scispace - formally typeset
Z

Zhiru Wang

Researcher at Southeast University

Publications -  10
Citations -  210

Zhiru Wang is an academic researcher from Southeast University. The author has contributed to research in topics: Computer science & Vulnerability assessment. The author has an hindex of 5, co-authored 6 publications receiving 158 citations. Previous affiliations of Zhiru Wang include Inner Mongolia University & Tsinghua University.

Papers
More filters
Journal ArticleDOI

Social network analysis for social risks of construction projects in high-density urban areas in China

TL;DR: In this article, a case study involving 66 cases of social conflicts in construction projects in China was performed, and 16 social risk factors were summarized by using NetMiner, a social network analysis (SNA) tool.
Journal Article

Recent advances in modeling the vulnerability of transportation networks

TL;DR: An overview of the vulnerability of the transportation network in terms of four main themes - research objective, transportation mode, disruption scenario and vulnerability indicator is provided, using the analysis of related articles from 2001 to 2013.
Journal ArticleDOI

Recent Advances in Modeling the Vulnerability of Transportation Networks

TL;DR: In this paper, a two-step literature review process is used to provide an overview of the vulnerability of the transportation network in terms of four main themes: research objective, transportation mode, disruption scenario, and vulnerability indicator.
Journal ArticleDOI

Human error risk management methodology for rail crack incidents

TL;DR: In this article, a Bayesian belief network is developed to model RCI by considering the human errors of designers, manufactures, operators and maintainers (DMOM) and the causal relationships involved.
Book ChapterDOI

A Critical Review of Vulnerability of Transport Networks: From the Perspective of Complex Network

TL;DR: This paper reviews the methodologies used in vulnerability analysis of transportation networks and particularly focuses on the application of complex network theory in this field and shed some new light concerning to the main issues in vulnerabilityAnalysis of transportation network like topological methods, attack strategies, and vulnerability indicators.