All

Development of Hydrogen Energy and Energy Storage Technologies for Net-Zero Emissions

Development of Hydrogen Energy and Energy Storage Technologies for Net-Zero Emissions

Nov 19, 2025

            To achieve the 2050 net-zero emission target, hydrogen energy, water electrolysis, CO₂ reutilization, and flow-battery energy storage constitute the major key technologies. Hydrogen is abundant, produces only water after reaction, and possesses high energy density, making it suitable as a transportation fuel, industrial energy source, and energy-storage medium. Industrial CO₂ emissions can also be converted with hydrogen into valuable fuels such as methane, ethylene, and methanol. Meanwhile, the intermittency of renewable resources such as solar and wind can be mitigated through flow batteries, enabling peak shaving and stabilizing power output.                The energy efficiency of these electrochemical reactions depends significantly on electrode properties, structure, and interfacial impedance. For example, water-electrolysis efficiency drops at high current densities due to sluggish oxygen evolution reaction kinetics and bubble formation, which increase interfacial impedance and energy loss. CO₂ capture and conversion are energy-intensive processes that require highly active and selective catalysts to improve efficiency and reduce cost. In flow batteries, the charge–discharge efficiency is influenced by the surface characteristics of porous graphite-felt electrodes and precise operational control. Across these electrochemical systems, carbon-based materials—particularly carbon nanotubes (CNTs)—play a key role. CNTs offer high electrical conductivity, chemical stability, large surface area, and excellent mechanical strength, forming three-dimensional conductive networks that enhance electron transport and catalysis while lowering overpotential and interfacial impedance.            Overall, the performances of water electrolysis, CO₂ conversion, and flow-battery storage depend on efficient, durable, and cost-effective electrode materials. To accelerate commercialization and reduce electrode cost, our team focuses on low-cost materials such as carbon, stainless steel, and nickel for developing electrodes used in water electrolysis and CO₂ electrochemical conversion. We also provide customized electrode components and testing services for material developers, supporting both experimental research and system-level integration. Currently, we have developed a stainless-steel-electrode for water-electrolysis with competitive performance, and we are now advancing toward large-scale commercial electrolysis systems to support future industrial deployment.

Fostering EFL University Students’ Motivation and Self-Regulated Learning in Writing: A Socio-Constructivist Approach

Fostering EFL University Students’ Motivation and Self-Regulated Learning in Writing: A Socio-Constructivist Approach

Oct 21, 2025

  Writing is a complex cognitive skill essential for both academic and professional communication. In many exam-oriented English-as-a-Foreign-Language (EFL) contexts, students often acquire writing passively and tend to lose motivation once exams are completed. Since motivation and self-regulated learning (SRL) influence the sustained effort needed for writing development, understanding how students’ motivation is supported and how they employ SRL strategies can offer valuable insights for teaching practice.   This qualitative case study explores how six first-year EFL university students with prior exam-focused writing experience developed motivation and utilized SRL strategies in a year-long English writing course designed around a socio-constructivist approach. Data were collected from semi-structured interviews, self-reflections, and students’ developing drafts. The analysis revealed that the students experienced positive changes in writing motivation as the course progressed. Their motivation grew through heightened task interest, which helped clarify outcome expectations and shift their goal orientation from vague career aspirations to specific skill improvement. The students also applied a range of SRL strategies, among which self-evaluative standards proved particularly crucial, as they enabled effective feedback integration and concrete revision goal-setting. These findings highlight the value of incorporating a socio-constructivist approach into writing courses to gradually transform students’ writing experiences and outcomes in exam-oriented EFL contexts, offering implications for both researchers and practitioners.

Outstanding Young Scholar Spotlight: Associate Professor Jian-Jhih Kuo

Outstanding Young Scholar Spotlight: Associate Professor Jian-Jhih Kuo

Sep 18, 2025

  As information technology continues to evolve rapidly, the new generation of scholars is taking on the challenge of exploring emerging research frontiers and shaping the future of the field. Associate Professor Jian-Jhih Kuo from the Department of Computer Science and Information Engineering at National Chung Cheng University has shown strong dedication and focus in his work. He has produced outstanding results in quantum networks, distributed machine learning, path planning, and traffic engineering. In recent years, he was honored with the prestigious Ta-You Wu Memorial Award, marking him as a rising figure in the computer science community.   Academic Journey: From CCU to NTHU, and Back Again to Grow Roots   After earning his bachelor’s degree in computer science from National Chung Cheng University, Associate Professor Jian-Jhih Kuo developed a strong interest in research. He recalls that during his undergraduate years, the excellent faculty not only helped him build a solid theoretical foundation, but also sparked his curiosity and strengthened his ability to solve problems. This period marked both his academic awakening and the beginning of his research journey.   He then pursued a Ph.D. at National Tsing Hua University under the guidance of Professor Ming-Jer Tsai. That stage of training was both challenging and deeply inspiring. Professor Tsai valued research freedom and encouraged students to take on forward-looking networking topics, while also pushing them to read difficult papers. More importantly, he constantly reminded his students to ask the right questions and to understand the mindset and reasoning behind each author’s research design. Under this kind of mentorship, Professor Kuo gradually developed his independence as a researcher and began thinking about technology and research value from a broader perspective.   After completing his doctorate, he joined the Institute of Information Science at Academia Sinica as a postdoctoral researcher, working with Professors Wen-Tsuen Chen and De-Nian Yang on software-defined networking. This experience exposed him to the high academic standards and dedication of senior scholars. Despite being close to 70 years old at the time, Professor Chen actively participated in every research discussion and never compromised on quality, leaving a lasting impression on Professor Kuo’s academic mindset. Professor Yang, on the other hand, often emphasized that “working hard is a given, but only real results count.” This helped shape Professor Kuo’s early-career perspective that academic work requires not only passion and persistence, but also concrete, visible outcomes.   With support from senior colleagues, including Professor Ren-Hung Hwang who hosted his job talk and helped facilitate his return, Professor Kuo eventually launched his academic career at his alma mater, National Chung Cheng University. Having started his academic path at National Chung Cheng University, returning to serve his alma mater carries special meaning and reinforces his dedication to teaching and research.   Academic Honor: Ta-You Wu Memorial Award   In 2025, Associate Professor Jian-Jhih Kuo was honored with the Ta-You Wu Memorial Award. To him, this national-level recognition is not only an affirmation but also a meaningful reminder. With humility, he emphasizes that this achievement does not belong to him alone, but to the many people who have supported him along the way, including his mentors, research collaborators, students, and family. Being able to continuously pursue both teaching and research, accumulate meaningful results, and ultimately receive such a prestigious award, has been an extraordinary journey.   For Professor Kuo, the true value of this recognition lies not only in affirming his past efforts, but also in inspiring future progress. He hopes the award will encourage more young scholars to stay true to their passion, embrace challenges with courage, and learn to give back and share as they strive for breakthroughs. He especially emphasizes, “Research is not only a personal achievement, but also a legacy to be passed on.” With this belief, upon returning to his alma mater, he has committed himself to guiding students in research projects, helping them develop skills in independent thinking, academic writing, and interdisciplinary collaboration. Research Achievements: Bridging Theory and Application   Associate Professor Jian-Jhih Kuo's research