Zhu Jun-Fang's research while affiliated with Southwest University of Science and Technology and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (2)
The presence of the East Turkistan terrorist network in China can be traced back to the rebellions on the BAREN region in Xinjiang in April 1990. This article intends to research the East Turkistan networks in China and offer a panoramic view. The events, terrorists and their relationship are described using matrices. Then social network analysis i...
The inter-event time of terrorism attack events is investigated by empirical data and model analysis. Empirical evidence shows that it follows a scale-free property. In order to understand the dynamic mechanism of such a statistical feature, an opinion dynamic model with a memory effect is proposed on a two-dimensional lattice network. The model ma...
Citations
... The relevance of this endeavor has motivated an increasing shift in modern forensic studies away from classical descriptive analyses of criminal networks (Krebs, 2002;Carley et al., 2002;Morselli, 2009;Malm and Bichler, 2011;Li et al., 2015;Agreste et al., 2016;Grassi et al., 2019;Cavallaro et al., 2020), and towards studying more complex group structures involving the monitored suspects (Ferrara et al., 2014;Calderoni and Piccardi, 2014;Magalingam et al., 2015;Calderoni et al., 2017;Robinson and Scogings, 2018;Liu et al., 2018;Sangkaran et al., 2020). These contributions have provided valuable initial insights into the internal structure and functioning of several criminal organizations. ...
... According to the theory of human dynamics, Vázquez et al. (2006) exponent of human-behavior modes into two common patterns (i.e., 1.0 and 1.5) by analyzing email activities, web browsing, library lending, and celebrity emails. However, subsequent research discovered that the power exponents could be extended from 0.5 to 3.0 (Bohorquez et al. 2009;Takaguchi et al. 2011;Zhu et al. 2010). This study indicates that the power exponents of the EIS use time interval distribution for all IS users and core users approximately followed the universality classes of 1.0. ...