Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 1,600

United States v. Browne - law.temple.edu

https://www2.law.temple.edu/events/excelling-in-evidence/wp-content/uploads/sites/106/2020/06/United-States-v.-Browne_-834-F.3d-403.pdf

HN4[ ] Exceptions, Business Records Fed. R. Evid. 803(6) allows for the admission of a record of an act, event, condition, opinion, or diagnosis containing hearsay if: (A) the record was made at or near the time by—or from information transmitted by— someone with knowledge; (B) the record was kept in the course of a regularly conducted activity of a business, organization, occupation, or ...

Dysphagia - Temple University

https://medicine.temple.edu/sites/medicine/files/files/PMR_presentation_skills_Swallowing_for_Residents.pdf

Water intake is unrestricted prior to a meal and allowed 30 minutes after a meal. The period of time following the meal allows spontaneous swallows and gravity to clear pooled solid or thickened liquid residues.

1041 - cst.temple.edu

https://cst.temple.edu/sites/cst/files/media/document/1041_F24_Problist.pdf

3.7: 1, 3, 4 (in Problems 1, 3 and 4 skip Part (f); in Part (i) determine if the particle is speeding up or slowing down at t = 1 second), 5, 9, 10, 15ab, 16abc, 17ab ...

Vitae – Shanyang Zhao - Sites

https://sites.temple.edu/syzhao/vitae/

Journal of Affective Disorders 45: 19-30. Wittchen, Hans-Ulrich, Shanyang Zhao, Jamie M. Abelson, James L. Abelson, and Ronald C. Kessler. 1996. “Reliability and Procedural Validity of UM-CIDI DSM-III-R Phobic Disorders.” Psychological Medicine 26: 1169-1177. Wittchen, Hans-Ulrich, Ronald C. Kessler, Shanyang Zhao, and Jamie M. Abelson. 1995.

Visionary Voices | Institute on Disabilities | Temple University ...

https://disabilities.temple.edu/voices

The Visionary Voices | Leaders Lessons Legacy website features approximately 30 videotaped interviews recorded over a 12-month period. These earliest interviews focus on leaders in Pennsylvania's Intellectual Disability Movement; as this group ages, we run the risk of forever losing the stories that shaped the way supports and services are ...

2025.02.15 Master's Recital - Emily Poll, Instrumental Conducting

https://boyer.temple.edu/sites/boyer/files/2025.02.15%20Master%27s%20Recital%20-%20Emily%20Poll%2C%20Instrumental%20Conducting.pdf

Fanfare for Oya (2024) Figures in the Garden (1991) I. II.

Spring Student Dance Concert - boyer.temple.edu

https://boyer.temple.edu/sites/boyer/files/2025.03.21%20Dance%20-%20Spring%20Student%20Dance%20Concert.pdf

A response to misogynistic social media posts such as the "your body, my choice" video posted by Nick Fuentes following the 2024 presidential election. This piece was largely born from negative emotions such as anger, fear, frustration, and anxiety, but it is also about supporting and uplifting each other as women/feminine presenting people.

Yan Wang's personal website - Temple University

https://cis.temple.edu/~yanwang/publications.html

Yucheng Xie, Xiaonan Guo, Yan Wang, Jerry Cheng, and Yingying Chen. "Universal targeted adversarial attacks against mmwave-based human activity recognition." In Network Security Empowered by Artificial Intelligence, pp. 177-211. Cham: Springer Nature Switzerland, 2024. New!

PPGSpotter: Personalized Free Weight Training Monitoring Using Wearable ...

https://cis.temple.edu/~yu/research/PPGSpotter-info24.pdf

Abstract—Free weight training (FWT) is of utmost importance for physical well-being. However, the success of FWT depends heavily on choosing the suitable workload, as improper selections can lead to suboptimal outcomes or injury. Current workload estimation approaches rely on manual recording and special-ized equipment with limited feedback. Therefore, we introduce PPGSpotter, a novel PPG ...

Application Development Technology and Tools: Vulnerabilities and ...

https://community.mis.temple.edu/mis5206sec701fall2024/files/2020/08/SANS-Reading7_application-development-technology-tools-vulnerabilities-threat-management-secure-programming-practices-defense-in-depth-approach-1283.pdf

This paper addresses the security challenges that exist due to programming flaws, and explains how simple programming practices can reduce the risks. The paper starts with a description of common application vulnerabilities and risks. The vulnerabilities that are discussed include Buffer overflows, SQL Injection, Script Injection, XML injection and others. The application development platforms ...