Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 42

Research Guides: Public Health Law Research Guide: Legal Mapping

https://guides.temple.edu/c.php?g=990083&p=7162366

A mapping study may examine the law at a particular point in time or its change over a period of time. Policy surveillance, one type of legal mapping, tracks laws and policy over time in multiple jurisdictions and in turn can be used to evaluate those laws and policies’ effects.

Auditors’ Responsibility for Fraud Detection.

https://community.mis.temple.edu/mis5208sp18/files/2018/01/Auditors%E2%80%99-Responsibility-for-Fraud-Detection.-1.pdf

Auditors will enter a much expanded arena of procedures to detect fraud as they implement SAS no. 99. The new standard aims to have the auditor’s consideration of fraud blended into the audit process and continually updated until the audit’s completion. SAS no. 99 describes a process in which the auditor (1) gathers information needed to identify material misstatement due to fraud, (2 ...

Accountancy MAcc | Temple University Bulletin

https://bulletin.temple.edu/graduate/scd/fox/accountancy-macc/

Time Limit for Degree Completion: The Fox Master of Accountancy is designed to be completed in one year with full-time study or across a two-year minimum if studying part-time. Graduate School guidelines allow up to six years, however, for completion of the master's degree.

DiVE: Differential Video Encoding for Online Edge-assisted Video ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/DiVE.pdf

Abstract—Ensuring stable and high-quality real-time video an-alytics for computationally constrained mobile agents is essential. However, limited computing resources and network bandwidth present significant challenges in meeting the objective of low response time and high inference accuracy. In this paper, we present DiVE, an edge-assisted video analytics system that utilizes motion vectors ...

Question 1 - Temple University

https://cis.temple.edu/~latecki/Courses/CIS617-04/Solutions/archana_guptaHW1.pdf

Solutions by Archana Gupta Question 1 (Chapter 3: 10) An 8-bit byte with binary value 10101111 is to be encoded using an even-parity Hamming code. What is the binary value after encoding?

GR ADUATION CEREMONY - School of Pharmacy

https://pharmacy.temple.edu/sites/pharmacy/files/media/document/TUSP%202024%20GRAD%20PROGRAM%205.9.pdf

The School houses the Moulder Center for Drug Discovery research, The Jayne Haines Center for Pharmacogenomics and Drug Safety, a tissue culture facility for cell-based research, a Proteomics Facility an Addiction Research Lab and a CGMP facility, one of only six based at universities nationwide.

Zhanteng Xie, Pujie Xin, and Philip Dames - Sites

https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf

Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...

Firewalls, IDS and IPS - Temple University

https://community.mis.temple.edu/mis5214sec702spring2021/files/2021/02/06_S21_MIS5214_Unit6_Firewalls-IDS-IPS.pdf

Critical infrastructure systems supporting major industries are dependent on information systems for command and control • Financial, Manufacturing, Transportation, Energy, Water...

location_mobicom.dvi - Temple University

https://cis.temple.edu/~jiewu/teaching/Spring%202013/01-savvides-localization-wireless-sensor-networks-fine-grained.pdf

Abstract— Wireless communication systems have become increasingly common because of advances in radio and embedded system technologies. In recent years, a new class of applications that networks these wireless de-vices together is evolving. A representative of this class that has received considerable attention from the research community is the wireless sensor network. Such a sensor ...

Balancing Privacy and Accuracy using Significant Gradient Protection in ...

https://cis.temple.edu/~wu/research/publications/Publication_files/J-CT-2024-Balancing%20Privacy%20and%20Accuracy%20using%20Siginificant%20Gradient%20Protection%20in%20Federated%20Learning.pdf

Abstract—Previous state-of-the-art studies have demonstrated that adversaries can access sensitive user data by membership inference attacks (MIAs) in Federated Learning (FL). Intro-ducing differential privacy (DP) into the FL framework is an effective way to enhance the privacy of FL. Nevertheless, in differentially private federated learning (DP-FL), local gradients become excessively ...