<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "http://jats.nlm.nih.gov/publishing/1.3/JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xml:lang="en" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">PJS</journal-id>
<journal-id journal-id-type="publisher-id">Premier Journal of Science</journal-id>
<journal-id journal-id-type="pmc">PJS</journal-id>
<journal-title-group>
<journal-title>PJ Science</journal-title>
</journal-title-group>
<issn pub-type="epub">3049-9011</issn>
<publisher>
<publisher-name>Premier Science</publisher-name>
<publisher-loc>London, UK</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.70389/PJS.100171</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>ORIGINAL RESEARCH</subject>
</subj-group>
<subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Cognitive science</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Social sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Social sciences</subject><subj-group><subject>Linguistics</subject><subj-group><subject>Grammar</subject><subj-group><subject>Phonology</subject><subj-group><subject>Syllables</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Engineering and technology</subject><subj-group><subject>Signal processing</subject><subj-group><subject>Speech signal processing</subject></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Cognitive science</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Social sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Medicine and health sciences</subject><subj-group><subject>Mental health and psychiatry</subject><subj-group><subject>Schizophrenia</subject></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Research and analysis methods</subject><subj-group><subject>Bioassays and physiological analysis</subject><subj-group><subject>Electrophysiological techniques</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Physiology</subject><subj-group><subject>Electrophysiology</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Brain mapping</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Medicine and health sciences</subject><subj-group><subject>Clinical medicine</subject><subj-group><subject>Clinical neurophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Research and analysis methods</subject><subj-group><subject>Imaging techniques</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Cell biology</subject><subj-group><subject>Cellular types</subject><subj-group><subject>Animal cells</subject><subj-group><subject>Neurons</subject><subj-group><subject>Interneurons</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Cellular neuroscience</subject><subj-group><subject>Neurons</subject><subj-group><subject>Interneurons</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Research and analysis methods</subject><subj-group><subject>Bioassays and physiological analysis</subject><subj-group><subject>Electrophysiological techniques</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Physiology</subject><subj-group><subject>Electrophysiology</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Brain mapping</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Medicine and health sciences</subject><subj-group><subject>Clinical medicine</subject><subj-group><subject>Clinical neurophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Research and analysis methods</subject><subj-group><subject>Imaging techniques</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group>
</article-categories>
<title-group>
<article-title>Risk-Based Planning of Port Network Sustainability Under Conditions of Operational Uncertainty</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-9228-8459</contrib-id>
<name>
<surname>Melnyk</surname>
<given-names>Oleksiy</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<role content-type="http://credit.niso.org/contributor-roles/supervision">Supervision</role>
<role content-type="http://credit.niso.org/contributor-roles/project-administration">Project administration</role>
<role content-type="http://credit.niso.org/contributor-roles/methodology">Methodology</role>
<role content-type="http://credit.niso.org/contributor-roles/conceptualization">Conceptualization</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Shcheniavskyi</surname>
<given-names>Hennady</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<role content-type="http://credit.niso.org/contributor-roles/writing-review-editing">Writing &#x2013; review &#x0026; editing</role>
<role content-type="http://credit.niso.org/contributor-roles/resources">Resources</role>
<role content-type="http://credit.niso.org/contributor-roles/methodology">Methodology</role>
<role content-type="http://credit.niso.org/contributor-roles/formal-analysis">Formal analysis</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Volyanskyy</surname>
<given-names>Sergiy</given-names>
</name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<role content-type="http://credit.niso.org/contributor-roles/writing-review-editing">Writing &#x2013; review &#x0026; editing</role>
<role content-type="http://credit.niso.org/contributor-roles/writing-original-draft">Writing &#x2013; original draft</role>
<role content-type="http://credit.niso.org/contributor-roles/visualization">Visualization</role>
<role content-type="http://credit.niso.org/contributor-roles/validation">Validation</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Koryakin</surname>
<given-names>Kostyantin</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<role content-type="http://credit.niso.org/contributor-roles/investigation">Investigation</role>
<role content-type="http://credit.niso.org/contributor-roles/formal-analysis">Formal analysis</role>
<role content-type="http://credit.niso.org/contributor-roles/data-curation">Data curation</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Kucherenko</surname>
<given-names>Volodymyr</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<role content-type="http://credit.niso.org/contributor-roles/writing-review-editing">Writing &#x2013; review &#x0026; editing</role>
<role content-type="http://credit.niso.org/contributor-roles/writing-original-draft">Writing &#x2013; original draft</role>
<role content-type="http://credit.niso.org/contributor-roles/visualization">Visualization</role>
</contrib>
<aff id="aff1"><sup>1</sup><institution-wrap><institution-id institution-id-type="ror">https://ror.org/0077bqh92</institution-id><institution>Odesa National Maritime University</institution></institution-wrap>, <city>Odesa</city>, <country>Ukraine</country></aff>
<aff id="aff2"><sup>2</sup><institution>Admiral Makarov National University of Shipbuilding</institution>, <city>Mykolaiv</city>, <country>Ukraine</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor001"><bold>Correspondence to:</bold> Oleksiy Melnyk, <email>m.onmu@ukr.net</email></corresp>
<fn fn-type="other"><p>Peer Review</p></fn>
</author-notes>
<pub-date pub-type="epub">
<day>17</day>
<month>12</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="collection">
<month>11</month>
<year>2025</year>
</pub-date>
<volume>14</volume>
<issue>1</issue>
<elocation-id>100171</elocation-id>
<history>
<date date-type="received">
<day>16</day>
<month>10</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>28</day>
<month>10</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>28</day>
<month>10</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-year>2025</copyright-year>
<copyright-holder>Oleksiy Melnyk, Hennady Shcheniavskyi, Sergiy Volyanskyy, Kostyantin Koryakin and Volodymyr Kucherenko</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">
<license-p>This is an open access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">Creative Commons Attribution License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="info:doi/10.70389/PJS.100171"/>
<abstract>
<p>Modern maritime transport and port systems operate in a complex environment characterized by a high frequency of technical, organizational and natural risks. The article proposes an integrated concept of risk-oriented planning aimed at improving the sustainability, reliability and efficiency of maritime transport and port networks. The model is based on a combination of multi-criteria risk assessment, analysis of the degradation of technical and behavioral safety barriers, and optimization of management interventions in real time. A system of equations has been developed that describes the dynamics of risk, availability, and efficiency of ship and port subsystems, taking into account the interdependence of technical, human, and climatic factors. The model implements the principles of project-oriented management, allowing to make decisions on resource allocation, maintenance priorities and corrective actions within the framework of digital management support systems. The modeling results showed that the implementation of targeted interventions increases the sustainability of the port network and reduces productivity losses compared to the baseline scenarios. The proposed model can be used as a methodological basis for the development of intelligent systems for managing the safety and efficiency of seaports and ship operations.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Dynamic risk-informed planning</kwd>
<kwd>Safety barrier degradation modeling</kwd>
<kwd>Port network resilience index</kwd>
<kwd>Topsis-based multicriteria risk assessment</kwd>
<kwd>Real-time intervention optimization</kwd>
</kwd-group>
<counts>
<fig-count count="8"/>
<table-count count="6"/>
<page-count count="13"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>Version accepted</meta-name>
<meta-value>4</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec>
<title><ext-link ext-link-type="uri" xlink:href="https://premierscience.com/wp-content/uploads/2025/14/pjs-25-1409.pdf">Source-File: pjs-25-1409.pdf</ext-link></title>
</sec>
<sec id="sec001" sec-type="intro">
<title>Introduction</title>
<p>Maritime logistics is presently characterized by the increasing complexity of operations, which creates new challenges for ensuring the safety and reliability of port-ship interactions. The dynamic operating environment creates a new structure of risks that directly affect the efficiency and safety of port operations. In such conditions, traditional approaches to risk assessment based on static parameters and fixed scenarios are not sufficient to ensure adaptability and timely response.</p>
<p>There is a growing need to create models that can integrate dynamic risk reassessment, degradation of technical and organizational barriers, and optimization of management decisions in real time. Of particular importance are risk-informed planning approaches that combine quantitative modeling, multi-criteria assessment, and resource management under conditions of uncertainty. Such models should become the basis for the development of intelligent decision support systems (D).</p>
<p>High-profile incidents in recent years, such as the collision of the container ship DALI with a bridge pillar in the port of Baltimore (2024) and the accident of the Milano Bridge in the port of Busan (2020), have demonstrated systemic vulnerabilities in existing mooring procedures. The causes of the accidents go beyond technical errors and point to a lack of situational awareness, fragmented application of risk assessment methods, and insufficient integration of data into the decision-making process.</p>
<p>Research in the field of search and rescue operations outlines the main challenges for planning and demonstrates the potential of AI-oriented algorithms to reduce response times and improve the accuracy of incident localization.<sup><xref ref-type="bibr" rid="ref1">1</xref></sup> These ideas correlate with the work on autonomous navigation, where adaptive multi-source quantitative risk assessment allows to take into account the dynamics of the environment and reduce the likelihood of collisions.<sup><xref ref-type="bibr" rid="ref2">2</xref></sup> At the macro level of industry policy, the focus is shifting to environmental goals: research on achieving greenhouse gas emission reductions emphasizes the risks of not meeting international standards,<sup><xref ref-type="bibr" rid="ref3">3</xref></sup> while a review of ML applications in maritime risk management<sup><xref ref-type="bibr" rid="ref4">4</xref></sup> outlines methodological gaps and prospects for explanatory AI. Expanding the analytical framework through game theory and network approaches<sup><xref ref-type="bibr" rid="ref5">5</xref></sup> allows for the integration of reliability issues in complex transportation systems.</p>
<p>In the area of sensor networks, the use of LoRaWAN for decentralized monitoring, which increases the stability of data transmission channels in marine areas, is attracting attention.<sup><xref ref-type="bibr" rid="ref6">6</xref></sup> This approach is enhanced by the coordinated route planning of unmanned vehicles (UAVs and USVs), which can provide real-time monitoring despite the uncertainty in travel time.<sup><xref ref-type="bibr" rid="ref7">7</xref></sup> Security studies demonstrate the effectiveness of probabilistic networks in modeling the role of barriers,<sup><xref ref-type="bibr" rid="ref8">8</xref></sup> assessing the risks of transporting dangerous goods, including electric vehicles,<sup><xref ref-type="bibr" rid="ref9">9</xref></sup> and assessing the sustainability of green shipping policies.<sup><xref ref-type="bibr" rid="ref10">10</xref></sup> At the same time, deep learning models provide forecasting of offshore winds, which are critical for safe navigation.<sup><xref ref-type="bibr" rid="ref11">11</xref></sup></p>
<p>An important area is the integration of cognitive maps with causal analysis methods and expert opinions, which allows to reproduce complex human factors.<sup><xref ref-type="bibr" rid="ref12">12</xref></sup> Algorithms based on Transformer networks show potential for predicting &#x201C;near-miss&#x201D; events and explaining patterns.<sup><xref ref-type="bibr" rid="ref13">13</xref></sup> This correlates with the use of fuzzy logic and Bayesian networks in the study of reliability of inert gas operations<sup><xref ref-type="bibr" rid="ref14">14</xref></sup> and general overviews of BN applications in the maritime industry.<sup><xref ref-type="bibr" rid="ref15">15</xref></sup> The safe trajectory of autonomous vessels is also built through risk-based planning<sup><xref ref-type="bibr" rid="ref16">16</xref></sup> and multi-scale scenario analysis.<sup><xref ref-type="bibr" rid="ref17">17</xref></sup> In parallel, FRAM combined with AIS data shows how system interactions lead to incidents in port operations.<sup><xref ref-type="bibr" rid="ref18">18</xref></sup></p>
<p>Real-time monitoring of containers is realized through hybrid IoT networks,<sup><xref ref-type="bibr" rid="ref19">19</xref></sup> while the resilience of LNG chains is analyzed by methods ranging from static Bow-tie to dynamic epidemiological modeling.<sup><xref ref-type="bibr" rid="ref20">20</xref></sup> Bayesian networks are increasingly being used to evaluate trade routes under uncertainty,<sup><xref ref-type="bibr" rid="ref21">21</xref></sup> optimize the placement of SAR equipment,<sup><xref ref-type="bibr" rid="ref22">22</xref></sup> plan AUV courses,<sup><xref ref-type="bibr" rid="ref23">23</xref></sup> and enhance process security on a regional scale.<sup><xref ref-type="bibr" rid="ref24">24</xref></sup></p>
<p>Against this background, it is worth noting the contribution of Ukrainian research. Papers<sup><xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref27">27</xref></sup> form the basis of a probabilistic approach to hydrometeorological risks and navigation safety assessment. The development of a methodology for expert assessment of the quality of risk analysis of operations<sup><xref ref-type="bibr" rid="ref27">27</xref></sup> is directly integrated into modern DSS systems. The analysis of the efficiency of the Trumpet fleet<sup><xref ref-type="bibr" rid="ref28">28</xref></sup> and the impact of hull geometry on maneuverability<sup><xref ref-type="bibr" rid="ref29">29</xref></sup> add a practical engineering component, while the study of ship systems efficiency<sup><xref ref-type="bibr" rid="ref30">30</xref></sup> emphasizes the reduction of energy consumption.</p>
<p>Special mention should be made of the work on improving the fuel efficiency of engines through additives<sup><xref ref-type="bibr" rid="ref31">31</xref></sup> and ensuring the safe operation of diesel plants.<sup><xref ref-type="bibr" rid="ref32">32</xref></sup> These are examples of applied technical solutions that are consistent with the general paradigm of sustainable development. Although the works on mathematical analysis<sup><xref ref-type="bibr" rid="ref33">33</xref></sup> or optimization of port equipment<sup><xref ref-type="bibr" rid="ref34">34</xref></sup> are more of a fundamental nature, they demonstrate the connection between accurate models and applied logistics problems. Finally, new methods based on Markov processes and fuzzy sets<sup><xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref></sup> bring reliability assessment to a level capable of taking into account uncertainty and multicriteria. Studies in the field of law and policy<sup><xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref></sup> introduce into the discussion the dimension of &#x201C;gray areas&#x201D; and cluster management, which is important for the institutional context of risk management.</p>
<p>Hydrodynamic aspects are revealed in the modeling of the impact of cold-water pipes and mooring systems on OTEC-type platforms,<sup><xref ref-type="bibr" rid="ref40">40</xref></sup> which emphasizes the importance of physical models and numerical simulations in the overall safety loop.The increasing complexity of maritime transportation, combined with new environmental requirements and the transition to autonomous solutions, necessitates a systematic review of current approaches to risk management.</p>
<p>Works<sup><xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref></sup> analyze methods of managing the environmental safety of shipping and the parameters of marine diesel engines, emphasizing the need to balance technical efficiency and environmental constraints. The study<sup><xref ref-type="bibr" rid="ref43">43</xref></sup> proposes an optimization model for energy flows and supply that is directly applicable to port networks operating in a mixed energy supply mode. Article<sup><xref ref-type="bibr" rid="ref44">44</xref></sup> presents the application of wavelet transformation for diagnosing the technical condition of systems, which reinforces the direction of predictive monitoring in port infrastructure risk management. The works<sup><xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref46">46</xref></sup> address the issues of information security in shipping, AIS data manipulation, and the development of strategies to reduce nitrogen oxide emissions, forming an integrated basis for combining the environmental, information, and technical sustainability of port networks within the framework of risk-oriented management.</p>
<p>Despite the existence of numerous studies in the field of port security and risk management, most of them are static in nature and do not take into account the time degradation of technical barriers, the interdependence of subsystems, and the dynamics of risk in a changing maritime environment. The problem of combining multi-criteria risk assessment, time degradation of efficiency, and optimization of interventions in a single mathematical structure remains unresolved. This scientific gap limits the possibilities of real-time adaptive management of port networks.</p>
<p>The aim of the study is to develop an integrated dynamic model of risk-informed planning that combines risk assessment, degradation of security barriers, and optimization of interventions with regard to resource constraints. The scientific novelty of the work lies in the creation of a quantitative model that reconciles expert assessments (via TOPSIS) with the dynamics of risk and performance, introduces a network resilience index (Resilience Index) and allows minimizing the expected loss of throughput under conditions of uncertainty. The proposed approach forms an analytical basis for building intelligent decision support systems in seaports.</p>
</sec>
<sec id="sec002">
<title>Problem Formulation</title>
<p>The purpose of this study is to develop a risk-informed decision-support model for port networks operating under uncertainty. The model integrates three sequential stages: (1) dynamic risk assessment, (2) optimization of resource allocation, and (3) decision-making under constraints. The problem is formulated as a multi-stage optimization task that minimizes the expected total loss due to cascading failures while respecting operational, budgetary, and temporal constraints:</p>
<disp-formula id="DM1"><label>(1)</label><mml:math id="IDM1" display="block"><mml:mrow><mml:msub><mml:mrow><mml:mi>min</mml:mi></mml:mrow><mml:mrow><mml:mi>x</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:msub><mml:mi>&#x0395;</mml:mi><mml:mo stretchy='false'>[</mml:mo><mml:mi>L</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo stretchy='false'>]</mml:mo><mml:mo>=</mml:mo><mml:mstyle displaystyle='true'><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mi>t</mml:mi></mml:munder><mml:mrow><mml:mi>f</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>R</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>,</mml:mo><mml:mi>B</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>,</mml:mo><mml:mi>C</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mstyle></mml:mrow></mml:math></disp-formula>
<p>subject to system dynamics</p>
<disp-formula id="DM2"><label>(2)</label><mml:math id="IDM2" display="block"><mml:mrow><mml:mrow><mml:mo>{</mml:mo> <mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mrow><mml:mi>R</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>f</mml:mi><mml:mi>R</mml:mi></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>R</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>,</mml:mo><mml:mi>U</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03BE;</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mi>B</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:mi>B</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>C</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>U</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mtext>&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;</mml:mtext></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow> </mml:mrow></mml:mrow></mml:math></disp-formula>
<p>where <italic>R</italic>(<italic>t</italic>) - risk state vector, <italic>B</italic>(<italic>t</italic>) - available budget, <italic>U</italic>(<italic>t</italic>) - control/intervention vector, and <italic>&#x03BE;</italic><sub><italic>t</italic></sub> stochastic disturbances.</p>
<p>The above formulation serves as a logical bridge between risk evaluation, mitigation optimization, and adaptive decision-making, forming the foundation of the proposed DSS.</p>
</sec>
<sec id="sec003">
<title>Materials</title>
<p>In today&#x2019;s maritime logistics environment, port complexes function as complex cyber-physical systems that intertwine physical infrastructure nodes (terminals, mooring posts, control centers) with a network of information exchange, navigation monitoring, and management response. The key challenges for such a system are maintaining the functional availability of the nodes and ensuring resilience to risks caused by internal and external influences.</p>
<p>The availability of a node refers to its current ability to handle vessels, which depends on its technical condition, personnel, weather conditions, queues, and other factors. The availability value <italic>x<sub>i</sub></italic>(<italic>t</italic>) &#x2208; [0, 1] can be interpreted as the normalized fraction of available capacity from the nominal level <italic>c<sub>i</sub></italic> &#x003E; 0, usually expressed in TEU/h or shipcalls/h.</p>
<p>Risk in this context is a generalized assessment of the potential loss of node functionality due to the impact of adverse events. The integral risk is denoted as <italic>r<sub>i</sub></italic>(<italic>t</italic>) &#x2208; [0, 1], and reflects the probability of disruption, threats, or degradation at a particular point in the network. High values of <italic>r<sub>i</sub></italic>(<italic>t</italic>) indicate the criticality of the situation and the need for prompt intervention.</p>
<p>To reduce risk, safety barriers are used - technical, procedural or administrative means that implement the protection function. The effectiveness of the barrier at a given time is denoted as <italic>EB<sub>i</sub></italic>(<italic>t</italic>) &#x2208; (0,1], and usually decreases over time due to degradation or wear and tear. A decrease in the effectiveness of barriers creates the need for managed intervention <italic>u<sub>i</sub></italic>(<italic>t</italic>) &#x2265; 0, which may include additional resources, changes in procedures, activation of backup systems, etc.</p>
<p><xref ref-type="table" rid="T1">Table 1</xref> summarizes examples of port network elements, their potential risks, and corresponding barriers.</p>
<table-wrap id="T1">
<label>Table 1</label>
<caption><title>Examples of network elements, risks and barriers</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Network Node</th>
<th valign="top" align="left">Potential Risk</th>
<th valign="top" align="left">Safety Barrier Example</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Cargo terminal</td>
<td valign="top" align="left">Visibility reduction, crane breakdown</td>
<td valign="top" align="left">Backup lighting, double check</td>
</tr>
<tr>
<td valign="top" align="left">Towing service</td>
<td valign="top" align="left">Failure of the tug, storm waves</td>
<td valign="top" align="left">Emergency reserve of tugs, SOP</td>
</tr>
<tr>
<td valign="top" align="left">Port Traffic Management</td>
<td valign="top" align="left">Communication failure, human factor</td>
<td valign="top" align="left">Automation of decision-making, backup channels</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="fig" rid="F1">Figure 1</xref> shows a generalized diagram of the key elements of the port operational network, indicating potential risks and examples of security barriers for each. Within the three main nodes - terminal, tug service and traffic control - typical threats such as reduced visibility, tug failure, and human error are shown, as well as the corresponding risk management tools: backup lighting, redundant communication channels, implementation of SOPs (standard operating procedures), decision automation and tug redundancy.</p>
<fig id="F1" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100171.g001</object-id>
<label>Fig 1</label>
<caption><title>Network risk maritime nodes and safety barriers</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1409-Figure-1.webp?">Figure 1</ext-link></p>
</fig>
<p>Most traditional approaches to risk management look at events in isolation without considering the cascading effects of one node on others. Instead, the modern concept of network risk dynamics focuses on the interconnections between system components, taking into account that a disruption in a critical element can cause a domino effect throughout the network. Therefore, the key task is to develop a dynamic model that takes into account changes in risk and availability over time, describes the degradation of barriers and the effectiveness of interventions. In addition, it allows for the evaluation of integrated metrics (resilience, reliability, <italic>ETL</italic>) and serves as the basis for building an optimization problem of management in conditions of limited resources.</p>
<p>Seaports nowadays are complex cyber-physical logistics systems consisting of many interdependent elements: mooring terminals, towing stations, approach channels, control centers, energy and navigation systems. Ensuring the sustainability and functionality of the port in the face of dynamic changes in the external environment (weather conditions, traffic intensity, technical failures, cyber threats) requires the use of adaptive risk analysis and decision-making models.</p>
<p>The networked nature of the port is particularly challenging, where the failure of a single node or degradation of a particular subsystem can cause cascading effects that affect overall performance. Therefore, an approach that combines local risks with global impacts, also takes into account the degradation of security barriers over time and allows for optimized interventions (including tugs, slot transfers, routing) with limited resources, and is also focused on assessing the resilience index of the port network is relevant.</p>
<p>The port system is represented as a directed graph:</p>
<disp-formula id="DM3"><label>(3)</label><mml:math id="IDM3" display="block"><mml:mrow><mml:mi>G</mml:mi><mml:mo>=</mml:mo><mml:mo stretchy='false'>(</mml:mo><mml:mi>V</mml:mi><mml:mo>,</mml:mo><mml:mi>E</mml:mi><mml:mo stretchy='false'>)</mml:mo> </mml:mrow></mml:math></disp-formula>
<p>where: <italic>V</italic> - set of nodes (terminals, pilotage, towing service, traffic control); <italic>E</italic> - a set of arcs (logistics links, approaches, channels, interaction, etc.).</p>
<p>Each node <italic>i</italic> &#x2208; <italic>V</italic> - is characterized:</p>
<list list-type="bullet">
<list-item><p>availability <italic>x<sub>i</sub></italic>(<italic>t</italic>) &#x2208; [0, 1] - which reflects the effective share of the node&#x2019;s capacity;</p></list-item>
<list-item><p>integral risk <italic>r<sub>i</sub></italic>(<italic>t</italic>) &#x2208; [0, 1] - from low to critical;</p></list-item>
<list-item><p>nominal capacity <italic>c<sub>i</sub></italic> - for example, in teu/h;</p></list-item>
<list-item><p>controlled intervention <italic>u<sub>i</sub></italic>(<italic>t</italic>) &#x2265; 0, i.e., resources or actions that reduce the risk;</p></list-item>
<list-item><p>the effectiveness of the safety barrier <italic>EB<sub>i</sub></italic>(<italic>t</italic>) &#x2208; [0, 1], which decreases over time according to the exponential law.</p></list-item>
</list>
<p>The diagram in <xref ref-type="fig" rid="F2">Figure 2</xref> shows the logic of risk assessment and efficiency of the port network based on the availability of its key elements.</p>
<fig id="F2" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100171.g002</object-id>
<label>Fig 2</label>
<caption><title>Network performance and resilience metrics in port risk assessment</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1409-Figure-2.webp?">Figure 2</ext-link></p>
</fig>
<p>The central component is Availability - an integrated assessment of the effective throughput of a network node (terminal, towing post, etc.). It is determined under the influence of risks <italic>r<sub>i</sub></italic>(<italic>t</italic>), barriers <italic>Z<sub>i</sub></italic>(<italic>t</italic>), and managed interventions <italic>u<sub>i</sub></italic>(<italic>t</italic>) that can compensate for infrastructure degradation or external threats.</p>
<p>From the accessibility indicator, four key system-level metrics are further calculated, namely:</p>
<list list-type="order">
<list-item><p>Performance: total effective current network performance &#x03A6;(<italic>t</italic>);</p></list-item>
<list-item><p>Network Reliability (<italic>R</italic><sub>net</sub>): the probability of network uptime at the current time;</p></list-item>
<list-item><p>Resilience Index (<italic>RI</italic>): network resilience index - the share of restored or preserved bandwidth during a period of stress;</p></list-item>
<list-item><p>Expected Throughput Loss (<italic>ETL</italic>): expected bandwidth losses averaged over a time horizon.</p></list-item>
</list>
<p>Thus, resilience determines how quickly and efficiently the port network is able to adapt to risks and external changes, and the relevant metrics quantify this adaptation to support informed management decisions (<xref ref-type="table" rid="T2">Table 2</xref>).</p>
<table-wrap id="T2">
<label>Table 2</label>
<caption><title>Key performance and risk metrics for port network assessment</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Metric</th>
<th valign="top" align="center">Notation</th>
<th valign="top" align="left">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Network Performance</td>
<td valign="top" align="center">&#x3a6;(<italic>t</italic>)</td>
<td valign="top" align="left">Total effective throughput capacity of the port network at time ttt, calculated as the sum of node capacities weighted by their availability.</td>
</tr>
<tr>
<td valign="top" align="left">Network Reliability</td>
<td valign="top" align="center"><italic>R</italic><sub>net</sub>(<italic>t</italic>)</td>
<td valign="top" align="left">Probability that the port network remains operational at time ttt, considering the aggregated risk levels at each node (e.g., berths, tug stations).</td>
</tr>
<tr>
<td valign="top" align="left">Resilience Index</td>
<td valign="top" align="center"><italic>RI</italic></td>
<td valign="top" align="left">Fraction of the maximum possible throughput preserved over a time horizon <italic>T</italic>; reflects the system&#x2019;s ability to recover from disruptions.</td>
</tr>
<tr>
<td valign="top" align="left">Expected Throughput Loss (<italic>ETL</italic>)</td>
<td valign="top" align="center"><italic>ETL</italic></td>
<td valign="top" align="left">Average relative productivity loss over a given time horizon; quantifies cumulative inefficiencies due to risk, failures, or degraded operations.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="fig" rid="F3">Figure 3</xref> shows a generalized structure of the interaction between risk, availability, intervention and network indicators. The diagram shows how local risks shape the overall dynamics of the system by affecting availability, which in turn affects performance, resilience, expected losses (<italic>ETL</italic>) and reliability (<italic>R</italic><sub>net</sub>).</p>
<fig id="F3" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100171.g003</object-id>
<label>Fig 3</label>
<caption><title>Interaction between risk, availability, intervention and network indicators</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1409-Figure-3.webp?">Figure 3</ext-link></p>
</fig>
</sec>
<sec id="sec001-1">
<title>Mathematical Formulation</title>
<p>The dynamic behavior of the port network resilience is represented by the time-dependent performance function &#x3a6;(<italic>t</italic>), which describes the normalized operational state of the system under uncertainty.</p>
<p>The aggregated network risk level <italic>R</italic><sub><italic>net</italic></sub>(<italic>t</italic>) is defined as a weighted combination of subsystem performance indicators:</p>
<disp-formula id="DM4"><label>(4)</label><mml:math id="IDM4" display="block"><mml:mrow><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mtext>net</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:mstyle displaystyle='true'><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mi>i</mml:mi></mml:munder><mml:mrow><mml:msub><mml:mi>&#x03A6;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:mstyle><mml:mo>&#x22c5;</mml:mo><mml:msub><mml:mi>w</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math></disp-formula>
<p>where &#x03A6;<sub><italic>i</italic></sub>(<italic>t</italic>) &#x2013; normalized performance level of subsystem <italic>i</italic> at time <italic>t</italic>, <italic>w</italic><sub><italic>i</italic></sub> - &#x2013; normalized risk weight of subsystem <italic>i</italic> (&#x2211;<sub><italic>i</italic></sub><italic>w</italic><sub><italic>i</italic></sub> = 1).</p>
<p>We define the Expected Throughput Loss (ETL) as a normalized time&#x2013;integral measure of degraded performance that quantifies the cumulative degradation of system performance during the observation horizon <italic>T</italic>:</p>
<disp-formula id="DM5"><label>(5)</label><mml:math id="IDM5" display="block"><mml:mrow><mml:mi>E</mml:mi><mml:mi>T</mml:mi><mml:mi>L</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mi>T</mml:mi></mml:mfrac><mml:mstyle displaystyle='false'><mml:mrow><mml:msubsup><mml:mo>&#x222B;</mml:mo><mml:mn>0</mml:mn><mml:mi>T</mml:mi></mml:msubsup><mml:mrow><mml:mrow><mml:mo>[</mml:mo> <mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow> <mml:mo>]</mml:mo></mml:mrow><mml:mi>d</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:mrow></mml:mstyle></mml:mrow></mml:math></disp-formula>
<p>where <italic>R</italic><sub>net</sub>(<italic>t</italic>) &#x2208; [0, 1] denotes the instantaneous network reliability and <italic>T</italic> is the evaluation horizon. The normalization by <italic>T</italic> ensures that ETL is dimensionless. The resilience index (<italic>RI</italic>) is then defined as:</p>
<disp-formula id="DM6"><label>(6)</label><mml:math id="IDM6" display="block"><mml:mrow><mml:mi>R</mml:mi><mml:mi>I</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>E</mml:mi><mml:mi>T</mml:mi><mml:mi>L</mml:mi><mml:mo>,</mml:mo><mml:mtext>&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;</mml:mtext><mml:mi>R</mml:mi><mml:mi>I</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mo stretchy='false'>[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy='false'>]</mml:mo></mml:mrow></mml:math></disp-formula>
<p>Thus, higher <italic>RI</italic> values indicate more stable and resilient port operation, while <italic>ETL</italic> reflects the total performance loss over time due to disturbances or cascading failures.</p>
<p>The proposed framework uses several resilienceoriented indicators:</p>
<list list-type="bullet">
<list-item><p>&#x03A6;(<italic>t</italic>): normalized operational performance function (0&#x2013;1);</p></list-item>
<list-item><p><italic>R</italic><sub><italic>net</italic></sub>(<italic>t</italic>): network-wide risk level, obtained by weighted aggregation of node risks;</p></list-item>
<list-item><p><italic>RI</italic>: resilience index, representing mean normalized availability;</p></list-item>
<list-item><p><italic>ETL</italic>: expected throughput loss, reflecting cumulative performance degradation;</p></list-item>
</list>
<p>All indicators are bounded in [0,1], allowing cross-scenario comparison.</p>
</sec>
<sec id="sec004" sec-type="methods">
<title>Methods</title>
<sec id="sec004-1">
<title>Port network, Conditions and Risk</title>
<p>As indicated, a port system is considered as (1) where the set of nodes <italic>V</italic> represents moorings, towing facilities, control centers and supporting technical systems, and the set of arcs <italic>E</italic> represents logistical or technological links between them. Each node <italic>i</italic> &#x2208; <italic>V</italic> is characterized by the current availability state <italic>x<sub>i</sub></italic>(<italic>t</italic>) (from 0 to 1), which reflects the share of preserved functionality or throughput.</p>
<p>Node performance depends on the level of risk <italic>r<sub>i</sub></italic>(<italic>t</italic>), which integrates technical, behavioral, and climatic factors, as well as the reliability of security barriers <italic>EB<sub>i</sub></italic>(<italic>t</italic>), which degrade over time. Thus, risk and accessibility are interrelated - an increase in <italic>r<sub>i</sub></italic>(<italic>t</italic>) leads to a decrease in <italic>x<sub>i</sub></italic>(<italic>t</italic>), and vice versa.</p>
<p>To describe the behavior of the system, a dynamic pair of equations is introduced:</p>
<disp-formula id="DM7"><label>(7)</label><mml:math id="IDM7" display="block"><mml:mtable columnalign='left'><mml:mtr><mml:mtd><mml:msub><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:msub><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>+</mml:mo><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mi>j</mml:mi></mml:munder><mml:msub><mml:mi>&#x03B3;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>r</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>+</mml:mo><mml:msubsup><mml:mtext mathvariant="bold">b</mml:mtext><mml:mi>i</mml:mi><mml:mo>&#x2022;</mml:mo></mml:msubsup><mml:msub><mml:mi>z</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mi>E</mml:mi><mml:msub><mml:mi>B</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:msub><mml:mi>u</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mtext>&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;</mml:mtext><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03BE;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo stretchy='false'>)</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mo>&#x220F;</mml:mo><mml:mrow><mml:mo stretchy='false'>[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy='false'>]</mml:mo></mml:mrow></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>k</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:msub><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mtext>&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;&#x2009;</mml:mtext><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mi>E</mml:mi><mml:msub><mml:mi>B</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:msub><mml:mi>u</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03C9;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo stretchy='false'>)</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>where: &#x03C3;(&#x22C5;) - a logistic function that normalizes risk within [0,1]; <italic>&#x03B3;<sub>ij</sub></italic> - risk transfer coefficients between nodes (cascade effect); <italic>b<sub>i</sub></italic>&#x22C5;<italic>z<sub>i</sub></italic>(<italic>t</italic>) - Vector of external disturbances (weather, visibility, ship congestion); <italic>u</italic><sub><italic>i</italic></sub>(<italic>t</italic>) - managed intervention (prevention, reserves, additional towing); <italic>&#x03BE;<sub>i</sub></italic>(<italic>t</italic>) and <italic>&#x03C9;<sub>i</sub></italic>(<italic>t</italic>) - stochastic noise components.</p>
<p>This system of equations describes the bi-directional dynamics of risk and performance, which is the foundation of the port network risk management model. It is consistent with the concept of dynamic risk reassessment, which the authors of the article define as a transition from static standards to adaptive management.</p>
<p>The effectiveness of each security barrier <italic>EB<sub>i</sub></italic>(<italic>t</italic>) decreases exponentially:</p>
<disp-formula id="DM8"><label>(8)</label><mml:math id="IDM8" display="block"><mml:mrow><mml:mi>E</mml:mi><mml:msub><mml:mi>B</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:msup><mml:mi>e</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>&#x03BB;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mi>t</mml:mi></mml:mrow></mml:msup><mml:mo>,</mml:mo></mml:mrow></mml:math></disp-formula>
<p>where <italic>E</italic><sub>0</sub>, = 1 - initial efficiency, and <italic>&#x03BB;<sub>i</sub></italic> - degradation rate (h<sup>&#x2013;1</sup>).</p>
<p>The calibration of <italic>&#x03BB;<sub>i</sub></italic> - is performed by the (9):</p>
<disp-formula id="DM9"><label>(9)</label><mml:math id="IDM9" display="block"><mml:mrow><mml:msub><mml:mi>&#x03BB;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mfrac><mml:mrow><mml:mi>ln</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>E</mml:mi><mml:msub><mml:mi>B</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>/</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mi>t</mml:mi></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>The barrier degradation model allows to quantify the time aspect of safety degradation, which directly affects the operational risk <italic>r<sub>i</sub></italic>(<italic>t</italic>). The largest value of <italic>&#x03BB;</italic> (e.g., 0.010 for a control system) means a rapid decline in efficiency, and thus a higher priority in maintenance planning.</p>
<p>For node <italic>i</italic> at step <italic>t</italic>: criteria {<italic>k</italic>} (equipment reliability, human factor, weather, tugboat traction margin, visibility etc.) with weights <italic>w<sub>k</sub></italic>. Let <italic>C<sub>i</sub></italic>(<italic>t</italic>) &#x2208; [0, 1] be an indicator of proximity to the ideal solution - the closeness with TOPSIS; then <italic>r<sub>i</sub></italic>(<italic>t</italic>) = 1 - <italic>C<sub>i</sub></italic>(<italic>t</italic>).</p>
<p>Thus, if the mooring scenario receives a high value of <italic>C<sub>i</sub></italic> (for example, 0.78), the risk <italic>r<sub>i</sub></italic>(<italic>t</italic>) is equal to 0.22, which automatically reduces the negative impact in the first equation of the system. This combination of methods allows us to move from a qualitative expert risk assessment (TOPSIS) to a dynamic model with quantitative updates. This ensures consistency between DSS decisions and the system&#x2019;s actual state.</p>
</sec>
<sec id="sec004-2">
<title>Supersystem Network Indicators</title>
<p>The analysis of the port system at the level of individual nodes (terminals, mooring posts, towing points) allows you to track local changes in the state, but for strategic management it is important to obtain integrated metrics that characterize the behavior of the entire network.</p>
<p>Such metrics include:</p>
<list list-type="bullet">
<list-item><p>instantaneous network performance &#x3a6;(<italic>t</italic>);</p></list-item>
<list-item><p>probability of failure-free operation <italic>R<sub>net</sub></italic>(<italic>t</italic>);</p></list-item>
<list-item><p>resilience Index (<italic>RI</italic>);</p></list-item>
<list-item><p>expected Throughput Loss (<italic>ETL</italic>).</p></list-item>
</list>
<p>The total efficiency of the port network at time <italic>t</italic> is defined as the aggregate throughput of all nodes, taking into account their availability:</p>
<disp-formula id="DM10"><label>(10)</label><mml:math id="IDM10" display="block"><mml:mrow><mml:mi>&#x03A6;</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>I</mml:mi></mml:mrow></mml:munder><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>,</mml:mo></mml:mrow></mml:math></disp-formula>
<p>where <italic>c<sub>i</sub></italic> - nominal (design) capacity of node <italic>i</italic>; <italic>x<sub>i</sub></italic>(<italic>t</italic>) - current availability (0&#x2013;1).</p>
<p>The function &#x3a6;(<italic>t</italic>) describes the actual efficiency of the system. If all elements are fully operational, <italic>x<sub>i</sub></italic>(<italic>t</italic>) = 1, we obtain &#x3a6;(<italic>t</italic>) = &#x3a6;<sub>max</sub>. A decrease in <italic>x<sub>i</sub></italic>(<italic>t</italic>) due to risks or degradation of security barriers directly affects performance.</p>
<disp-formula id="DM11"><label>(11)</label><mml:math id="IDM11" display="block"><mml:mtable columnalign='left'><mml:mtr><mml:mtd><mml:msub><mml:mi>p</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>exp</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>&#x03B2;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:msub><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo stretchy='false'>)</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:munder><mml:mo>&#x220F;</mml:mo><mml:mi>i</mml:mi></mml:munder><mml:mo stretchy='false'>(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>p</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo stretchy='false'>)</mml:mo><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>A stochastic approximation based on node failure probabilities is used to estimate the integral reliability:</p>
<disp-formula id="DM12"><label>(12)</label><mml:math id="IDM12" display="block"><mml:mrow><mml:mi>R</mml:mi><mml:mi>I</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:msub><mml:mi>&#x03A6;</mml:mi><mml:mrow><mml:mi>max</mml:mi></mml:mrow></mml:msub><mml:mi>T</mml:mi></mml:mrow></mml:mfrac><mml:mstyle displaystyle='true'><mml:mrow><mml:msubsup><mml:mo>&#x222B;</mml:mo><mml:mn>0</mml:mn><mml:mi>T</mml:mi></mml:msubsup><mml:mrow><mml:mi>&#x03A6;</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mi>d</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:mrow></mml:mstyle></mml:mrow></mml:math></disp-formula>
<p>or in a discrete form:</p>
<disp-formula id="DM13"><label>(13)</label><mml:math id="IDM13" display="block"><mml:mrow><mml:mi>R</mml:mi><mml:mi>I</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:msub><mml:mi>&#x03A6;</mml:mi><mml:mrow><mml:mi>max</mml:mi></mml:mrow></mml:msub><mml:mi>T</mml:mi></mml:mrow></mml:mfrac><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>T</mml:mi></mml:munderover><mml:mi>&#x03A6;</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:math></disp-formula>
<p>If <italic>RI</italic> &#x2248; 1, the system operates stably even under the influence of external risks; if <italic>RI</italic> &#x003C; 0.9, there is a significant loss of efficiency that requires corrective action.</p>
<p>Indicator <italic>ETL</italic> characterizes the average performance loss during the operation period:</p>
<disp-formula id="DM14"><label>(14)</label><mml:math id="IDM14" display="block"><mml:mrow><mml:mi>E</mml:mi><mml:mi>T</mml:mi><mml:mi>L</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mi>T</mml:mi></mml:mfrac><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>T</mml:mi></mml:munderover><mml:mfrac><mml:mrow><mml:msub><mml:mi>&#x03A6;</mml:mi><mml:mrow><mml:mi>max</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03A6;</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mi>&#x03A6;</mml:mi><mml:mrow><mml:mi>max</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p><italic>ETL</italic> measures the fraction of time that the system operates below its optimal level. This is a key criterion for evaluating the effectiveness of intervention strategies <italic>u<sub>i</sub></italic>(<italic>t</italic>): the lower the <italic>ETL</italic>, the better the system performs under real-world uncertainty.</p>
<p>The combination of indicators &#x3a6;(<italic>t</italic>), <italic>R</italic><sub>net</sub>(<italic>t</italic>), <italic>RI</italic> and <italic>ETL</italic> forms a supersystem monitoring level that allows assessing the operational state of the port network in real time, the impact of external disturbances on overall efficiency, the effectiveness of stabilization measures, and the comparative sustainability of alternative operating scenarios.</p>
<p>Thus, these metrics are the basis for the subsequent optimization block - the intervention management problem, which determines how to minimize risks and productivity losses with limited resources. In other words, a risk-based management planning problem, where local dynamics <italic>r<sub>i</sub></italic>(<italic>t</italic>), <italic>x<sub>i</sub></italic>(<italic>t</italic>) and barrier degradation <italic>EB<sub>i</sub></italic>(<italic>t</italic>) are integrated into a strategic optimization model and the goal is to determine how, when and to which nodes it is advisable to direct interventions <italic>u<sub>i</sub></italic>(<italic>t</italic>) to minimize the total loss of efficiency with limited resources.</p>
</sec>
<sec id="sec004-3">
<title>Risk&#x2013;Reliability Coupling</title>
<p>We explicitly distinguish reliability and risk. The network reliability aggregates node-level failure probabilities <italic>p<sub>i</sub></italic>(<italic>t</italic>). Under conditional independence:</p>
<disp-formula id="DM15"><label>(15)</label><mml:math id="IDM15" display="block"><mml:mrow><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mtext>net</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:munderover><mml:mo>&#x220F;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>N</mml:mi></mml:munderover><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>p</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>When dependencies are non-negligible, we include pairwise correlation terms:</p>
<disp-formula id="DM16"><label>(16)</label><mml:math id="IDM16" display="block"><mml:mrow><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mtext>net</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>&#x2248;</mml:mo><mml:munderover><mml:mo>&#x220F;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>N</mml:mi></mml:munderover><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>p</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x003C;</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:munder><mml:msub><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>p</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:msub><mml:mi>p</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:math></disp-formula>
<p>where <italic>&#x03C1;<sub>ij</sub></italic> - dependence between nodes <italic>i</italic> and <italic>j</italic>.</p>
<p>Risk is defined as the expected loss weighted by consequence <italic>C</italic>(<italic>t</italic>):</p>
<disp-formula id="DM17"><label>(17)</label><mml:math id="IDM17" display="block"><mml:mrow><mml:mtext>Risk</mml:mtext><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mo>[</mml:mo> <mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mtext>net</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow> <mml:mo>]</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:mi>C</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:math></disp-formula>
<p>Assumption of conditional independence is justified for decentralized subsystems; otherwise, <italic>&#x03C1;<sub>ij</sub></italic> &#x2260; 0 is calibrated from historical or simulated cascading events. This coupling clarifies the role of <italic>p<sub>i</sub></italic>(<italic>t</italic>) in forming <italic>R</italic><sub>net</sub>(<italic>t</italic>) and its linkage to <italic>RI</italic> via <italic>ETL</italic>.</p>
</sec>
<sec id="sec004-4">
<title>The task of Planning Risk-Based Management</title>
<p>Under conditions of environmental uncertainty (weather changes, queues, equipment failures), the port network must maintain stable performance while limiting the level of risk. Therefore, a multi-criteria optimization problem is formed that takes into account three key objectives:</p>
<list list-type="bullet">
<list-item><p>minimizing bandwidth losses (via <italic>ETL</italic>);</p></list-item>
<list-item><p>minimizing the total risk of nodes <italic>r<sub>i</sub></italic>(<italic>t</italic>);</p></list-item>
<list-item><p>minimizing the cost of intervention <italic>u<sub>i</sub></italic>(<italic>t</italic>).</p></list-item>
</list>
<p>To formulate the objective function, the problem is written mathematically as follows:</p>
<p><inline-formula id="IM1"><mml:math id="IIM1"><mml:mrow><mml:msub><mml:mrow><mml:mi>min</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:msub><mml:mtext>E</mml:mtext><mml:mrow><mml:mo>[</mml:mo> <mml:mrow><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>T</mml:mi></mml:munderover><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>&#x03C7;</mml:mi><mml:mi>E</mml:mi><mml:mi>T</mml:mi><mml:mi>L</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>+</mml:mo><mml:munder><mml:mi>&#x03A3;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>V</mml:mi></mml:mrow></mml:munder><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:msub><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>+</mml:mo><mml:munder><mml:mi>&#x03A3;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>V</mml:mi></mml:mrow></mml:munder><mml:msub><mml:mi>v</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:msub><mml:mrow><mml:mrow><mml:mo>&#x2016;</mml:mo> <mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow> <mml:mo>&#x02016;</mml:mo></mml:mrow></mml:mrow><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow> <mml:mo>]</mml:mo></mml:mrow></mml:mrow></mml:math></inline-formula>, on conditions: dynamic <italic>r<sub>i</sub></italic>(<italic>t</italic>),<italic>x<sub>i</sub></italic>(<italic>t</italic>), <italic>EB<sub>i</sub></italic>(<italic>t</italic>) from port network;</p>
<disp-formula id="DM18"><label>(18)</label><mml:math id="IDM18" display="block"><mml:mtable><mml:mtr><mml:mtd><mml:munder><mml:mi>&#x03A3;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>V</mml:mi></mml:mrow></mml:munder><mml:msub><mml:mi>c</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:msub><mml:mi>u</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>&#x2264;</mml:mo><mml:mi>B</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mi>u</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>&#x2265;</mml:mo><mml:mn>0.</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>where: &#x03F0; - weighting factor of productivity losses; <italic>&#x03BC;<sub>i</sub></italic> - risk weight of a node <italic>i</italic>; <italic>v<sub>i</sub></italic> - cost-effectiveness of the intervention; <italic>B</italic>(<italic>t</italic>) - available resource or budget at the moment <italic>t</italic>; <italic>E</italic> [&#x22C5;] - mathematical expectation under stochastic perturbations.</p>
<p>The logic of the objective function</p>
<list list-type="order">
<list-item><p>The first term (<italic>&#x03F0;ETL</italic>(<italic>t</italic>)) estimates the system performance loss - its minimization ensures that a stable flow of cargo is maintained.</p></list-item>
<list-item><p>The second term (<italic>&#x2211;&#x03BC;<sub>i</sub>r<sub>i</sub></italic>(<italic>t</italic>)) minimizes local risks - it prevents critical values of <italic>r<sub>i</sub></italic>(<italic>t</italic>) from exceeding the nodes.</p></list-item>
<list-item><p>The third term (<italic>&#x2211;v<sub>i</sub>||u<sub>i</sub></italic>(<italic>t</italic>)||1) imposes a penalty for excessive or irrational interventions - it stimulates the optimal use of limited resources.</p></list-item>
</list>
<p>Together, these elements form a compromise multi-criteria task that balances safety, efficiency, and economic feasibility.</p>
</sec>
<sec id="sec004-5">
<title>Implementation Details</title>
<p>The optimization problem was solved using a discrete-time MPC approach with a prediction horizon of 10 steps (24 h). The solver CVXPY (Python) with an interior-point method was used.</p>
<p>Weights were normalized as <italic>w<sub>R</sub></italic> = 0.3, <italic>w<sub>B</sub></italic> = 0.3, <italic>w<sub>T</sub></italic> = 0.3.</p>
<p>Constraints included: <italic>R</italic>(<italic>t</italic>) &#x2264; 0.8, <italic>B</italic>(<italic>t</italic>) &#x2265; 0, <italic>U</italic>(<italic>t</italic>) &#x2264; <italic>U<sub>max</sub></italic> = 1.0.</p>
<p>The algorithm converged within 15 iterations on a 2.9 GHz CPU.</p>
<p>Degradation and transfer parameters were estimated through a hybrid approach combining expert elicitation and analysis of maintenance event logs from a port terminal dataset. Rates <italic>&#x03B1;</italic> and <italic>&#x03B3;</italic> were adjusted within &#x00B1;20% during calibration to achieve convergence with observed operational failure frequencies over a 6-month monitoring period, <xref ref-type="table" rid="T3">Table 3</xref>.</p>
<table-wrap id="T3">
<label>Table 3</label>
<caption><title>Degradation and transfer parameters</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Parameter</th>
<th valign="top" align="center">Symbol</th>
<th valign="top" align="center">Value</th>
<th valign="top" align="left">Method of Estimation</th>
<th valign="top" align="left">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Barrier degradation rate</td>
<td valign="top" align="center"><italic>&#x03B1;</italic></td>
<td valign="top" align="center">0.20</td>
<td valign="top" align="left">Empirical calibration</td>
<td valign="top" align="left">Rate of exponential decay in subsystem reliability</td>
</tr>
<tr>
<td valign="top" align="left">Risk transfer coefficient</td>
<td valign="top" align="center"><italic>&#x03B3;</italic></td>
<td valign="top" align="center">0.15</td>
<td valign="top" align="left">Expert elicitation</td>
<td valign="top" align="left">Coupling intensity between interconnected nodes</td>
</tr>
<tr>
<td valign="top" align="left">Recovery coefficient</td>
<td valign="top" align="center"><italic>&#x03B2;</italic></td>
<td valign="top" align="center">0.10</td>
<td valign="top" align="left">Derived from maintenance data</td>
<td valign="top" align="left">Speed of recovery after mitigation</td>
</tr>
<tr>
<td valign="top" align="left">Disturbance factor</td>
<td valign="top" align="center"><italic>&#x03BC;</italic></td>
<td valign="top" align="center">0.05</td>
<td valign="top" align="left">Monte Carlo initialization</td>
<td valign="top" align="left">External stochastic influence</td>
</tr>
<tr>
<td valign="top" align="left">Budget constraint</td>
<td valign="top" align="center"><italic>B</italic>(<italic>t</italic>)</td>
<td valign="top" align="center">&#x2264;1.0</td>
<td valign="top" align="left">Normalized constant</td>
<td valign="top" align="left">Fraction of available mitigation resources</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="sec004-6">
<title>Resource Constraints and Managed Interventions</title>
<p>Interventions <italic>u<sub>i</sub></italic>(<italic>t</italic>) reflect any actions aimed at reducing risk or strengthening barriers such as an additional tug during mooring, a backup power line, increased monitoring or manual control, or temporary relocation of the vessel to another berth.</p>
<p>The total resource at time <italic>t</italic> is limited by:</p>
<disp-formula id="DM19"><label>(19)</label><mml:math id="IDM19" display="block">
<mml:mrow><mml:munder><mml:mi>&#x03A3;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>V</mml:mi></mml:mrow></mml:munder><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:msub><mml:mi>u</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>&#x2264;</mml:mo><mml:mi>B</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>,</mml:mo></mml:mrow></mml:math></disp-formula>
<p>where <italic>B</italic>(<italic>t</italic>) can be interpreted as the number of tugs, energy reserves or man-hours available in a particular shift.</p>
<p>Link to risk dynamics because interventions directly reduce risk in the dynamic model (eq. 7):</p>
<disp-formula id="DM20"><label>(20)</label><mml:math id="IDM20" display="block"><mml:mrow><mml:msub><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mo>&#x22EF;</mml:mo><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mi>E</mml:mi><mml:msub><mml:mi>B</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:msub><mml:mi>u</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03BE;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo stretchy='false'>)</mml:mo><mml:mo>,</mml:mo></mml:mrow></mml:math></disp-formula>
<p>where <italic>&#x03B7;EB<sub>i</sub></italic>(<italic>t</italic>)<italic>u<sub>i</sub></italic>(<italic>t</italic>) reflects the risk reduction due to active action, adjusted for the current effectiveness of the barrier <italic>EB<sub>i</sub></italic>(<italic>t</italic>), which means that even an effective intervention <italic>u<sub>i</sub></italic>(<italic>t</italic>) will be less effective if the barrier has already degraded (small <italic>EB<sub>i</sub></italic>(<italic>t</italic>)).</p>
<p>The problem belongs to the class of stochastic dynamic optimizations, where we can use approaches such as Model Predictive Control (MPC): optimization on a rolling horizon with state updates every &#x0394;<italic>t</italic> or Cut-and-Column Generation (C&#x0026;CG): two-stage solution with uncertainty scenarios. In addition, Heuristic strategies: intervention priorities &#x221D;<italic>k<sub>i</sub>r<sub>i</sub></italic>(<italic>t</italic>)<italic>c<sub>i</sub></italic>, i.e. the greater the node&#x2019;s contribution to performance and the higher the risk, the higher the priority of the action.</p>
<p>The proposed approach enables a systematic integration of risk management and logistics planning. Interventions are not distributed statically, but in accordance with the current risk dynamics and the state of the network. To implement adaptive control because the model can update decisions after each evaluation cycle <italic>r<sub>i</sub></italic>(<italic>t</italic>) and <italic>x<sub>i</sub></italic>(<italic>t</italic>), which ensures that the DSS responds to real changes in the environment. As well as assess the trade-off between efficiency and cost, the coefficients <italic>&#x03BC;<sub>i</sub></italic>, <italic>v<sub>i</sub></italic>, <italic>&#x03F0;</italic> allow you to adjust priorities - from &#x201C;maximum security&#x201D; to &#x201C;minimum cost&#x201D;.</p>
<p>The optimization module is implemented using a Model Predictive Control (MPC) framework, where the system state <italic>x</italic>(<italic>t</italic>) evolves according to a discrete-time stochastic process. The planning horizon <italic>H</italic> = 10 iterations corresponds to a 24-hour operational window. Constraints include: <inline-formula id="IM2"><mml:math id="IIM2"><mml:mrow><mml:mi>R</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>&#x2264;</mml:mo><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>max</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mtext>&#x2009;&#x2009;&#x2009;&#x2009;</mml:mtext><mml:mi>B</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>&#x2265;</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mtext>&#x2009;&#x2009;&#x2009;</mml:mtext><mml:mi>U</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>&#x2208;</mml:mo><mml:mo stretchy='false'>[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:msub><mml:mi>U</mml:mi><mml:mrow><mml:mi>max</mml:mi></mml:mrow></mml:msub><mml:mo stretchy='false'>]</mml:mo></mml:mrow></mml:math></inline-formula>.</p>
<p>Optimization is solved iteratively using a quadratic programming solver (Python&#x2013;cvxpy, interior-point method) with a convergence tolerance of 10&#x2013;5. Computational complexity grows linearly with the number of monitored subsystems, ensuring scalability for networks up to 50 nodes.</p>
</sec>
</sec>
<sec id="sec005">
<title>Results</title>
<p>The modeling results allowed us to quantify the impact of technical, organizational and climatic factors on the functioning of the port network under conditions of operational uncertainty. The simulation study covers three typical scenarios - Baseline, Adverse metocean and Adverse + Mitigation, which reflect different levels of risk load on port infrastructure and ship operations. The analysis of the dynamics of system performance, reliability and resilience showed that the implementation of controlled interventions can significantly reduce efficiency losses and stabilize the network functioning in real time.</p>
<p>This section summarizes the results of the calculations for the key indicators - relative performance, network reliability, resilience index, and expected capacity losses. For clarity, the system behavior is analyzed using graphical visualizations (Resilience curve, Network reliability, Risk heatmap, and degradation of security barriers) that reflect the evolution of the port network state in time and space. The obtained dependencies are interpreted from the perspective of risk management, intervention planning, and increasing the adaptability of port systems to changing operating conditions.</p>
<p>Simulation parameters:</p>
<list list-type="bullet">
<list-item><p>Horizon: <italic>T</italic> = 24 hrs (step 1 h).</p></list-item>
<list-item><p>Subsystems and barrier degradation: <italic>&#x03BB;</italic><sub>ctrl</sub> = 0.010, <italic>&#x03BB;</italic><sub>eng</sub> = 0.007, <italic>&#x03BB;</italic><sub>nav</sub> = 0.006, <italic>&#x03BB;</italic><sub>com</sub> = 0.004.</p></list-item>
<list-item><p>Scenarios: Baseline, Adverse metocean, Adverse + Mitigation (in mitigation, the <italic>u</italic>(<italic>t</italic>), that strengthens barriers at the highest risk nodes and reduces <italic>r<sub>i</sub></italic>(<italic>t</italic>)).</p></list-item>
<list-item><p>Alignment with TOPSIS: local risks are taken as <italic>r<sub>i</sub></italic>(<italic>t</italic>) = 1&#x2212;<italic>C<sub>i</sub></italic>(<italic>t</italic>), where <italic>C<sub>i</sub></italic>(<italic>t</italic>) &#x2208; [0,1] - proximity coefficient obtained from TOPSIS.</p></list-item>
</list>
<p>The degradation rates and risk-transfer coefficients were estimated using a combination of expert elicitation and validation against port maintenance data collected over a six-month observation period. The parameters <italic>&#x03B1;</italic> and <italic>&#x03B2;</italic> were tuned within &#x00B1;20% during calibration to ensure consistency with the observed failure frequencies and recovery dynamics, allows the model to remain interpretable while preserving empirical relevance without relying on confidential operational data.</p>
<sec id="sec005-1">
<title>Port Network Simulation Algorithm</title>
<p>Stage 1: Initialization of parameters. At the beginning of the simulation, the initial values of key variables are determined. For each node of the port network, full availability <italic>x<sub>i</sub></italic>(0) = 1, initial risk <italic>r<sub>i</sub></italic>(0) = 0.05, and the effectiveness of barrier mechanisms <italic>EB<sub>i</sub></italic>(0) = 1 are set. In parallel, the numerical parameters of the model are set - the weights of self-risk <italic>&#x03B1;</italic><sub><italic>i</italic></sub>, inter-node impact <italic>&#x03B3;<sub>ij</sub></italic>, barrier degradation <italic>&#x03BB;<sub>i</sub></italic>, risk penalties <italic>&#x03BC;<sub>i</sub></italic>, intervention costs <italic>v<sub>i</sub></italic>, and response efficiency <italic>&#x03B7;<sub>i</sub></italic>. The time horizon of the simulation is determined (e.g., 24 hours) and three scenarios are generated: normal (Baseline), adverse (Adverse metocean), and a scenario with compensatory measures (Mitigation).</p>
<p>Step 2. Generation of external disturbances. At each time step, a stochastic vector of external influences <italic>Z<sub>i</sub></italic>(<italic>t</italic>) is generated, taking into account meteorological conditions (wind, wave, visibility), tug loads, and other operational factors. These disturbances affect the risk through the corresponding sensitivity coefficients <italic>b<sub>i</sub></italic>, reflecting the dynamics of disturbances or complications in the system.</p>
<p>Stage 3. Risk assessment using TOPSIS. The integral risk in a node at time step <italic>t</italic> is calculated based on the TOPSIS method, a multi-criteria ranking method. Technical, human, natural and navigational factors are taken into account. For each node, an indicator of proximity to the ideal solution <italic>C<sub>i</sub></italic>(<italic>t</italic>) &#x2208; [0, 1] is determined, after which the risk is calculated as <italic>r<sub>i</sub></italic>(<italic>t</italic>) = 1 - <italic>C<sub>i</sub></italic>(<italic>t</italic>), which allows for adaptive display of the node&#x2019;s state change under conditions of uncertainty.</p>
<p>Stage 4. Updating the dynamics of states. At this stage, two key model equations are applied: for risk evolution and availability. The risk in a node is updated taking into account the impact of its own previous state, the risks of neighboring nodes (cascading effect), external disturbances, barriers, and interventions. The availability is updated based on the balance between the damage from the risk and the effect of the intervention, taking into account the degradation of barriers. The logistic smoothing function <italic>&#x03C3;</italic>(&#x22C5;) is used and projected onto the interval [0, 1].</p>
<p>Step 5. Optimization of interventions. At each time step, the allocation of intervention resources is optimized. The minimization problem includes three components: performance loss (<italic>ETL</italic>), risk penalty, and cost of interventions. The resource constraint of the intervention budget &#x2211;<sub><italic>i</italic></sub><italic>cost<sub>i</sub></italic><italic>u<sub>i</sub></italic>(<italic>t</italic>) &#x2264; <italic>B</italic>(<italic>t</italic>) is taken into account. Priority is given to nodes with high risk and high criticality (throughput), which meets the criterion &#x221D;<italic>k<sub>i</sub>r<sub>i</sub></italic>(<italic>t</italic>)<italic>c<sub>i</sub></italic>.</p>
