Next Article in Journal
The Contribution of Immigrants to Multifunctional Agricultural Systems in Italy
Next Article in Special Issue
Identifying the Main Opportunities and Challenges from the Implementation of a Port Energy Management System: A SWOT/PESTLE Analysis
Previous Article in Journal
“Social Trilemma”: Empirical Evidence from Central and Eastern Europe
Previous Article in Special Issue
Port Efficiency Incorporating Service Measurement Variables by the BiO-MCDEA: Brazilian Case
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on the Coupled Risk of Key Nodes in Maritime Transport Based on Improved Catastrophe Theory

College of Transportation Engineering, Dalian Maritime University, Dalian 116026, China
*
Author to whom correspondence should be addressed.
Sustainability 2019, 11(17), 4640; https://doi.org/10.3390/su11174640
Submission received: 26 July 2019 / Revised: 22 August 2019 / Accepted: 22 August 2019 / Published: 26 August 2019
(This article belongs to the Special Issue Sustainable Maritime Transportation Management and Policies)

Abstract

:
Defining the degree of risk of maritime transport nodes is an important basis for studying the security status of maritime transport passages. However, some important straits or canals are key nodes in the maritime transport passage, and their system security conditions are affected by the interaction of uncertainty risk factors. This study addresses the issue of the security status of transport nodes from the perspective of the characteristics of influencing factors. With a focus on catastrophes and the mutual coupling characteristics of the factors that influence the security of maritime transport nodes, a model based on principal component analysis (PCA) and catastrophe theory (CT) is constructed, and the coupled risk degree of the key nodes in Chinese maritime transportation is empirically analysed. The results show that the Taiwan Strait has the lowest risk degree and that the Windward Strait has the highest risk degree among the key nodes in Chinese maritime transport. From the perspective of the security status of these key nodes, most nodes are currently in a stable and safe state.

1. Introduction

As a major part of the maritime transport passage, the security of maritime transport node has been the focus of research in recent years. Due to the fact that the security situation is affected by factors from the internal and external environment, the research on the security of the single maritime transport node and the mechanism of the influencing factors are gradually increasing. In addition, the research methods used are also different, among which the catastrophe theory is the representative one. At present, relevant researches around the above are as follows:

1.1. Key Nodes

A maritime transport node is a specific maritime area with a special geographical location or special supply function for ships at sea; such nodes include canals, straits, and important ports [1]. With the emergence of nontraditional security issues at sea, research on the security of key nodes in maritime transport has received increasing attention. Notably, security studies have been conducted on specific key nodes, such as the Strait of Malacca; specifically, some scholars have discussed its security [2], and some have proposed security measures related to the impacts of specific risk factors [2,3]. In addition, security analyses of some other key transportation nodes, such as the Panama Canal, the Suez Canal, the Strait of Hormuz, and the Turkish Straits, have been conducted from different perspectives [4,5,6,7]. There are also studies on maritime transport based on the strait or canal. Gao, T. and Lu, J. [8] used a mathematical model based on a programming formulation to measure the impact of a blockage of a strait or canal on the Chinese fleet. Wu Di et al. [9] analysed statistical data on all routes operated by the top 100 global container liner companies and constructed a network model to study the impact of main channel interruption on container shipping. Zhi, H. et al. [10] discussed the proposed Kra Canal and its impacts on the tanker market from an economic perspective.
At present, it is mainly to study the specific aspects of a node or to study the maritime based on nodes. However, security analyses based on the interaction between influencing factors are lacking. Therefore, this paper takes the main straits and canals as key nodes and takes these node systems as research objects, and considers the relationship of factors to conduct security analysis.

1.2. Risk Coupling of Key Nodes

The term “coupling” was originally derived from physics, which refers to the phenomenon of joint interaction between two or more systems or forms of motion through various forms of interaction [11]. Coupling can have different definitions in different areas. In the field of risk management, risk coupling refers to the occurrence of certain types of risks in the system and the extent to which its influence depends on other risks, and the extent to which the risks affect other risk formations and influences [12]. In terms of maritime transport passages, there is a coupling effect between the various risk factors affecting the maritime transport passage; that is, the occurrence of two or more risk factors will produce a certain force or offset effect. If the degree of risk is greater than the simple sum of the risk levels of the two factors, there is a positive coupling effect, and vice versa [13]. Therefore, the degree of risk coupling of maritime transport nodes refers to the safe state formed when these nodes are affected by the mutual interactions of dynamic factors such as bad weather, pirates, maritime terrorism, etc. Research on the coupling mechanisms associated with the risk factors of shipping has gradually increased. For example, the coupling mechanisms of ship navigation risk factors have been studied [14], from the perspective of a complex port–ship navigation system, and a system dynamics method was used to simulate the port–ship navigation risk [15]. In addition, some scholars have conducted security analyses based on the relevant risk coupling mechanisms. Shan, S.F. [16] identified potential risk influencing factors (RIFs) for the Arctic maritime transportation system from human, technical (ship), environmental, and organizational aspects. An analytical hierarchy process method is used to analyse the hierarchical relationships and to calculate the relative importance of the selected RIFs. Gudela Grote [17] used the theory of loose coupling to analyse the security management of high-risk systems and applied the analysis results to optimize human decision-making and improve the security of the system. Peter Brooker [18] studied the question: “what do design security targets really mean and imply for risk modelling?” by analysing the nature of accidents considering the corresponding causal factors and performing practical collision risk modelling.
Currently, although there are more and more studies on risk coupling in maritime transport; however, research on risk coupled of key nodes is still in its infancy, focusing on the identification of risk factors, with a lack of research on the mechanism of action between influencing factors. This paper focuses on risk analysis of important maritime transport nodes from the coupling mechanism of factors affecting maritime transport security.

1.3. Application of Catastrophe Theory in Maritime Transport Security

In previous studies, the catastrophe theory was widely used in security evaluations [19]. Nashwan, M.S. [20] used fuzzy catastrophe theory and data clustering methods to solve certain data subjectivity problems. Ahammed, S.J. [21] used a multicriteria decision-making approach based on catastrophe theory to assess systemic indices. In the application of catastrophe theory in maritime security research, in addition to directly using the catastrophe progression method based on the catastrophe theory [22], a fuzzy catastrophe evaluation model was established by combining fuzzy and catastrophe theory to comprehensively evaluate the maritime traffic risk [23]. In other areas of application, Papacharalampous, A.E. [24] proposed a framework based on stochastic cusp catastrophe theory to model microscopic freeway traffic flow. Ahmed, K. [25] used catastrophe theory for the assessment of groundwater potential zones in the arid region of the lower Balochistan province of Pakistan. Wen, Y.L. [26] used the catastrophe progression method and fuzzy comprehensive evaluation to comprehensively evaluate and predict the security of ship navigation in coastal areas.
Although the catastrophe theory is widely used, it mainly uses the catastrophe progression method based on catastrophe theory. When using the catastrophe progression method, the first step is to establish a hierarchical structure. At present, it is mainly qualitative to establish, thus, it lacks objectivity. This paper has improved upon this, based on the relationship between factors, to quantitatively establish the hierarchical structure.
In view of the above literature, this paper studies the coupled risk of key nodes in maritime transport, based on the mechanism of action between risk factors. Among them, the key nodes of transportation refer to important straits or canals. According to the interaction between risk factors, the traditional catastrophe model is improved to construct a coupled risk measurement model of maritime transport nodes. On the one hand, it can ably analyse the impact of risk factors on key nodes; on the other hand, it can improve the applicability of the catastrophe model so that it can thoroughly analyse the risk coupling status of key nodes in maritime transport. Considering the straits and canals that the important material transportation routes pass through, the key nodes of maritime transportation are selected to conduct empirical research. The key nodes constitute an important foundation and support for the maritime transportation network. Therefore, it is of great significance to analyse the risk degree of the key nodes in maritime transportation networks to aid maritime transportation.

