Affiliation:
1. College of Meteorology and Oceanography, National University of Defense Technology, Nanjing 211101, China
2. Unit 78127, Chengdu 610000, China
Abstract
Piracy is a major threat to maritime safety. Assessing piracy risk is crucial to ship safety, travel security, and emergency plan preparation. In the absence of a thorough understanding of the factors and mechanisms that influence piracy, no perfect mathematical equation can be set up for such risk assessment. Therefore, the major factors that influence piracy were identified to construct an indicator system for assessment. These factors were analyzed, keeping in view the overall hazard, vulnerability, and antirisk properties, and then the Bayesian network was introduced into the risk assessment model to fuse multiresource information. For some indicators, which have only qualitative information or fragmentary statistical data, the cloud model theory was adopted to realize prior probability settings of the Bayesian network and thus made up for the deficiency in parameter settings. Finally, the inherent hazard of the South China Sea was assessed, as an example for the model, and two real piracy cases were studied to validate the proposed model. The assessment model constructed here can be applied to all cases, similar to the ones studied here.
Subject
General Engineering,General Mathematics
Reference33 articles.
1. New thinking in the fight against marine piracy: financing and plunder pre-empting piracy before prevention becomes necessary;H. R. Williamson;Case Western Reserve Journal of International Law,2013
2. Combating risk on the high sea, an analysis of the effects of modern piratical acts on the marine insurance industry;C. M. Douse;Tulane Maritime Law Journal,2010
3. The economic analysis and the countermeasures of pirate crime;J. Chen;Economy & Management,2011
4. Toward an international law of piracy sui generis. How the dual nature of maritime piracy law enables piracy to flourish;B. Lucas;Social Science Electronic Publishing,2010
5. Transiting areas patrolled by a mobile adversary
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献