable dynamical performance region where the creation of novel action information may reside.
Resumo:
Just Fast Keying (JFK) is a simple, efficient and secure key exchange protocol proposed by Aiello et al. (ACM TISSEC, 2004). JFK is well known for its novel design features, notably its resistance to denial-of-service (DoS) attacks. Using Meadows’ cost-based framework, we identify a new DoS vulnerability in JFK. The JFK protocol is claimed secure in the Canetti-Krawczyk model under the Decisional Diffie-Hellman (DDH) assumption. We show that security of the JFK protocol, when reusing ephemeral Diffie-Hellman keys, appears to require the Gap Diffie-Hellman (GDH) assumption in the random oracle model. We propose a new variant of JFK that avoids the identified DoS vulnerability and provides perfect forward secrecy even under the DDH assumption, achieving the full security promised by the JFK protocol.
Resumo:
Aim Collisions between trains and pedestrians are the most likely to result in severe injuries and fatalities when compared to other types of rail crossing accidents. Currently, there is a growing emphasis towards developing effective interventions designed to reduce the prevalence of train–pedestrian collisions. This paper reviews what is currently known regarding the personal and environmental factors that contribute to train–pedestrian collisions, particularly among high-risk groups. Method Studies that reported on the prevalence and characteristics of pedestrian accidents at railway crossings up until June 2012 were searched in electronic databases. Results Males, school children and older pedestrians (and those with disabilities) are disproportionately represented in fatality databases. However, a main theme to emerge is that little is known about the origins of train–pedestrian collisions (especially compared to train–vehicle collisions). In particular, whether collisions result from engaging in deliberate violations versus making decisional errors. This subsequently limits the corresponding development of effective and targeted interventions for high-risk groups as well as crossing locations. Finally, it remains unclear what combination of surveillance and deterrence-based and education-focused campaigns are required to produce lasting reductions in train–pedestrian fatality rates. This paper provides direction for future research into the personal and environmental origins of collisions as well as the development of interventions that aim to attract pedestrians’ attention and ensure crossing rules are respected.
Resumo:
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellman Inversion assumption and provides another approach to building IBE systems. Our first system, BB1, is very versatile and well suited for practical applications: the basic hierarchical construction can be efficiently secured against chosen-ciphertext attacks, and further extended to support efficient non-interactive threshold decryption, among others, all without using random oracles. Both systems, BB1 and BB2, can be modified generically to provide “full” IBE security (i.e., against adaptive-identity attacks), either using random oracles, or in the standard model at the expense of a non-polynomial but easy-to-compensate security reduction.
Resumo:
To this day, realizations in the standard-model of (lossy) trapdoor functions from discrete-log-type assumptions require large public key sizes, e.g., about Θ(λ 2) group elements for a reduction from the decisional Diffie-Hellman assumption (where λ is a security parameter). We propose two realizations of lossy trapdoor functions that achieve public key size of only Θ(λ) group elements in bilinear groups, with a reduction from the decisional Bilinear Diffie-Hellman assumption. Our first construction achieves this result at the expense of a long common reference string of Θ(λ 2) elements, albeit reusable in multiple LTDF instantiations. Our second scheme also achieves public keys of size Θ(λ), entirely in the standard model and in particular without any reference string, at the cost of a slightly more involved construction. The main technical novelty, developed for the second scheme, is a compact encoding technique for generating compressed representations of certain sequences of group elements for the public parameters.