Key nodes of sea lanes are important hubs for global trade and cargo transportation and play important roles in ensuring the safety of maritime transportation and maintaining the stability of the global supply chain. The safety guarantee of key nodes of sea lanes is facing more risks and higher requirements currently because the global shipping industry is gradually recovering. This paper focuses on key nodes of sea lanes, conducting regional security risk assessment and risk spatial scale visualization. A set of security risk assessment and visualization study methods for key nodes of sea lanes is constructed, which includes constructing a security risk assessment index system of key nodes of sea lanes with 25 indicators selected from three risk categories (hazard, vulnerability and exposure, and mitigation capacity) and using geospatial analysis to form the multi-criteria spatial mapping layers and then creating comprehensive risk layers to realize the risk visualization in the strait area by weighted overlaying based on the combined weights calculated by Analytic Hierarchy Process and Grey Relational Analysis. After taking the Tsugaru Strait and Makassar Strait as case studies, the results show that the comprehensive risk layers can effectively present the spatial distribution of security risks of key nodes of sea lanes, reflecting the spatial changes of risk levels (i.e., very low, low, medium, high and very high) and the methods can precisely identify and analyze crucial factors affecting the security risk of key nodes. These findings may strengthen the risk prevention and improve the safety of the navigation environment in the strait to ensure the safety and stability of maritime trade.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9326424 | PMC |
http://dx.doi.org/10.1007/s11069-022-05484-8 | DOI Listing |
Sci Rep
January 2025
Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, UK.
In general, edge computing networks are based on a distributed computing environment and hence, present some difficulties to obtain an appropriate load balancing, especially under dynamic workload and limited resources. The conventional approaches of Load balancing like Round-Robin and Threshold-based load balancing fails in scalability and flexibility issues when applied to highly variable edge environments. To solve the problem of how to achieve steady-state load balance and provide dynamic adaption to edge networks, this paper proposes a new framework that using PCA and MDP.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Pharmaceutics, College of Pharmacy, King Saud University, PO Box 2457, Riyadh, 11451, Saudi Arabia.
Prostate cancer presents a major health issue, with its progression influenced by intricate molecular factors. Notably, the interplay between miRNAs and changes in transcriptomic patterns is not fully understood. Our study seeks to bridge this knowledge gap, employing computational techniques to explore how miRNAs and transcriptomic alterations jointly regulate the development of prostate cancer.
View Article and Find Full Text PDFCurr Opin Neurobiol
January 2025
Department of Physiology, University of California-San Francisco, San Francisco, CA 94143, USA.
Subconscious breathing is generated by a network of brainstem nodes with varying purposes, like pacing breathing or patterning a certain breath phase. Decades of anatomy, pharmacology, and physiology studies have identified and characterized the system's fundamental properties that produce robust breathing, and we now have well-conceived computational models of breathing that are based on the detailed descriptions of neuronal connectivity, biophysical properties, and functions in breathing. In total, we have a considerable understanding of the brainstem breathing control circuit.
View Article and Find Full Text PDFEur Radiol
January 2025
Department of Urological Surgical, JiangNan University Medical Center, Wuxi, China.
Objective: To conduct a meta-analysis assessing the diagnostic performance of the node reporting and data system (Node-RADS) for detecting lymph node (LN) invasion.
Method: We performed a systematic literature search of online scientific publication databases from inception up to July 31, 2024. We used the quality assessment of diagnostic accuracy studies-2 (QUADAS-2) to assess the study quality, and heterogeneity was determined by the Q-test and measured with I statistics.
Int J Clin Health Psychol
January 2025
Faculty of Psychology, Tianjin Normal University, Tianjin, 300387, China.
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!