Showing 281 - 300 results of 322 for search '"bugging"', query time: 0.05s Refine Results
  1. 281

    Severe infestation by tropical bedbugs (Cimex hemipterus) in Medellín, Colombia. Case series by Julián Felipe Porras-Villamil, Sandra Sáez-Durán, María Trelis-Villanueva, Rubén Bueno-Marí, Màrius Vicent Fuentes

    Published 2025-01-01
    “…A pest control company made several visits to eliminate the bed bugs, but they were ineffective. Finally, the insects were eradicated after 3 months of meticulous daily cleaning with steam and heat. …”
    Get full text
    Article
  2. 282

    Source Code Error Understanding Using BERT for Multi-Label Classification by Md Faizul Ibne Amin, Yutaka Watanobe, Md Mostafizer Rahman, Atsushi Shirafuji

    Published 2025-01-01
    “…However, errors, often referred to as ‘bugs’ in code, can be challenging to identify and rectify for both students learning to program and experienced professionals. …”
    Get full text
    Article
  3. 283

    Automated vulnerability discovery method for 5G core network protocol by Peixiang WU, Zhilong ZHANG, Libo CHEN, Yijun WANG, Zhi XUE

    Published 2024-02-01
    “…With the widespread development of fifth-generation (5G) mobile communication technology, concerns regarding 5G network security have also increased.Blackbox fuzzing is a commonly used method for automated vulnerability discovery in software security.However, applying dynamic approaches like fuzzing to discover vulnerabilities in the complex design of 5G core network protocols poses challenges such as low efficiency, poor versatility, and lack of scalability.Therefore, a novel static method to examine the open-source solution of the 5G core network was proposed.Through this method, a series of memory leak security issues caused by improper variable life cycle management were identified, which can lead to denial-of-service attacks on the 5G core network.To summarize these weaknesses, a general vulnerability model and an automated vulnerability discovery method called HoI were presented, which utilized hybrid analysis based on control and data flow.By successfully discovering five zero-day bugs in Open5GS, an open-source solution for the 5G core network, vulnerabilities that cover practical application scenarios of multiple interface protocols in the 5G core network were identified.These vulnerabilities have wide-ranging impact, are highly detrimental, and can be easily exploited.They have been reported to the vendor and assigned four Common Vulnerabilities and Exposures (CVE) numbers, demonstrating the effectiveness of this automated vulnerability discovery method.…”
    Get full text
    Article
  4. 284

    Ecological drift during colonization drives within-host and between-host heterogeneity in an animal-associated symbiont. by Jason Z Chen, Zeeyong Kwong, Nicole M Gerardo, Nic M Vega

    Published 2024-04-01
    “…To understand how this heterogeneity arises, we utilize the squash bug, Anasa tristis, and its bacterial symbionts in the genus Caballeronia. …”
    Get full text
    Article
  5. 285

    Optimal frequency bands for pupillography for maximal correlation with HRV by Júlio Medeiros, André Bernardes, Ricardo Couceiro, Paulo Oliveira, Henrique Madeira, César Teixeira, Paulo Carvalho

    Published 2025-01-01
    “…From a controlled experiment involving 21 programmers performing software bug inspection, our study pinpoints the optimal low-frequency (0.06-0.29 Hz) and high-frequency (0.29-0.49 Hz) bands. …”
    Get full text
    Article
  6. 286

    Mathematical modeling of the parasitism and hyperparasitism increase on Halyomorpha halys eggs in a five-year survey in Northern Italy by Ezio Venturino, Francesco Cantaloni, Luciana Tavella, Silvia Moraglio, Francesco Tortorici

    Published 2024-11-01
    “…The invasive stink bug Halyomorpha halys has become an important pest of many crops, causing severe economic losses to farmers. …”
    Get full text
    Article
  7. 287
  8. 288

    Laboratory and field efficacy of natural products against the invasive pest Halyomorpha halys and side effects on the biocontrol agent Trissolcus japonicus by Elena Chierici, Elisa Marchetti, Adriana Poccia, Antonio Russo, Vito Antonio Giannuzzi, Lorenzo Governatori, Luca Zucchi, Gabriele Rondoni, Eric Conti

    Published 2025-02-01
    “…Abstract The brown marmorated stink bug, Halyomorpha halys (Hemiptera: Pentatomidae), is an invasive pest causing major economic losses to crops. …”
    Get full text
    Article
  9. 289

    Comparison of Naive Bayes and SVM Algorithms for Sentiment Analysis of PUBG Mobile on Google Play Store by Putri Ratna Sari, Dwi Rosa Indah, Errissya Rasywir, Mgs Afriyan firdaus, Ghita Athalina

    Published 2024-11-01
    “…However, there were also technical concerns that required attention, including bugs, server instability, lag, and performance issues. …”
    Get full text
    Article
  10. 290

    Human migrations, anthropogenic changes, and insect-borne diseases in Latin America by André B. B. Wilke, Priscilla Farina, Marco Ajelli, Angelo Canale, Filipe Dantas-Torres, Domenico Otranto, Giovanni Benelli

    Published 2025-01-01
    “…This review examines recent outbreaks and reemergence of insect-borne diseases through five case studies: (i) malaria transmission linked to political instability and large-scale migration through the Amazon jungle; (ii) the expansion of triatomine bug habitats into overcrowded, substandard urban settlements, increasing Chagas disease incidence; (iii) the influence of movement and ecotourism in the Amazonia on yellow fever transmission in peri-urban areas; (iv) the spread of visceral leishmaniasis driven by deforestation and human–canine movement; and (v) dengue outbreaks in rural Amazon regions, spurred by urbanization and rural development. …”
    Get full text
    Article
  11. 291
  12. 292

    Leveraging an Enhanced CodeBERT-Based Model for Multiclass Software Defect Prediction via Defect Classification by Rida Ghafoor Hussain, Kin-Choong Yow, Marco Gori

    Published 2025-01-01
    “…Automated testing has emerged as the most practical approach to achieving bug-free and efficient code. In this context, machine learning-driven methods, especially those leveraging natural language models, have gained significant traction for developing effective techniques. …”
    Get full text
    Article
  13. 293

    Adjuvant postbiotic administration improves dental caries prognosis by restoring the oral microbiota by Qing Liu, Teng Ma, Cuijiao Feng, Yalin Li, Hao Jin, Xuan Shi, Lai-Yu Kwok, Yan Shi, Tingtao Chen, Heping Zhang

    Published 2024-09-01
    “…Taxonomic and functional annotation of the microbiota revealed that postbiotics co-treatment significantly: increased the relative abundance of Pseudomonas and P. reactans, decreased the relative abundance of Prevotella shahii, and enriched the energy metabolism-related pathways. BugBase-predicted phenotypes inferred to an oral microbiota with decreased potential pathogenic bacteria and increased oxidative stress-tolerant bacteria after postbiotics intervention. …”
    Get full text
    Article
  14. 294

    Evaluasi Kualitas Proyek Sistem Informasi Pelayanan Pemerintah Daerah Menggunakan Project Management Body of Knowledge by Gde Brahupadhya Subiksa, Made Pasek Agus Ariawan, , Ida Bagus Adisimakrisna Peling

    Published 2024-07-01
    “…Sedangkan pada Quality Control terdapat temuan bahwa belum diketahuinya bug atau masalah yang terdapat pada sistem, rencananya akan diujicoba dengan data uji sebelum resmi dirilis secara publik.   …”
    Get full text
    Article
  15. 295

    Data visualisation in continuous integration and delivery: Information needs, challenges, and recommendations by Azeem Ahmad, Ola Leifler, Kristian Sandahl

    Published 2022-06-01
    “…The identified needs were categorised as testing, code & commit, confidence, bug, and artefacts. Apart from identifying information needs, practitioners face several challenges in developing visualisation tools. …”
    Get full text
    Article
  16. 296

    The Last Victory of the Crimean Yurt: The Battle near Migeya Tract on June 7 (18), 1769 by Vasiliy Kashirin

    Published 2023-12-01
    “…As a result of the mistakes of their command and the fatal coincidence of a number of circumstances, the Russian regiments were surrounded by Tatars on the banks of the Southern Bug and tried to defend themselves in wagenburg. …”
    Get full text
    Article
  17. 297

    Reading and Calculation Neural Systems and Their Weighted Adaptive Use for Programming Skills by Joao Castelhano, Isabel C. Duarte, Joao Duraes, Henrique Madeira, Miguel Castelo-Branco

    Published 2021-01-01
    “…By unraveling the neural correlates of program understanding and bug detection, this work provides a framework to understand error monitoring in this novel complex faculty.…”
    Get full text
    Article
  18. 298

    Dealing with post-excavation data: the Omeka S TiMMA web-database by Rueff, Bastien

    Published 2024-01-01
    “…The TiMMA project also faces the limitations of Omeka S, such as the lack of efficiency of the search engine, which makes the use of web-semantic vocabularies difficult, a few bugs, and the absence of convenient functionalities in archaeological projects (e.g. the automatic creation of primary keys, a statistic dashboard, cells’ automatic filling). …”
    Get full text
    Article
  19. 299

    Machine learning for predicting Chagas disease infection in rural areas of Brazil. by Fabio De Rose Ghilardi, Gabriel Silva, Thallyta Maria Vieira, Ariela Mota, Ana Luiza Bierrenbach, Renata Fiuza Damasceno, Lea Campos de Oliveira, Alexandre Dias Porto Chiavegatto Filho, Ester Sabino

    Published 2024-04-01
    “…<h4>Methods</h4>In this study, we developed machine learning algorithms to predict the risk of Chagas disease based on five general factors: age, gender, history of living in a mud or wooden house, history of being bitten by a triatomine bug, and family history of Chagas disease. We analyzed data from the Retrovirus Epidemiology Donor Study (REDS) to train five popular machine learning algorithms. …”
    Get full text
    Article
  20. 300

    Comparative efficacy and safety of intra-articular analgesics after knee arthroscopy: a Bayesian network meta-analysis protocol by Yilun Wang, Hongyi He, Yuchen He, Dong-Xing Xie, Xiaoxiao Li

    Published 2020-09-01
    “…The Bayesian network meta-analysis will be conducted using WinBUGS V.1.4.3.Ethics and dissemination Since no private or confidential patient data will be contained in the reporting, approval from an ethics committee is not required. …”
    Get full text
    Article