9,537 research outputs found

    Combined measurements of the properties of the Higgs boson using the ATLAS detector

    Full text link
    The combined measurement of the mass, couplings and spin-CP properties of the recently discovered Higgs boson obtained with the ATLAS detector using up to 2525 fb−1^{-1} of 77 TeV and 88 TeV pppp collision data is reviewed.Comment: 6 pages, 4 figure

    Tinjauan Yuridis Terhadap Tindak Pidana Pencucian Uang Di Bidang Pasar Modal

    Get PDF
    Tujuan dilakukannya penelitian ini adalah untuk mengetahui bagaimana pengaturan tentang Tindak Pidana Pencucian Uang di Indonesia dan bagaimana pencegahan Tindak Pidana Pencucian Uang dalam Pasar Modal. Dengan menggunakan metode penelitian yuridis normatif, disimpulkan: 1. Tindak pidana pencucian uang di Indonesia diatur dalam Undang-Undang Nomor 8 Tahun 2010 tentang Pencegahan dan Pemberantasan Tindak Pidana Pencucian Uang. Bahwa di Indonesia para pelaku pencucian uang diberikan sanksi sesuai dengan hukum yang berlaku tersebut. 2. Otoritas Jasa Keuangan sebagai lembaga pengawas dan pengatur di bidang Pasar Modal menerapkan program Anti Pencucian Uang dan Pencegahan Pendanaan Terorisme sebagai bentuk atau upaya pencegahan tindak pidana pencucian uang di pasar modal. Progam Anti Pencucian Uang dan Pencegahan Pendanaan Terorisme ini diatur dalam POJK Nomor 12/POJK.01/2017 tentang Penerapan Program Anti Pencucian Uang dan Pencegahan Pendanaan Terorisme Di Sektor Jasa Keuangan. Dalam pelaksanaannya, Progam Anti Pencucian Uang dan Pencegahan Pendanaan Terorisme dilakukan oleh Penyedia Jasa Keuangan di sektor pasar modal. Peyedia Jasa Keuangan diwajibkan menerapkan baik Customer Due Diligence berupa identifikasi, verikasi dan pemantauan maupun Ehanced Due Diligence berupa tindakan Customer Due Diligence lebih mendalam terhadap calon nasabah, nasabah dan beneficial owner

    The Latin Leaflet, Number 29

    Get PDF
    Polymer electrolytes represent the ultimate in terms of desirable properties of energy storage/conversion devices, as they can offer an all-solid-state construction, a wide variety of shapes and sizes, light-weight, low costs, high energy density and safety. Here we present our recent results concerning a novel strategy for preparing efficient polymer membranes which are successfully demonstrated as suitable electrolytes for several energy conversion and storage devices (i.e., Li- and Na-based batteries and DSSCs). Highly ionic conducting polymer electrolytes containing PEO-based functionalities and different components (e.g., Li/Na salts, RTILs, natural biosourced and cellulosic fillers) are successfully prepared via a rapid process and, directly or subsequently, cross-linked via UV irradiation (patent pending, PCT/IT2014/000008). All the prepared materials are thoroughly characterised in terms of their physical, chemical and morphological properties and tested for their electrochemical performances and durability. The UV-curing process on such materials led to the production of elastic and resistant amorphous macromolecular networks. Noticeably increased ionic conductivities are registered (10-3 S cm-1 at RT), along with very stable interfacial and storage stability and wide electrochemical stability windows. The different lab-scale solid-state devices show remarkable performances even at ambient temperature, at the level of those using liquid electrolytes, respect to which demonstrate much greater durability and safety. The obtained findings demonstrate a new, easy and low cost approach to fabricate and tailor-make polymer electrolytes with highly promising prospects for the next generation of advanced flexible energy production and storage devices

    An agronomic evaluation of new safflower (Carthamus tinctorius L.) germplasm for seed and oil yields under Mediterraean climate conditions

    Get PDF
    Interest in oilseed crops for agro-industrial research and development projects has increased in the Mediterranean area, in recent years. Saffloower (Carthamus tinctorius L.) is of potential interest for agriculture mainly due to fatty acid content variability in the seed oil. The aim of this study was to assess the agronomic performance of 16 new safflower accessions together with safflower variety Montola 2000, used as a reference, in a semi-arid environment. Research was carried out in Sicily (Italy) from 2013–2014. Hierarchical cluster analysis carried out on the fatty acid composition of safflower accessions resulted in their division into four main groups. Linoleic, oleic and palmitic acids were the main fatty acids present in the accessions. Seed yield was 1.11 t ha-1 on average and seed oil content was found to be approximately 35.01% of dry matter on average. Positive and significant relationships between seed/oil yield and other tested traits were found. The carbon, hydrogen and nitrogen content as a percentage of dry matter varied greatly both for the above- and belowground plant parts on average. This study confirms the interest of safflower for both food and non-food applications, offering interesting prospects in semi-arid regions

    Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)

    Full text link
    Security protocols are often found to be flawed after their deployment. We present an approach that aims at the neutralization or mitigation of the attacks to flawed protocols: it avoids the complete dismissal of the interested protocol and allows honest agents to continue to use it until a corrected version is released. Our approach is based on the knowledge of the network topology, which we model as a graph, and on the consequent possibility of creating an interference to an ongoing attack of a Dolev-Yao attacker, by means of non-collaboration actuated by ad-hoc benign attackers that play the role of network guardians. Such guardians, positioned in strategical points of the network, have the task of monitoring the messages in transit and discovering at runtime, through particular types of inference, whether an attack is ongoing, interrupting the run of the protocol in the positive case. We study not only how but also where we can attempt to defend flawed security protocols: we investigate the different network topologies that make security protocol defense feasible and illustrate our approach by means of concrete examples.Comment: 29 page
    • …
    corecore