718 research outputs found

    Kedudukan Korban Kejahatan dalam Sistem Peradilan Pidana

    Get PDF
    Dilakukannya penelitian ini dengan tujuan untuk mengetahui apa yang menjadi hak korban kejahatan dalam penyelesaian suatu tindak pidana dan bagaimana kedudukan korban kejahatan dalam sistem peradilan pidana. Metode penelitian yang digunakan dalam penelitian ini adalah menggunakan metode penelitian yuridis normatif sehingga dapat disimpulkan: 1. Bahwa hak-hak korban kejahatan dalam penyelesaian suatu tindak pidana sudah diatur di dalam UU No. 31 Tahun 2014 tentang Perobahan Atas UU No, 13 Tahun 2006 tentang Perlindungan Saksi dan Korban pada Bab II tentang Perlindungan Hak Saksi dan Korban dalam Pasal 5 sampai dengan Pasal 10 dan di dalam pasal-pasal Kitab Undang-Undang Hukum Acara Pidana (KUHAP) Pasal 95, Pasal 97, Pasal 108, Pasal 109, Pasal 113, Pasal 117 dan Pasal 140 ayat (2). 2. Bahwa kedudukan korban kejahatan dalam Sistem Peradilan Pidana saat ini belum ditempatkan secara adil bahkan cenderung terlupakan, apalagi dalam KUHAP dan KUHP, namun dalam beberapa Perundang-undangan walaupun tidak memberikan porsi yang besar tapi korban sudah lebih diperhatikan seperti dalam: UU No. 31 Tahun 2014 tentang Perobahan Atas UU No. 13 Tahun 2006 tentang Perlindungan Saksi dan Korban, UU No. 23 Tahun 2004 tentang Penghapusan KDRT, UU No. 15 Tahun 2003 tentang Tindak Pidana Terorisme, UU No. 5 Tahun 1999 tentang Larangan Monopoli dan Persaingan Usaha Tidak Sehat dan dalam declaration of basic principles of justice for victims crme and abuse of power

    Minimal Session Types for the π-calculus

    Get PDF
    Session types enable the static verification of message-passing programs. A session type specifies a channel’s protocol as sequences of messages. Prior work established a minimality result: every process typable with standard session types can be compiled down to a process typable using minimal session types: session types without the sequencing construct. This result justifies session types in terms of themselves; it holds for a higher-order session π-calculus, where values are abstractions (functions from names to processes).This paper establishes a new minimality result but now for the session π-calculus, the language in which values are names and for which session types have been more widely studied. Remarkably, this new minimality result can be obtained by composing known results. We develop optimizations of our new minimality result, and establish its static and dynamic correctness.<br/

    Bit-Vector Typestate Analysis

    Get PDF
    Static analyses based on typestates are important in certifying correctness of code contracts. Such analyses rely on Deterministic Finite Automata (DFAs) to specify properties of an object. We target the analysis of contracts in low-latency environments, where many useful contracts are impractical to codify as DFAs and/or the size of their associated DFAs leads to sub-par performance. To address this bottleneck, we present a lightweight compositional typestate analyzer, based on an expressive specification language that can succinctly specify code contracts. By implementing it in the static analyzer Infer, we demonstrate considerable performance and usability benefits when compared to existing techniques. A central insight is to rely on a sub-class of DFAs whose analysis uses efficient bit-vector operations

    Administrative Data Systems Design Computerized Residentkayumanis IV Baru Rt004/04 Using Microsoft Access 2000

    Full text link
    With existence of computerized system of service is expected to be faster in dealing with administrative access to data resident RT 004/04 KayumanisIV Baruresidents as well as search data, blueprints of the house, compared with the manual method.In order for the data administration of new citizens IV RT 004/04 Kayumanisand running well, then the required information and reports on concrete, as well as monthly reports, a list of residents.This can be done by the computerized data of new residents KayumanisIV RT 004/04 which has been previously accessed, can be implemented quickly with rock media via computer software Microsoft Access

    Variance-based sensitivity of Bayesian inverse problems to the prior distribution

    Full text link
    The formulation of Bayesian inverse problems involves choosing prior distributions; choices that seem equally reasonable may lead to significantly different conclusions. We develop a computational approach to better understand the impact of the hyperparameters defining the prior on the posterior statistics of the quantities of interest. Our approach relies on global sensitivity analysis (GSA) of Bayesian inverse problems with respect to the hyperparameters defining the prior. This, however, is a challenging problem--a naive double loop sampling approach would require running a prohibitive number of Markov chain Monte Carlo (MCMC) sampling procedures. The present work takes a foundational step in making such a sensitivity analysis practical through (i) a judicious combination of efficient surrogate models and (ii) a tailored importance sampling method. In particular, we can perform accurate GSA of posterior prediction statistics with respect to prior hyperparameters without having to repeat MCMC runs. We demonstrate the effectiveness of the approach on a simple Bayesian linear inverse problem and a nonlinear inverse problem governed by an epidemiological model
    • …
    corecore