XLI.—Investigations upon some Protozoa

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Some aspects of rumen ciliate protozoa.

Balch, C. C., Johnson, V. W. & Turner, I. A. (1955). Rep. Nut. Inst. Dairy. Reading, p . 40. Balch, D. A. & Rowland, S. J. (1957). Biit.J. Nutr. XI, 288. Barry, J. M. (1958). Proc. roy. Soc. B, 149, 380. Burt, A. W. A. (1957). Dairy Sci. Abstr. 19, 436. Folley, S. J. (1956). The Physiology and Biochemistry of Lactation. Edinburgh and London: Oliver and Boyd. Glascock, R. F. (1958). Proc. roy. S...

متن کامل

Some Observations upon Spirostomum

CONTENTS. PAGE 1. H I S T O R I C A L 3 9 2 2. M A T E R I A L A N D M E T H O D S . . . . . . . 3 9 3 F i x a t i o n 3 9 3 S t a i n i n g 3 9 4 O b s e r v a t i o n s o n L i v i n g S p e c i m e n s . . . . . 3 9 4 F e e d i n g M e t h o d s . . . . . . . . 3 9 5 3. O B S E R V A T I O N S O N T H E M O R P H O L O G Y O F S P I R O S T O M U M A M B I G U U M 3 9 5 C o n t r a c t i l e...

متن کامل

Some Aspects of the Protozoa and Their Way of Life.

I feel much honoured to have been invited to give the Marjory Stephenson Memorial lecture of 1963, but I must confess that I also approach the undertaking with considerable trepidation as it fills me with an acute sense of inadequacy. In 1961 Professor Knight in his lecture on the growth of microbiology gave a very good account of Marjory Stephenson’s own contribution and her influence on the d...

متن کامل

2-Aminoethylphosphonic acid concentrations in some rumen ciliate protozoa.

The concentration of 2-aminoethylphosphonic acid has been measured in seven genera of rumen ciliate protozoa. Expressed as milligrams per gram of total nitrogen, 2-aminoethylphosphonic acid concentrations ranged from 17.2 in Ophryoscolex spp. to 72.4 in Eremoplastron spp.

متن کامل

Some new attacks upon security protocols

Many security protocols have appeared in the literature, with aims such as agreeing upon a cryptographic key, or achieving authentication. However, many of these have been shown to be flawed. In this paper we present a number of new attacks upon security protocols, and discuss ways in which we may avoid designing incorrect protocols in the fu-

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Annals and Magazine of Natural History

سال: 1883

ISSN: 0374-5481

DOI: 10.1080/00222938309459158