نتایج جستجو برای: rodent attacks
تعداد نتایج: 84575 فیلتر نتایج به سال:
Peromyscus ochraventer is a rodent species endemic of Mexico. In 1981, Robbins and Baker described its karyotype from one single female which presented 2n = 48 FN 60.
Previous studies suggest that rodent burrows, a proxy for rodent population are important for predicting plague risk areas. However, studies that link landform, surface attributes and rodent burrows in the Western Usambara Mountains in Tanzania are scanty. Therefore, this study was conducted in plague endemic area of the Western Usambara Mountains in northern, Tanzania, to explore the relations...
Background Apnea of prematurity (AOP) is a developmental disorder that affects the premature newborns frequently. One of the new non-drug methods for controlling apnea attacks is olfactory stimulation. The aim of this study was to determine the effect of olfactory stimulation by vanilla on the rate of apnea attacks in neonates with AOP. Materials and Methods: This study is a single-blind random...
Based on historical data, wolf is one of the large carnivores which suffers from human-wildlife conflicts especially in the animal husbandry field. In this research we tried to model wolf attacks to the humans and livestocks in Ardabil Province, and give some relevant recommendations. Focusing on the wolf attacks data (both human and livestocks), recorded during 10 years (2004–2014), we carried...
BACKGROUND Hemorrhagic fever with renal syndrome (HFRS) is a rodent-borne disease caused by hantaviruses. Landscape can influence the risk of hantavirus infection for humans, mainly through its effect on rodent community composition and distribution. It is important to understand how landscapes influence population dynamics for different rodent species and the subsequent effect on HFRS risk. ...
wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. routing attacks on the networks, where a malicious node from sending data to the base station is perceived. in this article, a method that can be used to transfer the data securely to prevent attacks...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید