Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 50

HearBP: Hear Your Blood Pressure via In-ear ... - Temple University

https://cis.temple.edu/~yu/research/HearBP-info24.pdf

Abstract—Continuous blood pressure (BP) monitoring using wearable devices has received increasing attention due to its importance in diagnosing diseases. However, existing methods mainly measure BP intermittently, involve some form of user effort, and suffer from insuficient accuracy due to sensor properties. In order to overcome these limitations, we study the BP measurement technology ...

Modeling Infiltration with Approximate Solutions to Richard s Equation

https://sites.temple.edu/sserrano/files/2020/08/12-Modeling-Infiltration-with-Approximate-Solutions-of-Richards-Equation.pdf

Sergio E. Serrano1 Abstract: Using approximate analytical solutions of the nonlinear Richard’s equation, simple models for the simulation of water content, pressure head, hydraulic head, and infiltration rate profiles, subject to either constant conditions, time-variable rainfall, or redistribution, are developed. New practical expressions for the time to ponding and infiltration rate at the ...

Microsoft Word - Article B Bricker.doc

https://sites.temple.edu/ticlj/files/2017/02/27.1.Bricker-TICLJ.pdf

Pennsylvania included language emphasizing the importance of proportionality in punishment.96 Influenced by Quaker abolitionists,97 the Pennsylvania legislature, in 1794, departed from common law classifications by dividing murder into degrees.98 The new law provided that: [A]ll murder, which shall be perpetrated by means of poison, or by lying ...

1 QoS-aware Online Service Provisioning and Updating in Cost-efficient ...

https://cis.temple.edu/~wu/research/publications/Publication_files/10_bare_jrnl_compsoc.pdf

1.1 Motivation and Challenges Service provisioning and updating refers to the decision-making process of the locations of services within a specific edge computing network to balance the interests of service providers and consumers to achieve the greatest eficiency possible [7]. Numerous mobile devices and sensors in edge networks need to interface with services and exchange data in real-time ...

Intrinsic Disorder and Protein Function A. Keith Dunker, J. David ...

https://dabi.temple.edu/external/zoran/papers/Dunker_TPT.pdf

For ordered protein, the ensemble members all have the same time-averaged canonical set of Ramachandran angles along their backbones. For intrinsically disordered protein, the ensemble members have different (and typically dynamic) Ramachandran angles. Such disorder has been characterized by a variety of methods including x-ray crystallography, NMR spectroscopy, CD spectroscopy, and protease ...

THE BEMBA ACQUITTAL: A BLOW TO THE ICC’S LEGITIMACY IN A TIME ... - Sites

https://sites.temple.edu/ticlj/files/2020/05/34.1_Article-D-Final-Format.pdf

World leaders and human rights groups have criticized the ICC as expensive and ineffective. This critique is essentially an attack on the court’s legitimacy. This Note argues that Bemba’s acquittal only serves to weaken that legitimacy. Beginning with an analysis of the majority and minority opinions, it then discusses how the decision will impact the ICC’s legitimacy by imposing ...

DeepIDPS: An Adaptive DRL-based Intrusion Detection and Prevention ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf

Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...

Sophistic Method and Practice - Sites

https://sites.temple.edu/dwolf/files/2020/06/Sophistic-method.pdf

Since neither Plato’s nor the general sense of “sophist” encourages an account of sophistic method and practice, it is questionable whether there is an alternative approach. The follow-ing discussion offers a sort of middle course by suggesting alterations to Plato’s sense of “sophist” that in turn yield a subset of sophists in the general sense. What is ultimately important here ...

An Overview of Cryptography - Temple University

https://cis.temple.edu/~qzeng/cis4360-spring17/papers/An%20Overview%20of%20Cryptography.pdf

GEA/1 and GEA/2 are proprietary stream ciphers, employing a 64-bit key and a 96-bit or 128-bit state, respectively. GEA/1 and GEA/2 are most widely used by network service providers today although both have been reportedly broken.

The Socialist Legal System with Chinese Characteristics: - Sites

https://sites.temple.edu/ticlj/files/2017/02/24.1.Zhang-TICLJ.pdf

The specifics of what is a socialist legal system and what constitutes Chinese characteristics in terms of the rule of law are subject to further debate. The Confucian heritage rooted legal tradition and the single party ruling system have significantly shaped the legal landscape of the country, making the route to the rule of law in China a long and thorny one. Despite China’s socialist ...