2. Methods

2.1. Basic Theory

2.1.1. Characteristics of Security Threat Factors in the Nodes of Maritime Transport

The security of maritime transport nodes is affected by various uncertainties. However, by taking various security measures, the transport nodes are generally in a state of stable equilibrium. At a certain point in time, when a new security threat emerges or the degree of influence of the original security threat changes, the original equilibrium state of the node may be disrupted, and the security state of the transport node can shift to “catastrophe.” Therefore, the maritime transport node experiences a security threat and resists the external security threat to maintain its original equilibrium state, which comprehensively reflects the security status of the maritime transport node. The risk factors of maritime transport nodes can be characterised as follows.
  • The degree of security of maritime transport nodes is affected by the mutual coupling of two types of control variables: external disaster factors and various measures to address disasters.
  • The steady state of maritime transport nodes can suddenly change under different degrees of influence from the above two types of control variables. By measuring the catastrophe level associated with the security of maritime transport nodes, the degree of coupled risk of maritime transport nodes can be effectively evaluated.
  • There are two stable states before and after the catastrophe state of maritime transport nodes.

2.1.2. Catastrophe Theory

Catastrophe theory was proposed by the French mathematician Rene Thom based on mathematical foundations such as topology and structural stability to address problems involving discontinuous changes and catastrophe [27]. Using different elementary functions to correspond to different types of mutations, theoretical analysis of the system can be applied not only to the natural sciences such as mathematics, physics, and mechanics [28], but also to the fields of social sciences and engineering sciences [29]. Generally, there are multiple stable state systems in the evolution process, which can be analysed by using the catastrophe theory [30].
The catastrophe theory in general refers to the elementary catastrophe theory. The catastrophe model based on catastrophe theory is described by a potential function, which is determined by state and control variables, where the state variables represent the behavioural state of the system and the control variables represent various factors that influence the state variables. Let f ( x , c ) denote the system potential function, where x is the state variable and c is the control variable. Then, the critical point equation can be expressed as follows.
d f ( x , c ) d x = 0
Equation (1) is a balanced system composed of all critical points. The system is unstable near the critical point of degradation. If the control variables slightly change, it may cause a catastrophe in the system. The critical point of degradation satisfies the following conditions.
{ f ( x , c ) = 0 f ( x , c ) = 0
The bifurcation point set equation is obtained by eliminating x in (2), and the bifurcation point set equation encompasses the point of change of all forms of the potential function. The normalization formula can be derived using the bifurcation point set equation. The normalization formula normalizes the different states of the control variables of the system into the same mass state and uses it to perform recursive operations. The value of the total catastrophe membership function representing the state of the system is obtained as a basis for the comprehensive measurement.
Rene Thom demonstrates that the number of discontinuous constructs that may differ in nature is determined primarily by the number of control variables, not by the number of state variables. According to the proof of Rene Thom, a large amount of discontinuous catastrophe in both natural and social sciences can be described by corresponding geometric shapes, and if there are no more than four elements in the control variable set c , then the system potential function has at most 7 catastrophe models: fold, cusp, swallowtail, butterfly, hyperbolic, elliptical, and parabolic; wherein the state variable is a one-dimensional potential function and the corresponding normalization formula is shown in Table 1.
When using the catastrophe theory to measure, the catastrophe progression method based on the catastrophe theory is used. Applying the catastrophe progression method, we must first perform multilevel contradiction decomposition on the evaluation target of the system, and then use the catastrophe fuzzy membership function generated by the combination of catastrophe theory and fuzzy mathematics to obtain the elementary catastrophe model and its bifurcation point set equation. The two can derive the normalization formula, and the generalized formula is used for the comprehensive quantization operation. Finally, the normalization is a parameter; that is, the total membership function is obtained, and the comprehensive evaluation is performed.

2.1.3. Principal Component Analysis

Principal component analysis (PCA) uses the ideas of dimension reduction to convert multiple variables to a few variables, in which each principal component is a linear combination of the original variables, and each principal component is unrelated. These principal components can reflect most of the information of the original variables and contain information overlapping each other [31].
The PCA model can be briefly described as follows.
Suppose p variables are used to describe the research objects, respectively using X 1 , X 2 , , X p as representatives. The p -dimensional random vector formed by these p variables is X = ( X 1 , X 2 , , X p ) T . Let a denote the mean of random variables, and the linear combination of the original variables is,
{ F 1 = a 11 X 1 + a 21 X 2 + + a p 1 X p F 2 = a 12 X 1 + a 22 X 2 + + a p 2 X p F p = a 1 p X 1 + a 2 p X 2 + + a p p X p
The principal component is an uncorrelated linear combination F 1 , F 2 , , F p , and F 1 is the largest variance of the linear combination of F 1 , F 2 , , F p .
The basic steps of using principal component analysis are as follows.
  • Because the ranges of values and the units of measurement of the original data sets are different, the indices should be normalized.
  • Establish the correlation coefficient matrix R based on standardized data matrix. R reflects the degree of correlation between the standardized data, where R i j ( i , j = 1 , 2 , , p ) is the correlation coefficient between the original variables X i and X j , and the calculation formula is,
    R i j = l = 1 n ( X l j X i ) ( X l j X j ) l = 1 n ( X l j X i ) 2 ( X l j X j ) 2
  • Calculate the eigenvalue and the cumulative variance contribution rate based on the correlation coefficient matrix R , and then determine the number of principal components, wherein the eigenvalue and the variance contribution rate are calculated as (5) and (6).
    | λ E R | = 0
    ω i = λ j / j 1 p λ j
    ω i represents the variance contribution rate of the principal component F i . In addition, the formula for calculating the cumulative variance contribution rate is,
    j 1 q λ j / j 1 p λ j
    According to the principle of selecting the number of principal components, 1 , 2 , , q ( q p ) corresponding to the eigenvalue λ 1 , λ 2 , , λ q of greater than 1 and the cumulative variance contribution rate of 80−95% is required, wherein the integer q is the number of the main components.
  • Establish a factor load matrix to explain the principal components, and the factor load matrix reveals the degree of correlation between principal components and indicators.
    b i j = a i j λ i
    where b i j denotes the factor load of the i th index on the j th principal component and a i j denotes the j th component of the feature vector corresponding to the i th eigenvalue.
  • Based on the above results, the principal components are expressed and used for calculation and analysis
In this paper, the PCA method is used to improve the measurement steps of the catastrophe theory, mainly using the first 4 steps of the PCA method, which are specifically referred to in the next section.

2.2. Improved Catastrophe Theory Model Based on PCA

2.2.1. Establish Model

According to the characteristics of the security factors affecting the maritime transport node and the fields and scenarios applicable to the catastrophe theory, the catastrophe model can effectively describe the changes in maritime transport nodes from stable equilibrium to an unsteady state. To describe the degree of coupled risk of maritime transport nodes, the concept of the coupling degree is proposed. The degree of coupling is the degree of coupled risk.
Let G ( x , c ) denote the coupling degree potential function of key nodes, where x is the state variable and c is the control variable. The state variable is the coupling degree of the key nodes, the control variables represent various influential factors, and their joint action determines the coupling degree of the key nodes. The coupling degree and judgement criteria for key nodes can be described as follows.
G ( x ) = f ( x , c )
d G ( x ) d x = f ( x , c ) x = 0
Δ = { f ( x , c ) x = 0 2 f ( x , c ) x 2 = 0
Equation (9) represents the degree of coupling of the potential functions of key nodes. Equation (10) is the equilibrium state of the key nodes in the state space, which represents a balance among the risk factors of the key nodes. Equation (11) is a bifurcation point set equation, which can be used to determine whether the key node coupling degree is stable. When Δ < 0 , the key node risk coupling degree is unstable; when Δ = 0 , the key node risk coupling degree is in a critical stable state, and even a small interference may cause a catastrophe; when Δ > 0 , the key node risk coupling degree is stable.

2.2.2. Improved Measurement Model

Most previous studies used qualitative methods to establish a hierarchical model structure. This paper considers the importance of the factors in the established hierarchical structure model. Considering the different degrees of representativeness among the security factors of the key nodes in maritime transportation, some information duplication will occur among the indices. Therefore, to comprehensively measure the degree of coupled risk among the various transport nodes and the objective explanatory factors, this paper uses PCA to establish the hierarchical structure of key nodes, making the approach more objective and representative than traditional methods.
The model improvement steps are as follows.
  • According to the characteristics of the influential factors, these factors can be divided into two categories: external disaster factors, defined as a vulnerability index, and various measures to address disasters, defined as an adaptivity index.
  • PCA was performed on the two types of indices, and the hierarchical structure was established.
    (1) Because the ranges of values and the units of measurement of the original data sets are different, the indices should be normalized. This paper adopts standardized formulas such as (12) and (13) for this task.
    Positive :   x i j * = x i j min 1 i n ( x i j ) max 1 i n ( x i j ) x i j min 1 i n ( x i j )
    Negative :   x i j * = max 1 i n ( x i j ) x i j max 1 i n ( x i j ) x i j min 1 i n ( x i j )
    where x i j * is the value after the influential factor index is processed; i = ( 1 , 2 , , n ) denote key nodes; j = ( 1 , 2 , , m ) denote the influential factors; x i j is the j th influential factor index value of the i th key node; and max ( x i j ) and min ( x i j ) denote the maximum and minimum values of the j th influential factor of the i th key node, respectively.
    (2) Calculate the correlation coefficient matrix of the normalized index data R m × m .
    (3) Calculate the eigenvalues λ i ( i = 1 , 2 , , n ) of the correlation coefficient matrix R , where λ i denotes the total variance of the original index data explained by the principal component F i . The variance contribution of the original index data ω i denoted by the principal component F i can be expressed as follows.
    ω i = λ i / i = 1 n λ i
    Equation (14) denotes the ratio of the original information represented by the i th principal component F i to all the original information. The calculated λ i values are sorted from large to small. When the cumulative variance contribution of the p th eigenvalue λ p is greater than or equal to 85%, the principal components corresponding to the first p eigenvalues are selected.
    (4) Calculate the factor load matrix to establish the relationships among indices and importance of each index. Finally, the hierarchical structure of the factor indices is established. Related calculation formula reference (8).
  • When using the catastrophe progression method, the obtained values are often clustered. To make the calculated coupling value more intuitively represent the coupling degree of key nodes and facilitate subsequent operations, this paper improves the initial coupling degree value calculated by the traditional catastrophe progression method according to reference [32].
    First, according to the established coupled risk degree catastrophe model of key nodes, the comprehensive coupling degree value k i is calculated for control variable set { 0 , 0.2 , 0.4 , 0.6 , 0.8 , 1 } , and the six values are used as the scales of the initial comprehensive values. The corresponding interval for different scales is [ k i , k i + 1 ] ( i = 0 ,   1 , ,   4 ) .
    Second, the calculated coupling degree value K j { K 1 , K 2 , , K n } (n denotes key node) is mapped to the corresponding interval according to the scale interval [ k i , k i + 1 ] ( i = 0 ,   1 , ,   4 ) in which it falls, and the adjusted coupling degree value is K j { K 1 , K 2 , , K n } .
    K j = 0.2 [ ( K j k i k i + 1 k i ) + i ]
  • Based on the above analysis, the final determination of the coupling degree of the key nodes considers both the vulnerability index and the adaptivity index. In addition, according to Table 1, the cusp catastrophe model can be used to describe the state of the security system of the key nodes. The cusp catastrophe state of the key node security system based on the equilibrium state and the control plane can be established as shown in Figure 1.
The z-surface in Figure 1 is a balanced surface with a cusp catastrophe, and the c-surface below is the control surface of the control variables u and v . The balanced surface consists of the upper, middle, and lower leaves, which correspond to the security state, the catastrophe state, and the dangerous state of the security system of key nodes at sea, respectively. For the control surface, the middle curve is the projection of the surface where the middle leaf is located, which is also the curve formed by the set of bifurcation points. The upper and lower leaves are the stable states of the key node security system, and the middle leaf is in an unstable state that is prone to catastrophe. The security system state of each key node can be assessed by calculating the corresponding Δ value through the bifurcation point set equation. To determine the state of the security system of key nodes based on the values of u and v , the bifurcation point set of the cusp mutation formula is transformed as follows.
(1)
If v > [ 8 27 u 3 ] 1 / 2 , the security system of key nodes in maritime transport is in a stable state.
(2)
If v = [ 8 27 u 3 ] 1 / 2 , the security system of key nodes in maritime transport is in a critical steady state.
(3)
If v < [ 8 27 u 3 ] 1 / 2 , the security system of key nodes in maritime transport is in an unstable state.

