نتایج جستجو برای: mopane worm

تعداد نتایج: 9551  

2011
Xufei ZHENG Tao LI Hua YANG X. Zheng

Cloud computing technology not only provides us powerful computing, on-demand service, rapid elasticity, but also possible great destruction by the internet criminal accordingly. This prompts us to consider the cloud-based worm propagation problem. We set up the analytical model through a highly abstract network environment and achieve the overall characteristics of the worm research purposes. ...

Journal: :iranian journal of parasitology 0
t mohammadzadeh department of parasitology and mycology, school of medicine, shiraz university of medical sciences, shiraz, iran sm sadjjadi department of parasitology and mycology, school of medicine, shiraz university of medical sciences, shiraz, iran hr rahimi department of parasitology and mycology, school of medicine, shiraz university of medical sciences, shiraz, iran s shams fars industrial abattoirs, shiraz, iran

background: echinococcus granulosus , a zoonotic cestode parasite, causative agent of hydatid cyst is endemic in many parts of the world including the middle east. study on different aspects of this parasite is very important and valuable. however, working with adult worms which their habitat situated in the small intestine of canids, is dangerous and risky. achieving such risky situa­tion need...

Journal: :Tree physiology 2008
Elmar M Veenendaal Khanyisa B Mantlana Norman W Pammenter Piet Weber Phillipa Huntsman-Mapila Jon Lloyd

We investigated differences in physiological and morphological traits between the tall and short forms of mopane (Colophospermum mopane (Kirk ex Benth.) Kirk ex J. Léonard) trees growing near Maun, Botswana on a Kalahari sandveld overlying an impermeable calcrete duricrust. We sought to determine if differences between the two physiognomic types are attributable to the way they exploit availabl...

2015
Dipali Kharche Anuradha Thakare

Internet worm means separate malware computer programs that repeated itself and in order to spread one computer to another computer. Malware includes computer viruses, worms, root kits, key loggers, Trojan horse, and dialers, adware, malicious, spyware, rogue security software and other malicious programs. It is programmed by attackers to interrupt computer process, gatherDelicate Information, ...

1999
S. J. Torr J. W. Hargrove

Studies were made of the behaviour of Glossina pallidipes Austen and G. morsitans morsitans Westwood during the hot season (September–November) in Zimbabwe, and attributes of samples of tsetse from refuges, odour-baited traps, targets and mobile baits were compared. Various arrangements of electric nets were used to study tsetse as they entered or left artificial refuges. The peak time of entry...

Journal: : 2021

Abstract The manufacturing precision of involute worms constitutes a major requirement. On the one hand, worm input element drive; secondly, helical surface is basic an worm-hob. This paper presents analytic comparison between surfaces obtained using theoretical equations, kinematic simulation cutting and charged with errors. error considered distance along normal direction to surface, measured...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید