نتایج جستجو برای: e fetida worm and worm biomass

تعداد نتایج: 17343716  

Habib Khoshvaghti Mosa Tavassoli,

Forty-one wild sheep (Ovis ammon orintalis) from Kabodan Island of National Park of Urmia Lake (North-West of Iran), were examined during a period of six months from October 2002 to March 2003, for helminthes and coccidian infection. The numbers of oocyst and eggs per gram of faeces (OPG & EPG) were determined by the centrifuge flotation technique using saturated sugar solution. The rate of inf...

Journal: :Applied and environmental microbiology 2011
Thomas Mosser Ivan Matic Magali Leroy

Internal egg hatching in Caenorhabditis elegans, "worm bagging," is induced by exposure to bacteria. This study demonstrates that the determination of worm bagging frequency allows for advanced insight into the degree of bacterial pathogenicity and is highly predictive of the survival of worm populations. Therefore, worm bagging frequency can be regarded as a reliable population-wide stress rep...

2012
A.S.N. Chakravarthy K. Manasa Veena K. Renuka

Active worms are one of the major security threats to the Internet. This is because of their ability to propagate in an automated fashion as they continuously compromise computers on the Internet. Camouflaging Worm (C-Worm in short) is one of the active worms. The C-Worm is different from traditional worms because they can camouflage (hide) itself from the detection schemes by manipulating thei...

2015
Sartaj Ahmad Bhat Jaswinder Singh Adarsh Pal Vig

In the present work bagasse (B) i.e waste of the sugar industry, was fed to Eisenia fetida with cattle dung (CD) support as feed material at various ratios (waste: CD) of 0:100 (B0), 25:75 (B25), 50:50 (B50), 75:25 (B75) and 100:0 (B100) on dry weight basis. Co-composting with cattle dung helped to improve their acceptability for E. fetida and also improved physico-chemical characteristics. Bes...

2010
Shad Stafford Jun Li

Many worm detectors have been proposed and are being deployed, but the literature does not clearly indicate which one is the best. New worms such as IKEE.B (also known as the iPhone worm) continue to present new challenges to worm detection, further raising the question of how effective our worm defenses are. In this paper, we identify six behavior-based worm detection algorithms as being poten...

2012

As data to be stored in storage subsystems tremendously increases, data protection techniques have become more important than ever, to provide data availability and reliability. In this paper, we present the file system-based data protection (WOWSnap) that has been implemented using WORM (Write-Once-Read-Many) scheme. In the WOWSnap, once WORM files have been created, only the privileged read r...

2012

As data to be stored in storage subsystems tremendously increases, data protection techniques have become more important than ever, to provide data availability and reliability. In this paper, we present the file system-based data protection (WOWSnap) that has been implemented using WORM (Write-Once-Read-Many) scheme. In the WOWSnap, once WORM files have been created, only the privileged read r...

2012

Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation and thus pose great challenges to defend against them. In this paper, we investigate a new class of active worms, referred to as Camouflaging Worm (C-Worm ...

2012
S. Preetha

Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation, and thus, pose great challenges to defend against them. A new class of active worms, referred to as Camouflaging Worm (C-Worm in short). The C-Worm is dif...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید