https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf
Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...
https://sites.temple.edu/rtwiseowls/files/2024/01/Effectiveness-of-Animal-Assisted-Therapy-in-Improving-PTSD-Symptoms-Among-Children_Final.pdf
Effectiveness of Animal-Assisted Therapy in Improving PTSD Symptoms Among Children Temple University, Department of Health & Rehabilitation Sciences, Recreational Therapy Program
https://studyabroad.temple.edu/programs/temple-university-japan-campus/semester-academic-year-summer-tokyo
Temple University, Japan Campus (TUJ) offers a semester, academic year, and 10-week summer program. Coursework is available in Asian studies, Japanese language, and a variety of other academic disciplines.
https://law.temple.edu/csj/wp-content/uploads/sites/3/2016/07/Live-Stop-Report.pdf
The Live Stop law instructs police officers to immobilize drivers’ cars for certain traffic violations including driving without a license, with a suspended or revoked license, and driving with expired or no registration.1 The law applies only to Philadelphia. Other counties may adopt the law by local ordinance, however, most have not done so.2 The law instructs that cars should be towed for ...
https://sites.temple.edu/borguet/files/2025/01/spectroscopy-2012.pdf
ABSTRACT: Sum frequency generation (SFG) spectra and free induction decay (FID) measurements of the H2O/octadecylsilane (ODS)/silica interface in the free OH spectral region (∼3700 cm− 1) show spatially inhomogeneous behavior. The SFG spectra and FIDs suggest an inhomogeneous response of the free OH, consisting of at least two distinct species at the interface with short and long coherence ...
https://cis.temple.edu/~he/publications/Conferences/PEPausing-FAST12.pdf
The implementation of P/E suspension for NAND flash involves minimal modifications to the flash inter-face, i.e., merely the “program suspend/resume” and “erase suspend/resume” commands need to be added in the command set of the flash interface [12]. To support P/E suspension, the control logic inside the flash chip is required to determine the appropriate time to suspend the P/E ...
https://www.fox.temple.edu/sites/fox/files/documents/CVs/yan-li-cv.pdf
Yan Li 425 Alter Hall Department of Finance The Fox School of Business Temple University Phone: 215-204-4148 E-mail: liyanlpl@temple.edu
https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/
By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...
https://cis.temple.edu/~latecki/Courses/CIS750-03/Lectures/Siddu_RegionGrowing.ppt
Contents Brief introduction to Image segmentation Types of Image segmentation Region growing and Shrinking (split /merge ) method Applications of Image segmentation Results Introduction The shape of an object can be described in terms of: Its boundary – requires image edge detection The region it occupies – requires image segmentation in homogeneous regions, Image regions generally have ...
https://cis.temple.edu/~qzeng/papers/deobfuscation-icics2017.pdf
Abstract. Virtualization-obfuscation replaces native code in a binary with semantically equivalent and self-de ned bytecode, which, upon ex-ecution, is interpreted by a custom virtual machine. It makes the code very di cult to analyze and is thus widely used in malware. How to deobfuscate such virtualization obfuscated code has been an important and challenging problem. We approach the problem ...