https://cis.temple.edu/~pwang/papers.html
Selected Papers of Pei Wang All the following publications are authored by Pei Wang unless specified otherwise.
https://cis.temple.edu/~anwar/CIS2305Spring2014/LabAssignments/LabAssignment3/loancalculator.html
A amortization schedule is a table or chart showing each payment on an amortizing loan, including how much of each payment is interest and the amount going towards the principal balance. Thankfully, there are many freely available websites and calculators that create amortization schedules automatically. The downside to this is people are less informed on the mathematical calculations involved ...
https://sites.temple.edu/hpearsall/publications/
Lee, KangJae “Jerry,” Myla F.J. Aronson, Jeffrey A.G. Clark, Fushcia-Ann Hoover, Hogyeum Evan Joo, Peleg Kremer, Daniele La Rosa, Kelli L. Larson, Christopher A ...
https://cis.temple.edu/~yu/research/HearBP-info24.pdf
Abstract—Continuous blood pressure (BP) monitoring using wearable devices has received increasing attention due to its importance in diagnosing diseases. However, existing methods mainly measure BP intermittently, involve some form of user effort, and suffer from insuficient accuracy due to sensor properties. In order to overcome these limitations, we study the BP measurement technology ...
https://bulletin.temple.edu/courses/cis/
This single semester course hopes to equip students with critical consciousness around information technologies. The course is designed with the presumption that living and working with 21st Century technologies requires not only vocational skills but also theoretical grounding. Key themes such as "Computational Thinking" or "21st Century Economics and Global Communication" embed an ...
https://cis.temple.edu/~qzeng/cis4360-spring17/papers/Introduction%20to%20Cryptography.pdf
Introduction The origin of the word cryptology lies in ancient Greek. The word cryptology is made up of two components: "kryptos", which means hidden and "logos" which means word. Cryptology is as old as writing itself, and has been used for thousands of years to safeguard military and diplomatic communications. For example, the famous Roman emperor Julius Caesar used a cipher to protect the ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Reinforcement_Learning-based_Dual-Identity_Double_Auction_in_Personalized_Federated_Learning.pdf
Reinforcement Learning-based Dual-Identity Auction in Personalized Federated Juan Li, Member, IEEE, Zishang Chen, Tianzi Wu, Fellow, IEEE, Yanmin
https://sites.temple.edu/pdames/files/2016/07/DamesTokekarKumarISRR2015.pdf
Abstract Target tracking is a fundamental problem in robotics research and has been the subject of detailed studies over the years. In this paper, we introduce a new formulation, based on the mathematical concept of random finite sets, that allows for tracking an unknown and dynamic number of mobile targets with a team of robots. We show how to employ the Probability Hypothesis Density filter ...
https://cis.temple.edu/~pwang/AGI-Intro.html
Artificial General Intelligence — A gentle introduction Pei Wang [On-line document since 2007, last updated in August 2025] [中文] [Español] [This page contains information about the field of Artificial General Intelligence (AGI), collected and organized according to my judgment, though efforts are made to avoid personal biases.]
https://cis.temple.edu/~ingargio/cis587/readings/id3-c45.html
Introduction ID3 and C4.5 are algorithms introduced by Quinlan for inducing Classification Models, also called Decision Trees, from data.