https://scholarshare.temple.edu/bitstreams/1c1f1a6d-0f34-4234-8b39-41d9eeb397f0/download
of machine learning (ML) versus a traditional statistical model in predicting dental caries in
https://www.temple.edu/
As Philadelphia’s public R1 university, Temple’s innovative education centers student outcomes with interdisciplinary academics and real-world experiences.
https://sites.temple.edu/cognitionlearning/files/2013/09/Gunderson-et-al-2013-Child-Dev-final.pdf
In laboratory studies, praising children’s effort encourages them to adopt incremental motivational frame-works—they believe ability is malleable, attribute success to hard work, enjoy challenges, and generate strate-gies for improvement. In contrast, praising children’s inherent abilities encourages them to adopt fixed-ability frameworks. Does the praise parents spontaneously give ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/FedHAN.pdf
FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework Defending Against Poisoning Attacks in Heterogeneous Clients Xiaoding Wang1 , Bin Ye1 , Li Xu1 , Lizhao Wu1 , Sun-Yuan Hsieh2 , Jie Wu3;4 and Limei Lin1 1College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350117, China 2Department of ...
https://sites.temple.edu/servicedesk/files/2015/02/Citrix-USArmySetupInfo.pdf
3. Once the utility has ran, reboot and download the Citrix
https://sites.temple.edu/tudsc/2017/03/30/measuring-similarity-between-texts-in-python/
By Luling Huang This post demonstrates how to obtain an n by n matrix of pairwise semantic/cosine similarity among n text documents. Finding cosine similarity is a basic technique in text mining. My purpose of doing this is to operationalize “common ground” between actors in online political discussion (for more see Liang, 2014, p. 160). The tools are Python libraries scikit-learn (version ...
https://medicine.temple.edu/sites/medicine/files/files/skyscan_1172_introduction.pdf
THE SKYSCAN 1172 MICROCT INTRODUCTION Principles of operation: Briefly, the system obtains multiple x-ray “shadow” transmission images of the object from multiple angular views as the object rotates on a high-precision stage. From these shadow images, cross-section images of the object are reconstructed using a modified Feldkamp cone-beam algorithm, creating a complete 3D representation of ...
https://sites.temple.edu/bjsewall/files/2021/08/Freestone-et-al-2021-Ecology-Stronger-predation-intensity-impact-on-prey-communities-in-the-tropics.pdf
Predator exposure experiment To test the hypothesis that predation intensity and im-pact are stronger at lower latitudes, we conducted a short-term, 3-d predator exposure experiment on mature prey communities after a 3-month assembly period.
https://undergradstudies.temple.edu/arc/continuingstudies
Continuing Studies students must have a minimum cumulative GPA of 2.0 (C average) for all prior college level coursework. A student may take a maximum of 30 credits through Continuing Studies prior to applying to the university. Continuing Studies students are limited to part-time course work (11 credits or less during a fall or spring semester).
https://bulletin.temple.edu/courses/mis/
MIS 4596. Managing Enterprise Cybersecurity. 3 Credit Hours. Learn how to secure systems and the enterprise using cryptography, authentication, and ethical hacking. In this writing-intensive course for MIS, you will also identify and communicate cybersecurity risks facing businesses through risk assessment reports that support management decisions.