Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 3,090

Research Guides: Modern Physics: PHYS 2796: Lab Reports

https://guides.temple.edu/physics2796/labs

PHY 2796 Modern Physics Laboratory (provide an informative title) Your name, Department of Physics, Temple University Abstract This paper describes the required format of the lab reports of the experiments performed in PHYSICS 2796 Modern Physics Laboratory. It also serves as a template for your lab reports. An abstract is designed to give the reader: a) Knowledge of the general method ...

Microsoft Word - Getting Students to do Reading Assignments.doc

https://teaching.temple.edu/sites/teaching/files/resource/pdf/Getting_Students_to_do_Readings.pdf

Often students don’t do reading assignments because they can achieve their goals without doing them. The course goal for the average undergraduate is “getting through,” and students are adept at identifying exactly what’s necessary to get through (with their target grade).

Guide to Becoming an Effective Writer in College

https://studentsuccess.temple.edu/sites/studentsuccess/files/GuidetoBecominganEffectiveWriterinCollege.pdf

Guide to Becoming an Effective Writer in College The learning environment of college is strikingly different from that of most high schools, and the shift into this new academic culture can be disorienting even to the best students. In every subject, the biggest shift has to do with motivation and control: college students must be self-motivated and active learners responsible for their own ...

DeepIDPS: An Adaptive DRL-based Intrusion Detection and Prevention ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf

Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...

CrossLayer.dvi - cis.temple.edu

https://cis.temple.edu/~wu/research/publications/Publication_files/mass15pouya.pdf

Interference among the nodes is the second major origin of errors in wireless transmissions. In contrast with the wired links, the wireless medium is shared among the wireless devices. Consequently, in the case that two wireless trans-mitters that have a common node in their communication rage transmit simultaneously, the receiver node cannot receive the transmitted packet correctly. Feedback ...

THE FOURTH CONSTITUTION-MAKING WAVE OF AFRICA: CONSTITUTIONS 4.0?

https://sites.temple.edu/ticlj/files/2017/02/28.2.Hessebon-TICLJ.pdf

Section II of this paper discusses the metaphor of constitution-making waves and its applicability in Sub-Saharan Africa. Discussions of the distinguishing features of constitutions 4.0 and the problems of incumbency abuse and politicized ethnicity in Kenya prior to the adoption of the Kenyan Constitution in 2010 follow. The purpose of these discussions is to show the problems the new Kenyan ...

Outlier Detection with Kernel Density Functions

https://cis.temple.edu/~latecki/Papers/mldm07.pdf

Abstract. Outlier detection has recently become an important prob-lem in many industrial and ̄nancial applications. In this paper, a novel unsupervised algorithm for outlier detection with a solid statistical foun-dation is proposed. First we modify a nonparametric density estimate with a variable kernel to yield a robust local density estimation. Out-liers are then detected by comparing the ...

Visual Curvature - Temple University

https://cis.temple.edu/~latecki/Papers/VisualCurvatureCVPR07.pdf

a relation between multi-scale visual curvature and convexity of simple closed curves. To our best knowledge, the proposed definition of visual curvature is the first ever that applies to regular curves as defined in differential geometry as well as to turn angles of polygonal curves. Moreover, it yields stable curvature estimates of curves in digital images even under sever distortions.

M2381 - BENSON PRINT.indd - College of Liberal Arts

https://liberalarts.temple.edu/sites/liberalarts/files/Handbook_on_the_Economics.pdf

The largest part of the industry (75 percent) comprises guards or patrol ofi cers. With the rising employment of technology, security blends into the IT department, especially in the proprietary context. It is also important to note that in both segments of the indus-try some security employees spend part of their time in such non- security- related tasks as concierge- type activities.

CanalScan: Tongue-Jaw Movement Recognition via Ear Canal Deformation ...

https://www.cis.temple.edu/~yu/research/CanalScan-info21.pdf

Abstract—Human-machine interface based on tongue-jaw movements has recently become one of the major technological trends. However, existing schemes have several limitations, such as requiring dedicated hardware and are usually uncomfortable to wear. This paper presents CanalScan, a nonintrusive system for tongue-jaw movement recognition using only commodity speaker and microphone mounted on ...