3. Empirical Analysis

This paper employs the key straits and canals in Chinese maritime transport passage as empirical cases to analyze the coupled risk of key nodes in maritime transport [1].

3.1. Selection of Key Nodes in Chinese Maritime Transportation

According to statistics from the general administration of customs, P.R. China, China imported 462 million tons of crude oil, 1.064 billion tons of iron ore, 281 million tons of coal and 108 million tons of grain and international container throughput of the above-scale ports was 249.82 million twenty-feet equivalent unit (TEU) in 2018, of which more than 90% were transported by shipping completed. Some straits or canals are the important part of the transport passages of these important materials, and it is also the place where the above materials must pass through. In addition, from the perspective of Chinese important strategic material import passages and routes distribution [33], the main sea import transportation passages for crude oil are (1) Persian Gulf - Hormuz Strait - Malacca Strait - (or Makassar Strait) - Taiwan Strait - China; (2) North Africa-Mediterranean- Gibraltar Strait - Cape of Good Hope -Malacca Strait-Taiwan Strait-China; (3) West Africa - Cape of Good Hope - Malacca Strait -Taiwan Strait-China; the main sea import transportation passages for iron ore are: (1) Australia-Pacific- China; (2) Brazil - Magellan (Panama) - Pacific - China; (3) Brazil - Cape of Good Hope - Indian Ocean - Malacca Strait (Sunta Strait, Makassar Strait) - Taiwan Strait - China; (4) South Africa - Indian Ocean - Malacca Strait - South China Sea - Taiwan Strait - Mainland China; (5) India - Indian Ocean - Malacca Strait - South China Sea - Taiwan Strait - Northern ports; the main sea import transportation passages for coal are: (1) Australia - Pacific (Ryukyu Islands) - China Mainland; Vietnam - Joan State Strait - Taiwan Strait - Northern ports; (2) Indonesia - Malacca - South China Sea - China; (3) South Africa - Cape of Good Hope - Malacca Strait (Sunta Strait, Makassar Strait) - South China Sea - China; (4) North America - China mainland route. From the above, some important straits and canals can be found to be an important part of the strategic material transportation passage. Therefore, this paper concludes that the straits and canals are the key nodes of Chinese maritime transportation, based on the important straits and canals through which different Chinese important material routes pass and the important roles of the straits or canals, as shown in Table 2.

3.2. Construction of a Coupled Risk Measurement System for Key Nodes

3.2.1. Security Factors

The factors that influence the navigation status of key nodes in maritime transport mainly include two categories: traditional and nontraditional threats. Since the end of the Cold War, the threat of traditional military confrontations to maritime transport nodes has decreased, but military conflicts in some areas and the military control of key transport nodes in certain countries still pose important threats to the navigation conditions of maritime transport nodes. In addition, extreme weather events such as typhoons, heavy fog, and ice flows; natural factors such as large waves, earthquakes, and tsunamis; and security threats such as pirates and maritime terrorism have become increasingly serious. The most seriously affected areas include the Gulf of Aden and the Strait of Malacca.
In response to security threats, the countries in which the key nodes are located and the countries in which they are used will also take measures to prevent or mitigate disasters caused by risk factors, such as the introduction of various legal policies, the establishment of specialized guarantee institutions, and the strengthening of cooperation among countries. For example, In response to the Malacca Strait, there are laws or agreements such as the “Regional cooperation agreement on combating piracy and armed robbery of ships in Asia,” the “Joint declaration on cooperation in non-traditional security fields between China and ASEAN,” and memorandums of understanding to strengthen cooperation against piracy or maritime terrorism.

3.2.2. Risk Coupling Measurement System

According to the characteristics of the influencing factors and reference [1], this paper considers two types of factors that affect the security of key nodes in maritime transport as first-level indices for measuring the security of these nodes. The vulnerability index values of key nodes in maritime transportation reflect the susceptibility of the nodes to external disturbances, mainly based on the stability of the system structure. The adaptivity index of key nodes in maritime transport encompasses the disaster response and response capabilities of the system and the system resilience, i.e., the extent to which the system can avoid damage and rebound after a disaster event. The second-level indices are shown in Table 3. The second-level indices will change with time and the risk degree. The second-level indices associated with vulnerability are negative indices, and those related to adaptivity are positive indices.

3.3. Coupled Risk Measurement for Key Nodes in Maritime Transport

3.3.1. Data Sources and Normalization

The data in this paper mainly come from the Global Integrated Shipping Information System (GISIS) database, some statistical reports, and websites. Pirates and the number of accidents in each node are sourced from GISIS, while maritime terrorism in each node is sourced from the “Global Terrorism Database.” Military conflict and military bases in each node are sourced from “Hull War, Piracy, Terrorism and Related Perils.” Coastal political stability in each node is sourced from “FP Marine Risks.” In addition, others are mainly collected from the relevant websites of the country in which each node belongs or the countries in which they are used, such as the international maritime bureau, China maritime bureau, Maritime and Port Authority of Singapore, Suez Canal authority, Panama Canal Authority and others. The data selection period is from 2010 to 2018. Formulas (12) and (13) are used to standardize the index data for the key nodes in Chinese maritime transport. The results are shown in Table 4 and Table 5.

3.3.2. Establishment of the Hierarchy Structure of Key Nodes

In this paper, SPSS 20 software was used to analyse the vulnerability and adaptivity index values, and the cumulative variance contributions and factor load matrices were calculated.
1. The calculated cumulative variance contributions are shown in Table 6 and Table 7.
Table 6 shows that the cumulative variance contribution of the first three principal components is 87.431%, indicating that the first three principal components represent 87.431% of the information for all indices. Thus, the first three principal components can be used to represent all of the vulnerability index data.
Table 7 shows that the cumulative variance contribution of the first three principal components reaches 85.610%, indicating that the first three principal components represent 85.610% of the information for all indices. Thus, the first three principal components can be used to represent all of the adaptivity index data.
2. The calculated factor load matrices are shown in Table 8 and Table 9.
Table 8 shows that military conflicts, coastal political stability, piracy, and maritime terrorism have high factor loads for principal component 1, and that for military conflict reaches more than 90%. Thus, these four indices are represented by principal component 1. Similarly, accidents have a high factor load for principal component 2, so principal component 2 reflects the effect of accidents. The value for military bases is high for principal component 3, and principal component 3 reflects the number of military bases.
As shown in Table 9, legal factors, international cooperation, and security norms have high factor loads for principal component 1 and are represented by principal component 1. Similarly, alternatives and related organizations have high factor loads for principal component 2 and principal component 3, respectively; thus, principal components 2 and 3 represent alternatives and related organizations, respectively.
Based on the above results, the hierarchical structure model shown in Figure 2 can be established. Notably, the importance of each layer gradually decreases from left to right.

3.3.3. Establishment of a Catastrophe Model Based on the Hierarchical Structure of Key Nodes

According to Figure 2 and Table 1, a coupled risk catastrophe model of the key nodes in Chinese maritime transport can be established, as shown in Figure 3.

3.4. Results and Analysis

3.4.1. Calculation Results

According to the third part of Section 2.2.2, the catastrophe model identified in Figure 3, and the normalization formula corresponding to the catastrophe model in Table 1, the coupling degree values of key nodes in Chinese maritime transportation are divided into 5 levels, as shown in Table 10. Security level 1 is the lowest level of security, and the level of security increases to level 5.
1. The comprehensive coupled risk of key nodes in maritime transport is shown in Table 11.
2. The coupling degrees of key nodes in maritime transportation in terms of the vulnerability and adaptivity indices are shown in Table 12.
3. The results of the analysis of the security status of the key node security system for maritime transport are shown in Table 13.

3.4.2. Analysis of the Results

Table 11 indicates that the overall security level of the key nodes in Chinese maritime transportation is relatively low, and most security levels are I , II , and III . Table 12 shows that the reason for these results is that the vulnerability index has a high coupled risk and a considerable impact on the overall security. The Taiwan Strait has the highest degree of coupling and the highest degree of security compared with the other key nodes, and the Windward Strait has the lowest coupling degree and the lowest degree of security compared with the other key nodes. The values for the Strait of Malacca, which links the important maritime transport corridors between East and West Asia, and the Strait of Hormuz, which is an important European maritime transport and strategic channel, are also relatively low. In addition, the difference in security among the key nodes with the same security level is highly variable. As shown in Figure 4, the degrees of security of the Taiwan Strait and the Florida Strait, which are both classified as level III , are very different. Table 12 shows that the coupling degree of the vulnerability index of the Florida Straits is larger than that of the Taiwan Strait, but the coupling degree of the adaptivity index is much smaller than that of the Taiwan Strait, thus causing this difference.
From the perspective of the vulnerability index, the vulnerability index value of the Strait of Malacca is the lowest, indicating that the risk factors have a considerable impact on this key node. From the perspective of the adaptivity index, the coupling degree of the adaptivity index of the Strait of Malacca is large, indicating that there are important risk prevention measures related to other key nodes but that the overall security of the Strait of Malacca is not high.
From the perspective of key nodes security system status, most of the security systems of the key nodes in Chinese maritime transport are in a stable state, as shown in Table 13. Only the Windward Strait and the Mona Strait are in an unstable state, indicating that the security systems of these nodes are prone to catastrophes. The reason for this can be seen in Table 12, which shows that the coupling values of the two strait vulnerability indicators are relatively high and the coupling values of the adaptive indicators are relatively low. Therefore, from the perspective of the whole system, the vulnerability is much higher than the adaptability, which leads to the instability of the system. Further analysis of the original statistics indicates that the military risk, accident risk, and piracy risk of the Windward Strait and the Mona Strait are higher than their corresponding defence measures. Therefore, the above results are caused and the appropriate departments should take relevant measures to improve the security level of the system. In addition, taking the Strait of Malacca as an example, although it is currently in a stable state from the perspective of security systems, the overall security level of the Straits of Malacca is low; thus, appropriate departments should also lay out relevant measures in advance.

4. Conclusions

In this paper, an improved catastrophe model was used to measure the coupled risk of key nodes in Chinese maritime transport. This approach provides a new concept to accurately describe and analyse the security of key nodes in maritime transport. The establishment of a hierarchical structure model based on PCA avoids subjectively establishing a measurement system, mitigates the inaccuracy of determining the importance of influential factors, and accurately describes the actual situation and problem. In addition, the calculation results are improved compared to those of the traditional method, yielding results that are conducive to in-depth analysis. Based on specific examples, a simulation is performed. The results show that the Taiwan Strait has the lowest risk and that the Windward Strait has the highest risk. The vulnerability and adaptivity indices have different degrees of impact on the security of different key nodes.
For the analysis of the key risk coupling value of the key nodes, the appropriate departments can know the current relative security level of each key node, and analysis of the adaptivity and vulnerability indicators of the key nodes can be used to know the current preventive measures and the current threat situation, providing the basis for relevant departments to formulate the corresponding policies or preventive measures. In addition, for the analysis of the security status of key node systems, it is possible to know the stability of the system status, which provides a reference for the urgency of the relevant departments to take precautionary measures and to determine whether a ship’s navigation passes through this key node. Therefore, this paper analyses the risk coupling of key nodes, providing not only reference for users and managers of key nodes, but also a basis for appropriate departments to formulate relevant policies and take security measures.
Although the model proposed in this paper has some practical significance for risk coupling assessment of maritime transport nodes, it still has some limitations. Firstly, the model proposed in this paper needs to analyse the correlation of the basic data, the inaccuracy or change of the data will directly affect the construction of the model, which will affect the accuracy of the results. Secondly, when using the principal component analysis method, the cumulative contribution rate of the first few extracted principal components should be guaranteed to reach a high level, and the ambiguity of the cumulative contribution rate calculated will affect the results of principal component selection. In addition, the data in this paper are the average data in the research period. As the data changes with the development of time, therefore, different data selection times need to be considered in different research periods. The results of this paper are relative. Whether the number of nodes is changed or the data of the node is changed, the results will change. Therefore, the nodes of the study must be clear.

Author Contributions

The paper was written by B.D.L. and J.L. (Jing Li) and revised and checked by J.L. (Jing Li) and J.L. (Jing Lu). All authors read and approved the final manuscript.

Funding

This research was funded by the Fundamental Research Funds for the Central Universities (3132019302), Humanities and Social Science Fund of the Ministry of Education of China (16YJAZH030) and the Key Project of the National Societal Science Foundation of China (18VHQ005).

Acknowledgments

We are thankful to anonymous reviewers and editors for their helpful comments and suggestions.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lu, J.; Wang, S. Security Evaluation of China’s Maritime Transport Key Nodes. J. Transp. Syst. Eng. Inf. Technol. 2015, 1, 30–36. [Google Scholar]
  2. Rusli, M.H.B.M. Protecting vital sea lines of communication: A study of the proposed designation of the Straits of Malacca and Singapore as a particularly sensitive sea area. Ocean Coast. Manag. 2012, 57, 79–94. [Google Scholar] [CrossRef]
  3. Lee, T.; Mcgahan, K. Norm subsidiarity and institutional cooperation: Explaining the straits of malacca anti-piracy regime. Pac. Rev. 2015, 28, 529–552. [Google Scholar] [CrossRef]
  4. Bonney, J. Panama canal’s growing risk. J. Commer. 2014, 15, 36. [Google Scholar]
  5. El-Eraki, M.A.; Abd El-Aal, E.A.K.; Mostafa, S.I. Multi-seismotectonic models, present-day seismicity and seismic hazard assessment for Suez Canal and its surrounding area, Egypt. Bull. Eng. Geol. Environ. 2015, 75, 503–517. [Google Scholar] [CrossRef]
  6. Katzman, K.; Nerurkar, N.; O’Rourke, R.; Mason, R. Iran’s threat to the strait of hormuz. Am. Foreign Policy Interests 2012, 32, 64–74. [Google Scholar]
  7. Essiz, B.; Dagkiran, B. Accidental risk analyses of the istanbul and canakkale straits. In IOP Conference Series Earth and Environmental Science; IOP Publishing: Bristol, UK, 2017; p. 95. [Google Scholar]
  8. Gao, T.; Lu, J. The impacts of strait and canal blockages on the transportation costs of the Chinese fleet in the shipping network. Marit. Policy Manag. 2019, 46, 669–686. [Google Scholar] [CrossRef]
  9. Di, W.; Nuo, W.; An, Q.Y.; Nuan, W. Vulnerability analysis of global container shipping liner network based on main channel disruption. Marit. Policy Manag. 2019, 46, 394–409. [Google Scholar]
  10. Zhi, H.; Tsz, L.Y. Impacts of Kra Canal and its toll structures on tanker traffic. Marit. Policy Manag. 2018, 45, 125–139. [Google Scholar]
  11. Guang, C.L. Preliminary Study on Coupling Theory of Engineering Geology. J. Eng. Geol. 2001, 4, 435–442. [Google Scholar]
  12. Qing, L.; Guan, X.W. Analysis of Coupling Mechanism of Ship Navigation Security Risk in Complex Waters. J. Wuhan Univ. Technol. 2014, 38, 59–63. [Google Scholar]
  13. Tian, H.G.; Jing, L.; Mao, J.S. Identification of Risk Factors in Sea Channel Considering Coupling Effect. J. Shanghai Marit. Univ. 2017, 38, 18–24. [Google Scholar]
  14. Hu, C.P.; Li, F.; Xi, Y.T. Simulation of the coupling mechanism of risk factors in marine transportation systems. J. Basic Sci. Eng. 2015, 2, 409–419. [Google Scholar]
  15. Cao, J.H.; Xi, Y.T.; Hu, C.P. Coupling model of port ship navigation risk based on system dynamics. J. Secur. Environ. 2015, 3, 65–71. [Google Scholar]
  16. Fu, S.; Yan, X.; Zhang, D.; Zhang, M. Risk influencing factors analysis of Arctic maritime transportation systems: A Chinese perspective. Marit. Policy Manag. 2018, 45, 439–455. [Google Scholar] [CrossRef]
  17. Gudela, G. Organizational Measures for Achieving Loose Coupling in High-Risk Systems: The Importance of Systematic Rules Management. In Proceedings of the 2004 IEEE International Conference on Systems, Man and Cybernetics, The Hague, The Netherlands, 10–13 October 2004; pp. 2569–2573. [Google Scholar]
  18. Peter, B. Air Traffic Management Accident Risk. Part l: The Limits of Realistie Modeling. Secur. Seienee 2006, 44, 419–500. [Google Scholar]
  19. Poston, T.; Stewart, I. Catastrophe Theory and Its Applications; Courier Corporation: Washington, DC, USA, 1978. [Google Scholar]
  20. Nashwan, M.S.; Shahid, S.; Chung, E.; Ahmed, K.; Song, Y.H. Development of Climate-Based Indice for Hydrologic Hazard Susceptibility. Sustainability 2018, 10, 2182. [Google Scholar] [CrossRef]
  21. Ahammed, S.J.; Chung, E.; Shahid, S. Para measurement Assessment of Pre-Monsoon Agricultural Water Scarcity in Bangladesh. Sustainability 2018, 10, 819. [Google Scholar] [CrossRef]
  22. Zhu, L.Q.; Lu, J.; Li, J. Research on Security Warning of Marine Channel Based on High Dimensional Mutation Model. Oper. Res. Manag. 2016, 25, 261–266. [Google Scholar]
  23. Qi, J.; Zheng, Z.Y.; Li, J.M. Research on Causes of Maritime Traffic Accidents Based on Mutation Mechanism. China Navig. 2013, 36, 112–115. [Google Scholar]
  24. Papacharalampous, A.E.; Vlahogianni, E.I. Modeling Microscopic Freeway Traffic Using Cusp Catastrophe Theory. IEEE Intell. Transp. Syst. Mag. 2014, 6, 6–16. [Google Scholar] [CrossRef]
  25. Ahmed, K.; Shahid, S.; bin Harun, S.; Ismail, T.; Nawaz, N.; Shamsudin, S. Assessment of groundwater potential zones in an arid region based on catastrophe theory. Earth Sci. Inform. 2015, 8, 539–549. [Google Scholar] [CrossRef]
  26. Liu, W.Y.; Juan, P. Navigation Security Evaluation in Coastal Areas Based on Catastrophe Theory. China Secur. Sci. J. 2010, 20, 113–118. [Google Scholar]
  27. Thom, R. Structural Stability and Morphogenesis; Benjamin Press: New York, NY, USA, 1972. [Google Scholar]
  28. Zhong, R.L.; Tian, H.C. Analysis of the Formation Mechanism of Debris Flow in Open-pit Mine Dumping Site Based on Catastrophe Theory. Mod. Min. 2000, 1, 8–10. [Google Scholar]
  29. Fisher, G.H. Preparation of Ambiguous Stinalus Materials. Recept. Psychophys. 1967, 2, 421–422. [Google Scholar] [CrossRef]
  30. Sun, X. Research on Coupling of Highway Traffic Security Risk Based on Catastrophe Theory; Beijing Jiaotong University: Beijing, China, 2015. [Google Scholar]
  31. Zhu, X.Y. SPSS Multivariate Statistical Analysis Method and Application; Tsinghua University Press: Beijing, China, 2011. [Google Scholar]
  32. Tang, M.; Shao, D.G.; Yao, C.L. Application of improved catastrophe evaluation method in drought risk assessment. J. Hydraul. Eng. 2009, 40, 858–862. [Google Scholar]
  33. Liang, M.; Chen, R. The current situation and research of China’s maritime trade channel. Int. Econ. Coop. 2014, 11, 79–84. [Google Scholar]
Figure 1. Schematic diagram of the cusp catastrophe model of key nodes in marine transportation.
Figure 1. Schematic diagram of the cusp catastrophe model of key nodes in marine transportation.
Sustainability 11 04640 g001
Figure 2. The hierarchical structure of the coupled risk of key nodes.
Figure 2. The hierarchical structure of the coupled risk of key nodes.
Sustainability 11 04640 g002
Figure 3. The hierarchical structure of the coupled risk of key nodes.
Figure 3. The hierarchical structure of the coupled risk of key nodes.
Sustainability 11 04640 g003
Figure 4. Comparison of the security levels of key nodes in maritime transport.
Figure 4. Comparison of the security levels of key nodes in maritime transport.
Sustainability 11 04640 g004
Table 1. One-dimensional catastrophe models of the state variable.
Table 1. One-dimensional catastrophe models of the state variable.
Model NameControl VariablePotential FunctionNormalization Formula
Fold 1 ( u ) f ( x ) = x 3 + u x x u = u 1 / 2
Cusp 2 ( u , v ) f ( x ) = x 4 + u x 2 + v x x u = u 1 / 2 , x v = v 1 / 3
Swallowtail 3 ( u , v , w ) f ( x ) = x 5 + u x 3 + v x 2 + w x x u = u 1 / 2 , x v = v 1 / 3 , x w = w 1 / 4
Butterfly 4 ( t , u , v , w ) f ( x ) = x 6 + t x 4 + u x 3 + v x 2 + w x x t = t 1 / 2 , x u = u 1 / 3 , x v = v 1 / 4 , x w = w 1 / 5
Note: x t , x u , x v and x w are the catastrophe progression values corresponding to each control variable.
Table 2. Key nodes of Chinese maritime transportation.
Table 2. Key nodes of Chinese maritime transportation.
Strait/CanalAffiliation PassageImportant RoleTransport Important Material
Taiwan StraitChina’s coastal areas - Southeast Asia, China’s coastal areas - Africa, China’s coastal areas - Europe, China’s coastal areas - the Middle East, China’s coastal areas - South America’s east coast, China’s coastal areas - AustraliaThe main channel between the East China Sea and its northern neighbouring seas and the South China Sea and the Indian OceanCrude oil, iron ore, coal, grain, container
Malacca StraitChina’s coastal areas - Africa, China’s coastal areas - Europe, China’s coastal areas - North America’s east coast - Middle East, China’s coastal areas - South America’s east coastImportant channel between the Indian Ocean and the Pacific Ocean; Important channel from West Asia to East AsiaCrude oil, iron ore, container
Mande StraitChina’s coastal areas - North Africa, China’s coastal areas - EuropeLocated along the shortest route from the Atlantic Ocean to the Indian Ocean and is an important channel for maritime trade between Europe, Asia, and AfricaCrude oil, container
Suez CanalChina’s coastal areas - North Africa, China’s coastal areas - EuropeA famous international waterway connecting the Mediterranean Sea and the Red Sea; essential for maritime navigation in the North Atlantic, Indian Ocean, and Western PacificContainer
Lombok StraitIndian Ocean - China’s coastal areas, China’s coastal areas - Australia/New ZealandProvides a connection to the Indonesian Archipelago; important channel for maritime shipping in the Pacific Ocean and the Indian OceanCrude oil, iron ore, grain
Sunta StraitIndian Ocean - China’s coastal areasAn important sea route between the Pacific Ocean and the Indian Ocean; on the route from North Pacific countries to East Africa, West Africa; also a detour to the Cape of Good Hope and EuropeCrude oil
Makassar StraitIndian Ocean - China’s coastal areas, China’s coastal areas - Australia/New ZealandAlong an important route to the South China Sea and from the Philippines to AustraliaIron ore, grain
Gibraltar StraitChina’s coastal areas - Europe, China’s coastal areas - North America’s east coastThe only channel from the Mediterranean to the Atlantic Ocean is also the throat of Western European and Northern European countries through the Mediterranean Sea, the Suez Canal, and the Indian OceanCrude oil, container
Hormuz StraitChina’s coastal areas - Middle EastPersian Gulf oil must pass through this sea channel on the way to Western Europe, the United States, Japan and the rest of the worldCrude oil, container
Panama CanalChina’s coastal areas - North America’s east coastImportant channel connecting to the Pacific Ocean and Atlantic OceanCrude oil, grain, container
Korean StraitChina’s coastal areas - JapanProvides convenient access to the sea between the Japanese Archipelago and the Asian continent; the only channel connecting the Sea of Japan to the East China Sea and the Yellow SeaIron ore, grain, container
English ChannelChina’s coastal areas - Western European countries, North America’s east coast - Caribbean routesThe channel connects the Atlantic Ocean and the North SeaContainer
Florida StraitWestern Europe - North America’s south coastAn important channel connecting the Gulf of Mexico and the Atlantic OceanGrain, container
Dagu StraitChina’s coastal areas - North America’s east coast, China’s coastal areas - North America’s west coastSea channel between the ports of the East China Sea, the Yellow Sea coast and the east coast ports of JapanGrain, container
Zonggu StraitChina’s coastal areas - North America’s west coastAn important entrance to the seas of Japan Container
Mindoro StraitChina’s coastal areas - Australia/New ZealandAn important channel along the route from China to the Indian OceanIron ore, grain
Windward StraitNorthwest Europe/North America’s east coast - Caribbean routesAn important channel from the Atlantic Ocean to the CaribbeanGrain, container
Mona StraitNorthwest Europe/North America’s east coast - Caribbean routesAn important channel connecting the Caribbean Sea and the Atlantic OceanGrain, container
Table 3. Risk factor index system for key nodes in maritime transport.
Table 3. Risk factor index system for key nodes in maritime transport.
First-Level IndexSecond-Level Index
IndexIndex InterpretationNature of the Index *
VulnerabilityMilitary conflictNumber of countries at risk of military conflict along the strait or canal/Number of countries in which the strait or canal is locatedNegative
Military baseNumber of countries with military bases along the strait or canal/Number of countries in which the strait or canal is located
PiratesAverage number of pirate attacks per year in the strait or canal
Maritime terrorismNumber of countries in which maritime terrorism has occurred along the strait or canal/Number of countries in which the strait or canal is located
Accident (caused by extreme weather, etc.)Average number of accidents per year in the strait or canal
Coastal political stabilityNumber of countries in which the strait or canal is classified as dangerous/Number of countries in which the strait or canal is located
AdaptivityAlternativeNumber of alternative channels for the strait or canalPositive
Related organizationNumber of responsible agencies in the relevant country or new agencies established to coordinate the management of the strait or canal
Security normNumber of special agencies established by the country/countries in which the channel or canal is located to ensure the smooth flow of traffic through the strait or canal
Legal policyNumber of relevant laws and policies for the strait or canal
International cooperationNumber of international cooperation measures for the strait or canal
* indicates the impact of the index on the risk of the key nodes; a positive index will reduce the risk, and a negative index will increase the risk.
Table 4. Standardized vulnerability index data for the key nodes.
Table 4. Standardized vulnerability index data for the key nodes.
IndexMilitary ConflictMilitary BasePiratesMaritime TerrorismAccidentCoastal Political Stability
Key Node
Taiwan Strait1.000.751.001.000.401.00
Malacca Strait0.330.750.000.330.000.67
Mande Strait0.001.000.451.000.880.00
Suez Canal1.000.750.860.000.491.00
Lombok Strait0.000.750.480.000.930.00
Sunta Strait0.001.000.480.000.840.00
Makassar Strait0.000.500.740.000.880.00
Gibraltar Strait1.000.500.961.000.751.00
Hormuz Strait0.500.250.861.000.620.50
Panama Canal1.001.001.001.000.801.00
Korean Strait1.000.751.001.000.221.00
English Channel1.000.001.001.000.311.00
Florida Strait1.000.501.001.000.841.00
Dagu Strait1.001.001.001.000.971.00
Zonggu Strait1.000.751.001.000.931.00
Mindoro Strait0.001.000.981.000.880.00
Windward Strait1.000.751.001.001.000.50
Mona Strait1.000.750.981.001.001.00
Table 5. Standardized adaptivity index data for the key nodes.
Table 5. Standardized adaptivity index data for the key nodes.
IndexAlternativeRelated OrganizationSecurity NormLegal PolicyInternational Cooperation
Key Node
Taiwan Strait0.330.331.000.600.25
Malacca Strait1.001.001.000.801.00
Mande Strait0.331.000.000.200.00
Suez Canal0.330.331.001.000.00
Lombok Strait1.000.500.000.400.00
Sunta Strait1.000.500.000.200.00
Makassar Strait0.670.500.000.200.00
Gibraltar Strait0.330.331.000.400.00
Hormuz Strait0.000.170.000.400.25
Panama Canal0.330.331.000.000.00
Korean Strait0.330.670.000.200.00
English Channel0.330.500.000.200.00
Florida Strait0.670.670.000.200.00
Dagu Strait0.670.330.000.200.00
Zonggu Strait0.670.330.000.200.00
Mindoro Strait0.670.170.000.000.00
Windward Strait0.670.000.000.000.00
Mona Strait0.670.000.000.000.00
Table 6. Extraction of the vulnerability index.
Table 6. Extraction of the vulnerability index.
Vulnerability IndexPrincipal Component 1Principal Component 2Principal Component 3
Cumulative variance contribution (%)48.01870.04287.431
Table 7. Extraction of the adaptivity index.
Table 7. Extraction of the adaptivity index.
Adaptivity IndexPrincipal Component 1Principal Component 2Principal Component 3
Cumulative variance contribution (%)40.29463.34785.610
Table 8. Factor load matrix for the vulnerability index.
Table 8. Factor load matrix for the vulnerability index.
Vulnerability FactorsPrincipal Component
123
Military conflict0.945−0.0440.189
Coastal political stability0.898−0.2210.290
Pirates0.7930.425−0.243
Maritime terrorism0.7230.312−0.022
Accidents−0.1370.903−0.255
Military bases−0.3580.5560.743
Table 9. Factor load matrix for the adaptivity index.
Table 9. Factor load matrix for the adaptivity index.
Adaptivity FactorsPrincipal Component
123
Legal policy0.857−0.1990.045
International cooperation0.8180.2570.144
Security norm0.744−0.4740.234
Alternatives0.0440.8470.481
Related organizations0.5450.504−0.643
Table 10. Security level of key nodes.
Table 10. Security level of key nodes.
Security Level I II III IV V
Scale k [0, 0.9035)[0.9035, 0.9436)[0.9436, 0.9680)[0.9680, 0.9859)[0.9859, 1]
Table 11. Comprehensive measurement results for key nodes.
Table 11. Comprehensive measurement results for key nodes.
Key NodeRankSecurity LevelCoupling Degree ValueAdjusted Coupling Degree Value
Taiwan Strait1 III 0.96170.5480
Malacca Strait14 I 0.87710.1941
Mande Strait9 II 0.92250.2945
Suez Canal5 III 0.94720.4301
Lombok Strait10 II 0.91070.2356
Sunta Strait11 II 0.90760.2205
Makassar Strait12 I 0.89860.1989
Gibraltar Strait2 III 0.95580.5004
Hormuz Strait15 I 0.86610.1917
Panama Canal3 III 0.95330.4795
Korean Strait8 II 0.92680.3164
English Channel16 I 0.83620.1851
Florida Strait7 III 0.94630.4226
Dagu Strait4 III 0.95000.4526
Zonggu Strait6 III 0.94640.4232
Mindoro Strait13 I 0.88960.1969
Windward Strait18 I 0.83380.1846
Mona Strait17 I 0.83600.1850
Table 12. Coupling degree values of the vulnerability and adaptivity indices of key nodes.
Table 12. Coupling degree values of the vulnerability and adaptivity indices of key nodes.
Key NodeVulnerability Index Coupling Value (u)Adaptivity Index Coupling Value (v)
Taiwan Strait0.94080.8665
Malacca Strait0.57180.9941
Mande Strait0.88470.7396
Suez Canal0.90410.8403
Lombok Strait0.80300.7921
Sunta Strait0.80940.7677
Makassar Strait0.79270.7459
Gibraltar Strait0.95650.8140
Hormuz Strait0.89820.4827
Panama Canal0.98760.7606
Korean Strait0.91410.7231
English Channel0.60750.7119
Florida Strait0.96280.7571
Dagu Strait0.99850.7308
Zonggu Strait0.98420.7308
Mindoro Strait0.89530.5780
Windward Strait0.97950.3116
Mona Strait0.98800.3116
Table 13. Security status of the security system of key nodes.
Table 13. Security status of the security system of key nodes.
Key Node v [ 8 27 u 3 ] 1 / 2 Status
Taiwan Strait0.86650.4967Stable
Malacca Strait0.99410.2353Stable
Mande Strait0.73960.4530Stable
Suez Canal0.84030.4679Stable
Lombok Strait0.79210.3917Stable
Sunta Strait0.76770.3963Stable
Makassar Strait0.74590.3842Stable
Gibraltar Strait0.81400.5092Stable
Hormuz Strait0.48270.4634Stable
Panama Canal0.76060.5342Stable
Korean Strait0.72310.4757Stable
English Channel0.71190.2578Stable
Florida Strait0.75710.5143Stable
Dagu Strait0.73080.5431Stable
Zonggu Strait0.73080.5315Stable
Mindoro Strait0.57800.4611Stable
Windward Strait0.31160.5277Unstable
Mona Strait0.31160.5346Unstable

Share and Cite

MDPI and ACS Style

Li, B.; Li, J.; Lu, J. Research on the Coupled Risk of Key Nodes in Maritime Transport Based on Improved Catastrophe Theory. Sustainability 2019, 11, 4640. https://doi.org/10.3390/su11174640

AMA Style

Li B, Li J, Lu J. Research on the Coupled Risk of Key Nodes in Maritime Transport Based on Improved Catastrophe Theory. Sustainability. 2019; 11(17):4640. https://doi.org/10.3390/su11174640

Chicago/Turabian Style

Li, Baode, Jing Li, and Jing Lu. 2019. "Research on the Coupled Risk of Key Nodes in Maritime Transport Based on Improved Catastrophe Theory" Sustainability 11, no. 17: 4640. https://doi.org/10.3390/su11174640

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop