نتایج جستجو برای: blood worm

تعداد نتایج: 695532  

ژورنال: توسعه آبزی پروری 2019

Abstract This study was conducted to test the effect of bioremediation the polychaete worm Nereis diversicolor in order to removal of wastewater nutrition derived different densities Huso huso. The aim of this study was determination of different densities for creating the equivalence for rearing of N. diversicolor and H. huso rate in the integrated culture system. Three different densities of ...

Journal: :Applied and environmental microbiology 2011
Thomas Mosser Ivan Matic Magali Leroy

Internal egg hatching in Caenorhabditis elegans, "worm bagging," is induced by exposure to bacteria. This study demonstrates that the determination of worm bagging frequency allows for advanced insight into the degree of bacterial pathogenicity and is highly predictive of the survival of worm populations. Therefore, worm bagging frequency can be regarded as a reliable population-wide stress rep...

Journal: :Cadernos de saude publica 2003
Edward José de Oliveira Hermínia Yoshio Kanamura Luiz Cândido de Souza Dias Lanny Cristina Burlandy Soares Dirce Mary Correia Lima Ricardo Mário de Carvalho Ciaravolho

An immunoenzymatic method for the detection of IgM antibodies (IgM-ELISA) against a fraction of Schistosoma mansoni adult worm antigen, soluble in trichloroacetic acid (TCA-soluble fraction), was evaluated for epidemiological purposes in low endemic areas for schistosomiasis. Blood samples on filter paper were collected from a population living in the municipality of Pedro de Toledo, São Paulo ...

2012
A.S.N. Chakravarthy K. Manasa Veena K. Renuka

Active worms are one of the major security threats to the Internet. This is because of their ability to propagate in an automated fashion as they continuously compromise computers on the Internet. Camouflaging Worm (C-Worm in short) is one of the active worms. The C-Worm is different from traditional worms because they can camouflage (hide) itself from the detection schemes by manipulating thei...

2012

As data to be stored in storage subsystems tremendously increases, data protection techniques have become more important than ever, to provide data availability and reliability. In this paper, we present the file system-based data protection (WOWSnap) that has been implemented using WORM (Write-Once-Read-Many) scheme. In the WOWSnap, once WORM files have been created, only the privileged read r...

2012

As data to be stored in storage subsystems tremendously increases, data protection techniques have become more important than ever, to provide data availability and reliability. In this paper, we present the file system-based data protection (WOWSnap) that has been implemented using WORM (Write-Once-Read-Many) scheme. In the WOWSnap, once WORM files have been created, only the privileged read r...

2010
Shad Stafford Jun Li

Many worm detectors have been proposed and are being deployed, but the literature does not clearly indicate which one is the best. New worms such as IKEE.B (also known as the iPhone worm) continue to present new challenges to worm detection, further raising the question of how effective our worm defenses are. In this paper, we identify six behavior-based worm detection algorithms as being poten...

Journal: :Genitourinary medicine 1997
G Satpathy S Mohanty S P Pani S K Panda

OBJECTIVE To determine the presence of Chlamydia trachomatis in hydrocele fluid. METHODS 90 male patients with hydrocele of tunica vaginalis from an endemic area for bancroftian filariasis were investigated for the presence of Chlamydia trachomatis in their hydrocele fluids. C trachomatis antigen detection tests-a direct immunofluorescence assay and an enzyme immunoassay along with polymerase...

Journal: :The Southeast Asian journal of tropical medicine and public health 2003
Supap Saenphet Chalobol Wongsawad Kanokporn Saenphet Jong-Yil Chai

Two rodent hosts, rats (Rattus norvegicus) and mice (Mus musculus), were examined for their susceptibility to Stellantchasmus falcatus infection. The metacercariae were recovered from half-beaked fish, Dermogenus pusillus, collected from Hang Dong District, Chiang Mai Province. A single inoculation of three hundred metacercariae was orally conducted with male rats (n=15) and mice (n=15). Uninfe...

2012

Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation and thus pose great challenges to defend against them. In this paper, we investigate a new class of active worms, referred to as Camouflaging Worm (C-Worm ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید