Rapid Bioassessment Protocols Using Aquatic Macroinvertebrates in Africa–Considerations for Regional Adaptation of Existing Biotic Indices

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Water quality indices based on bioassessment: the biotic indices.

Water quality indices (WQIs), which translate numerical values of several water quality characteristics of a sample into a single value, play a very important role in the monitoring, comparison and control of water quality. The WQIs of modern and post-modern times have been almost exclusively based on physical and chemical characteristics, and have seldom included 'biological' characteristics o...

متن کامل

Application of Rapid Bioassessment Protocols (RBP) for benthic macroinvertebrates in Brazil: comparison between sampling techniques and mesh sizes.

This study is part of the effort to test and to establish Rapid Bioassessment Protocols (RBP) using benthic macroinvertebrates as indicators of the water quality of wadeable streams in south-east Brazil. We compared the cost-effectiveness of sampling devices frequently used in RBPs, Surber and Kick-net samplers, and of three mesh sizes (125, 250 and 500 microm). A total of 126,815 benthic macro...

متن کامل

Detection of Human-Induced Stress in Streams. Comparison of Bioassessment Approaches using Macroinvertebrates

Dahl, J. 2004. Detection of human-induced stress in streams. Comparison of bioassessment approaches using macroinvertebrates. Doctoral dissertation. ISSN 1401-6230, ISBN 91-576-6716-0. Running water habitats are among the most precious, yet most threatened, ecosystems on earth. Hence, there is a need for reliable methods for detecting the effects of pollution on this valuable commodity. This th...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Frontiers in Water

سال: 2021

ISSN: 2624-9375

DOI: 10.3389/frwa.2021.628227