An Egyptian diplomat-turned-scholar provides a detailed analysis of events from the fall of Mubarak through the aftermath of the 2013 military move to oust Egypt's first democratically elected president. The Arab Spring caught the world by surprise and was truly inspiring. Then, many watched with bewilderment as the process unfolded in unforeseen directions. This lively and well-documented book tells the story of events in Egypt from the end of the Mubarak era in 2010 through the revolution in 2011 and the military interference in the summer of 2013. Written from an insider's perspective, it discusses what occurred and analyzes the motives of the parties involved, putting each incident in context so the reader can see—and understand—the big picture. The author's background as an Egyptian diplomat provides insights that fuel a nuanced and richly detailed study. Among other topics, the book sheds light on the Egyptian military and economy, the life and written opinions of the military leader Al Sisi, and ties between the United States and the Egyptian armed forces. It reveals evidence of a conspiracy against the first elected civilian administration in Egypt, details the conflict between the Islamists and the deep state, and examines the rise and fall of political Islam. A final chapter speculates about possible scenarios for the future of Egypt.
This book documents the history of the Muslim community in the United States, and particularly in California, and the foundation and evolution of the Southern California Islamic Center. The associated digital archive was built in an ongoing project with the University of California, Los Angeles. This substantial work of social history analyses the Islamic Center’s work from 1953 to 1977 as it tries to establish itself within the mosaic of Southern Californian society. The work of the Islamic Centre has hardly been documented in the literature, and the social history of the wider Muslim Community in the USA is arguably under-researched. This is a unique and important contribution, of interest to historians, social scientists and students of race and religion in America.
This is the first detailed account of the life and ideas of 'Abdullah Yusuf 'Ali, whose The Holy Qur'an: Text, Translation and Commentary is the most widely used English translation of the Qur'an. This is a candid and sympathetic study that draw on Yusuf 'Ali's writings and private papers, as well as unpublished sources.
On a bright, busy morning in Cairo, a roaring sound fills the city square as the big mosque and the main cathedral are engulfed in dust and smoke, throwing the population into panic. When the air and the debris are cleared, an odd realization emerges: only the ornamentation on the houses of worship has been destroyed. Although members of each religion are quick to believe that the other was responsible for the violent destruction, in fact neither group is to blame. Determined to find out who is behind the incident, a colonel from the National Security Department begins an investigation that leads him to unexpected places, not only within Egyptian culture but within himself. In this richly layered novel, rifts between Islam and Christianity, and between Anglican and Coptic Christianity, divide young couples in love, families, and communities. Parents struggle to explain differences to their children, priests to parishioners, and lovers to each other in heartfelt conversations. Meanwhile, symbols and messages further deepen the intrigue behind the violence, and accounts of a large online community and its leader start to surface. Is it possible—or even desirable—for people to get along peacefully with each other, despite differences in how we approach God? As clashes between cultures and religions threaten to destroy us, the colonel’s quest to solve the crime becomes not only about the debris in the heart of Cairo, but one of the central questions of our time.
In practice, the design and architecture of a cloud varies among cloud providers. We present a generic evaluation framework for the performance, availability and reliability characteristics of various cloud platforms. We describe a generic benchmark architecture for cloud databases, specifically NoSQL database as a service. It measures the performance of replication delay and monetary cost. Service Level Agreements (SLA) represent the contract which captures the agreed upon guarantees between a service provider and its customers. The specifications of existing service level agreements (SLA) for cloud services are not designed to flexibly handle even relatively straightforward performance and technical requirements of consumer applications. We present a novel approach for SLA-based management of cloud-hosted databases from the consumer perspective and an end-to-end framework for consumer-centric SLA management of cloud-hosted databases. The framework facilitates adaptive and dynamic provisioning of the database tier of the software applications based on application-defined policies for satisfying their own SLA performance requirements, avoiding the cost of any SLA violation and controlling the monetary cost of the allocated computing resources. In this framework, the SLA of the consumer applications are declaratively defined in terms of goals which are subjected to a number of constraints that are specific to the application requirements. The framework continuously monitors the application-defined SLA and automatically triggers the execution of necessary corrective actions (scaling out/in the database tier) when required. The framework is database platform-agnostic, uses virtualization-based database replication mechanisms and requires zero source code changes of the cloud-hosted software applications.
