Guinea Worm

In: Science

Submitted By modelnek
Words 255
Pages 2
Dracunculiasis the disease commonly known as Guinea Worm is caused by the parasitic worm Dracunculus Medinensis . Guinea Worm disease only occurs in 10% of the world’s poorest populations who has no access to safe drinking water or health care. This parasitic worm is the largest of parasites affecting the human’s tissues. The risk for Dracunculiasis varies by ones sex, age, profession, and ethnicity. These differences reflect from how people’s drinking water is obtained in these countries. Drancunculiasis is commonly found now in Southern Sudan. About the same number of men and women are equally infected. Guinea Worm is common among the ages of 15–45 years old. People in this age group are known to be farmers, herders, and water fetchers for the household. Water fetchers often affected more due to the fact that they are more likely to drink contaminated water while away from home.
People become infected with Guinea worm by drinking stationary water containing copepods tiny "water fleas" that carry Guinea worm. It takes about 2 weeks to mature inside the copepods before they can infect humans. Measuring 2-3 feet in length the adult female can carry about 3 million embryos within one person. This parasite migrates through the victim's subcutaneous tissues causing severe pain especially when it occurs in the joints. The worm eventually emerges causing an intense pain, blisters and ulcers accompanied by fever, nausea and vomiting. Studies show that biological factors can increase ones susceptibility. Not everyone drinking from the same contaminated water supply will become…...

Similar Documents

Round Worms

...experiments on more than 10,000 tiny laboratory roundworms. The first step involved developing genetic mutants of these transparent roundworms for each one of 654 genes that were suspected to play a role in the regulation of axon regrowth in worms, fruit flies and mice. They then labeled the roundworm neurons with green fluorescent protein and, with a precise surgical laser, damaged a specific axon. Because the worms were transparent they could see the axons expressing a green fluorescent protein. By examining the re-growth, or lack of growth, of the damaged axon 24 hours later, the scientists were then able to determine which of these 654 genes were actually important to axon re-growth. The 76 genes seen are believed to have the same function in humans as in the worms. Research teams are now collaborating with other investigators to conduct experiments on mice to verify this connection and determine which of these genes are the most critically important. This article is relevant to what I am studying because it show that we as humans have so many genes cells and other parts throughout our body that do many different things and when we damage these or harm them there is a way for our body to compensate or try to fix the problem. So in the worms they are finding axons or nerve cells that could potentially cure nerve damage in our bodies. My opinion is that if scientists can find a way to regenerate nerve cells in animals that maybe someday they will be able to......

Words: 367 - Pages: 2

The Worm in the Apple

...The worm in the apple John Cheever is an American novelist, who gained his popularity as a short-story writer, for which he was awarded with Pulitzer prize for fiction. His work mostly deal with the duality oh human nature corroborated by cultural and psychological background. And his short story titled “The worm in the apple” is not an exclusion. The story unfolds very smoothly and evenly in spite of of the stirring and at the same time troubling subject of the matter. We get acquainted with the main characters – The Crutchman family “so very very happy and so temperate in all their habits and so pleased with everything that came their way”, due to the anaphoric repetition the author creates intensification, that states the problem – what in beautiful on the outside may be dreadful inside. Obviously, the theme of the work is reflected in the title of the story. The rhetorical questions (who but someone suffering from a guilt complex would want to much light to pour into the rooms?; Why be o intense about digging holes) give a detailed emotional description of the Crutchman's life. The world of things puts emphasis on their way of life and thoughts. The positive form of these questions presuppose negative answers and so it gets obvious from the very beginning that the Crutchman's problems are deep and that the extraordinary rosiness of their family fruit just conceal the gravity of the infection. John Cheever gives a psychological portray of the main characters: Helen and......

