نتایج جستجو برای: e fetida worm and worm biomass
تعداد نتایج: 17343716 فیلتر نتایج به سال:
We give an estimate of type sup× inf on Riemannian manifold of dimension 5 for Yamabe type equation. Mathematics Subject Classification: 53C21, 35J60 35B45 35B50
One of the largest threats to network security in Internet-connected corporate networks is attack via worms. Worms infiltrate the network and compromise security, consuming processor cycles and network bandwidth that would otherwise be available for corporate use. This research analyses a particular strain of network worm called the “Ethical worm”, which is targeted towards beneficial means rat...
SUMMARY hydatic cyst is a serious disease of man. That cause by a worm called taenia echinocococus, the adult worm lives in small bowel of dog and other canine host. The dog is the usual definitive host of this parasite and is important for transmition of this disease. In this study a total of 283 stray dags Teheran country were investigated for the present of intestinal metazoan parasites. T...
To improve the efficiency of resistance of anti-worms to malicious worms and enhance their diffusibility, diffusion strategies of anti-worms based on B+ address tree are proposed in order to speed up anti-worm diffusion rate in the network and reduce anti-worm influence on network system when diffused. The diffusion strategies are simulated by scilab. Results show that anti-worms using B+ addre...
This work presents a closed-form expression for characterizing the spread of a class of worm-scanning strategies through a mean-field approximation. This expression can both accurately capture the worm propagation speed before the number of infections becomes large and explicitly demonstrate the effects of important parameters such as the vulnerable-host distribution and the worm-scanning strat...
Worm is the major hurdle, which restricts the comfortable communication in any networks. Worm is a malicious software program that destroys the normal communication in the networking systems. Every system must not be vulnerable to avoid infection by worm in the computing networks. Defending against such worm still plays vital role to the network programmers. Various countermeasures have been ta...
We present an extensive flow-level traffic analysis of the network worm Blaster.A and of the e-mail worm Sobig.F. Based on packet-level measurements with these worms in a testbed we defined flow-level filters. We then extracted the flows that carried malicious worm traffic from AS559 (SWITCH) border router backbone traffic that we had captured in the DDoSVax project. We discuss characteristics ...
a total of 68385 live pin-worm eggs from adhesive scotch tape were exposed to different detergent powders in under to compare method of detergent washing clothes with the boiling method for the control of family enterobiasis. results show that: a) 80.4-100 percent of eggs are destroyed after hatching within 6-8 hours of exposure to 0.25 gr% detergent at 10-250c. exposure for less than 6 hours h...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید