NETWORK ANALYSIS OF TERRORIST ACTIVITIES

来源 :Journal of Systems Science & Complexity | 被引量 : 0次 | 上传用户:out000
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
This paper uses an extensive network approach to “East Turkistan” activities by building both the one-mode and the bipartite networks for these activities.In the one-mode network,centrality analysis and spectrum analysis are used to describe the importance of each vertex.On this basis,two types of core vertices——The center of communities and the intermediary vertices among communities— are distinguished.The weighted extreme optimization(WEO) algorithm is also applied to detect communities in the one-mode network.In the “terrorist-terrorist organization” bipartite network,the authors adopt centrality analysis as well as clustering analysis based on the original bipartite network in order to calculate the importance of each vertex,and apply the edge clustering coefficient algorithm to detect the communities.The comparative and empirical analysis indicates that this research has been proved to be an effective way to identify the core members,key organizations,and communities in the network of “East Turkistan” terrorist activity.The results can provide a scientific basis for the analysis of “East Turkistan” terrorist activity,and thus provide decision support for the real work of “anti-terrorism”. This paper uses an extensive network approach to “East Turkistan ” activities by building both the one-mode and the bipartite networks for these activities. The one-mode network, centrality analysis and spectrum analysis are used to describe the importance of each vertex.On this basis, two types of core vertices - The center of communities and the intermediary vertices among communities- are distinguished.The weighted extreme optimization (WEO) algorithm is also applied detectable in the one-mode network. the “terrorist-terrorist organization ” bipartite network, the authors adopt centrality analysis as well as clustering analysis based on the original bipartite network in order to calculate the importance of each vertex, and apply the edge clustering coefficient algorithm to detect the communities. comparative and empirical analysis indicates that this research has been proved to be an effective way to identify the core members, key organizations, and communities in the network of “East Turkistan ” terrorist activity. The results can provide a scientific basis for the analysis of “East Turkistan ” terrorist activity, and thus provide decision support for the real work of “anti-terrorism ”.
其他文献
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7
如果把复杂难懂的交会对接过程简单类比成轮船靠泊码头,那么“神舟八号”与“天宫一号”的交会对接任务就会显得更容易理解.为实现中国首次无人交会对接任务,载人航天工程各
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7
Reliability, maintainability and testability(RMT) are important properties of equipment, since they have important influence on operational availability and lif
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7
期刊
用建立非表达文库的方法,从大肠杆菌感染后9h的中国家蚕的mRNA合成cDNA片段,重组入噬菌体λgt10的EcoRI的位点之间,所构成的基因非表达文库库容量为2×106重组子,经大肠杆菌C
二十一世纪教育应充分重视人格塑造和健康发展。心理学研究表明,坚强的意志、乐观的情绪、健全的人格等良好的心理品质,可以成就美好人生。高中学生的心理是复杂、多样的。班主任在对学生进行心理健康教育时,要具体问题具体分析,循序渐进,采取适合的心理健康教育策略。  青春期心理辅导  高中生处于青春后期。“长大未成人”是对他们心理发展特点的总体评价。根据中学生心理发展的特点,笔者从如下几个方面指导:  树立良
This paper studies a production system where products are produced continuously and whose specification limits are specified for screening inspection.In this pa
官员的致仕制度和官员的休假制度一样是我国从古至今的官员所享有的一项基本福利制度,也是国家对官员的一项重要的人事管理制度。历朝历代的统治者为了能更好的巩固自身的统治
笔者针对六年级学生以自己的喜好选择学科,忽视美术学科现象,通过问卷调查得知学生的真实想法。根据学生的心理特征,以个案研究为策略,以课堂教学为基地,找到利于美术教学的切入点,和学生进行良好的感情沟通,从兴趣入手,尊重爱好及多样性学习,有效调动学生全面参与美术教学,让学生喜欢美术课。  树立学习美术的信心  在承担多年小学六年级美术教学工作中,笔者发现一种常见现象:学生在小学低、中年级阶段时非常喜欢画