LEADER 02828oam 2200649I 450 001 9910783614703321 005 20210629234650.0 010 $a1-134-97513-9 010 $a0-415-75512-3 010 $a1-134-97514-7 010 $a1-280-09889-9 010 $a0-203-16923-9 024 7 $a10.4324/9780203169230 035 $a(CKB)1000000000249506 035 $a(EBL)179087 035 $a(SSID)ssj0000278976 035 $a(PQKBManifestationID)11223012 035 $a(PQKBTitleCode)TC0000278976 035 $a(PQKBWorkID)10258336 035 $a(PQKB)11399549 035 $a(MiAaPQ)EBC179087 035 $a(Au-PeEL)EBL179087 035 $a(CaPaEBR)ebr10099267 035 $a(CaONFJC)MIL9889 035 $a(OCoLC)437081918 035 $a(OCoLC)560308324 035 $a(PPN)198458851 035 $a(EXLCZ)991000000000249506 100 $a20180331d1992 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aEgyptian society under Ottoman rule, 1517-1798 /$fMichael Winter 210 1$aLondon ;$aNew York :$cRoutledge,$d1992. 215 $a1 online resource (340 p.) 300 $aDescription based upon print version of record. 311 $a0-203-28566-2 311 $a0-415-02403-X 320 $aIncludes bibliographical references and index. 327 $aBook Cover; Title; Contents; Preface; List of Abbreviations; Introduction; Historical Background; The Vicissitudes of the Ruling Class; The Bedouin Arabs and the State; The Ulama; The Sufis; Popular Religion; The Ashraf and Naqib al-Ashraf: The Prophet's Descendants and their Chief; The Dhimmis: Jews and Christians; Life in Ottoman Cairo; Conclusion; Notes; Bibliography; Index 330 $aMichael Winter's book presents a panoramic view of Ottoman Egypt from the overthrow of the Mamluk Sultanate in 1517 to Bonaparte's invasion of 1798 and the beginning of Egypt's modern period.Drawing on archive material, chronicle and travel accounts from Turkish, Arabic, Hebrew and European sources as well as up-to-date research, this comprehensive social history looks at the dynamics of the Egyptian-Ottoman relationship and the ethnic and cultural clashes which characterised the period. The conflicts between Ottoman pashas and their Egyptian subjects and between Bedouin Arabs and th 606 $aSocial classes$zEgypt$xHistory 607 $aEgypt$xHistory$y1517-1882 607 $aEgypt$xSocial conditions 615 0$aSocial classes$xHistory. 676 $a301/.0962 676 $a962.03 700 $aWinter$b Michael$f1934,$01581409 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910783614703321 996 $aEgyptian society under Ottoman rule, 1517-1798$93862913 997 $aUNINA LEADER 13021nam 22007935 450 001 9910299316103321 005 20251113192855.0 010 $a3-319-66625-8 024 7 $a10.1007/978-3-319-66625-9 035 $a(CKB)4100000000587308 035 $a(DE-He213)978-3-319-66625-9 035 $a(MiAaPQ)EBC6296769 035 $a(MiAaPQ)EBC5588936 035 $a(Au-PeEL)EBL5588936 035 $a(OCoLC)1066184938 035 $a(PPN)204534690 035 $a(EXLCZ)994100000000587308 100 $a20170930d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCommunications and Networking $e11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part I /$fedited by Qianbin Chen, Weixiao Meng, Liqiang Zhao 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XXII, 516 p. 270 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v209 300 $aIncludes index. 311 08$a3-319-66624-X 327 $aIntro -- Preface -- Organization -- Contents -- Part I -- Contents -- Part II -- Technical Sessions -- Transceiver Optimization in Full Duplex SWIPT Systems with Physical Layer Security -- 1 Introduction -- 2 System Model and Problem Formulation -- 3 Optimal Transmitter Design with ZF Receiver -- 4 Simulation Results -- 5 Conclusion -- References -- Robust Secure Transmission Scheme in MISO Interference Channel with Simultaneous Wireless Information and Power Transfer -- 1 Introduction -- 2 System Model and Problem Formulation -- 3 Robust Secure Transmission Scheme -- 4 Simulation Results -- 5 Conclusion -- References -- An Effective Limited Feedback Scheme for FD-MIMO Based on Noncoherent Detection and Kronecker Product Codebook -- 1 Introduction -- 2 System Model -- 2.1 Beamforming Model with Feedback -- 2.2 3D Channel Model -- 3 Kronecker Product Codebook Construction -- 4 Channel Quantization Scheme -- 4.1 Duality Between Codebook Searching and Non-coherent Sequence Detection -- 4.2 Low Complexity Quantization for CSI -- 4.3 Complexity -- 5 Simulation Results and Discussions -- 5.1 Simulation Setup -- 5.2 3D-PSK vs. 2D-DFT -- 5.3 3D-PSK vs. 3D-DFT -- 6 Conclusion -- References -- Two-Stage Precoding Based Interference Alignment for Multi-cell Massive MIMO Communication -- 1 Introduction -- 2 System Model -- 3 Two-Stage Precoding Based IA Scheme -- 3.1 Proposed Transmission Scheme -- 3.2 Performance Analysis -- 4 Numerical Result -- 5 Conclusion -- References -- MAC Schemes -- Adaptive Energy-Saving Mechanism for SMAC Protocol in Wireless Sensor Network -- Abstract -- 1 Introduction -- 2 Adaptive Energy-Saving Mechanism for SMAC -- 2.1 Introduction of ASP -- 3 Simulation Results and Performance Analysis -- 4 Conclusion -- Acknowledgement -- References -- A Transmission Rate Optimized Cooperative MAC Protocol for Wireless Sensor Networks. 327 $aAbstract -- 1 Introduction -- 2 Network Model -- 3 TRO-CMAC Protocol -- 3.1 Relay Information Table (RIT) -- 3.2 TRO-CMAC Protocol and Relay Selection Algorithm -- 3.3 Access Method of Cooperative Node -- 4 Performance Evaluation -- 4.1 Simulation Environment -- 4.2 Performance Metrics -- 4.3 Simulation Results -- 5 Conclusion -- Acknowledgements -- References -- Heterogeneous Control and Data Split Network for Precision Formation Flying of Distributed Spacecraft -- Abstract -- 1 Introduction -- 1.1 Architecture of Heterogeneous Control and Data Split Network for Distributed Spacecraft -- 1.2 Optimize the MANET Protocol Stack -- 2 Event-Driven MAC Protocol for Control Sub-network -- 2.1 Description of E-MAC Protocol in Control Sub-network -- 2.2 Analytical Model of E-MAC Protocol -- 2.3 Spectrum and Energy Efficiency of E-MAC Protocol -- 3 Performance Evaluation -- 3.1 Scenario I -- 3.2 Scenario II -- 4 Conclusion -- Acknowledgements -- References -- A Novel Feedback Method to Enhance the Graphical Slotted ALOHA in M2M Communications -- 1 Introduction -- 2 System Model -- 3 Feedback Enhanced Design -- 3.1 Motivation of Feedback on CSA -- 3.2 Overhead Analysis -- 3.3 Analysis on the Optimal NRE value -- 4 Numerical Results -- 5 Conclusion -- References -- A Hybrid Automatic Repeat reQuest Scheme Based on Maximum Distance Separable Codes -- 1 Introduction -- 2 System Model and Encoding -- 3 Decoding Process -- 4 Simulations -- 4.1 Case 1 -- 4.2 Case 2 -- 5 Conclusion -- References -- Energy-Efficient Resource Allocation in Distributed Antenna Systems -- 1 Introduction -- 2 System Model and Problem Formulation -- 3 Energy Efficient Resource Allocation with Distributed Antennas -- 3.1 Joint DAU and Subcarrier Assignment -- 3.2 Power Allocation Optimization -- 4 Simulation Results -- 5 Conclusion -- References -- Traffic Engineering and Routing Algorithms. 327 $aApplications of Genetic Algorithms in BGP-Based Interdomain Traffic Engineering -- Abstract -- 1 Introduction -- 2 Interdomain Traffic Engineering -- 3 Related Work -- 4 A Multi-objective Genetic Algorithm -- 4.1 Adding Filtering Mechanism -- 4.2 Expanding the Scope of Application of the Algorithm -- 5 Applications of the Genetic Algorithm -- 5.1 Gathering the Information of Topology and IGP Weights -- 5.2 Gathering the Information of BGP Routing -- 5.3 Collecting Traffic and the Validation of the Algorithm -- 5.4 Comparison with the Original Algorithm -- 5.5 Discussion on Different Parameters -- 6 Conclusions -- References -- MP-SDWN: A Novel Multipath-Supported Software Defined Wireless Network Architecture -- Abstract -- 1 Introduction -- 2 MP-SDWN Architecture -- 2.1 Architecture of MP-SDWN -- 2.2 Use Cases -- 3 Performance Evaluation -- 3.1 Test-Bed Setup -- 3.2 Benchmark Performance of MVAP -- 3.3 Handover Performance -- 4 Conclusion -- Acknowledgments -- References -- Performance Analysis of Routing Algorithms Based on Intelligent Optimization Algorithms in Cluster Ad Hoc Network -- Abstract -- 1 Introduction -- 2 Cluster Ad Hoc Network Model -- 3 Principle of Intelligence Algorithms -- 3.1 Genetic Algorithm -- 3.2 Ant Colony Optimization -- 3.3 Particle Swarm Optimization -- 4 Network Performance Analysis -- 5 Conclusion -- Acknowledgment -- References -- Incentive Mechanism for Crowdsensing Platforms Based on Multi-leader Stackelberg Game -- 1 Introduction -- 2 System Model -- 3 Optimal Pricing Strategy Dealing with a Non-cooperative Game -- 4 Simulations and Discussions -- 4.1 Nash Equilibrium Between Crowdsensing Platforms -- 4.2 Optimal Pricing Strategy of Crowdsensing Platforms -- 4.3 Optimal Utility of Crowdsensing Platforms -- 4.4 Optimal Utility of Sensing Task Originator -- 5 Conclusion -- References. 327 $aMaster Controller Election Mechanism Based on Controller Cluster in Software Defined Optical Networks -- Abstract -- 1 Introduction -- 2 Master/Slaves Mode and Controller Election -- 3 Design and Implementation of MCEM -- 3.1 Election Qualifications for MCEM -- 3.2 Master Election Algorithm of MCEM -- 3.2.1 Vote Procedure -- 3.2.2 Approval Procedure -- 4 Simulation Results -- 4.1 The Evaluation Indicators in Experiment -- 4.2 The Analysis of Numerical Results -- 5 Conclusion -- Acknowledgements -- References -- Security -- Performance Evaluation of Black Hole Attack Under AODV in Smart Metering Network -- 1 Introduction -- 2 Black Hole Attack in Smart Metering Network -- 2.1 AODV Routing Protocol -- 2.2 Black Hole Attack Under AODV -- 3 Simulation Setup and Performance Metrics -- 4 Simulation Results -- 4.1 Effect of Variation of ART and Hello Packet Interval on PDR -- 4.2 Effect of Variation of ART and Hello Packet Frequency on Average End-to-End Delay -- 4.3 Effect of Position of Malicious Meters on PDR -- 5 Conclusions -- References -- An Entropy-Based DDoS Defense Mechanism in Software Defined Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Principle of Entropy-Based DDoS Detection in SDN -- 3.1 SDN Profile -- 3.2 Principle of Entropy-Based DDoS Detection -- 3.3 The Essential Difference Between DDoS Attacks and Flash Crowds -- 4 Proposed Mechanism: EDDM -- 4.1 Initialization and Window Construction Phase -- 4.2 DDoS Attack Detection Phase -- 4.3 DDoS Attack Mitigation Phase -- 5 Simulation Results -- 5.1 DDoS Without Any Defense Mechanisms -- 5.2 DDoS with EDDM -- 5.3 The Flash Crowd and DDoS with EDDM -- 5.4 Discussions -- 6 Conclusion -- References -- Protecting Location Privacy Through Crowd Collaboration -- 1 Introduction -- 2 Problem Statement -- 2.1 Weighed Distance -- 2.2 Joint Differential-Distortion Privacy Metric. 327 $a2.3 Inference Privacy Metric -- 2.4 Utility Cost -- 2.5 Objective -- 3 Privacy Game -- 3.1 Optimal Strategies -- 3.2 Optimal Equilibrium Point -- 4 Performance Evaluation -- 4.1 Case 1: Impacts of POI Density -- 4.2 Case 2: Impacts of Privacy Level -- 4.3 Case 3: Tracing Real Devices -- 5 Conclusions -- References -- A Measurement and Security Analysis of SSL/TLS Deployment in Mobile Applications -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Measurement Method -- 3.1 Data Collection -- 3.2 Measurement System -- 3.3 MITM Experiment -- 4 Measurement Results -- 4.1 SSL/TLS Deployment on Applications -- 4.2 SSL Handshake Parameters -- 4.3 MITM Experiment Results -- 4.4 Discussion -- 5 Conclusion -- Acknowledgments -- References -- A Method for Countering Snooping-Based Side Channel Attacks in Smart Home Applications -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Evaluation -- 5 Conclusion and Future Work -- Acknowledgement -- References -- Coding Schemes -- FPGA-Based Turbo Decoder Hardware Accelerator in Cloud Radio Access Network (C-RAN) -- 1 Introduction -- 2 System Design -- 2.1 Virtualized SDR Platform -- 2.2 Cloud Base Stations -- 2.3 FPGA Hardware Accelerator -- 3 Turbo Decoder Design -- 3.1 Interface Design -- 3.2 Design of Turbo Decoder -- 3.3 Pipeline Process -- 3.4 Implementation of Turbo Decoder -- 4 Simulation and Evaluation -- 5 Conclusions and Future Work -- References -- Iterative Detection and Decoding for Spatially Coupled Multiuser Data Transmission -- 1 Introduction -- 2 System Model -- 3 Iterative Multiuser Detection and Decoding -- 3.1 Factor Graph Representation -- 3.2 Iterative Detection and Decoding Based on MPA -- 3.3 EXIT Chart -- 4 EXIT Chart Analysis and Numerical Results -- 5 Conclusion -- References -- Two Degree Forest Based LT Codes with Feedback -- Abstract -- 1 Introduction. 327 $a2 Preliminary. 330 $aThe two-volume set LNICST 209-210 constitutes the post-conference proceedings of the 11th EAI International Conference on Communications and Networking, ChinaCom 2016, held in Chongqing, China, in September 2016. The total of 107 contributions presented in these volumes are carefully reviewed and selected from 181 submissions. The book is organized in topical sections on MAC schemes, traffic algorithms and routing algorithms, security, coding schemes, relay systems, optical systems and networks, signal detection and estimation, energy harvesting systems, resource allocation schemes, network architecture and SDM, heterogeneous networks, IoT (Internet of Things), hardware design and implementation, mobility management, SDN and clouds, navigation, tracking and localization, future mobile networks. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v209 606 $aComputer networks 606 $aComputers, Special purpose 606 $aComputer simulation 606 $aData protection 606 $aElectronic digital computers$xEvaluation 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer Modelling 606 $aData and Information Security 606 $aSystem Performance and Evaluation 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aComputer simulation. 615 0$aData protection. 615 0$aElectronic digital computers$xEvaluation. 615 14$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Modelling. 615 24$aData and Information Security. 615 24$aSystem Performance and Evaluation. 676 $a004.6 702 $aChen$b Qianbin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMeng$b Weixiao$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhao$b Liqiang$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299316103321 996 $aCommunications and Networking$92102240 997 $aUNINA