Words: 693 - Pages: 3

Guinea Pig Foods

...rhubarb, breads, biscuits, sweets, sugar, breakfast cereals, chocolate. What should you feed your guinea pig?    Like rabbits, Guinea Pigs are herbivores and require a high fiber diet. They should have grass or grass hay (e.g. meadow, timothy, fescue, oaten, pasture, and paddock or ryegrass hays) available at all times. Lucerne or clover hay can be offered but not as the sole source of fibre as they are high in calcium and protein. Suitable grasses include clover, buffalo grass, & oat grass. Guinea pigs also enjoy dandelion, milk thistle & a variety of fresh herbs. Grass & hay encourages chewing for long periods of time and helps to keep their teeth in good condition, which grow continuously throughout the guinea pig's life. The hay is best provided to them, if possible, in a hayrack attached to their cage wall. Fresh leafy green vegetables and herbs should also be offered. Vegetables include broccoli, cabbage, celery, endive, beet/carrot tops, Brussels sprouts, zucchini, capsicum, spinach leaves, bok choy & other Asian greens, dark-leafed lettuce varieties, fresh (uncooked) peas and stringed beans, corn and husks (sparingly as high in calcium). Herbs include parsley, coriander, mint, dill, basil, dandelion, rocket etc. Offer a variety of 2 or 3 different greens each day and remember to make any changes to the diet slowly to avoid gastric upset. Guinea Pigs also require a dietary source of Vitamin C, otherwise they will suffer from 'scurvy'.......

Words: 847 - Pages: 4

Guinea Worm

...Dracunculiasis the disease commonly known as Guinea Worm is caused by the parasitic worm Dracunculus Medinensis . Guinea Worm disease only occurs in 10% of the world’s poorest populations who has no access to safe drinking water or health care (CDC) . This parasitic worm is the largest of parasites affecting the human’s tissues. The risk for Dracunculiasis varies by ones sex, age, profession, and ethnicity. These differences reflect from how people’s drinking water is obtained in these countries (Medscape). Drancunculiasis is commonly found now in Southern Sudan. About the same number of men and women are equally infected. Guinea Worm is common among the ages of 15–45 years old. People in this age group are known to be farmers, herders, and water fetchers for the household. Water fetchers often affected more due to the fact that they are more likely to drink contaminated water while away from home (CDC). People become infected with Guinea worm by drinking stationary water containing copepods tiny "water fleas" that carry Guinea worm. It takes about 2 weeks to mature inside the copepods before they can infect humans. Measuring 2-3 feet in length the adult female can carry about 3 million embryos within one person (World Health Organization). This parasite migrates through the victim's subcutaneous tissues causing severe pain especially when it occurs in the joints. The worm eventually emerges causing an intense pain, blisters and ulcers accompanied by fever, nausea and......

Words: 646 - Pages: 3

Mydoom Worm

...Running head: Malicious Code MyDoom Worm Daniel Stevenson 11/22/2013 ITT-Tech North Las Vegas Abstract In this paper I will be detailing the Mydoom worm and what this has done to computer systems as well as what was the steps in how to prevent or remove this hazard from your computer. MyDoom Worm No one wants a virus on their computer, especially when it means that you may be spending money to remove these nasty pests from your system. There are all sorts of things that can infect your computer from viruses, worms, rootkits that make your computer into a puppet and also malicious spam ware and malware. All of these things can wreak havoc on your network. In this paper I will tell you about a worm that still has the record for being the fastest spreading virus. This virus is known as W32.MyDoom@mm. This worm has other names but this is the one that it is most known by. The Beginning MyDoom was a worm that came to the public eye at the beginning of 2004. Finnish security company F-Secure named is the worst virus to date because of the way it quickly infested users emails and quickly attached itself to any email that was going out that had an attachment. When the worm first came into the spotlight F-Secure stated that the worm was on 20-30% of the worldwide internet traffic. Another company that screens emails for companies, MessageLabs, also stated that it had intercepted the worm more than 3.4 million times at a rate of every 1 in 12 emails at its highest. This...

Words: 809 - Pages: 4

Worms and Trojan Horses

...The ILOVEYOU worm was first reported in Hong Kong on 4 May 2000 and spread westward on that day. The ILOVEYOU worm affected computers at more than half of the companies in the USA and more than 105 mail servers in Europe. Internal e-mail systems at both the U.S. Senate and Britain's House of Commons were shut down. It was estimated that the ILOVEYOU worm did more damage than any other malicious program in the history of computing: approximately US$ 9 × 109. On 4 May 2000, MessageLabs filtered ILOVEYOU from one in every 28 e-mails, the all-time highest daily infection rate seen by MessageLabs. The ILOVEYOU incident was commonly reported as a virus in the news media, but it was actually a worm, because this malicious program did not infect other programs. I call this worm by the subject line of e-mail that propagated this worm. Norton Anti-Virus calls it VBS.Loveletter.A. The ILOVEYOU worm arrived at the victim's computer in the form of e-mail with the ILOVEYOU subject line and an attachment. The e-mail itself was innocuous, but when the user clicked on the attachment to read the alleged love letter, LOVE-LETTER-FOR-YOU.TXT.VBS, the attachment was a Visual Basic program that performed a horrible sequence of bad things: Deletion of files from victim's hard disk. The worm overwrote files from the victims' hard disk drive, specifically targeting files with extensions:*.JPG, *.GIF, and *.WAV, amongst many others (i.e., files containing audio/visual data), *.CSS (i.e., cascading......

Words: 1046 - Pages: 5

Viruses, Trojans, Worms

...recent major viruses. What is a computer virus? A computer virus is a program or piece of software that copies itself to your PC, or attaches itself to a document. For example, when you open an infected document it replicates and attaches to other files on your hard drive. The process goes unnoticed until it is too late and your computer crashes. There are 3 types of computer viruses; E-Mail Viruses, Worms, and Trojan Horses. E-Mail Viruses- Many Hackers use E-Mail Viruses to reek havock on the E-World. (According to WWW.HACKERS.COM-Hackers are evil people who have nothing better to do with their vast knowledge of computers than destroy them.) An E- Mail Viruse is sent from person to person via E-Mail. Once the infected E-Mail is opened it replicates by sending itself to everyone in your address book. Thus resulting, the people in your address book open the E-Mail and are then infected. Any simple Virus scaning software should be able to stop and remove E-Mail viruses. Norton Anti-Virus is one of the best choices for defense. Worms- A network virus, it uses 'holes' in a computer network to replicate and take up space, in the end it makes the network grind to a hault. This virus once on a computer it scans the network for other vunerable computers, then infects them and continues the process over again. There are several effective Virus defense programs to choose from. Before you purchase one it is always better to make sure it......

Words: 992 - Pages: 4

The Worm in the Apple

...The worm in the apple John Cheever is an American novelist, who gained his popularity as a short-story writer, for which he was awarded with Pulitzer prize for fiction. His work mostly deal with the duality oh human nature corroborated by cultural and psychological background. And his short story titled “The worm in the apple” is not an exclusion. The story unfolds very smoothly and evenly in spite of of the stirring and at the same time troubling subject of the matter. We get acquainted with the main characters – The Crutchman family “so very very happy and so temperate in all their habits and so pleased with everything that came their way”, due to the anaphoric repetition the author creates intensification, that states the problem – what in beautiful on the outside may be dreadful inside. Obviously, the theme of the work is reflected in the title of the story. The rhetorical questions (who but someone suffering from a guilt complex would want to much light to pour into the rooms?; Why be o intense about digging holes) give a detailed emotional description of the Crutchman's life. The world of things puts emphasis on their way of life and thoughts. The positive form of these questions presuppose negative answers and so it gets obvious from the very beginning that the Crutchman's problems are deep and that the extraordinary rosiness of their family fruit just conceal the gravity of the infection. John Cheever gives a psychological portray of the main characters: Helen......

Words: 339 - Pages: 2

Worm Hole

...alter or destroy the data being exchanged in the network there by disrupting the normal functioning of the network. Active attacks can be internal or external. External attacks are carried out by nodes that do not belong to the network. Internal attacks are from compromised nodes that are part of the network. Since the attacker is already part of the network, internal attacks are more severe and hard to detect than external attacks. Active attacks, whether carried out by an external advisory or an internal compromised node involves actions such as impersonation, modification, fabrication and replication. Layer | Types of Attack | Application | Malicious code, Data corruption, viruses and worms | Transport | Session hijacking attack, SYN Flooding Attack | Network | Black hole, Worm Hole, sinkhole, link spoofing, rushing aaaaaaaa aaaaaaaa aattack, replay attack, Sybil attack etc.spoofing, rushing attack, replay attack, Sybil attack etc. | Data link | Selfish misbehaviour, malicious behaviour, traffic analysis. | Physical | Eavesdropping, jamming, active interference. | Table 1:Classification of Attacks 3. WORMHOLE ATTACK The wormhole attack is one of the most efficient attacks, which can be executed within MANET. There are two collaborating attackers should establish the wormhole link connection via a direct low-latency communication link between two separated distant points......

Words: 3336 - Pages: 14

Stuxnet Worm

...STUXNET Worm Webster University SECR-5080 Information Systems Security Author Note Certificate of Authorship: This paper was prepared by me for this specific course and is not a result of plagiarism or self-plagiarism. I have cited all sources from which I used data, ideas, or words either quoted or paraphrased. Abstract Discovered in June of 2010, a computer worm called Stuxnet was designed to attack programmable-logic controllers or PLCs that are used to control switches and values in industries that operate a specific type of on Siemens PLC device using Step7 software running on a Windows operating system. The worm was successful because it was able to exploit a of four zero-day flaw of Windows operating system. Stuxnet was a targeted attack by intelligence agencies to delay the enrichment of uranium by Iran. The Stuxnet worm was the first clear public evidence of sophisticated computer malware to sabotage control systems. The Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges in 2010. Table of Contents Introduction 5 Stuxnet Worm 5 Stuxnet is a Computer Virus 5 How Stuxnet Works 7 Stuxnet and PLCs 9 Stuxnet: Cyber Warfare? 9 Zero-day flaws and Stuxnet 11 Summary 12 References 14 Table of Figures Figure 1: SIEMINS S7 family of PLC (SIEMINS, n.d) 5 Figure 2: Flash Drive 5 Figure 3: Realtek Semiconductor Corp Logo (RealTek, n.d.). 6 Figure 4: Realtek Certificate (Symantec, 2010). 6 Figure 5: How......

Words: 2136 - Pages: 9

Early Bird Catches the Worm

...Amber S. Grayer 6/12/13 English “Early bird catches the worm” I. Health and wellness II. Career and employment promotions III. Educational endeavors Many people have often heard the phrase “The early bird catches the worm.” In defining this phrase it can be determined that the earlier a person develops interest and pursue the challenges involved in that interest the more beneficial it can be to that individual. Three common areas of interest where the earl bird can excel are in health and wellness, career and employment promotions, and educational endeavors. The earlier you start something the better the chances of succeeding. This is true in every sphere and every phase of life, be it health, studies, or be it business. There are numerous benefits of taking the head start. Regardless of what disease or illness one has or thinks about, there are various benefits to having an early diagnosis, or at least a diagnosis on the first trip to the doctor. One of the biggest advantages of being diagnosed early rather than late is that it allows you to know what is wrong providing a peace of mind. If the diagnosis is a major one it allows for treatment to begin. Some diseases, if caught early enough, allow you to be completely cured. In cancer and other progressive diseases early diagnosis can mean that the disease is not given the opportunity to spread to other organs or infect the rest of your body. Knowledge is power. Take good care of yourself. There...

Words: 495 - Pages: 2

New Guinea

...Gilliland1 The New Guinea Rainforest By: Maranda Gilliland Gilliland2 Maranda Gilliland Ms. Percefull Introduction to Geography 4 01 2012 The New Guinea Rainforest The island of New Guinea is the second largest island in the world. It is located one hundred kilometers north of Australia. It also has one of the largest tropical rainforests in the world, and is one of the last remaining expanses of tropical rainforest left in the world. The New Guinea Island still has parts that have been untouched and in some places on the island, the natives have never seen a white person. The rainforest however is being rapidly developed in the areas that are accessible. In the rainforest there are a large variety of plants and animals that are only found in this location. This is one thing that makes the New Guinea rainforest so special and unique. It is definitely a place worth preserving. It is also one of the few places on earth that the indigenous people still live on the land. There is a threat to the forest and all that inhabit it. People are logging and mining the forest, which is destroying it. If it is allowed to be destroyed and demolished, thousands of species of rare plants and animals along with homes of the people who live there will be destroyed along with it. The New Guinea Rainforest along with all other rainforest has life in it that should be protected, the destruction of the forest has dire consequences and effects on everyone, whether we realize it or......

Words: 1564 - Pages: 7

Worms

...Bio 54 2002 Filarial Worms I : Structure, Infection, & Disease Andrew G. Campbell, Ph.D. Parasitic Filarial Worms - Background • Thread-like worms transmitted by insect vectors (flies and mosquitoes) • collectively infect AT LEAST 100 million worldwide • considered major obstacles to development in endemic countries • "major players" – Wuchereria bancrofti / Brugia malayi lymphatic filariasis – Onchocerca volvulus - river blindness – Loa loa - loaiasis 1 Today’s Lecture •Taxonomy •Lymphatic Filariae •Nonlymphatic Filariae •Disease •Diagnosis, Treatment, & Control KINGDOM PHYLUM CLASS ORDER FAMILY GENUS/SPECIES Wuchereria bancrofti Brugia malayi ANIMALIA NEMATODA RHABDITAE SPIRURIDA ONCHOCERCIDAE Onchocerca volvulus Loa loa (Dirofilaria immitis) NONLYMPHATIC LYMPHATIC 2 Lymphatic Filariae • Wuchereria bancrofti – Approximately 600 million individuals are exposed with at least 80 million currently infected. – disease caused often referred to as Bancroftian filariasis. – occurs throughout the tropics, especially in Africa, South America, India, and Southeast Asia – has also been found in parts of Europe, Nile Valley and Australia • Brugia malayi – limited mostly to parts of India and Southeast Asia – infects probably less than 10 million The Global Distribution of Lymphatic Filariasis 3 Major Life Cycle Stages • INFECTIOUS LARVAE - transmitted to humans by mosquito bites • ADULT WORM - develop from larvae, reside in the......

Words: 917 - Pages: 4

Worms

...Bio 54 2002 Filarial Worms I : Structure, Infection, & Disease Andrew G. Campbell, Ph.D. Parasitic Filarial Worms - Background • Thread-like worms transmitted by insect vectors (flies and mosquitoes) • collectively infect AT LEAST 100 million worldwide • considered major obstacles to development in endemic countries • "major players" – Wuchereria bancrofti / Brugia malayi lymphatic filariasis – Onchocerca volvulus - river blindness – Loa loa - loaiasis 1 Today’s Lecture •Taxonomy •Lymphatic Filariae •Nonlymphatic Filariae •Disease •Diagnosis, Treatment, & Control KINGDOM PHYLUM CLASS ORDER FAMILY GENUS/SPECIES Wuchereria bancrofti Brugia malayi ANIMALIA NEMATODA RHABDITAE SPIRURIDA ONCHOCERCIDAE Onchocerca volvulus Loa loa (Dirofilaria immitis) NONLYMPHATIC LYMPHATIC 2 Lymphatic Filariae • Wuchereria bancrofti – Approximately 600 million individuals are exposed with at least 80 million currently infected. – disease caused often referred to as Bancroftian filariasis. – occurs throughout the tropics, especially in Africa, South America, India, and Southeast Asia – has also been found in parts of Europe, Nile Valley and Australia • Brugia malayi – limited mostly to parts of India and Southeast Asia – infects probably less than 10 million The Global Distribution of Lymphatic Filariasis 3 Major Life Cycle Stages • INFECTIOUS LARVAE - transmitted to humans by mosquito bites • ADULT WORM - develop from larvae, reside in the......

Words: 917 - Pages: 4

Worms

...ABSTRACT This minor research report is about the computer worm which is a self-navigating malicious program that is being utilized by many attackers to damage the target machine substantially. This report begins by giving an idea of what exactly is computer worm, then we discuss about the mechanism which this malicious code uses to attack the target machine, then we discuss about the various worms which have been discover and design till now, an overview is given about this worm infects the system and the exten to which these worms have cause damage. After that we discuss various prevention tools which are design to detect and eliminate such worms. In the end we discuss about the future potential worms and predicted what kind code will be written and how much damage it can cause to system or network. INTRODUCTION Everyone, almost everyone and every big organization like bank, pharmaceutical companies, and retail chain companies uses computer these days to do most of the important work so it is understood that their computer will contain certain sensitive information which they do not want to disclose, and as result such kind of information need security, and the term information security was introduced. In this minor research paper we discuss about one malicious code which is a serious threat to such information called WORM. A computer worm is a kind of malicious program which has the capability of reproducing itself and uses computer network to distribute......

Words: 2891 - Pages: 12

Crazyhead | How do I add a movie/show? | Uptown Funk