Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 91

Physics (PHYS) | Temple University Bulletin

https://bulletin.temple.edu/courses/phys/

In the first 3 to 5 weeks, the instructor will lecture on the ethical and etiquette responsibilities of students, teachers, and researchers in physics. In each of the next 10 to 12 weeks, a faculty volunteer will explain his or her research program and opportunities for student participation in it.

Anne Frankel CV - College of Public Health

https://cph.temple.edu/sites/cph/files/node/profile/resume/Anne%20Frankel%20CV%20July%202020-1.pdf

Doctor of Philosophy (Ph.D.), Public Health Florida International University – Miami, FL Concentration: Health Promotion and Disease Prevention Dissertation: Predictors of Adolescent Sexual Intentions and Behavior: Attitudes, Parenting, and Neighborhood Risk Advisor: Robert M. Malow, Ph.D.

Bariatric Surgery | Graduate Medical Education | Lewis Katz School of ...

https://medicine.temple.edu/departments-centers/clinical-departments/surgery/departmental-research/faculty-research/bariatric-surgery

Neil King, MD Claire L Le Guen, Neil A King , Huaqing Zhao, Elizabeth P Renza-Stingone, Glenn S Gerhard, Rohit S Soans. COVID-19 patients with obesity at risk for ...

Master of Social Work (MSW) - Temple University

https://www.temple.edu/academics/degree-programs/master-social-work-msw-sw-sswg-msw

The Master of Social Work prepares students to support and advocate for vulnerable populations including children, the elderly and those living in poverty.

Risk-IT-Framework-2nd-Edition_fmk_Eng_0620 - Temple University

https://community.mis.temple.edu/mis5206sec701fall2022/files/2022/08/Risk-IT-Framework-2nd-Edition_fmk_Eng_0620-1.pdf

The Risk IT Framework, 2nd Edition concerns the entire spectrum of I&T risk—any business or mission risk related to the use of, or dependence on, information and communications technology (ICT),3 3 operational technology (OT),4 4 network or internet of things (IOT),5 5 electronic data, and digital or electronic communications.

Impact of Transportation Supports on Students’ Academic Outcomes:

https://hope.temple.edu/sites/hope/files/media/document/RioHondoReport_FINAL.pdf

EXECUTIVE SUMMARY For many students, transportation presents a barrier to college completion. In 2020–21, the average commuter student could expect to spend nearly one-fifth of their total living expenses on transportation costs.1 Transportation programs have the potential to offer students some relief—and help them reach college graduation—yet more rigorous research on these programs ...

Stronger predation intensity and impact on prey communities in the tropics

https://sites.temple.edu/bjsewall/files/2021/08/Freestone-et-al-2021-Ecology-Stronger-predation-intensity-impact-on-prey-communities-in-the-tropics.pdf

evolutionary time across the globe (Menge and Lub-chenco 1981, Albouy et al. 2019, Silvestro et al. 2020). Although evidence continues to accrue in support of the prediction that predation intensity is stronger at lower latitudes (e.g., Schemske et al. 2009, Roslin et al. 2017, Reynolds et al. 2018), debate on its generality persists (Roesti et al. 2020). Further, variation in predation ...

ETF Ownership and the Transmission of Monetary Policy

https://sites.temple.edu/lnaveen/files/2024/11/Austin_Kleespie_paper.pdf

We explore whether ETF ownership afects monetary policy transmission to individual equities. Both broad market and sector-specific ETFs appear to moderate return responses to unexpected target rate changes. However, when considering the response to unexpected changes in the path of monetary policy, we find that broad market (sector-specific) ETFs play a moderating (amplifying) role. We also ...

THE USE OF FORCE AND CYBER COUNTERMEASURES

https://sites.temple.edu/ticlj/files/2020/02/32.2_Corn_Article02-header-deleted.pdf

ABSTRACT In a global environment where most unfriendly acts between nations fall below the threshold of a use of force, the doctrine of countermeasures can be an important tool for states. However, in the realm of cyber operations, the rules governing the application of countermeasures result in unrealistic constraints on states. Particularly when compared with the much lesser constraints on ...

Shape Retrieval Using Fourier Descriptors - Temple University

https://cis.temple.edu/~lakaemper/courses/cis595_2004/papers/fourierShape.pdf

Shape retrieval involves three primary issues: shape representation, shape similarity measure and shape indexing. Among them, shape representation is the most important issue in shape retrieval. Various shape representation methods, or shape descriptors, exist in the literature, these methods can be classified into two categories: region based versus contour based. In region based techniques ...