Search Keywords

Results Restricted To:

https://www.temple.edu

No results were found for your search.

iGEM - Institute for Genomics and Evolutionary Medicine | Temple University

https://igem.temple.edu/products/software/mega

iGEM researchers are pursuing a variety of interdisciplinary research and discovery projects

Evaluating the Effectiveness of Turnitin’s AI Writing Indicator Model

https://teaching.temple.edu/sites/teaching/files/media/document/Evaluating%20the%20Effectiveness%20of%20Turnitin%E2%80%99s%20AI%20Writing%20Indicator%20Model.pdf

Introduction: Turnitin recently developed what they call an “AI writing indicator model” that is intended to help instructors determine if a student has submitted work that is AI-generated. The model is integrated into Turnitin’s existing plagiarism detection software licensed at Temple, and is therefore convenient as it is already embedded in Canvas [1]. The process for using it is ...

Mathematical Tools for Multivariate Character Analysis

https://cis.temple.edu/~latecki/Courses/AI-Fall12/Lectures/GreatMatrixIntro.pdf

and their associatedeigenvectorsof a matrix describe the geometry of the trans- formation associated with that matrix. Using the multivariate normal, we then develop the multivariate breeders’ equation and examine properties of Gaussian fitness functions. We conclude with some elementary concepts in vector calcu- lus, focusing on derivatives of vectors and finding local extrema of vector ...

CONTENTdm - digital.library.temple.edu

https://digital.library.temple.edu/digital/api/collection/p245801coll10/id/237450/download

To experience full interactivity, please enable Javascript in your browser.

CanalScan: Tongue-Jaw Movement Recognition via Ear Canal Deformation ...

https://www.cis.temple.edu/~yu/research/CanalScan-info21.pdf

Abstract—Human-machine interface based on tongue-jaw movements has recently become one of the major technological trends. However, existing schemes have several limitations, such as requiring dedicated hardware and are usually uncomfortable to wear. This paper presents CanalScan, a nonintrusive system for tongue-jaw movement recognition using only commodity speaker and microphone mounted on ...

IEEE MASS 2022 - Temple University

https://cis.temple.edu/~yanwang/ieee-mass-2022/Home.html

IEEE MASS is a premier annual forum for sharing original, novel ideas in mobile ad-hoc networks and smart systems, defined broadly. As wireless ad-hoc networks continue to evolve and specialize into a number of application scenarios and environments, and sensor-based systems and technologies increasingly permeate our everyday life and become the inner fabric of the Internet of Things and cyber ...

I Can Hear You Without a Microphone: Live Speech Eavesdropping From ...

https://cis.temple.edu/~yu/research/Icanhearyou-INFOCOM2023.pdf

Abstract—Recent literature advances motion sensors mounted on smartphones and AR/VR headsets to speech eavesdropping due to their sensitivity to subtle vibrations. The popularity of mo-tion sensors in earphones has fueled a rise in their sampling rate, which enables various enhanced features. This paper investigates a new threat of eavesdropping via motion sensors of earphones by developing ...

The Language of Machines - Temple University

https://cis.temple.edu/~beigel/book/LOM.html

In The Language of Machines, Robert Floyd and Richard Beigel revolutionize the teaching of computability and languages. They propose nothing less than redefinition of the building blocks of automata theory: their unified model of computation clarifies the subject as never before. Floyd and Beigel's single model encompasses all the traditional types of computing machines and even "real world ...

In-Kernel Traffic Sketching for Volumetric DDoS Detection

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC25_In-Kernel%20Traffic%20Sketching%20for%20Volumetric%20DDoS%20Detection-final.pdf

Abstract—Emerging network technologies like cloud comput-ing provide flexible services but also introduce vulnerabilities to host servers, such as exposure to Distributed Denial of Service (DDoS) attacks. Traditional host-based detection tools operate in the user space, which can delay detection because network traffic must pass through the kernel space first. Moving detection to the kernel ...

DRBANET: A Lightweight Dual-Resolution Network for Semantic ...

https://cis.temple.edu/~latecki/Papers/Quan_DRBANET_ICIP_2022.pdf

ABSTRACT Due to the powerful ability to encode image details and semantics, many lightweight dual-resolution networks have been proposed in recent years. However, most of them ignore the benefit of boundary information. This paper introduces a lightweight dual-resolution network, called DRBANet, aim-ing to refine semantic segmentation results with the aid of boundary information. DRBANet also ...