-
281
Severe infestation by tropical bedbugs (Cimex hemipterus) in Medellín, Colombia. Case series
Published 2025-01-01“…A pest control company made several visits to eliminate the bed bugs, but they were ineffective. Finally, the insects were eradicated after 3 months of meticulous daily cleaning with steam and heat. …”
Get full text
Article -
282
Source Code Error Understanding Using BERT for Multi-Label Classification
Published 2025-01-01“…However, errors, often referred to as ‘bugs’ in code, can be challenging to identify and rectify for both students learning to program and experienced professionals. …”
Get full text
Article -
283
Automated vulnerability discovery method for 5G core network protocol
Published 2024-02-01“…With the widespread development of fifth-generation (5G) mobile communication technology, concerns regarding 5G network security have also increased.Blackbox fuzzing is a commonly used method for automated vulnerability discovery in software security.However, applying dynamic approaches like fuzzing to discover vulnerabilities in the complex design of 5G core network protocols poses challenges such as low efficiency, poor versatility, and lack of scalability.Therefore, a novel static method to examine the open-source solution of the 5G core network was proposed.Through this method, a series of memory leak security issues caused by improper variable life cycle management were identified, which can lead to denial-of-service attacks on the 5G core network.To summarize these weaknesses, a general vulnerability model and an automated vulnerability discovery method called HoI were presented, which utilized hybrid analysis based on control and data flow.By successfully discovering five zero-day bugs in Open5GS, an open-source solution for the 5G core network, vulnerabilities that cover practical application scenarios of multiple interface protocols in the 5G core network were identified.These vulnerabilities have wide-ranging impact, are highly detrimental, and can be easily exploited.They have been reported to the vendor and assigned four Common Vulnerabilities and Exposures (CVE) numbers, demonstrating the effectiveness of this automated vulnerability discovery method.…”
Get full text
Article -
284
Ecological drift during colonization drives within-host and between-host heterogeneity in an animal-associated symbiont.
Published 2024-04-01“…To understand how this heterogeneity arises, we utilize the squash bug, Anasa tristis, and its bacterial symbionts in the genus Caballeronia. …”
Get full text
Article -
285
Optimal frequency bands for pupillography for maximal correlation with HRV
Published 2025-01-01“…From a controlled experiment involving 21 programmers performing software bug inspection, our study pinpoints the optimal low-frequency (0.06-0.29 Hz) and high-frequency (0.29-0.49 Hz) bands. …”
Get full text
Article -
286
Mathematical modeling of the parasitism and hyperparasitism increase on Halyomorpha halys eggs in a five-year survey in Northern Italy
Published 2024-11-01“…The invasive stink bug Halyomorpha halys has become an important pest of many crops, causing severe economic losses to farmers. …”
Get full text
Article -
287
Construction and iterative redesign of synXVI a 903 kb synthetic Saccharomyces cerevisiae chromosome
Published 2025-01-01“…Application of the CRISPR D-BUGS protocol identified defective loci, which were modified to improve sporulation and recover wild-type like growth when grown on glycerol as a sole carbon source when grown at 37˚C. …”
Get full text
Article -
288
Laboratory and field efficacy of natural products against the invasive pest Halyomorpha halys and side effects on the biocontrol agent Trissolcus japonicus
Published 2025-02-01“…Abstract The brown marmorated stink bug, Halyomorpha halys (Hemiptera: Pentatomidae), is an invasive pest causing major economic losses to crops. …”
Get full text
Article -
289
Comparison of Naive Bayes and SVM Algorithms for Sentiment Analysis of PUBG Mobile on Google Play Store
Published 2024-11-01“…However, there were also technical concerns that required attention, including bugs, server instability, lag, and performance issues. …”
Get full text
Article -
290
Human migrations, anthropogenic changes, and insect-borne diseases in Latin America
Published 2025-01-01“…This review examines recent outbreaks and reemergence of insect-borne diseases through five case studies: (i) malaria transmission linked to political instability and large-scale migration through the Amazon jungle; (ii) the expansion of triatomine bug habitats into overcrowded, substandard urban settlements, increasing Chagas disease incidence; (iii) the influence of movement and ecotourism in the Amazonia on yellow fever transmission in peri-urban areas; (iv) the spread of visceral leishmaniasis driven by deforestation and human–canine movement; and (v) dengue outbreaks in rural Amazon regions, spurred by urbanization and rural development. …”
Get full text
Article -
291
Comprehensive Bibliographic Survey and Forward-Looking Recommendations for Software Defect Prediction: Datasets, Validation Methodologies, Prediction Approaches, and Tools
Published 2025-01-01“…Despite ongoing efforts, many software programs still contain bugs that can lead to financial losses and business risks. …”
Get full text
Article -
292
Leveraging an Enhanced CodeBERT-Based Model for Multiclass Software Defect Prediction via Defect Classification
Published 2025-01-01“…Automated testing has emerged as the most practical approach to achieving bug-free and efficient code. In this context, machine learning-driven methods, especially those leveraging natural language models, have gained significant traction for developing effective techniques. …”
Get full text
Article -
293
Adjuvant postbiotic administration improves dental caries prognosis by restoring the oral microbiota
Published 2024-09-01“…Taxonomic and functional annotation of the microbiota revealed that postbiotics co-treatment significantly: increased the relative abundance of Pseudomonas and P. reactans, decreased the relative abundance of Prevotella shahii, and enriched the energy metabolism-related pathways. BugBase-predicted phenotypes inferred to an oral microbiota with decreased potential pathogenic bacteria and increased oxidative stress-tolerant bacteria after postbiotics intervention. …”
Get full text
Article -
294
Evaluasi Kualitas Proyek Sistem Informasi Pelayanan Pemerintah Daerah Menggunakan Project Management Body of Knowledge
Published 2024-07-01“…Sedangkan pada Quality Control terdapat temuan bahwa belum diketahuinya bug atau masalah yang terdapat pada sistem, rencananya akan diujicoba dengan data uji sebelum resmi dirilis secara publik. …”
Get full text
Article -
295
Data visualisation in continuous integration and delivery: Information needs, challenges, and recommendations
Published 2022-06-01“…The identified needs were categorised as testing, code & commit, confidence, bug, and artefacts. Apart from identifying information needs, practitioners face several challenges in developing visualisation tools. …”
Get full text
Article -
296
The Last Victory of the Crimean Yurt: The Battle near Migeya Tract on June 7 (18), 1769
Published 2023-12-01“…As a result of the mistakes of their command and the fatal coincidence of a number of circumstances, the Russian regiments were surrounded by Tatars on the banks of the Southern Bug and tried to defend themselves in wagenburg. …”
Get full text
Article -
297
Reading and Calculation Neural Systems and Their Weighted Adaptive Use for Programming Skills
Published 2021-01-01“…By unraveling the neural correlates of program understanding and bug detection, this work provides a framework to understand error monitoring in this novel complex faculty.…”
Get full text
Article -
298
Dealing with post-excavation data: the Omeka S TiMMA web-database
Published 2024-01-01“…The TiMMA project also faces the limitations of Omeka S, such as the lack of efficiency of the search engine, which makes the use of web-semantic vocabularies difficult, a few bugs, and the absence of convenient functionalities in archaeological projects (e.g. the automatic creation of primary keys, a statistic dashboard, cells’ automatic filling). …”
Get full text
Article -
299
Machine learning for predicting Chagas disease infection in rural areas of Brazil.
Published 2024-04-01“…<h4>Methods</h4>In this study, we developed machine learning algorithms to predict the risk of Chagas disease based on five general factors: age, gender, history of living in a mud or wooden house, history of being bitten by a triatomine bug, and family history of Chagas disease. We analyzed data from the Retrovirus Epidemiology Donor Study (REDS) to train five popular machine learning algorithms. …”
Get full text
Article -
300
Comparative efficacy and safety of intra-articular analgesics after knee arthroscopy: a Bayesian network meta-analysis protocol
Published 2020-09-01“…The Bayesian network meta-analysis will be conducted using WinBUGS V.1.4.3.Ethics and dissemination Since no private or confidential patient data will be contained in the reporting, approval from an ethics committee is not required. …”
Get full text
Article