focuses on three main areas, all centered around problem modeling and algorithm design, with a strong emphasis on connecting theoretical analysis with practical implementation: Resource Allocation and Routing Optimization in Quantum Networks. As one of the first scholars in Taiwan to explore this emerging field, Professor Kuo's team addresses key challenges such as quantum memory limitations, fidelity degradation, entanglement swapping, and purification. They have developed approximation algorithms with theoretical guarantees and adaptive decision-making frameworks that lay the groundwork for future quantum communications. Distributed Machine Learning and Security Defense. His work tackles critical issues including non-IID data distributions, malicious attacks, and model splitting. He has proposed low-overhead defense mechanisms, clustering strategies, and flexible deployment techniques to improve both the efficiency and robustness of learning systems. Traffic Engineering and Path Planning Optimization. This includes multicast routing in software-defined networks, content caching and energy-aware scheduling in edge computing, as well as application-driven problems such as UAV data collection, battery swapping logistics for electric vehicles, and emergency communication support. By combining optimization theory with real-world needs, Professor Kuo has designed algorithms with provable guarantees or learning flexibility, validated through real-data simulations. These solutions strike a balance between theoretical rigor and practical relevance.   Since 2020, he has led several NSTC-funded projects and collaborated closely with leading research teams in Taiwan and abroad. His work has been published in over 40 papers across top-tier international conferences such as IEEE INFOCOM, GLOBECOM, and ICC, as well as prestigious journals including IEEE TMC, TSC, TVT, and COMST, receiving increasing recognition from the academic community.   Educational Mission: Inspiring Students and Nurturing Future Talent   As an early-career faculty member, Associate Professor Jian-Jhih Kuo deeply values the role and responsibility of education. He believes that the legacy of academic research lies not only in accumulated results but also in inspiring the next generation. He actively encourages undergraduate students to engage in research early on, guiding them through hands-on experience to learn how to raise meaningful questions, design methods, write papers, and deliver presentations. Through this process, students not only enhance their academic abilities but also develop the critical thinking and independent research skills that define their competitive edge.   He often says that the greatest sense of accomplishment for a teacher comes from seeing students shine on their academic or professional paths. He also expresses his gratitude to Professor Chih-Yu Wang for his early insights and advice, which helped shape his approach to mentoring undergraduates and building their problem-solving capabilities. Looking ahead, he hopes to cultivate more students with a global perspective, so that Taiwan’s research capacity can continue to grow and gain visibility on the international stage.   Looking Ahead: Research Vision and Global Collaboration   Looking forward, Associate Professor Jian-Jhih Kuo plans to continue advancing two core research directions. The first is quantum networking, with a focus on multiparty entangled states, integration of heterogeneous quantum platforms, and hybrid quantum network architectures that combine fiber, free-space optics, and satellite communications. The second involves traffic engineering and path optimization in classical networks, with practical applications in smart city infrastructure such as drones, electric vehicles, and next-generation communication technologies, bridging theoretical research with real-world implementation.   At the same time, he emphasizes the importance of international and inter-institutional collaboration. He is actively expanding his global research network to foster more cross-disciplinary exchanges and contribute to Taiwan’s continued growth in emerging technologies.   Associate Professor Jian-Jhih Kuo’s academic journey is one shaped by passion, perseverance, and a willingness to take on challenges. As a young scholar, he continues to push the boundaries of research, while as an educator, he shares his dedication to academic growth and responsibility with the next generation. His work not only marks him as a rising figure in Taiwan’s computer science community but also as a promising leader for the future.

Critical analysis of the technological affordances, challenges and future directions of Generative AI in education: a systematic review

Critical analysis of the technological affordances, challenges and future directions of Generative AI in education: a systematic review

Sep 18, 2025

  This systematic review synthesizes 27 core-journal papers (2020–2023) on generative AI in education using a PRISMA-guided selection and inductive thematic coding. It maps technological affordances, key challenges, and actionable directions for future research and practice.   Highlights Four technological affordances: Accessibility (always-on support; remote learning), Personalization (context-aware feedback/materials), Automation (offloading repetitive tasks; boosting preparation/assessment), and Interactivity (AI as conversational partner supporting language and conceptual learning). Five central challenges: Academic integrity (plagiarism/cheating), Response errors & bias (hallucinations, fabricated citations, data bias), Over-dependence (risks to higher-order thinking), Digital divide (paywalls and bans), and Privacy & security. Roles in educational settings: Generative AI can function as an intelligent tutor, tutee, learning tool/partner, and domain expert—supporting curriculum design, learning assistance, and teacher PD. Fig 1. Roles of generative AI in education   Methods   The review searched Web of Science, Scopus, and ScienceDirect, and coded contexts, sectors, and methods to portray the research landscape and use-cases. Fig 2. Guidelines about the future directions of research and practice   Conclusions and Recommendations Assessment & policy: Adopt diverse assessments (proctored open-ended tasks, orals, process portfolios) and enhance misconduct detection; establish and maintain institutional AI ethics guidelines. Bias mitigation & capacity building: Continuously monitor model bias and equip educators with AI literacy (including prompt design) to ensure human–AI collaboration that improves material design and feedback. Curricular integration: Integrate Generative AI into learning activities to foster higher-order skills; position AI as a thinking aid rather than an answer engine, with robust data protection and informed consent.   Contribution   The review bridges role-based perspectives with technological affordances to present a balanced account of opportunities and risks, offering concrete guidance for policymakers, educators, and learners.

‘You really have to have a thick skin’: A cross-cultural perspective on how online harassment influences female journalists

‘You really have to have a thick skin’: A cross-cultural perspective on how online harassment influences female journalists

Jul 15, 2025

            In-depth interviews with 75 female journalists who work or have worked in Germany, India, Taiwan, the United Kingdom, and the United States of America reveal that they face rampant online gendered harassment that influences how they do their jobs. Many of the women report that if they aim to engage with their audience online – which is a job requirement for many of them – they frequently face sexist comments that criticize, attack, marginalize, stereotype, or threaten them based on their gender or sexuality. Often, criticism of their work is framed as misogynistic attacks and, sometimes, even involves sexual violence. The journalists have developed a variety of strategies for dealing with the abuse, including limiting what they post online, changing what stories they report on, and using technological tools to prevent people from posting offensive words on the journalists’ public social media pages. Results show that this harassment disrupts the routinized practice of reciprocal journalism because it limits how much these women can interact with the audience in mutually beneficial ways without being attacked or undermined sexually. While experiences of harassment were consistent across the countries studied, cultural differences were evident in how much the journalists were expected to engage online. Results are discussed in relation to the hierarchy of influences model that aims to explain how multiple forces influence media content.

