نتایج جستجو برای: worm

تعداد نتایج: 9462  

Journal: :محیط شناسی 0
روح الله رستمی کارشناس ارشد مهندسی بهداشت محیط، مربی دانشکدة بهداشت، دانشگاه علوم پزشکی ایلام امیر نبئی کارشناس بهداشت محیط، مسئول آزمایشگاه تصفیه خانه فاضلاب شهری زنجان اکبر اسلامی استادیار بهداشت محیط، دانشکده بهداشت، دانشگاه علوم پزشکی زنجان حسین نجفی صالح دانشجوی کارشناسی ارشد مهندسی بهداشت محیط دانشکدة بهداشت، دانشگاه علوم پزشکی شهید بهشتی

much amount of solid waste disposed from human communities, daily. considerable part of these solids is organic waste that recycling and utilization of it by miscellaneous methods to holdup of damage to environment and maintenance of resources and energy is noteworthy for human. one of suitable methods for disposal of these wastes is production of organic fertilizer by use of vermicompost metho...

Frederik Vermeulen, Hamid Masoumi, Tom Vanhonacker

Apart from regular wheel wear such as decreasing wheel diameters and reduced flange thicknesses and heights, wheel flats (WF) and oval wheels (or OOR, Out-Of-Roundness) are the most common wheelset problems for railway vehicles. Within the FP7 Research Project “Saferail”, APT has developed an innovative wheelset monitoring system so-called “Wheel flat and Out of Roundness Monitoring (WORM) syst...

Journal: :iranian journal of public health 0
mohammed reza sheikhian gastrointestinal and liver disease section, department of internal medicine, imam reza hospital, mashhad university of medical science , mashhad, iran.

a case of a 40-year-old female, in whom a 6-meter long worm (taenia saginata) was found in stomach, is reported here. in this patient, t. saginata upward migration of the worm to the stomach, its rare phenomenon, worm mostly seen in the small intestine. this is mainly because of the high gastric acidity. in this patient, we believe proton pump inhibitor (ppi) use caused hypochlorhydria and coex...

Journal: :JIPS 2009
Byung-Gyu No Doo-Soon Park Min Hong Hwa-Min Lee Yoon Sok Park

Ever since the network-based malicious code commonly known as a 'worm' surfaced in the early part of the 1980's, its prevalence has grown more and more. The RCS (Random Constant Spreading) worm has become a dominant, malicious virus in recent computer networking circles. The worm retards the availability of an overall network by exhausting resources such as CPU capacity, network peripherals and...

2004
Christopher Church

ISBN 555555555/$10.00  2004 IEEE Abstract – Malicious worms have presented a formidable threat to the security community in recent years. Beginners to internet security research require an understanding of the inner workings of worms. A simple research worm designed to run on a test network facilitates this understanding. This worm is also useful to researchers needing see how a typical worm w...

2013
Andrea J Cullen

This paper presents a new STAKCERT KDD processes for worm detection. The enhancement introduced in the data-preprocessing resulted in the formation of a new STAKCERT model for worm detection. In this paper we explained in detail how all the processes involved in the STAKCERT KDD processes are applied within the STAKCERT model for worm detection. Based on the experiment conducted, the STAKCERT m...

2006
KAI-GUI WU YONG FENG

According to the features of worm propagation, a novel model for proactive worm prevention based on peer-to-peer (P2P) networking technologies is proposed in this paper. At first, we present the backgrounds and security issues related to P2P networks. Then, a structured P2P overlay network designed for worm prevention is specified. Based on that, we present the methods for Internet worm forecas...

Journal: :Pacific Symposium on Biocomputing. Pacific Symposium on Biocomputing 2000
M Gerstein J Lin H Hegyi

We survey the protein folds in the worm genome, using pairwise and multiple-sequence comparison methods (i.e. FASTA and PSI-blast). Overall, we find that approximately 250 folds match approximately 8000 domains in approximately 4500 ORFs, about 32 matches per fold involving a quarter of the total worm ORFs. We compare the folds in the worm genome to those in other model organisms, in particular...

2016
Tarek S. Sobh Heba Z. El-Fiqi

Network attacks such as computer virus and worms that scan computers randomly have caused billions of dollars in damage to enterprises across the Internet [Erbschloe M., 2005]. There are different worm detection techniques. [Guofei, G., 2004] classified them according to the worm characteristic used by detection technique. One approach is using worm signatures, it depends on the identical or si...

2005
Yufeng Chen Yabo Dong Dongming Lu Yunhe Pan

Worms have been becoming a serious threat in web age because worms can cause huge loss due to the fast-spread property. To detect worms effectively, it is important to investigate the characteristics of worm traffic at individual source level. We model worm traffic with the multi-fractal process, and compare the multi-fractal property of worm and normal traffics at individual source level. The ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید