نتایج جستجو برای: e fetida worm and worm biomass

تعداد نتایج: 17343716  

2013
JYOTSHANA V. PRAJAPAT

We give an estimate of type sup× inf on Riemannian manifold of dimension 5 for Yamabe type equation. Mathematics Subject Classification: 53C21, 35J60 35B45 35B50

2007
Mark Wallis Frans A. Henskens

One of the largest threats to network security in Internet-connected corporate networks is attack via worms. Worms infiltrate the network and compromise security, consuming processor cycles and network bandwidth that would otherwise be available for corporate use. This research analyses a particular strain of network worm called the “Ethical worm”, which is targeted towards beneficial means rat...

Mohammad reza Reza Gholi Nazari,

SUMMARY hydatic cyst is a serious disease of man. That cause by a worm called taenia echinocococus, the adult worm lives in small bowel of dog and other canine host. The dog is the usual definitive host of this parasite and is important for transmition of this disease. In this study a total of 283 stray dags Teheran country were investigated for the present of intestinal metazoan parasites. T...

Journal: :IOP Conference Series: Earth and Environmental Science 2021

Journal: :JCP 2012
Dewu Xu Jianfeng Lu Wei Chen

To improve the efficiency of resistance of anti-worms to malicious worms and enhance their diffusibility, diffusion strategies of anti-worms based on B+ address tree are proposed in order to speed up anti-worm diffusion rate in the network and reduce anti-worm influence on network system when diffused. The diffusion strategies are simulated by scilab. Results show that anti-worms using B+ addre...

Journal: :IJSN 2009
Zesheng Chen Chao Chen Yubin Li

This work presents a closed-form expression for characterizing the spread of a class of worm-scanning strategies through a mean-field approximation. This expression can both accurately capture the worm propagation speed before the number of infections becomes large and explicitly demonstrate the effects of important parameters such as the vulnerable-host distribution and the worm-scanning strat...

2013
M. Milton Joe R. S. Shaji K. Ashok Kumar

Worm is the major hurdle, which restricts the comfortable communication in any networks. Worm is a malicious software program that destroys the normal communication in the networking systems. Every system must not be vulnerable to avoid infection by worm in the computing networks. Defending against such worm still plays vital role to the network programmers. Various countermeasures have been ta...

2005
Thomas Dübendorfer Arno Wagner Theus Hossmann Bernhard Plattner

We present an extensive flow-level traffic analysis of the network worm Blaster.A and of the e-mail worm Sobig.F. Based on packet-level measurements with these worms in a testbed we defined flow-level filters. We then extracted the flows that carried malicious worm traffic from AS559 (SWITCH) border router backbone traffic that we had captured in the DDoSVax project. We discuss characteristics ...

Journal: :iranian journal of public health 0
m.bahmanrokh m. mahmoodi

a total of 68385 live pin-worm eggs from adhesive scotch tape were exposed to different detergent powders in under to compare method of detergent washing clothes with the boiling method for the control of family enterobiasis. results show that: a) 80.4-100 percent of eggs are destroyed after hatching within 6-8 hours of exposure to 0.25 gr% detergent at 10-250c. exposure for less than 6 hours h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید