This paper uses an extensive network approach to "East Turkistan" activities by building both the one-mode and the bipartite networks for these activities.In the one-mode network,centrality analysis and spec...This paper uses an extensive network approach to "East Turkistan" activities by building both the one-mode and the bipartite networks for these activities.In the one-mode network,centrality analysis and spectrum analysis are used to describe the importance of each vertex.On this basis,two types of core vertices——The center of communities and the intermediary vertices among communities— are distinguished.The weighted extreme optimization(WEO) algorithm is also applied to detect communities in the one-mode network.In the "terrorist-terrorist organization" bipartite network,the authors adopt centrality analysis as well as clustering analysis based on the original bipartite network in order to calculate the importance of each vertex,and apply the edge clustering coefficient algorithm to detect the communities.The comparative and empirical analysis indicates that this research has been proved to be an effective way to identify the core members,key organizations,and communities in the network of "East Turkistan" terrorist activity.The results can provide a scientific basis for the analysis of "East Turkistan" terrorist activity,and thus provide decision support for the real work of "anti-terrorism".展开更多
SOMALIA A suicide attack launched by terror group Al-Shabaab kills at least15 people at the Jazera Hotel in Mogadishu on July 26UNITED STATES The picture shows an artist’s rendition comparing Earth(left)to the new ...SOMALIA A suicide attack launched by terror group Al-Shabaab kills at least15 people at the Jazera Hotel in Mogadishu on July 26UNITED STATES The picture shows an artist’s rendition comparing Earth(left)to the new planet Kepler-452b.展开更多
基金supported by the Natural Science Foundation of China under Grants Nos.70771011 and 61174150the Program for New Century Excellent Talents in University of Ministry of Education of China under Grant No.NCET-09-0228+1 种基金Ph.D.Programs Foundation of Ministry of Education of China under Grant No.20110003110027the China Scholarship Council(CSC)
文摘This paper uses an extensive network approach to "East Turkistan" activities by building both the one-mode and the bipartite networks for these activities.In the one-mode network,centrality analysis and spectrum analysis are used to describe the importance of each vertex.On this basis,two types of core vertices——The center of communities and the intermediary vertices among communities— are distinguished.The weighted extreme optimization(WEO) algorithm is also applied to detect communities in the one-mode network.In the "terrorist-terrorist organization" bipartite network,the authors adopt centrality analysis as well as clustering analysis based on the original bipartite network in order to calculate the importance of each vertex,and apply the edge clustering coefficient algorithm to detect the communities.The comparative and empirical analysis indicates that this research has been proved to be an effective way to identify the core members,key organizations,and communities in the network of "East Turkistan" terrorist activity.The results can provide a scientific basis for the analysis of "East Turkistan" terrorist activity,and thus provide decision support for the real work of "anti-terrorism".
文摘SOMALIA A suicide attack launched by terror group Al-Shabaab kills at least15 people at the Jazera Hotel in Mogadishu on July 26UNITED STATES The picture shows an artist’s rendition comparing Earth(left)to the new planet Kepler-452b.