نتایج جستجو برای: compromised host
تعداد نتایج: 237790 فیلتر نتایج به سال:
engraftment by donor lymphocytes in an immunologically compromised host can result in donor t-cell activation against host major histocompatibility complex antigens, with resultant gvhd. the acute form of gvhd (agvhd) is characterized by erythroderma, cholestatic hepatitis, and enteritis. the intestinal symptoms of agvhd include crampy abdominal pain and watery diarrhea, often with blood. the c...
A botnet is one of the most dangerous forms security issues. It infects unsecured computers and transmit malicious commands. By using botnet, attacker can launch a variety attacks, such as distributed denial service (DDoS), data theft, phishing. The may contain lot infected hosts its size usually large. In this paper, we addressed problem detection based on network’s flows records activities in...
The fungal pathogens Cryptococcus neoformans and Cryptococcus gattii can cause life-threatening infections in immune compromised and immune competent hosts. These pathogens enter the host via inhalation, and respiratory tract innate immune cells such as dendritic cells (DCs) are one of the first host cells they encounter. The interactions between Cryptococcus and innate immune cells play a crit...
PURPOSE When investigating a case of unexplained corneal ulceration, we need to think of fungal infection and any predisposing factors. METHODS A case study of a corneal ulceration in a patient who was HIV positive with a devastating visual outcome. RESULTS Therapeutic corneal graft was necessary due to corneal perforation. Immunocompromised state of patient was retrospectively diagnosed. ...
It is generally reasoned that lethal infections caused by opportunistic pathogens develop permissively by invading a host that is both physiologically stressed and immunologically compromised. However, an alternative hypothesis might be that opportunistic pathogens actively sense alterations in host immune function and respond by enhancing their virulence phenotype. We demonstrate that interfer...
Introduction The goal of this paper is to describe the idea of so called passive covert channels (PCC), which might be used by malware to leak information from the compromised hosts. This idea has been implemented in a proof-of-concept tool, called NUSHU. The primary goal of the PCC is to be as stealth as possible by not generating its own traffic at all. To be actually useful PCC should be com...
"The authentic facts, relating to the remarkable power of the Eucalyptus Globulus in drjing marsh lands and rendering them healthy, are such as to deserve serious and general attention. It appears to be certain that where the Eucalyptus prospers intermittent fever disappears. This tree grows with incredible rapidity, absorbs ten times its own weight of water in twentyfour hours, and spreads thr...
Background and Aims: The first permanent molar is susceptible to caries, endodontic complications and developmental anomalies. Compromised teeth with poor prognosis could cause the clinician to face dilemmas. The aim of this review article was to assess recent guidelines on the treatment planning of compromised first permanent molars in mixed dentition period. Materials and Methods: The de...
Condition factor is a measure of energetics, nutritional status and viability host. Changes in the host condition have effect on rate infection. 100 fishes Sarotherodon melanotheron 90 Parachanna obscura from Lekki lagoon were procured dissected for intestinal helminth parasites. factors all individuals determined. Median (K < 1.32 K > 1.32) 4.09 4.09) used grouping individuals. Male fema...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید