Search Results - "Chaomin, Ou"
-
1
Evolution of the global terrorist organizational cooperation network
Published in PloS one (22-01-2024)“…Terrorism has shown a trend of organizational cooperation in a large number of terrorist attacks around the world, posting a great challenge to…”
Get full text
Journal Article -
2
Evolution characters of water exchange abilities between Dongting Lake and Yangtze River
Published in Journal of geographical sciences (01-08-2014)“…By using field-survey hydrological data of the related control stations in Dongting Lake and the Yangtze River mainstream in 1951-2010, the evolution…”
Get full text
Journal Article -
3
Effects of the dispatch modes of the Three Gorges Reservoir on the water regimes in the Dongting Lake area in typical years
Published in Journal of geographical sciences (01-08-2012)“…Based on the field-survey prototype hydrology data in typical years, the effect during the running periods of different dispatch modes of the Three Gorges…”
Get full text
Journal Article -
4
Research on Electric Vehicle Charging Station Planning based on Genetic Algorithm and Particle Swarm Optimization Algorithm (GAIPSO)
Published in 2023 9th International Conference on Big Data and Information Analytics (BigDIA) (15-12-2023)“…Thanks to the advancement of the electric vehicles (EVs) technology, the demand on electric vehicles is on a hideous rise. So follows the demand on…”
Get full text
Conference Proceeding -
5
The Effectiveness of Counter-terrorism Policies Based on the Terrorism Decision
Published in 2018 37th Chinese Control Conference (CCC) (01-07-2018)“…Counter-terrorism policies are classified into three kinds based on the terrorism decision whether to commit terrorist acts. The policy effectiveness is probed…”
Get full text
Conference Proceeding -
6
Research on the Causes and Prevention Countermeasures of Oil Leakage and Explosion Accidents from the Perspective of Big Data Analysis
Published in 2023 9th International Conference on Big Data and Information Analytics (BigDIA) (15-12-2023)“…Oil leakage and explosion accidents are of great harm and need to be prevented. Detailed accident investigation text data provide the basis for accident cause…”
Get full text
Conference Proceeding -
7
Large-Scale Medical Crowdfunding Data Reveal Determinants and Preferences of Donation Behaviors
Published in IEEE transactions on computational social systems (01-02-2024)“…The growing usage of online crowdfunding platforms has fundamentally changed the traditional modes of fundraising and donation. Previous studies have mainly…”
Get full text
Journal Article -
8
Agent-based simulation research on group emotion evolution of public emergency
Published in 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014) (01-08-2014)“…The use of agent based social simulation in computational analysis of public emergency management is becoming a prominent approach in social science research…”
Get full text
Conference Proceeding -
9
Weapon research project cost evaluation method based on technology readiness
Published in The Fourth International Workshop on Advanced Computational Intelligence (01-10-2011)“…Traditional weapon research project pricing method makes the bigger valuation cost, the more profit research department is got. The weapon research department…”
Get full text
Conference Proceeding -
10
Impacts of Three Gorges Reservoir's water storage on flow-sediment characteristics of Dongting Lake
Published in 2011 International Conference on Electric Technology and Civil Engineering (ICETCE) (01-04-2011)“…Based on the field surveyed data of flow-sediment, the subject of Three Gorges Reservoir's water storage operation influence on flow-sediment characteristics…”
Get full text
Conference Proceeding -
11
Research on Military Internet of Things Technology Application in the Context of National Security
Published in 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT) (01-12-2021)“…Intelligent and information-based warfare is developing rapidly, which has a subversive effect on the combat pattern and rules of engagement. In order to…”
Get full text
Conference Proceeding -
12
Disintegration analysis of terrorist organizations based on social networks
Published in 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS) (01-11-2017)“…In order to seek the best strategy to disintegrate terrorist organizations, this article uses the social network analysis to construct the general network…”
Get full text
Conference Proceeding -
13
Understanding the Dynamic of Covert Organization with Multilayer Networks Model
Published in 2015 European Intelligence and Security Informatics Conference (01-09-2015)“…Understanding the dynamic of covert organization is the first step to intervene in the crime activities and to develop strategies. Covert organization/network…”
Get full text
Conference Proceeding