You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Browne's famous work, a byword in Persian Studies for many years, continues to be the essential reference. Out of print for some time, it is reissued here as a library edition.
A comprehensive introduction to architecture design, protocol optimization, and application development.
Most applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services. Data grows rapidly, since applications produce continuously increasing volumes of both unstructured and structured data. Large-scale interconnected systems aim to aggregate and efficiently exploit the power of widely distributed resources. In this context, major solutions for scalability, mobility, reliability, fault tolerance and security are required to achieve high performance and to create a smart en...
This groundbreaking book provides the first comprehensive analysis of Ming China’s pursuit of national security along its 1,700 miles of northern frontier. Drawing on a wealth of original sources, John Dardess vividly portrays how Ming China’s emperors, officials, and commanders in the field thought, argued, and made decisions in real time as they worked to defend their country. Despite common perceptions of the central role of the so-called Great Wall of China, Dardess convincingly shows that the wall was but a minor piece in a much bigger effort to battle Tatar looting. Dardess immerses readers in the day-to-day world of the Ming as he explores the question of how leaders kept their country safe over the 276 years the dynasty ruled.
This book presents breakthroughs in the design of Wireless Energy Harvesting (WEH) networks. It bridges the gap between WEH through radio waves communications and power transfer, which have largely been designed separately. The authors present an overview of the RF-EHNs including system architecture and RF energy harvesting techniques and existing applications. They also cover the idea of WEH in novel discoveries of information, the theoretical bounds in WEH, wireless sensor networks, usage of modern channel coding together with WEH, energy efficient resource allocation mechanisms, distributed self-organized energy efficient designs, delay-energy trade-off, specific protocols for energy efficient communication designs, D2D communication and energy efficiency, cooperative wireless networks, and cognitive networks.
In October 2014 about thirty scholars from Asia and Europe came together for a conference to discuss different kinds of sources for the research on Central Asia. From museum collections and ancient manuscripts to modern newspapers and pulp fiction and the wind horses flying against the blue sky of Mongolia there was a wide range of topics. Modern data processing and data management and the problems of handling five different languages and scripts for a dictionary project were leading us into the modern digital age. The dominating theme of the whole conference was the importance of collections of source material found in libraries and archives, their preservation and expansion for future generations of scholars. Some of the finest presentations were selected for this volume and are now published for a wider audience.
Volume 5 is a survey of every aspect of the civilisations which flourished in the Iranian region between the eleventh and thirteenth centuries.
Covering the period from the establishment of Sui to the fall of Southern Sung, this reference work for the first time gives a full and conveniently arrranged overview of China’s diplomatic and trade relations with its major and minor Asian neighbours: continental South Asia and the islands, Japan, Korea, Northeast Asia, Tibet, Central Asia, West Asia, the Middle East, and the Hsia, Liao, and Chin States. Basing himself on his yearlong research of Chinese offical histories and historical compendia, the author offers a wealth of detailed information - in translation - on matters such as the goods exchanged, the negotiations for peace and alliances, special missions required by diplomatic etiquette, foreign requests for marriage with Chinese princesses, etc. Special emphasis is given to the meaning of the so-called “tribute missions”, in reality a disguised form of trade.
Aklın reddettiği, kalbin ise delice istediği bir aşkın kapısındaydı Ela ve Siyah... Çaresizliklerin onları getirdiği konuma şaşırdı ikisi de. Yola çıktıkların da ki asıl emanet ile şimdiki emanet tamamen farklıydı. "Emanet neydi, biliyor musun Ela?" diye sordu Siyah. "Neydi?”dedi Ela, merakla. "Emanet, aşktı... Ve sen o emaneti, yüreğinin en güzel köşesinde yıllarca sakladın" diye cevap verdi Siyah. "Sakladım" dedi Ela ve devam etti. "Hiç kimsenin ulaşamayacağı kadar derine sakladım" Siyah, Ela 'ya karıştı ve döktü içindekileri... "Aşkı geri ver Ela. Aşkı geri ver ki, seni aşka bulayayım. Aşkı geri ver ki, ömrümce yüreğimde taşıyayım. Emanet'imi geri ver ki, yeniden Ela'nın Siyah 7 olayım."