Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 897

Analysis of RNA conformation in endogenously assembled RNPs by icSHAPE

https://scholarshare.temple.edu/bitstreams/8f76a8fa-7976-4769-b0a7-fe3b9341ce13/download

Analysis of RNA conformation in endogenously assembled RNPs by icSHAPE The majority of the mammalian genome is transcribed into non-coding RNAs, many of which co-evolve with RNA-binding proteins (RBPs) to function as biochemically defined and tractable ribonucleoproteins (RNPs). Here, we applied icSHAPE, a robust and versatile RNA structural probing pipeline, to endogenous RNPs purified from ...

Explicit Solution to Green and Ampt Infiltration Equation - Sites

https://sites.temple.edu/sserrano/files/2020/08/16-Explicit-Solution-to-Green-and-Ampt-Infiltration-Equation.pdf

By Sergio E. Serrano1 ABSTRACT: An explicit solution of the Green and Ampt infiltration equation is presented by constructing a decomposition series. Simple expressions for the cumulative infiltration depth and the infiltration rate are pro-posed. These expressions are valid for deep homogeneous soils under ponding conditions resulting from intense rainfall events. The solution was compared ...

Risk-IT-Framework-2nd-Edition_fmk_Eng_0620 - Temple University

https://community.mis.temple.edu/mis5206sec701fall2022/files/2022/08/Risk-IT-Framework-2nd-Edition_fmk_Eng_0620-1.pdf

Risk IT Task Force Steven Babb, CRISC, CGEIT, ITIL, MUFG Investor Services, United Kingdom Urs Fischer, CISA, CRISC, CPA (Swiss), UBS Business Solutions AG ...

Adaptive Procedural Generation in Minecraft - Temple University

https://cis.temple.edu/~wangp/5603-AI/Project/2022S/pattersonblaker/Ward_Patterson_Final_Report.pdf

1 Abstract Minecraft has been the focus of much AI research in past years. Most recently, interest has risen in procedural generation of settlements in Minecraft, largely due to a annual competition established in 2018 called the Generative Design in Minecraft Competition. Inspired by this recent research, we aim to develop a set of algorithms that are capable of building a realistic ...

Mutual Risk Sharing and Fintech: The Case of Xiang Hu Bao

https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/XiangHuBao-main-2022-03-23.pdf

The significant progress in information technologies promotes new venues in risk sharing and risk management practices (OECD, 2017). Just as peer-to-peer (P2P) lending platforms connected un-or under-financed borrowers to lenders, emerging fintech platforms can also be leveraged to reach traditionally un-insured or under-insured customers.2 This is exemplified by Xiang Hu Bao (XHB, meaning ...

Stabilization of Hydroxide Ions at the Interface of a Hydrophobic ...

https://sites.temple.edu/xifanwu/files/2020/10/PhysRevLett.125.156803.pdf

We report a joint study using surface-specific sum-frequency vibrational spectroscopy and ab initio molecular dynamics simulations, respectively, on a pristine hydrophobic (sub)monolayer hexane-water interface, namely, the hexane/water interface with varied vapor pressures of hexane and different pHs in water. We show clear evidence that hexane on water revises the interfacial water structure ...

Scalable Routing in Delay Tolerant Networks

https://cis.temple.edu/~wu/hoc4667-liu.pdf

ABSTRACT The non-existence of an end-to-end path poses a challenge in adapting the traditional routing algorithms to delay tolerant networks (DTNs). Previous works include centralized rout-ing approaches based on deterministic mobility, ferry-based routing with deterministic or semi-deterministic mobility, °ooding-based approaches for networks with general mo-bility, and probability-based ...

Outlier Detection with Globally Optimal Exemplar-Based GMM

https://cis.temple.edu/~latecki/Papers/SDM09_Final.pdf

Outlier detection techniques can be categorized into several groups: (1) statistical or distribution-based ap-proaches; (2) geometric-based approaches; (3) pro ̄ling methods; and (4) model-based approaches. In statisti-cal techniques [2, 3], the data points are typically mod-eled using a data distribution, and points are labeled as outliers depending on their relationship with the dis ...

Chapter 4 Network Layer: The Data Plane - Temple University

https://cis.temple.edu/~tug29203/21spring-3329/lectures/ch4a.pdf

Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides:

stoj-1.qxd - Temple University

https://cis.temple.edu/~wu/teaching/Spring%202013/handoff.pdf

1.1 INTRODUCTION Mobility is the most important feature of a wireless cellular communication system. Usu-ally, continuous service is achieved by supporting handoff (or handover) from one cell to another. Handoff is the process of changing the channel (frequency, time slot, spreading code, or combination of them) associated with the current connection while a call is in progress. It is often ...