This book provides concise, reliable, and up-to-date information on all 118 species currently recognized from Egypt, with detailed review of their taxonomy, identification, natural history, ecology, and conservation. This volume is based on the author's twenty-year experience with the reptile and amphibian fauna of Egypt and the Middle East, which includes extensive fieldwork and research. In total, the current work adds almost 20 percent to the previously reported fauna from Egypt, and presents many taxonomic innovations that are reported and elaborated here for the first time." "Each species entry contains concise information, including synonymy, tanxonomic notes, world and Egypt distributions, distinguishing features, habitat, ecology and conservation status. Over 130 high-quality color photographs and line drawings illustrate all the species dealt with. With easy-to-use keys, accurate distribution maps, diagnostic illustrations, a comprehensive bibliography, this guide is a valuable tool in the identification, study, and conservation of the animals."--BOOK JACKET.
- Exploit the significant power of design patterns and make better design decisions with the proven POAD methodology - Improve software quality and reliability while reducing costs and maintenance efforts - Practical case studies and illustrative examples help the reader manage the complexity of software development
Effective project management tailored to the needs of the telecommunications industry "In our rapidly changing world, the information and communication technologies and services have an immense impact on virtually all aspects of our lives. . . . With his deep understanding of the telecommunication services, and his rich experiences in both standardization activities and teaching practice, [Dr. Sherif's] book provides a very clear analysis of development projects in telecommunication services. I believe the readers will find this book very useful and interesting." —Houlin Zhao, Director, Telecommunication Standardization Bureau,International Telecommunication Union "Dr. Sherif's book is an important contribution to the project management literature. With the domination of the service economy in recent years, the book addresses the unique features of telecommunication services, a critical pillar of the service sector. Development projects in telecommunications require combining good knowledge of the fundamentals of project management with clear understanding of the complexities arising from fast-changing technology, deregulations, standards, accountability, and supply chain management difficulties. This book addresses the much-needed integrative approach very well." —Tarek Khalil, President, International Association for Management of Technology (IAMOT) While there has been much written about project management, the vast majority of the literature focuses on industrial design and production. In Managing Projects in Telecommunication Services, Mostafa Hashem Sherif effectively demonstrates the unique requirements of projects in telecommunication services and, consequently, the benefits of an integrated approach to project management that is specifically tailored to the telecommunications industry. Managing Projects in Telecommunication Services draws from a wide range of disciplines, including organizational management, motivation, quality control, and software engineering. All the theory and practical guidance that an effective telecommunications project manager needs is provided. The text is divided into three main parts: Chapters 1 through 3 set forth the special characteristics of telecommunications projects, including technology life cycle, type of innovation, and project organization Chapters 4 through 10 cover the areas that the Project Management Institute has standardized in its publication A Guide to the Project Management Body of Knowledge (PMBOK® Guide), focusing on the issues specific to telecommunications. Chapters address scope, schedule and cost, information and communication, human resources, quality, vendor management, and risk Chapters 11 and 12 integrate and summarize all of the concepts for the planning and delivery of a project Chapters are loaded with examples and case studies, many from the author's personal experience, that demonstrate the benefits of good project management and the consequences of poor project management. Each chapter includes a summary of key points. References are also provided to facilitate further research and study. For project managers as well as students in telecommunications, this text is unsurpassed. It not only covers the theory and practice of effective project management, it also tailors its discussion specifically to the unique needs of the telecommunications industry. (PMBOK is a registered mark of the Project Management Institute, Inc.)
Written in a unique and innovative style, this book presents pediatric surgery in an interactive clinical context. Each chapter is built upon a specific disease or group of diseases, beginning with a typical case, presented interactively, just as it would be in encountered in clinical practice. These are actual cases that have been encountered by the author and are likely to be managed on any pediatric surgical service. The discussion that follows presents the most relevant issues pertaining to the topic, drawing on the index case, as well as multiple other cases that depict the entire spectrum of the disease or anomaly. The carefully selected suggested readings emphasize sentinel papers, high-quality reviews, and the best and most recent evidence published on the subject. A large number of illustrations help bring the clinical concepts to light. A number of high-quality videos provide a dynamic atlas of common procedures. The book is useful to the entire range of pediatric surgical trainees and practitioners, from the medical student or resident rotating on pediatric surgery, to the fellow preparing for certification, to the seasoned surgeon looking for an update on a particular subject or preparing for recertification. A large number of other physicians will find this book very useful, including general surgeons who evaluate and treat childhood surgical diseases, paediatricians and pediatric hospitalists who co-manage patients with surgeons, and obstetricians, pathologists, and radiologists who work closely with pediatric surgeons. Key Features Provides a hands-on guide to the management of typical clinical scenarios for all pediatric surgery trainees and other professionals involved in the care of childhood surgical disease Presents more than 300 cases, covering the whole spectrum of pediatric surgery, illustrated in full-color and with an accompanying e-book Allows the reader to apply their knowledge to real-life situations and assess their level of expertise by the use of a case-based Q&A format
The quote sums up the role of teachers in student’s life. The influence of a teacher extends beyond the four walls of a class room and plays a significant role in molding and shaping the life of a student. Rather the teacher-student bond is the foundation stone of building the life of a student. I am lucky to be a teacher who had a great influence on the lives of many medical students. The bond, and rapport between the teacher and the student is unique and beyond explanation. I have the privilege of being a teacher for over four decades having taught couple of thousand students who now adorn the garden of Medicine. I will just narrate one incident that describes the beauty and greatness of this relationship. When I was teaching in Antigua I had developed such a relationship that cemented our souls together. At the time of my leaving the medical school, at the Airport one of my student just tried to become one with me, standing on my feet, embracing me and not allowing me to travel. It took lot of persuasion to take leave of the student leaving a deep rooted bonding that defies explanation. This short write up pictures the journey of my life traveling through many stations of learning carrying memories which words cannot capture or portray for these experiences are embedded deep into the chambers of heart, probably rightly called as the seat of love and emotions.
Mechanical Alloying: Energy Storage, Protective Coatings, and Medical Applications, Third Edition is a detailed introduction to mechanical alloying that offers guidelines on the necessary equipment and facilities needed to carry out the process, also giving a fundamental background to the reactions taking place. El-Eskandarany, a leading authority on mechanical alloying, discusses the mechanism of powder consolidations using different powder compaction processes. A new chapter is included on utilization of the mechanically alloyed powders for thermal spraying. Fully updated to cover recent developments in the field, this second edition also introduces new and emerging applications for mechanical alloying, including the fabrication of carbon nanotubes, surface protective coating and hydrogen storage technology. El-Eskandarany discusses the latest research into these applications and provides engineers and scientists with the information they need to implement these developments. - Guides readers through each step of the mechanical alloying process - Includes tables and graphs that are used to explain the stages of the milling processes - Presents a comprehensive update on the previous edition, including new chapters that cover emerging applications
The International Association for Management of Technology (IAMOT) is one of the largest scientific associations dealing with the education, research and application of management of technology. The annual conferences held by IAMOT assemble the most important scientists and experts in the field. The 16th conference held in 2007 included papers by experts from 32 countries. This book compiles the best of those papers presented at the conference. It covers topics and issues related to the knowledge economy, commercialization of knowledge, green technologies, and sustainable development.
This briefing reviews the experiences of minorities and indigenous peoples in Egypt during the Covid-19 pandemic, including their living conditions and access to public health services. In particular, it focuses on the experiences of Nubians, Bedouins and Amazigh in the border regions of Aswan, Sinai and Matrouh. While the dispatch of mobile health clinics to the most neglected areas can provide some relief, there is still an urgent need to address the root causes of the health care crisis. New policies addressing both education and health in those areas can help to resolve the issues most effectively. For minority and indigenous communities resident there, who already contend with high levels of poverty and marginalization, the need is especially acute. In all three regions, despite a general surge in spending on health care across the country, many shortcomings remain. The briefing closes with a set of recommendations to address these challenges, focused on targeted prioritization measures in border regions, greater attention to training and capacity building of local personnel, as well as sustainable delivery, with more budget dedicated to staff development and service improvements.
This book describes efficient and effective techniques for harnessing the power of Linked Data by tackling the various aspects of managing its growing volume: storing, querying, reasoning, provenance management and benchmarking. To this end, Chapter 1 introduces the main concepts of the Semantic Web and Linked Data and provides a roadmap for the book. Next, Chapter 2 briefly presents the basic concepts underpinning Linked Data technologies that are discussed in the book. Chapter 3 then offers an overview of various techniques and systems for centrally querying RDF datasets, and Chapter 4 outlines various techniques and systems for efficiently querying large RDF datasets in distributed environments. Subsequently, Chapter 5 explores how streaming requirements are addressed in current, state-of-the-art RDF stream data processing. Chapter 6 covers performance and scaling issues of distributed RDF reasoning systems, while Chapter 7 details benchmarks for RDF query engines and instance matching systems. Chapter 8 addresses the provenance management for Linked Data and presents the different provenance models developed. Lastly, Chapter 9 offers a brief summary, highlighting and providing insights into some of the open challenges and research directions. Providing an updated overview of methods, technologies and systems related to Linked Data this book is mainly intended for students and researchers who are interested in the Linked Data domain. It enables students to gain an understanding of the foundations and underpinning technologies and standards for Linked Data, while researchers benefit from the in-depth coverage of the emerging and ongoing advances in Linked Data storing, querying, reasoning, and provenance management systems. Further, it serves as a starting point to tackle the next research challenges in the domain of Linked Data management.
An enchanted ring brings good fortune to an Egyptian oud player in this compelling novel combining elements of magical realism with political history Can one man or a mere ring alter the events of one’s life and the history of a country? Combining elements of magical realism with momentous history, Suleiman’s Ring poses these questions and more in a gripping tale of friendship, identity, and the fate of a nation. Alexandria, Egypt, on the eve of the 1952 Free Officers revolution. Daoud, a struggling musician, is summoned with his best friend Sheikh Hassanein to a meeting with Lt. Col. Gamal Abdel Nasser, who seeks their help as he mobilizes for the revolution. Daoud lends Nasser an enchanted silver ring for its powers to bring good luck. The revolution succeeds but Daoud soon grows estranged from Hassanein, who has joined the Muslim Brotherhood, after he suggests that Daoud leave Egypt since as a Jew he is no longer welcome. When Hassanein is arrested, however, destiny draws Daoud into a complex web of sexual intrigue and betrayal that threatens to upend his already precarious existence. Set against the backdrop of the simmering political tensions of mid-twentieth-century Egypt and the Arab–Israeli wars, Sherif Meleka’s story of fate and fortune transports us to another time and place while peeling back the curtain on events that still haunt the country to this day.
Master's Thesis from the year 2001 in the subject Medicine - Neoplasms, Oncology, , language: English, abstract: Weight loss is a common feature in patients with chronic obstructive pulmonary disease (COPD). The clinical importance of weight loss; particularely loss of fat-free mass (FFM) has been demonstrated in its adverse effects on physical performance and quality of life. Moreover; weight loss and a low body weight are unfavorable prognostic factors in survival, independent of lung function. Mechanisms of malnutrition in those patients are not fully understood. Several factors have been implicated. Increased resting energy expenditure (REE) contributes the main hypothesis for weight loss in COPD patients. However, not all patients with COPD who lose weight are hypermetabolic. Recent data have shown that a systemic inflammatory response is present in patients with COPD. A clear evidence for a relationship between weight loss and plasma tumour necrosis factor-alpha (TNF-*) has been shown in COPD patients. TNF-* produces a cachexia-like syndrome in animal models and has been implicated as a mediator of cachexia in several clinical conditions including cancer, chronic heart failure, cystic fibrosis and anorexia nervosa. Nutritional assessment for COPD patients is essential; to identify those individuals who will benifit from nutritional support therapies and to determine baseline values to measure the effectiveness of nutritional intervention. It includes several methods, no simple recommendation can be given regarding the best method for nutritional assessment. Because of the negative impact of malnutrition on the respiratory system in COPD patients, contributing to morbidity and mortality; it's valuable to include management strategies that increase energy balance in order to increase weight and fat-free mass in those malnourished COPD patients. The aim of this study is to determine the most valuable measurements to assess the nutritional status of COPD patients; as regards the anthropometric measurements, the somatic and visceral proteins and markers of inflammation; and to evaluate the correlation between serum TNF-* levels and weight loss among those patients; as a trial to improve their clinical prognosis and quality of life.
Scientific Study from the year 2015 in the subject Medicine - Other, grade: 8.1, , language: English, abstract: Hemoptysis is defined as bleeding arising from the lower airways. Identifying the etiology of hemoptysis and classifying it in terms of the amount of blood expectorated as well as the rate of bleeding play a fundamental role in defining the timing, way and place of managing a patient with hemoptysis. There are multiple causes of hemoptysis, including airway diseases, parenchymal lung diseases, cardiovascular diseases, and others. However, no cause is identified in 15–30% of all cases, and is termed idiopathic or cryptogenic hemoptysis. In the majority of cases, the source of massive hemoptysis is the bronchial circulation. However, nonbronchial systemic arteries can be also a significant source. Imaging modalities pertinent to the evaluation of hemoptysis include chest radiography, computed tomography, and bronchial arteriography. Conditions such as bronchiectasis, chronic bronchitis, lung malignancy, tuberculosis, and chronic fungal infection are easily detected with conventional CT. Even, CT is superior to fiberoptic bronchoscopy in finding a cause of hemoptysis, its main advantage being its ability to show distal airways beyond the reach of the bronchoscope, and the lung parenchyma surrounding these distal airways. However, more recently, the development of multidetector row CT has provided a comprehensive, noninvasive method of evaluating the entire thorax. At the same time, the combined use of thin-section axial scans and more complex reformatted images allows clear depiction of the origins and trajectories of abnormally dilated bronchial or non-bronchial systemic arteries that may be the source of hemorrhage requiring embolization.
Doctoral Thesis / Dissertation from the year 2008 in the subject Medicine - Neoplasms, Oncology, grade: 1.00, , language: English, abstract: Centrally arising squamous cell carcinoma of the airway is thought to develop through multiple stages from squamous metaplasia to dysplasia, followed by carcinoma in situ (CIS), progressing to invasive cancer. It would be ideal to be able to detect and treat preinvasive bronchial lesions before progressing to invasive cancer. Advances in early diagnostic and treatment options have the potential to manage LC while still in an intraepithelial and/or microinvasive stage. WLB is one of the most commonly used diagnostic tools for LC. However, WLB is limited in its ability to detect small intraepithelial and microinvasive preinvasive lesions.AFB was developed to address this limitation by WLB. Indications for AFI examination; (1) Patients with known or suspected LC (2) Patients with abnormal sputum cytology (3) Patients after curative surgery for stage I LC(4) Current or former smokers with symptoms. A total of 74.7% patients had abnormal sputum cytology, 14.3% had known or suspected LC. All patients underwent conventional WLB followed by AFI examination; using the AFI device. Bronchoscopic-guided biopsy specimens were obtained. Sensitivity, specificity, and diagnostic accuracy of WLB versus that of AFI, were 58.3% Vs 88.9%; 46.7% Vs 71.9%; and 53.0% Vs 80.9%. with a very high significant difference (p value
This book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book focuses on the end-to-end aspects of the LTE network architecture and different deployment scenarios of commercial LTE networks. It describes the air interface of LTE focusing on the access stratum protocol layers: PDCP, RLC, MAC, and Physical Layer. The air interface described in this book covers the concepts of LTE frame structure, downlink and uplink scheduling, and detailed illustrations of the data flow across the protocol layers. It describes the details of the optimization process including performance measurements and troubleshooting mechanisms in addition to demonstrating common issues and case studies based on actual field results. The book provides detailed performance analysis of key features/enhancements such as C-DRX for Smartphones battery saving, CSFB solution to support voice calls with LTE, and MIMO techniques. The book presents analysis of LTE coverage and link budgets alongside a detailed comparative analysis with HSPA+. Practical link budget examples are provided for data and VoLTE scenarios. Furthermore, the reader is provided with a detailed explanation of capacity dimensioning of the LTE systems. The LTE capacity analysis in this book is presented in a comparative manner with reference to the HSPA+ network to benchmark the LTE network capacity. The book describes the voice options for LTE including VoIP protocol stack, IMS Single Radio Voice Call Continuity (SRVCC). In addition, key VoLTE features are presented: Semi-persistent scheduling (SPS), TTI bundling, Quality of Service (QoS), VoIP with C-DRX, Robust Header Compression (RoHC), and VoLTE Vocoders and De-Jitter buffer. The book describes several LTE and LTE-A advanced features in the evolution from Release 8 to 10 including SON, eICIC, CA, CoMP, HetNet, Enhanced MIMO, Relays, and LBS. This book can be used as a reference for best practices in LTE networks design and deployment, performance analysis, and evolution strategy. Conveys the theoretical background of 4G-LTE networks Presents key aspects and best practice of 4G-LTE networks design and deployment Includes a realistic roadmap for evolution of deployed 3G/4G networks Addresses the practical aspects for designing and deploying commercial LTE networks. Analyzes LTE coverage and link budgets, including a detailed comparative analysis with HSPA+. References the best practices in LTE networks design and deployment, performance analysis, and evolution strategy Covers infrastructure-sharing scenarios for CAPEX and OPEX saving. Provides key practical aspects for supporting voice services over LTE, Written for all 4G engineers/designers working in networks design for operators, network deployment engineers, R&D engineers, telecom consulting firms, measurement/performance tools firms, deployment subcontractors, senior undergraduate students and graduate students interested in understanding the practical aspects of 4G-LTE networks as part of their classes, research, or projects.
An Egyptian diplomat-turned-scholar provides a detailed analysis of events from the fall of Mubarak through the aftermath of the 2013 military move to oust Egypt's first democratically elected president. The Arab Spring caught the world by surprise and was truly inspiring. Then, many watched with bewilderment as the process unfolded in unforeseen directions. This lively and well-documented book tells the story of events in Egypt from the end of the Mubarak era in 2010 through the revolution in 2011 and the military interference in the summer of 2013. Written from an insider's perspective, it discusses what occurred and analyzes the motives of the parties involved, putting each incident in context so the reader can see—and understand—the big picture. The author's background as an Egyptian diplomat provides insights that fuel a nuanced and richly detailed study. Among other topics, the book sheds light on the Egyptian military and economy, the life and written opinions of the military leader Al Sisi, and ties between the United States and the Egyptian armed forces. It reveals evidence of a conspiracy against the first elected civilian administration in Egypt, details the conflict between the Islamists and the deep state, and examines the rise and fall of political Islam. A final chapter speculates about possible scenarios for the future of Egypt.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.