Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 1,340

Sabina Rak Neugebauer

https://education.temple.edu/sites/education/files/faculty_files/CV_PDF_07102017.pdf

Teacher Academic Language Intervention Co-Principal Investigator (2015-present) Investigate elementary in-service and pre-service teachers’ talk, specifically syntactic complexity, semantic diversity, and discourse. Using mixed methods including audio recordings, teacher interviews, self-report questionnaires, and dispositional scores this study explores the impact of an academic language ...

The OpenNARS implementation of the Non-Axiomatic Reasoning System

https://cis.temple.edu/~pwang/Publication/OpenNARS.pdf

NARS utilises the Non-Axiomatic Logic (NAL) [9] for inference and the Nars-ese language for representing statements. The language and the logic are outside the scope of this document. The aim of this paper is to describe the current implementation of NARS in detail. The following aspects of the implementa-tion are focused on: memory management with concept centric processing, non-deterministic ...

Chapter 4 Network Layer: The Data Plane - Temple University

https://cis.temple.edu/~tug29203/21spring-3329/lectures/ch4a.pdf

Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides:

CHEM5412 Spring 2020: Free Energy Perturbation Calculation

https://ronlevygroup.cst.temple.edu/courses/2020_spring/chem5412/lectures/fep_lab_manual.pdf

1. Introduction In this lab, we will apply the free energy perturbation (FEP) method to calculate the relative binding free energies between a pair of congeneric ligand molecules binding to the receptor protein.

DeepIDPS: An Adaptive DRL-based Intrusion Detection and Prevention ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf

Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...

Comparative first-principles studies of prototypical ferroelectric ...

https://sites.temple.edu/xifanwu/files/2020/10/2017.PRB_.Comparative-first-principles-studies-of-prototypical-ferroelectric-materials-by-LDA-GGA-and-SCAN-meta-GGA.pdf

Comparative first-principles studies of prototypical ferroelectric materials by LDA, GGA, and SCAN meta-GGA Comparative first-principles studies of prototypical ferroelectric materials by LDA, GGA, and SCAN meta-GGA

Directional and Explainable Serendipity Recommendation

https://cis.temple.edu/~jiewu/research/publications/Publication_files/jiang_www_2020.pdf

ABSTRACT Serendipity recommendation has attracted more and more atten-tion in recent years; it is committed to providing recommendations which could not only cater to users’ demands but also broaden their horizons. However, existing approaches usually measure user-item relevance with a scalar instead of a vector, ignoring user preference direction, which increases the risk of unrelated ...

DIRECT PRIMARY CARE: A BIOETHICAL ANALYSIS AND DISCUSSION OF PRACTICE ...

https://scholarshare.temple.edu/bitstreams/bde3365d-5ae4-418c-ab8c-5d52c3b0c2a7/download

Table 3: DPC Practice Characteristics in Ten Most Populous Cities in US This table shows all of the DPC practices included in the analysis for Table 1. This includes practices within the city limits of the cities included in Table 1 according to the DPC Frontier Mapper that meet the three-part definition of the DPC model in that they charge a recurring monthly or yearly membership fee, they do ...

WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput ...

https://cis.temple.edu/~wu/teaching/spring2017_files/mobility.pdf

In all five group mobility models, random motion of each individual MN within a given group occurs. In Section 4, we illustrate that a mobility model has a large effect on the performance evaluation of an ad hoc network protocol. In other words, we show how the performance results of an ad hoc network pro-tocol significantly change when the mobility model in the simulation is changed. The ...

Adaptive Procedural Generation in Minecraft - Temple University

https://cis.temple.edu/~wangp/5603-AI/Project/2022S/pattersonblaker/Ward_Patterson_Final_Report.pdf

1 Abstract Minecraft has been the focus of much AI research in past years. Most recently, interest has risen in procedural generation of settlements in Minecraft, largely due to a annual competition established in 2018 called the Generative Design in Minecraft Competition. Inspired by this recent research, we aim to develop a set of algorithms that are capable of building a realistic ...