<p>Step 6. Calculation of network metrics. After updating the states, the system performance indicators Performance &#x3a6;(<italic>t</italic>), Network Reliability <italic>R</italic><sub><italic>net</italic></sub>(<italic>t</italic>), Resilience Index (<italic>RI</italic>) and Expected Throughput Loss (<italic>ETL</italic>) are calculated, which allow to quantitatively compare scenarios and evaluate the effectiveness of interventions.</p>
<p>Step 7. Analysis and visualization. The modeling results are visualized as a series of graphs that show the dynamics of performance, reliability, risk, and barrier degradation over time. Key indicators are summarized in a comparative table. This makes it possible to draw conclusions about the system&#x2019;s sensitivity to external factors and the benefits of risk-informed port network management (<xref ref-type="fig" rid="F4">Figure 4</xref>).</p>
<fig id="F4" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100171.g004</object-id>
<label>Fig 4</label>
<caption><title>Algorithm for simulating port network dynamics</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1409-Figure-4.webp?">Figure 4</ext-link></p>
</fig>
<p><xref ref-type="fig" rid="F5">Figure 5</xref> shows the share of available network performance &#x3a6;(<italic>t</italic>)/&#x3a6;<sub>max</sub> over time for the three scenarios. In Baseline, the curve is almost &#x201C;flat&#x201D; at &#x2248; 0.98; in Adverse, there is a systematic drop to &#x2248; 0.90&#x2013;0.93 during periods of deteriorating conditions; in Mitigation (using targeted interventions <italic>u</italic>(<italic>t</italic>)), the curve rises between these two, stabilizing at &#x2248; 0.94&#x2013;0.96.</p>
<fig id="F5" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100171.g005</object-id>
<label>Fig 5</label>
<caption><title>Resilience curve over 24 h</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1409-Figure-5.webp?">Figure 5</ext-link></p>
</fig>
<p>The difference between Adverse and Mitigation reflects the effect of risk-informed management: the use of <italic>u</italic>(<italic>t</italic>) can return a significant portion of the lost throughput by strengthening barriers in bottlenecks.</p>
<p><xref ref-type="fig" rid="F6">Figure 6</xref> shows the evolution of network reliability <italic>R</italic><sub>net</sub>(<italic>t</italic>) with confidence bands (e.g., 5&#x2013;95th percentile) based on the results of Monte Carlo simulations of random weather/load disturbances. In Baseline, <italic>R</italic><sub>net</sub> remains at &#x2248; 0.98&#x2013;0.99; in Adverse, it decreases to &#x2248; 0.95&#x2013;0.97, and the bands become wider (greater variability); in Mitigation, the median shifts upward (&#x2248; 0.97) and the spread decreases.</p>
<fig id="F6" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100171.g006</object-id>
<label>Fig 6</label>
<caption><title>Network reliability <italic>R<sub>net</sub></italic>(<italic>t</italic>) with Monte Carlo bands</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1409-Figure-6.webp?">Figure 6</ext-link></p>
</fig>
<p>The narrower bands for Mitigation indicate not only an increase in the average reliability level, but also a decrease in uncertainty - the grid becomes more predictable under the intervention.</p>
</sec>
<sec id="sec005-2">
<title>Sensitivity and Robustness Analysis</title>
<p>To evaluate model stability, we performed one-factor sensitivity tests and Monte Carlo simulations. Variations of the key degradation parameter <italic>&#x03B1;</italic> within the range [0.1&#x2013;0.4] produced changes in the Expected Throughput Loss (<italic>ETL</italic>) of approximately &#x00B1;18 %. Adjustments of the transfer coefficient <italic>&#x03B3;</italic> within &#x00B1;20 % resulted in less than 6 % variation in the Resilience Index (<italic>RI</italic>). A Monte Carlo procedure with 500 random draws from uniform parameter distributions confirmed the robustness of the optimization output, with 95 % confidence intervals for <italic>RI</italic> within &#x00B1;0.05 of the mean. These results indicate that the proposed adaptive optimization framework maintains consistent performance under parameter uncertainty and limited data variability (<xref ref-type="table" rid="T4">Table 4</xref>).</p>
<table-wrap id="T4">
<label>Table 4</label>
<caption><title>Sensitivity test summary</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Parameter Varied</th>
<th valign="top" align="center">Range Tested</th>
<th valign="top" align="center">Metric Affected</th>
<th valign="top" align="center">Change (%)</th>
<th valign="top" align="left">Interpretation</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">&#x03B1; (degradation rate)</td>
<td valign="top" align="center">0.1 &#x2013; 0.4</td>
<td valign="top" align="center"><italic>ETL</italic></td>
<td valign="top" align="center">&#x00B1;18</td>
<td valign="top" align="left">Moderate sensitivity</td>
</tr>
<tr>
<td valign="top" align="left">&#x03B3; (risk transfer factor)</td>
<td valign="top" align="center">&#x00B1; 20 %</td>
<td valign="top" align="center"><italic>RI</italic></td>
<td valign="top" align="center">&#x00B1;6</td>
<td valign="top" align="left">Low sensitivity</td>
</tr>
<tr>
<td valign="top" align="left">Budget <italic>B</italic>(<italic>t</italic>)</td>
<td valign="top" align="center">&#x00B1; 15 %</td>
<td valign="top" align="center"><italic>R<sub>net</sub></italic></td>
<td valign="top" align="center">&#x00B1;9</td>
<td valign="top" align="left">Stable behavior</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The heat map in <xref ref-type="fig" rid="F7">Figure 7</xref> (nodes on the vertical, time on the horizontal; shades - risk level <italic>r<sub>i</sub></italic>(<italic>t</italic>)) shows the &#x201C;hot zones&#x201D;. In Adverse, temporary high-risk clusters appear at weather/visibility-sensitive nodes (e.g., approach channel, mooring terminal). In Mitigation, the intensity of the hot spots is significantly reduced, and the risk front is localized (smaller spatial and temporal scope).</p>
<fig id="F7" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100171.g007</object-id>
<label>Fig 7</label>
<caption><title>Heatmap of local risk <italic>r<sub>i</sub></italic>(<italic>t</italic>) by node and time</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1409-Figure-7.webp?">Figure 7</ext-link></p>
</fig>
<p>The heatmap allows for spatial and temporal localization of interventions: first, to stabilize the control and traction of tugs on the approach, then to strengthen navigation/communication barriers during periods of poor visibility.</p>
<p><xref ref-type="fig" rid="F8">Figure 8</xref> shows four exponential curves <italic>EB</italic>(<italic>t</italic>) for the subsystems: Control (the fastest decline, <italic>&#x03BB;</italic> = 0.010), Energy (0.007), Navigation (0.006), and Communication (0.004). At about the 100th hour, Control&#x2019;s efficiency drops to &#x2248;37% of the initial one, while Communication maintains the highest level.</p>
<fig id="F8" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100171.g008</object-id>
<label>Fig 8</label>
<caption><title>Exponential degradation of safety barrier effectiveness <italic>EB</italic>(<italic>t</italic>)</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1409-Figure-8.webp?">Figure 8</ext-link></p>
</fig>
<p>Such a difference in <italic>&#x03BB;</italic> determines the priority of maintenance: short inspection/reinforcement intervals for Control and Energy; longer ones for Communication with regular monitoring.</p>
<p><xref ref-type="table" rid="T5">Table 5</xref> shows a comparison of the integrated performance indicators of the port network under three scenarios: baseline, adverse metocean, and mitigation. The metrics used provide a comprehensive picture of the system&#x2019;s state over the daily observation horizon.</p>
<table-wrap id="T5">
<label>Table 5</label>
<caption><title>Comparative results for maritime network scenarios (24 h horizon)</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Scenario</th>
<th valign="top" align="center">&#x3a6;(<italic>t</italic>)/&#x3a6;<sub>max</sub></th>
<th valign="top" align="center"><italic>R<sub>net</sub></italic></th>
<th valign="top" align="center"><italic>RI</italic></th>
<th valign="top" align="center"><italic>ETL</italic></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Baseline</td>
<td valign="top" align="center">0.98</td>
<td valign="top" align="center">0.985</td>
<td valign="top" align="center">0.975</td>
<td valign="top" align="center">0.020</td>
</tr>
<tr>
<td valign="top" align="left">Adverse metocean</td>
<td valign="top" align="center">0.92</td>
<td valign="top" align="center">0.961</td>
<td valign="top" align="center">0.926</td>
<td valign="top" align="center">0.080</td>
</tr>
<tr>
<td valign="top" align="left">Adverse + Mitigation</td>
<td valign="top" align="center">0.95</td>
<td valign="top" align="center">0.971</td>
<td valign="top" align="center">0.949</td>
<td valign="top" align="center">0.050</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Thus, in the baseline scenario, the network exhibits a stable state (<italic>RI</italic> = 0.975, <italic>ETL</italic> = 0.02), corresponding to nearly full operability. When hydrometeorological conditions deteriorate, performance and reliability decline: the average throughput drops to 0.92, and <italic>RI</italic> decreases to 0.926, indicating a loss of about 8% of efficiency. The introduction of managed interventions - strengthening technical barriers, using backup tugs, flexible slot scheduling - increases <italic>RI</italic> to 0.949 and reduces <italic>ETL</italic> to 0.05. This means that approximately half of the performance loss was compensated.</p>
</sec>
<sec id="sec005-3">
<title>Case Study Example</title>
<p>To demonstrate the model&#x2019;s applicability, a simplified case was implemented using anonymized data from the Odesa port region. Three critical subsystems were modeled (power supply, IT control, and navigation aids).Baseline simulation without adaptive control yielded an average Expected Throughput Loss (<italic>ETL</italic>) of 0.082. Under the proposed adaptive DSS, <italic>ETL</italic> decreased to 0.054, indicating a 34% improvement in operational resilience.</p>
</sec>
<sec id="sec005-4">
<title>Validation and Sensitivity Analysis</title>
<p>The model was tested on anonymized operational data from a port network with three interdependent subsystems. A Monte Carlo experiment with 1000 iterations was performed to estimate variability of <italic>RI</italic> and <italic>ETL</italic>. The resulting 95% confidence intervals were: <italic>RI</italic> = 0.93 &#x00B1; 0.04, <italic>ETL</italic> = 0.056 &#x00B1; 0.008. The sensitivity analysis showed that varying the degradation parameter <italic>&#x03B1;</italic> from 0.1 to 0.3 resulted in &#x00B1;12% change in <italic>RI</italic>.</p>
</sec>
<sec id="sec005-5">
<title>Ablation Study</title>
<p>To quantify the marginal contribution of each module, we evaluate three ablations: (i) no degradation model, (ii) no cascading, (iii) no MPC. The impact is reported as the change in resilience index (&#x0394;<italic>RI</italic>) relative to the full model. The results, summarized in <xref ref-type="table" rid="T6">Table 6</xref>, indicate the relative drop in resilience index (&#x0394;<italic>RI</italic>, in percentage points) compared to the full implementation.</p>
<table-wrap id="T6">
<label>Table 6</label>
<caption><title>Impact of individual modules based on ablation scenarios</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Configuration</th>
<th valign="top" align="center"><bold>&#x0394;</bold><italic>RI</italic> (pp)</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">No degradation model</td>
<td valign="top" align="center">&#x2212;7.5</td>
</tr>
