Some Waders secured in Formosa
نویسندگان
چکیده
منابع مشابه
Relationship between bill morphology and preening behaviour in waders
The relationship between bill morphology and preening behaviour was studied in 11 species of waders. On the assumption that species with long bills might be less efficient at preening than birds with short bills, the hypothesis was tested that long-billed species devoted more time to preening than short-billed species. Results showed a positive relationship between bill length and time spent pr...
متن کاملOvicide in the whitefly parasitoid, Encarsia formosa.
The oviposition decisions made by insect parasitoids when encountering hosts of variable quality have been the subject of extensive theoretical and experimental investigation. For parasitoids that lay their eggs inside the host, the possible outcomes of encounters with parasitized hosts have been assumed to include only oviposition (superparasitism), rejection, or in some cases feeding on host ...
متن کاملRare breeding waders of the Moscow region: distribution and numbers
Eleven wader species are included in the first version of the Red Data Book of the Moscow region. One of these species Jack Snipe Lymnocryptes minimus ceased breeding at the end of the 19th or beginning of the 20th century; three species, i.e. Oystercatcher Haematopus ostralegus, Wood Sandpiper Tringa glareola nd Greenshank T. nebularia breed in the Moscow region irregularl)5 as the region lies...
متن کاملSecured Independent Tools in Peritoneoscopy
BACKGROUND AND OBJECTIVES Secured independent tools are being introduced to aid in peritoneoscopy. We present a simple technique for anchoring instruments, powered lights, and micro machines through the abdominal wall. METHODS We used a laparoscopic trainer, micro alligator clips with one or two 2-0 nylon tails and cables for engines and lights. The above instruments were introduced via a 12-...
متن کاملPerformance Evaluation of Secured versus Non-Secured EIGRP Routing Protocol
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints. In this paper, we ev...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Japanese Journal of Ornithology
سال: 1935
ISSN: 0040-9480,1881-9702
DOI: 10.3838/jjo1915.8.40_519