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

Jul 14, 2025

Introduction           Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. Inspired by security evolution in prior generations, this work provides a systematic review of existing research efforts on security and privacy for 6G networks. The article reviews the issues of 6G enabling technologies and state-of-the-art defense methods. By conducting the problems in each technology, our goal is to provide a holistic view of the evolution of core security and privacy issues, along with the remaining challenges for further enhancements. To this end, the study aims to answer the fundamental question: What are the major potential changes of 6G security infrastructure from the prior generations? What are new challenges and prospective approaches for privacy preservation in 6G to satisfy the requirements in laws, such as General Data Protection Regulation (GDPR)? The main contributions of this article are multi-fold. First, the work provides a systematic overview of the evolution of security architecture and vulnerabilities in legacy networks. By investigating the shortcomings of the standards and technical insights of protocol flaws in such networks, required enhancements to 6G security and privacy are highlighted. Second, our survey provides a holistic view of security and privacy issues and how the existing solutions must be changed to satisfy the new demands in 6G. Since 6G will continue on the techno-economic trajectory of 5G, a systematic review on transition and possible changes of 6G security and privacy can shed light on the best plan for the operators/developers to upgrade the security infrastructure/defense systems at the right time. Finally, our discussions about lessons learned from the shortcomings of existing security architecture and remaining technical challenges may help researchers/developers quickly identify relevant issues and starting points for further works. The key security aspects are summarized in Figure 1.   Figure 1. A taxonomy of key points of our survey on security & privacy for 6G   Key findings from the research:      1. Major differences between 5G and 6G:  5G introduced substantial advancements like improved subscriber identity protection through SUCI (Subscription Concealed Identifier), and basic AI-assisted threat detection, it still carries many vulnerabilities, including weaknesses in mutual authentication, susceptibility to fake base stations, and the reuse of legacy protocols that expose outdated threats. In contrast, 6G security is envisioned to go far beyond patching existing flaws. It will operate in a space-air-ground-sea integrated network environment with radically diverse applications such as brain-computer interfaces, holographic telepresence, and autonomous systems. However, new technologies mean novel vulnerabilities. Unlike 5G, 6G will incorporate quantum-safe cryptography, AI-empowered real-time adaptive security, and physical layer security in beamforming and directional communications that leverages wireless channel characteristics. Also, unlike 5G’s centralized identity model, 6G may move toward decentralized, passwordless authentication through biometrics and system-on-chip identities. Blockchain and distributed ledgers are also considered for ensuring data integrity and mutual trust across domains. Furthermore, 6G networks are expected to fully support real-time zero-touch threat responses and zero-trust architectures, emphasizing dynamic, policy-based access control. This leap from static protection models to intelligent, self-defending infrastructures marks a transformative shift from 5G’s reactive posture to 6G’s proactive and predictive security paradigm. A summary of typical 6G vs 5G applications and security requirements is illustrated in Figure 2. 6G security will upgrade 5G security with new capability in terms of intelligence, automation, and energy efficiency. Figure 2. 6G security vs 5G security.         2. Space-Air-Ground-Sea Integrated Networks will be the next frontier of security defense, probably national security: As the rising popularity of satellite-based broadband networks and drones in civil applications, Space-Air-Ground-Sea Integrated Networks (SAGIN) will be the reachable target of mobile networks in the coming years. By combining terrestrial, aerial, maritime, and satellite systems, 6G SAGIN will achieve expansive coverage and support critical applications like emergency rescue and autonomous navigation. However, this integration introduces heightened risks, including jamming, eavesdropping, and masquerading attacks on high-altitude platforms. Given the strategic relevance of SAGIN infrastructure for national defense, public safety, and global communications, securing it becomes essential. Further research on efficient and secure SAGIN models for national targets will be critical.      3. AI-based functions in 6G will be the new target of the tit-for-tat battle between attackers and security defenders: AI-based functions in 6G are expected to revolutionize network operations through automation, real-time decision-making, and adaptive security responses. However, this reliance on AI introduces a new battleground where attackers and defenders will continually outmaneuver each other. Adversaries may exploit vulnerabilities in AI models, such as data poisoning or adversarial inputs, to mislead or disable security mechanisms. Meanwhile, defenders must develop more robust, transparent, and resilient AI systems to detect and neutralize evolving threats. This cat-and-mouse dynamic will define the future of 6G security, demanding continuous innovation to stay ahead of increasingly intelligent and adaptive cyberattacks. Figure 3 summarizes key attacks and defense approaches for AI-based functions and case studies in 6G. Figure 3. Attack and defense methods in AI-based functions for 6G and case studies for security in AI-based 6G V2X.         4. The starting era of post-quantum cryptography, quantum security, and semantic communications: 6G will mark the starting era of post-quantum cryptography, where traditional encryption methods can no longer withstand the power of quantum computing. To ensure long-term data protection and mitigate the risks of “collect now, decrypt later” attacks, 6G will adopt quantum-safe cryptographic algorithms, such as ML-KEM and HQC, and explore quantum key distribution technologies (e.g., using satellites or aerial systems). In parallel, semantic communication—a paradigm that transmits meaning rather than raw bits—will transform how information is conveyed and protected amid the explosion of data and the limitations of Shannon’s theory. Together, these advancements will redefine digital trust, enhancing network intelligence, security, and resilience for the quantum age.   Provided by: Van-Linh Nguyen

Synchrony facilitates altruistic decision making for non-human avatars

Synchrony facilitates altruistic decision making for non-human avatars

Jun 04, 2025

Negotiation is a ubiquitous social activity in which individuals work together to reach a consensus on issues that are in dispute. The complicated interplay of competition and cooperation is a remarkable feature of negotiation, and negotiators go into it with a highly mixed motivation. Most negotiators seek to reach an agreement with the other, but they also strive for an agreement that serves their own goals. Thus, effective negotiators must find a tenuous balance between facilitating positive and cooperative interactions within a competitive and often distrustful environment. Prior research on negotiation emphasizes the importance of rapport, a feeling of connection, mutual attentive ness and positivity, in establishing cooperation and obtaining mutually beneficial outcomes. Rapport is known to be reflected in a particular pattern of nonverbal behavioral dynamics between interlocutors: interactional synchrony, hereafter, synchrony (Bernieri & Rosenthal, 1991; Fujiwara et al., 2020). Synchrony refers to ‘‘similarity in rhythmic qualities and enmeshing or coordination of the behavioral patterns of both parties’’ in an interaction (Burgoon et al., 1995, p. 128), which is believed a natural part of human interactions. The research field of human-computer interaction, known as HCI, has emerged to bring together ideas from diverse fields such as psychology, engineering, computer science, design, sociology, and communication. Advances in automation now allow humans to have realistic interactions with virtual human interviewers and have interactive conversations that resemble human-human interactions. The degree to which the human and non-human agent behaviors are synchronized with one another goes a long way toward building rapport and improving outcomes. Thus, the purpose of this research was to examine whether human negotiators would synchronize their movements when working with non-human avatars and if so, whether that would affect their perceptions of their negotiations. In formulating our hypotheses, we relied on two assumptions. Namely, one is that people unconsciously treat computers as social actors (the “media equation” effect), and the other is that synchrony breaks down when the competitive aspect of negotiation is emphasized. The three hypotheses formulated on the basis of these are as follows: H1. Participants will synchronize their movements with the movements of their non-human negotiation partner. H2. Greater synchrony will occur when participants engage in an integrative (win-win) negotiation compared to distributive (win-lose or zero-sum) negotiations. H3. Participants that engage in synchrony will report greater impression of affiliation, a proxy of rapport, with their non-human partner. People are not purely selfish in negotiations, but try to accommodate the other party’s goals somehow. The extent of this “other regard” is shaped by the relationship to the other party. Indeed, prior research suggests that affiliation towards one’s negotiation partner will influence concession-making, so in addition to these hypotheses, we also examine how synchrony impacts the outcomes participants obtain. Methods The 172 participants were instructed to negotiate with an avatar in order to come to an agreement, the maximum interaction time for this task was 10 min. The avatar was named “Sam” for both the male and female version of the avatar (Fig. 1). There were several items on the negotiation table, and participants were informed of the relative value of each item before starting the interaction. The specific values of these items were determined by the setting of the study; in the distributive (zero-sum) setting, items were worth the same amount for both participant and avatar. On the contrary, in the integrative condition, the item value differed between the participant and the avatar, allowing both the participant and the avatar to receive their highest value items. Participants were not told the avatar’s value of items in either condition, however they could discover this during the negotiation by asking questions or observing the avatar’s pattern of offers (the avatar always responded truthfully to questions about what it values). If no agreement was reached within the 10 min time limit, each party would only receive a single copy of their highest value item.   Fig. 1. Appearance of female and male avatar (“Sam”). The skeleton rendered by OpenPose is overlaid on each joint point of the avatar. Participants could talk to the agent without any restrictions, and the avatar was controlled by two experimenters through a graphical user interface; i.e., the Wizard of Oz method. One experimenter controlled the agent’s speech and verbal behavior, while the other controlled the avatar’s nonverbal behavior such as facial expressions and gestures. The interactions were video recorded, which was used in the subsequent synchrony analysis. Using video films of the negotiation, time-series bodily movement data was obtained using OpenPose (Cao et al., 2021; Fujiwara & Yokomitsu, 2021). Since a video is a series of still images, the movement time-series was created by calculating the distance the joint points traveled between each frame. For avatars, 10 coordinate points (i.e., eyes, nose, neck, shoulders, elbows, and hands/wrists) was used whereas 3 coordinate points (i.e., eyes and nose) were targeted for humans because many participants were videotaped with only their faces (i.e., above the chin). The sampling frequency was set to 30 Hz, which was equal to the video frame rate. As for synchrony analysis, we performed the dynamic time warping for each dyadic time series (Figure 2). The distance score obtained was the main variable (as an inverse) indicating the degree of synchrony. To test the validity of a synchrony measure, we randomly shuffled data within each time series to generate artificial “interactions.” This technique is a time-series equivalent of a permutation test that offers a baseline to assess the level of synchrony in the genuine dyadic interactions. Fig. 2. Example of dynamic time warping on movement time series: (A) A genuine human-avatar interaction, (B) A pseudo interaction of a randomly shuffled series. The heatmap represents the cost matrix created based on the difference between the two series; blue denotes smaller costs, red denotes larger costs. The black least-cost path minimizes the total cost (the cumulative addition of the costs on the path) from the start to the end of the matrix. In (A), the path can travel through the blue area, while the path must take the red area in (B), resulting in (A) having a smaller difference or a greater similarity. Deviations from the white diagonal show traces of adjustment using “warping” series, which align time series by their shape instead of time.   Results We used the distance score to test H1 and H2. H1 predicted that the participants would synchronize their movement with the non-human avatar, which was supported, as the distance was significantly smaller in the genuine human-avatar dyad compared to the dyad with shuffled artificial data. H2 was also supported; the distance score was significantly smaller in the integrative (cooperative) condition than that in the distributive condition. H3 predicted that synchrony with non-human avatars will lead to a favorable impression of the avatar. A mediation analysis that incorporated the impact of the experimental manipulation verified that the impact of the negotiation setting on impression of avatar was fully mediated by synchrony (Figure 3). Thus, H3 was supported. Fig. 3. The effect of experimental manipulation on the impression of affiliation to the avatar is mediated by synchrony. Negotiation setting is binarily coded: integrative (1), distributive (0). All the estimates were standardized (**p < .01).   In addition to the hypothesis tests, we explored whether synchrony leads to better negotiation outcomes for the human player. The results showed that participants’ willingness to engage in synchrony boosted the avatar-friendly decision in the integrative negotiation where they could accomplish a win-win deal (Figure 4). Instead, synchrony had no impact on their outcomes in the zero-sum negotiation.   Fig. 4. The interaction effect of synchrony and the negotiation setting on the negotiation outcome. On the left is the human player's score: the more synchrony they show with the avatar (left side of the figure), the lower their score. On the right is the avatar's score: synchrony was associated with increased score.   Overall, these findings reinforce the importance of synchrony in human-machine interactions. Here, we demonstrated that human-machine synchrony predicted positive subjective feelings as well as the outcomes that were negotiated. Our findings further suggest that people seem strategic in their willingness to engage in synchrony (Dunbar et al., 2020), because they only synchronized their movements to the avatar partner when there appeared to be material benefits to this behavior in an integrative negotiation. Also, our study may raise important practical and ethical questions for agent design. We complement a growing body of research that anthropomorphic interfaces can use subtle nonverbal signals to shape both perceptions and behavior. Some of these findings have obvious societal benefits such as enhancing physical and mental health. But other uses may be more problematic. For example, we have found that agents can extract greater concessions from a human negotiation partner by strategically using synthetic emotional expressions (de Melo et al., 2011) and potential consumers would want to own such an agent if it helped them manipulate others for their own personal gain (Mell et al., 2020). The field of artificial intelligence is becoming more aware of the need to work through ethical principles to guide the development of such technology. Our findings lend greater urgency to such efforts.   Related papers Bernieri, F. J., & Rosenthal, R. (1991). Interpersonal coordination: Behavior matching and interactional synchrony. In R. Feldman, & B. Rime (Eds.), Fundamentals of nonverbal behavior: Studies in emotion & social interaction (pp. 401–432). Cambridge University Press. Burgoon, J. K., Stern, L. A., & Dillman, L. (1995). Interpersonal adaptation: Dyadic interaction patterns. Cambridge University Press. Cao, Z., Hidalgo, G., Simon, T., Wei, S., & Sheikh, Y. A. (2021). OpenPose: Realtime multi-person 2d pose estimation using part affinity fields. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43, 172–186. https://doi.org/10.1109/TPAMI.2019.2929257 Dunbar, N. E., Giles, H., Bernhold, Q., Adams, A., Giles, M., Zamanzadeh, N., et al. (2020). Strategic synchrony and rhythmic similarity in lies about ingroup affiliation. Journal of Nonverbal Behavior, 44(1), 153–172. https://doi.org/10.1007/s10919-019- 00321-2 Fujiwara, K., Kimura, M., & Daibo, I. (2020). Rhythmic features of movement synchrony for bonding individuals in dyadic interaction. Journal of Nonverbal Behavior, 44(1), 173–193. https://doi.org/10.1007/s10919-019-00315-0 Fujiwara, K., & Yokomitsu, K. (2021). Video-based tracking approach for nonverbal synchrony: A comparison of Motion Energy Analysis and OpenPose. Behavior Research Methods, 53(6), 2700–2711. https://doi.org/10.3758/s13428-021-01612-7 Mell, J., Lucas, G., Mozgai, S., & Gratch, J. (2020). The effects of experience on deception in human-agent negotiation. Journal of Artificial Intelligence Research, 68, 633–660. https://doi.org/10.1613/jair.1.11924 de Melo, C., Carnevale, P. J., & Gratch, J. (2011). The effect of expression of anger and happiness in computer agents on negotiations with humans. Taipei, Taiwan: Paper presented at the Tenth International Conference on Autonomous Agents and Multiagent Systems.

Wavelet Approximation-Aware Residual Network for Single Image Deraining

Wavelet Approximation-Aware Residual Network for Single Image Deraining

May 15, 2025

It has been made great progress on single image deraining based on deep convolutional neural networks (CNN). In most existing deep deraining methods, CNNs aim to learn a direct mapping from rainy images to clean rain-less images, and their architectures are becoming more and more complex. However, due to the limitation of mixing rain with object edges and background, it is difficult to separate rain and object/background, and the edge details of the image cannot be effectively recovered in the reconstruction process. To address this problem, we propose a novel wavelet approximation-aware residual network (WAAR), wherein rain is effectively removed from both low-frequency structures and high-frequency details at each level separately, especially in low-frequency sub-images at each level. After wavelet transform, we propose novel approximation aware (AAM) and approximation level blending (ALB) mechanisms to further aid the low-frequency networks at each level recover the structure and texture of low-frequency sub-images recursively, while the high-frequency network can effectively eliminate rain streaks through block connection and achieve different degrees of edge detail enhancement by adjusting hyperparameters. In addition, we also introduce block connection to enrich the high-frequency details in the high-frequency network, which is favorable for obtaining potential interdependencies between high- and low-frequency features. Experimental results indicate that the proposed WAAR exhibits strong performance in reconstructing clean and rain-free images, recovering real and undistorted texture structures, and enhancing image edges in comparison with the state-of-the-art approaches on synthetic and real image datasets. It shows the effectiveness of our method, especially on image edges and texture details.

1 2