نتایج جستجو برای: 2005 accordingly

تعداد نتایج: 193787  

2014
Kui Liu Buli Fu Jiangrong Lin Yueguan Fu Zhengqiang Peng Qi’an Jin

Laboratory studies were conducted to determine the effect of temperature and cold storage on the performance of Tetrastichus brontispae (Ferriere) (Hymenoptera: Eulophidae), one of the major endoparasitoids against coconut hispine beetle, Brontispa longissima (Gestro) (Coleptera: Chrysomelidae). The results revealed that T. brontispae could successfully parasitize host pupae under all seven tes...

2016
Xin-Ran Li Zong-Qing Wang

The incorrect generic name Perisphaeria Burmeister, 1838 results from a mistake by Princis (1947). Perisphaeria is an incorrect spelling by Burmeister referring to Perisphaerus Serville, 1831. Princis (1947) incorrectly regarded Perisphaeria as proposed by Burmeister and as the senior synonym of Hyposphaeria Lucas, 1863, which is valid. The subfamilial name Perisphaeriinae based on Perisphaeria...

2008
Thomas Neubauer Andreas Ekelhart Stefan Fenz

IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security standards provide a holistic approach to mitigate these threats and legal acts demand their implementation, companies often refrain from the implementation of information security standards, especially due to high costs and the lack of evidence for a positive cost/benefit...

2008
Shareeful Islam Jan Jürjens

Compliance with law, industry standards, and corporate governance regulations are one of the driving factors for discovering security requirements. This paper aims to incorporate constraints from regulations through security requirements at an early stage of development. Constraints are extracted using a pattern based approach from legal texts of information security laws and policies derived f...

2010
Elena Ruiz Larrocha Jesús M. Minguet Gabriel Díaz Manuel Castro

This paper describes different proposals made at UNED, for post-graduated students, at the area of IT Services Management and specially trying to fill the gap, of paramount importance, of the treatment due in ITIL® (Information Technology Infrastructure Library) to Information Security Management. We analyze the treatment given to Information Security Management in ITIL, both versions 2 and 3, ...

Journal: :CoRR 2011
Tolga Mataracioglu Sevgi Özkan

In this paper, after giving a brief definition of Information Security Management Systems (ISMS), ISO 27001, IT governance and COBIT, pros and cons of implementing only COBIT, implementing only IS

2009
Ali Sunyaev Alexander Kaletsch Christian Mauro Helmut Krcmar

This paper describes a technical security analysis which is based on experiments done in a laboratory and verified in a physician’s practice. The health care telematics infrastructure in Germany stipulates every physician and every patient to automatically be given an electronic health smart card (for patients) and a corresponding health professional card (for health care providers). We analyze...

Journal: :Zootaxa 2015
Daniel Burckhardt Zoya Yefremova Ekaterina Yegorenkova

Adults and immatures of Diaphorina teucrii sp. nov. (Hemiptera, Liviidae, Euphyllurinae) and adults of Tamarixia dorchinae sp. nov. (Hymenoptera, Eulophidae, Tetrastichinae) from Israel are described, diagnosed and illustrated. D. teucrii sp. nov. develops on Teucrium capitatum (Lamiaceae), representing a family which was previously not recorded as a psyllid host from Israel, and is parasitised...

Journal: :Journal of economic entomology 2006
Edward W Evans Jay B Karren Clark E Israelsen

The phenology of parasitism of the cereal leaf beetle, Oulema melanopus (L.) (Coleoptera: Chrysomelidae) by Tetrastichus julis (Walker) (Hymenoptera: Eulophidae) was studied in small grain fields from 2000 to 2005 in northern Utah, after release and redistribution of the partially bivoltine larval parasitoid during the 1990s. Host larvae first occurred in May, with peak infestation typically oc...

Journal: :Climate of The Past 2021

Abstract. Trees record climatic conditions during their growth, and tree rings serve as proxy to reveal the features of historical climate a region. In this study, we collected tree-ring cores hemlock forest (Tsuga forrestii) from northwestern Yunnan area southeastern Tibetan Plateau (SETP) created residual width (TRW) chronology. An analysis relationship between growth revealed that precipitat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید