Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 6,430

Detecting, Localizing, and Tracking an Unknown Number of Moving Targets ...

https://sites.temple.edu/pdames/files/2016/07/DamesTokekarKumarISRR2015.pdf

Abstract Target tracking is a fundamental problem in robotics research and has been the subject of detailed studies over the years. In this paper, we introduce a new formulation, based on the mathematical concept of random finite sets, that allows for tracking an unknown and dynamic number of mobile targets with a team of robots. We show how to employ the Probability Hypothesis Density filter ...

EXTENDING ORGANIZATIONAL ROLE THEORY TO UNDERSTAND SHARED RESOURCES AND ...

https://scholarshare.temple.edu/bitstreams/e808959d-5aec-4594-9e88-b4afbff21ff4/download

EXTENDING ORGANIZATIONAL ROLE THEORY TO UNDERSTAND SHARED RESOURCES AND ROLE ENCROACHMENT IN ORGANIZATIONS A Dissertation Submitted to the Temple University Graduate ...

Potts Models and Protein Covariation - Temple University

https://ronlevygroup.cst.temple.edu/courses/2017_spring/chem5412/lectures/Lecture4_SBII_2017.pdf

Using Protein-sequence-variation profitably Correlated Mutations and Structural Contacts

PowerPoint Presentation

https://cis.temple.edu/~latecki/Courses/CIS2166-Fall21/Lectures/ch10.1-2.ppt

Then 2e = v V deg(v) Example: How many edges are there in a graph with 10 vertices, each of degree 6? Solution: The sum of the degrees of the vertices is 6 10 = 60. According to the Handshaking Theorem, it follows that 2e = 60, so there are 30 edges. * Graph Terminology Theorem: An undirected graph has an even number of vertices of odd degree.

Legendre-Hadamard conditions for two-phase configuration

https://faculty.cst.temple.edu/~yury/LH4lam.pdf

We generalize the classical Legendre-Hadamard conditions by using quadratic extensions of the energy around a set of two configurations and obtain new algebraic necessary conditions for nonsmooth strong local minimizers. The implied bounds of stability are easily accessible as we illustrate on a nontrivial example where quasiconvexification is unknown.

Trauma-Informed Art Education: Caring for Learners and Each Other

https://tyler.temple.edu/sites/tyler/files/Translations4_Trauma-informed%20Art%20Education.pdf

Trauma-informed art education involves commitment to relationships and programs that attempt to mitigate the efects of past traumatic experiences and to avoid retraumatization (Kay, 2020). Art educators who are trauma-informed build relationships, listen and afirm, empathize, assess to teach, and instruct in ways that help students build on their strengths. We utilize the therapeutic ...

TIle Irony of Socrates

https://sites.temple.edu/dwolf/files/2020/06/Irony.pdf

In the phrase "Socratic irony," which, as here, is principally used with reference to Plato's charac-ter Socrates, 'irony' is also commonly understood to mean dissembling or disingenuousness. This us-age is clearly informed by the conventional under-standing of 'eironeia,' but 'irony' does not mean deception. There are two basic kinds of irony, ver-bal and situational. Verbal irony occurs when ...

BINGE-WATCHING KILLED THE IDIOT BOX: THE CHANGING IDENTITIES OF VIEWERS ...

https://scholarshare.temple.edu/bitstreams/acea1ad1-1c27-4de3-89b1-770bd96f230b/download

collective memory, I examine binge-watching and binge-viewers through their mediated

Mathematical Tools for Multivariate Character Analysis

https://cis.temple.edu/~latecki/Courses/AI-Fall12/Lectures/GreatMatrixIntro.pdf

and their associatedeigenvectorsof a matrix describe the geometry of the trans- formation associated with that matrix. Using the multivariate normal, we then develop the multivariate breeders’ equation and examine properties of Gaussian fitness functions. We conclude with some elementary concepts in vector calcu- lus, focusing on derivatives of vectors and finding local extrema of vector ...

JOURNAL OF LA Privacy Preserving Ranked Multi-Keyword Search for ...

https://cis.temple.edu/~wu/research/publications/Publication_files/zhangweitc.pdf

Abstract—With the advent of cloud computing, it has become increasingly popular for data owners to outsource their data to public cloud servers while allowing data users to retrieve this data. For privacy concerns, secure searches over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner ...