Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 2,240

HARMONIC ANALYSIS METHODS FOR ELLIPTIC BOUNDARY VALUE PROBLEMS IN ...

https://scholarshare.temple.edu/bitstreams/3faf52f7-123b-4304-889b-42a7eee1f8a1/download

Overdetermined boundary value problems for the Laplacian on uniformly rectifiable domains; Overdetermined boundary value problems for second-order, homogeneous, constant complex coeficient elliptic systems on uniformly rectifiable domains; Overdetermined boundary value problems for the Stokes system of linearized hydro- statics on uniformly rectifiable domains; Fredholm Theory for the ...

Change Management Simulation: Power and Influence

https://community.mis.temple.edu/mis3535sec001spring2023/files/2023/02/Simulation-Intro_slides-week-5.pdf

Gaining insight into why individuals and groups might resist change and how to overcome that resistance, including social network information to develop change implementation strategy;

BSD Sockets: A Quick And Dirty Primer - Temple University

https://cis.temple.edu/~giorgio/old/cis307s96/readings/docs/sockets.html

Introduction As you delve into the mysteries of UNIX, you find more and more things that are difficult to understand immediately. One of these things, at least for most people, is the BSD socket concept. This is a short tutorial that explains what they are, how they work, and gives sample code showing how to use them. The Analogy (or: What is a socket, anyway?) The socket is the BSD method for ...

LAW SCHOOL FACILITIES - Temple University Beasley School of Law

https://law.temple.edu/wp-content/uploads/Temple-Law_Campus-Map.pdf

LAW SCHOOL FACILITIES The law school facilities consist of three buildings: Klein, Barrack, and Shusterman Halls, all conveniently located within one block on Temple University’s Main Campus.

How Online Communication Platforms Facilitated Human ... - Sites

https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/

By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...

LETHAL AUTONOMOUS WEAPONS SYSTEMS (LAWS): - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Meier-TICLJ.pdf

Humanity by Human Rights Watch, lethal autonomous weapons systems (LAWS) have become an issue of national and international attention. With almost daily articles and commentary, including letters by notable scientists, debating the advantages and disadvantages of developing and fielding these systems, the public has become generally more aware of the issues related to autonomy, but it has ...

An introduction to Kalman filt - Temple University

https://cis.temple.edu/~latecki/Courses/CIS750-03/Papers/kalmanintroduction.pdf

1 Introduction In his 1960 famous publication (“A new approach to linear filtering and prediction problems”, Trans. ASME J. Basic Engineering., vol 82, March 1960, pp 34-45), Rudolf Kalman based the construction of the state estimation filter on probability theory, and more specifically, on the properties of conditional Gaussian random variables. The criterion he proposed to minimize is ...

The Cognitive Style of PowerPoint - Temple University

https://community.mis.temple.edu/mis5208sp18/files/2018/01/tufte-powerpoint.pdf

IN corporate and government bureaucracies, the standard method for making a presentation is to talk about a list of points organized onto slides projected up on the wall. For many years, overhead projectors lit up transparencies, and slide projectors showed high-resolution 35mm slides. Now "slideware" computer programs for presentations are nearly everywhere. Early in the 2ist century, several ...

Analysis of RNA conformation in endogenously assembled RNPs by icSHAPE

https://scholarshare.temple.edu/bitstreams/8f76a8fa-7976-4769-b0a7-fe3b9341ce13/download

Analysis of RNA conformation in endogenously assembled RNPs by icSHAPE The majority of the mammalian genome is transcribed into non-coding RNAs, many of which co-evolve with RNA-binding proteins (RBPs) to function as biochemically defined and tractable ribonucleoproteins (RNPs). Here, we applied icSHAPE, a robust and versatile RNA structural probing pipeline, to endogenous RNPs purified from ...

Building Classification Models: ID3 and C4.5 - Temple University

https://cis.temple.edu/~ingargio/cis587/readings/id3-c45.html

Introduction ID3 and C4.5 are algorithms introduced by Quinlan for inducing Classification Models, also called Decision Trees, from data.