6,283 research outputs found

    Balancing Justice Needs and Private Property in Constitutional Takings Provisions: A Comparative Assessment of India, Australia, and the United States

    Get PDF
    This Article explores the relationship between justice needs and private property in the constitutional takings provisions of the Indian, Australian, and American constitutions. Building upon established scholarship, it develops a theoretical framework within which to consider the way in which a state balances the requirement to provide minimal levels of justice for its citizens through the re-distribution of goods and resources with the need to protect the private property of individuals. We summarize this framework in what we refer to as the “Justice Needs-Protection of Private Property Continuum.” Using the framework developed, the Article provides an outline of the takings provisions found in the Indian, Australian, and American constitutions. Part I examines Article 300A of the Constitution of India, which contains the scope of the power of compulsory acquisition exercised by the Indian state. Part II assesses Section 51(xxxi) of the Australian Constitution which, unlike its American and Indian counterparts, operates as both a grant of power to the federal government, as well as a limitation imposed upon that power, which may, it seems, operate so as to provide some minimal protection for individual private property interests. Part III considers the Takings Clause of the Fifth Amendment to the United States Constitution which, as interpreted by the Supreme Court, provides perhaps the most robust means among the three jurisdictions considered for protecting the individual private property interests as against state takings. The Conclusion offers comparative reflections on the nature of the takings provision found in each jurisdiction.Krithika Ashok, Paul T. Babie, & John V. Ort

    Tests of Integrability of the Supersymmetric Nonlinear Schrodinger Equation

    Full text link
    We apply various conventional tests of integrability to the supersymmetric nonlinear Schr\"odinger equation. We find that a matrix Lax pair exists and that the system has the Painlev\'e property only for a particular choice of the free parameters of the theory. We also show that the second Hamiltonian structure generalizes to superspace only for these values of the parameters. We are unable to construct a zero curvature formulation of the equations based on OSp(2|1). However, this attempt yields a nonsupersymmetric fermionic generalization of the nonlinear Schr\"odinger equation which appears to possess the Painlev\'e property.Comment: 21 pages, UR-1344, ER-40685-79

    Parametric Non-linear programming approach for N-policy queues with infinite capacity

    Get PDF
    This paper proposes a procedure to construct the membership function of N-policy queue with infinite capacity.  By using mathematical programming we construct the membership function of the system performance measure in which arrival rate and service rate are fuzzy numbers.  Based on a-cut approach and Zadeh’s extension principle, the fuzzy queues are converted into a family of crisp queues.  Suitable real world example is exemplified to analyze N-policy fuzzy queues.  Extending this model to fuzzy environment it would have further more wider applications

    A Triple Key Resource Sharing Technique for Enterprise Cloud

    Get PDF
    The cloud is a competitive alternative to the general distributed resource sharing scheme with less cost and efficient and less maintenance overhead so most of the enterprises are choosing it. The cloud is the service being delivered from remote sites. Weather it is public, private, hybrid, community or inter-cloud, the physical location of the devices at the end points are servers, storage devices, computing devices, networking equipments and security systems that we interact with mobiles, computers, tablets using some applications from inside and outside of the enterprise. The enterprises have to register for the required resources in the cloud and can be utilized by the different members. It is problematic to maintain security and user privacy within the enterprise with traditional strategy. In my proposed system an efficient resource sharing is provided by using a technique ERST with three keys called Enterprise key, Manager key and member key along with the Biometric authentication. DOI: 10.17762/ijritcc2321-8169.150611

    The sAKNS Hierarchy

    Full text link
    We study, systematically, the properties of the supersymmetric AKNS (sAKNS) hierarchy. In particular, we discuss the Lax representation in terms of a bosonic Lax operator and some special features of the equations and construct the bosonic local charges as well as the fermionic nonlocal charges associated with the system starting from the Lax operator. We obtain the Hamiltonian structures of the system and check the Jacobi identity through the method of prolongation. We also show that this hierarchy of equations can equivalently be described in terms of a fermionic Lax operator. We obtain the zero curvature formulation as well as the conserved charges of the system starting from this fermionic Lax operator which suggests a connection between the two. Finally, starting from the fermionic description of the system, we construct the soliton solutions for this system of equations through Darboux-Backlund transformations and describe some open problems.Comment: LaTeX, 16 pg
    corecore