Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 3,860

iGEM - Institute for Genomics and Evolutionary Medicine | Temple University

https://igem.temple.edu/products/software/mega

iGEM researchers are pursuing a variety of interdisciplinary research and discovery projects

Pennsylvania Courts of Common Pleas - Civil Dockets (including Family ...

https://guides.temple.edu/c.php?g=1145528&p=8361088

Pennsylvania's trial courts are the Courts of Common Pleas (CCPs), which are divided into 60 judicial districts. CCPs hear major civil and criminal cases. as well as appeals from minor courts. In most cases, the judicial district has the same boundaries as the county in which it is located, but sometimes two counties with smaller populations are combined into a single judicial district ...

Quantitative EDS Analysis using AZtec software platform

https://cst.temple.edu/sites/cst/files/documents/EDS%20Oxford-Quantitative-Guide.pdf

Olivine: To demonstrate the effect of Carbon coating on Oxygen measurement Olivine Certified Values O: 43.89 Mg: 30.42 Si: 19.44 Mn: 0.08 Fe: 5.87 Ni: 0.3 Spectrum quantified by processing all elements, including Oxygen.

Stronger predation intensity and impact on prey communities in the tropics

https://sites.temple.edu/bjsewall/files/2021/08/Freestone-et-al-2021-Ecology-Stronger-predation-intensity-impact-on-prey-communities-in-the-tropics.pdf

Predator exposure experiment To test the hypothesis that predation intensity and im-pact are stronger at lower latitudes, we conducted a short-term, 3-d predator exposure experiment on mature prey communities after a 3-month assembly period.

Building Classification Models: ID3 and C4.5 - Temple University

https://cis.temple.edu/~ingargio/cis587/readings/id3-c45.html

Introduction ID3 and C4.5 are algorithms introduced by Quinlan for inducing Classification Models, also called Decision Trees, from data.

Information Technology Auditing and Cyber Security

https://www.fox.temple.edu/academics/graduate-programs/specialized-masters/information-technology-auditing-cyber-security

The hands-on curriculum behind the Master of Science in IT Auditing and Cyber-Security can help equip you with the knowledge to make smart business decisions within a rising industry. You’ll learn to analyze data; identify, assess, and communicate cyber risk; and prepare to pass either the Certified Information System Auditor (CISA) exam or the Certified Information System Security Certified ...

scholarshare.temple.edu

https://scholarshare.temple.edu/server/api/core/bitstreams/24a36317-da80-46cc-b740-63092d3a167f/content

scholarshare.temple.edu

Temple becomes first university in region to deploy ZeroEyes gun ...

https://news.temple.edu/news/2024-11-18/temple-becomes-first-university-region-deploy-zeroeyes-gun-detection

Temple University becomes the first college campus in the tristate area to implement ZeroEyes, an AI-based gun detection software.

HackerRank Solutions: Tree: Huffman Decoding – Vahid E-Portfolio

https://sites.temple.edu/vahid/2022/03/05/hackerrank-solutions-tree-huffman-decoding/

Problem Huffman coding assigns variable length codewords to fixed length input characters based on their frequencies. More frequent characters are assigned shorter codewords and less frequent characters are assigned longer codewords. All edges along the path to a character contain a code digit. If they are on the left side of the tree, they will be a 0 (zero). If on the right, they’ll be a 1 ...

DSpace - scholarshare.temple.edu

https://scholarshare.temple.edu/bitstreams/1093d9ac-2782-41a8-9391-4dffb9337551/download

DSpace - scholarshare.temple.edu ... DSpace