Z
Zhiru Wang
Researcher at Southeast University
Publications - 10
Citations - 210
Zhiru Wang is an academic researcher from Southeast University. The author has contributed to research in topics: Computer science & Vulnerability assessment. The author has an hindex of 5, co-authored 6 publications receiving 158 citations. Previous affiliations of Zhiru Wang include Inner Mongolia University & Tsinghua University.
Papers
More filters
Journal ArticleDOI
Social network analysis for social risks of construction projects in high-density urban areas in China
Jingfeng Yuan,Kaiwen Chen,Wei Li,Chuang Ji,Zhiru Wang,Miroslaw J. Skibniewski,Miroslaw J. Skibniewski,Miroslaw J. Skibniewski +7 more
TL;DR: In this article, a case study involving 66 cases of social conflicts in construction projects in China was performed, and 16 social risk factors were summarized by using NetMiner, a social network analysis (SNA) tool.
Journal Article
Recent advances in modeling the vulnerability of transportation networks
TL;DR: An overview of the vulnerability of the transportation network in terms of four main themes - research objective, transportation mode, disruption scenario and vulnerability indicator is provided, using the analysis of related articles from 2001 to 2013.
Journal ArticleDOI
Recent Advances in Modeling the Vulnerability of Transportation Networks
TL;DR: In this paper, a two-step literature review process is used to provide an overview of the vulnerability of the transportation network in terms of four main themes: research objective, transportation mode, disruption scenario, and vulnerability indicator.
Journal ArticleDOI
Human error risk management methodology for rail crack incidents
TL;DR: In this article, a Bayesian belief network is developed to model RCI by considering the human errors of designers, manufactures, operators and maintainers (DMOM) and the causal relationships involved.
Book ChapterDOI
A Critical Review of Vulnerability of Transport Networks: From the Perspective of Complex Network
TL;DR: This paper reviews the methodologies used in vulnerability analysis of transportation networks and particularly focuses on the application of complex network theory in this field and shed some new light concerning to the main issues in vulnerabilityAnalysis of transportation network like topological methods, attack strategies, and vulnerability indicators.