- Digital Marketing and Social Media
- AI in Service Interactions
- Functional Brain Connectivity Studies
- Advanced Neural Network Applications
- Advanced Graph Neural Networks
- Advanced Malware Detection Techniques
- Social Robot Interaction and HRI
- Anomaly Detection Techniques and Applications
- EEG and Brain-Computer Interfaces
- Advanced MRI Techniques and Applications
- Geographic Information Systems Studies
- Blood donation and transfusion practices
- Web Applications and Data Management
- Advanced Computational Techniques and Applications
- Neural dynamics and brain function
- Topic Modeling
- AI and Big Data Applications
- Adversarial Robustness in Machine Learning
- Systems Engineering Methodologies and Applications
- Data-Driven Disease Surveillance
- Machine Learning and ELM
- Digital Games and Media
- Technology Adoption and User Behaviour
- Halal products and consumer behavior
- Human Mobility and Location-Based Analysis
Center for Translational Research in Neuroimaging and Data Science
2024-2025
Georgia State University
2024-2025
Qingdao University
2022-2024
Georgia Institute of Technology
2024
Emory University
2024
The University of Sydney
2024
National University of Malaysia
2024
Renmin University of China
2024
Wuhan Sports University
2023
Beihang University
2023
Resting-state functional magnetic resonance imaging (rs-fMRI) is a noninvasive technique pivotal for understanding human neural mechanisms of intricate cognitive processes. Most rs-fMRI studies compute single static connectivity matrix across brain regions interest, or dynamic matrices with sliding window approach. These approaches are at risk oversimplifying dynamics and lack proper consideration the goal hand. While deep learning has gained substantial popularity modeling complex...
Purpose This study aims to critically review the research on phenomenon of discrimination in hospitality and tourism services identify key thematic areas, scenarios, antecedents consequences; provide theoretical propositions for future research; propose practical strategies reduce improve equality field. Design/methodology/approach paper adopts preferred reporting items systematic reviews meta-analyses guidelines collect relevant academic work from 1985 2020 analyses studies through...
Purpose The purpose of this study is to evaluate service robots as an alternative provider that can reduce customers’ social discomfort in hospitality encounters. Specifically, the authors discuss when and what scenarios alleviate such explain effect from perspective dehumanization. Design/methodology/approach Following a constructivist paradigm, adopt qualitative research design, gathering data through 21 semistructured interviews explore why presence employees causes encounters how...
Resting-state functional magnetic resonance imaging (rs-fMRI) offers valuable insights into the human brain's organization and is a powerful tool for investigating relationship between brain function cognitive processes, as it allows of to be captured without relying on specific task or stimuli. In this study, we introduce novel attention mechanism graphs with subnetworks, named Self-Clustering Graph Transformer (SCGT), designed handle issue uniform node updates in graph transformers. By...
Abstract Air quality plays a pivotal role in human health and well-being, with growing public awareness of its importance. However, the response relationship between air attention is unclear. Utilizing data from Baidu Index, quality, demographic data, we developed per capita Public Attention to Quality (PAAQ) index. Employing seasonal time series analysis, spatial lag models, examined spatiotemporal driving factors PAAQ index Shandong Province, China 2014 2021. Our study focused on keywords...
Abstract Systems Modeling Language (SysML) is a standard modeling language commonly used in the field of systems engineering. As one key elements SysML, The “use case” not only serves as an important means for refining requirements but also drives incremental design process entire model. Taking remote-sensing satellite example, this paper introduces iterative method based on use cases system model construction spacecraft, which continuously evaluates architecture-related aspects such...
Based on large-scale human mobility data collected in San Francisco and Boston, the morning peak urban rail transit (URT) ODs (origin-destination matrix) were estimated most vulnerable URT segments, those capable of causing largest service interruptions, identified. In both networks, a few highly segments observed. For this small group vital impact failure must be carefully evaluated. A bipartite usage network was developed used to determine inherent connections between transits their...
The multi-agent information fusion (MAIF) system can alleviate the limitations of a single expert in dealing with complex situations, as it allows multiple agents to cooperate order solve problems environments. Dempster–Shafer (D-S) evidence theory has important applications multi-source data fusion, pattern recognition, and other fields. However, traditional Dempster combination rules may produce counterintuitive results when highly conflicting data. A conflict method based on base basic...
The family factors have a crucial influence on the choice of occupations. present study analyzed through combination qualitative and quantitative research. Methods used in were professional disposition research method Colaizzis method. showed that students from better-off families had clear preferences for humanities social sciences majors, while children less well-off to give priority such issues as income tuition fees. analysis found at this stage, different genders more significantly...
We develop a quantitative methodology to characterize vulnerability among 132 U.S. urban centers ('cities') terrorist events, applying place-based index database of incidents and related human casualties. A centered autologistic regression model is employed relate outcomes also adjust for autocorrelation in the geospatial data. Risk-analytic 'benchmark' techniques are then incorporated into modeling framework, wherein levels high low terrorism identified. This new, translational adaptation...
In pattern matching, a gap constraint is more flexible wildcard than traditional wildcards "?" and "*". Pattern matching with constraints difficult to handle fulfills user's enquiries easily. has therefore been carried out in numerous research works, such as music information retrieval, searching protein sites, sequence mining. Strict under nonoverlapping condition, type of constraints, key issue mining since it can be used compute the frequency pattern. Exact limits flexibility match some...
In contemporary studies in areas such as the field of classical theory, there has been an increasing emphasis on E-Business. this study, we examine central place theory principles using China’s consumer-to-consumer online game marketing a case E-business. The results indicate that virtual goods C2C are distributed with high economic development and where residents have purchasing power. Further, found transmission capacity is affected by level telecommunication services because they...
A verification code is an automated test method used to distinguish between humans and computers. Humans can easily identify codes, whereas machines cannot. With the development of convolutional neural networks, automatically recognizing a now possible for machines. However, advantages networks depend on data by training classifier, particularly size set. Therefore, identifying using network difficult when are insufficient. This study proposes active deep learning strategy obtain new special...
In this paper we propose an improved hybrid genetic algorithm to overcome the deficiencies of conventional algorithms in solving multi-modal function global optimization problems. The combines niche and steepest descent method: elimination operator is introduced keep diversity population ensure search space complete more solutions can be obtained; used strengthen local ability improve accuracy efficiency. new Algorithm applied optimizing function, fact shows that find all complex it has...
In the existing spectral GNNs, polynomial-based methods occupy mainstream in designing a filter through Laplacian matrix. However, polynomial combinations factored by matrix naturally have limitations message passing (e.g., over-smoothing). Furthermore, most GNNs are based on bases, which struggle to capture high-frequency parts of graph signal. Additionally, we also find that even increasing order does not change this situation, means models natural deficiency when facing signals. To tackle...
In this work, we propose Salient Sparse Federated Learning (SSFL), a streamlined approach for sparse federated learning with efficient communication. SSFL identifies subnetwork prior to training, leveraging parameter saliency scores computed separately on local client data in non-IID scenarios, and then aggregated, determine global mask. Only the model weights are communicated each round between clients server. We validate SSFL's effectiveness using standard benchmarks, noting marked...
In 2020, the Supreme People's Court, Procuratorate, and Ministry of Public Security jointly issued Guiding Opinion on Lawful Application Legitimate Defence System (the Opinion). This article examines implementation in respect abused women who killed their abusers China. Effectiveness was reviewed through analysis cases before after its issuance. has given people a deeper understanding determination legitimate defence by elaborating issues related to defence, but practice, opinion played...
Videos showcasing specific products are increasingly important for E-commerce. Key moments naturally exist as the first appearance of a product, presentation its distinctive features, presence buying link, etc. Adding proper sound effects (SFX) to these key moments, or video decoration with SFX (VDSFX), is crucial enhancing user engaging experience. Previous studies about adding videos perform matching at holistic level, lacking ability moment. Meanwhile, previous on highlight detection...