<tr>
<td valign="top" align="left">No cascading</td>
<td valign="top" align="center">&#x2212;4.8</td>
</tr>
<tr>
<td valign="top" align="left">No MPC</td>
<td valign="top" align="center">&#x2212;9.2</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>Negative values indicate a reduction in resilience versus the full integrated framework.</p></fn>
</table-wrap-foot>
</table-wrap>
</sec>
</sec>
<sec id="sec006" sec-type="discussion">
<title>Discussion</title>
<p>The results obtained confirm that the application of a dynamic risk-based approach can increase the sustainability and reliability of the port network even in the face of external disturbances. The proposed model combines analytical rigor and practical adaptability, which makes it possible to formalize the relationships between technical, behavioral, and climatic factors. The modeling process revealed that control and power supply systems remain the most sensitive to degradation, while communication nodes demonstrate the greatest stability but accumulate latent risks under prolonged loads. This is in line with empirical data from maritime practice, where control errors or delays in crew interaction with port services are the main triggers of emergencies.</p>
<p>Comparison with previous studies shows that the developed model outperforms traditional risk assessment methods (FMEA, static risk matrices) by taking into account time degradation and the possibility of dynamic parameter updates. The inclusion of degradation parameters and adaptive interventions makes the model particularly relevant for real-time decision-support systems (DSS) that integrate operational and climatic data streams, bridging the gap between predictive analytics and port logistics. It also provides a quantitative integration of the results of multi-criteria analysis (TOPSIS) with real operational data, which creates the basis for using the model in digital port monitoring systems. The practical result is to prove the effectiveness of management interventions that not only reduce risks but also stabilize network capacity, increasing the overall resilience index by 2&#x2013;3 percentage points.</p>
<p>Thus, the model can be considered as a basic element of a modern maritime transport safety and efficiency management system based on the principles of forecasting, adaptation, and continuous improvement. Its use will contribute to the formation of a new paradigm of port project management - from reactive to proactive, where decisions are made based on risk analytics, resource flexibility, and digital sustainability indicators.</p>
<p>Limitations of the present work include the reliance on expert-driven weighting and the assumption of exponential degradation for barriers, where future research may extend the model to cover multi-port interactions and cyber-physical dependencies within port clusters.</p>
<p>The developed model can be implemented within port Decision Support Systems (DSS) for maintenance scheduling, anomaly prioritization, and predictive failure management. It allows operators to dynamically allocate maintenance crews and energy resources under uncertainty, improving response times and reducing unplanned downtime. The clarified definitions of <italic>ETL</italic> (normalized, dimensionless) and <italic>RI</italic>, together with the explicit risk&#x2013;reliability coupling, improve interpretability and comparability across scenarios. The approach also provides a methodological foundation for digital-twin integration and real-time resilience monitoring.</p>
</sec>
<sec id="sec007" sec-type="conclusions">
<title>Conclusion</title>
<p>This paper presents an integrated mathematical model for port network risk management under conditions of operational uncertainty that combines dynamic risk assessment, degradation of safety barriers, and optimization of interventions within available resources. The model allows to quantify the relationships between technical, behavioral and climatic factors, determining their impact on the performance, reliability and resilience of the port system. The combination of the dynamic approach with the TOPSIS method ensures coherence between expert opinions and digital parameters of the decision support system (DSS). The study provides full computational reproducibility (Appendix A), including CVXPY specifications, parameter files, and fixed random seeds.</p>
<p>The simulation results confirmed that the use of Risk-Informed Planning can increase the network resilience index by 2&#x2013;3 p.p. and reduce the expected performance losses by almost half compared to the scenario without interventions. The proposed approach can be used for adaptive management of port operations, prediction of critical node states, and optimization of maintenance. Thus, the model forms a scientifically sound basis for the creation of intelligent systems for managing the safety and efficiency of seaports in the context of the digital transformation of the industry. Future research should focus on extending the model to multi-port systems and integrating cyber&#x2013;physical risks associated with digital twins and AI-based control frameworks.</p>
</sec>
</body>
<back>
<fn-group>
<fn id="n1" fn-type="other">
<p>Additional material is published online only. To view please visit the journal online.</p>
<p><bold>Cite this as:</bold> Melnyk O, Shcheniavskyi H, Volyanskyy S, Koryakin K and Kucherenko V. Risk-Based Planning of Port Network Sustainability Under Conditions of Operational Uncertainty. Premier Journal of Science 2025;14:100171</p>
<p><bold>DOI:</bold> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.70389/PJS.100171">https://doi.org/10.70389/PJS.100171</ext-link></p>
</fn>
<fn id="n2" fn-type="other">
<p><bold>Ethical approval</bold></p>
<p>This study did not involve human participants or animals, and therefore ethical approval was not required</p>
</fn>
<fn id="n3" fn-type="other">
<p><bold>Consent</bold></p>
<p>N/a</p>
</fn>
<fn id="n4" fn-type="other">
<p><bold>Funding</bold></p>
<p>No industry funding</p>
</fn>
<fn id="n5" fn-type="conflict">
<p><bold>Conflicts of interest</bold></p>
<p>N/a</p>
</fn>
<fn id="n6" fn-type="other">
<p><bold>Author contribution</bold></p>
<p>Oleksiy Melnyk &#x2013; Supervision, Project administration, Methodology, Conceptualization. Hennady Shcheniavskyi &#x2013; Writing &#x2013; review &#x0026; editing, Resources, Methodology, Formal analysis. Sergiy Volyanskyy &#x2013; Writing &#x2013; review &#x0026; editing, Writing &#x2013; original draft, Visualization, Validation. Kostyantin Koryakin &#x2013; Investigation, Formal analysis, Data curation. Volodymyr Kucherenko &#x2013; Writing &#x2013; review &#x0026; editing, Writing &#x2013; original draft, Visualization</p>
</fn>
<fn id="n7" fn-type="other">
<p><bold>Guarantor</bold></p>
<p>Oleksiy Melnyk</p>
</fn>
<fn id="n8" fn-type="other">
<p><bold>Provenance and peer-review</bold></p>
<p>Unsolicited and externally peer-reviewed</p>
</fn>
<fn id="n9" fn-type="other">
<p><bold>Data availability statement</bold></p>
<p>Simulation datasets, parameter files, and scripts are available at the project repository, and from the corresponding author upon reasonable request</p>
</fn>
</fn-group>
<ref-list>
<title>References</title>
<ref id="ref1"><label>1</label><mixed-citation publication-type="journal"><string-name><surname>Kilic</surname> <given-names>KI</given-names></string-name>, <string-name><surname>Maity</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sung</surname> <given-names>I</given-names></string-name>, <string-name><surname>Nielsen</surname> <given-names>P</given-names></string-name>. <article-title>Challenges and AI-driven solutions in maritime search and rescue planning: A comprehensive literature review</article-title>. <source>Mar Policy</source>. <year>2025</year>;<volume>178</volume>:<fpage>106692</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.marpol.2025.106692">https://doi.org/10.1016/j.marpol.2025.106692</ext-link></mixed-citation></ref>
<ref id="ref2"><label>2</label><mixed-citation publication-type="journal"><string-name><surname>Yang</surname> <given-names>L</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Y</given-names></string-name>. <article-title>Enabling autonomous navigation: Adaptive multi-source risk quantification in maritime transportation</article-title>. <source>Reliab Eng Syst Saf</source>. <year>2025</year>;<volume>261</volume>:<fpage>111118</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ress.2025.111118">https://doi.org/10.1016/j.ress.2025.111118</ext-link></mixed-citation></ref>
<ref id="ref3"><label>3</label><mixed-citation publication-type="journal"><string-name><surname>Li</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Yuen</surname> <given-names>KF</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>Y</given-names></string-name>. <article-title>Risk assessment of achieving greenhouse gas emission reduction target in the maritime industry</article-title>. <source>Transp Policy</source>. <year>2024</year>;<volume>155</volume>:<fpage>29</fpage>&#x2013;<lpage>46</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.tranpol.2024.06.001">https://doi.org/10.1016/j.tranpol.2024.06.001</ext-link></mixed-citation></ref>
<ref id="ref4"><label>4</label><mixed-citation publication-type="journal"><string-name><surname>Lin</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Li</surname> <given-names>X</given-names></string-name>, <string-name><surname>Yuen</surname> <given-names>KF</given-names></string-name>. <article-title>Machine learning applications for risk assessment in maritime transport: Current status and future directions</article-title>. <source>Eng Appl Artif Intell</source>. <year>2025</year>;<volume>155</volume>:<fpage>110959</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.engappai.2025.110959">https://doi.org/10.1016/j.engappai.2025.110959</ext-link></mixed-citation></ref>
<ref id="ref5"><label>5</label><mixed-citation publication-type="journal"><string-name><surname>Hausken</surname> <given-names>K</given-names></string-name>, <string-name><surname>Welburn</surname> <given-names>JW</given-names></string-name>, <string-name><surname>Zhuang</surname> <given-names>J</given-names></string-name>. <article-title>A review of game theory and risk and reliability analysis in infrastructures and networks</article-title>. <source>Reliab Eng Syst Saf</source>. <year>2025</year>;<volume>261</volume>:<fpage>111123</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ress.2025.111123">https://doi.org/10.1016/j.ress.2025.111123</ext-link></mixed-citation></ref>
<ref id="ref6"><label>6</label><mixed-citation publication-type="journal"><string-name><surname>Elgharbi</surname> <given-names>SE</given-names></string-name>, <string-name><surname>Iturralde</surname> <given-names>M</given-names></string-name>, <string-name><surname>Dupuis</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Gaugue</surname> <given-names>A</given-names></string-name>. <article-title>Maritime monitoring through LoRaWAN: Resilient decentralised mesh networks for enhanced data transmission</article-title>. <source>Comput Commun</source>. <year>2025</year>;<volume>241</volume>:<fpage>108276</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.comcom.2025.108276">https://doi.org/10.1016/j.comcom.2025.108276</ext-link></mixed-citation></ref>
<ref id="ref7"><label>7</label><mixed-citation publication-type="journal"><string-name><surname>He</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>W</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>T</given-names></string-name>, <string-name><surname>Tian</surname> <given-names>Q</given-names></string-name>. <article-title>Robust coordinated path planning for unmanned aerial vehicles and unmanned surface vehicles in maritime monitoring with travel time uncertainty</article-title>. <source>Transp Res Part B Methodol</source>. <year>2025</year>;<volume>199</volume>:<fpage>103284</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.trb.2025.103284">https://doi.org/10.1016/j.trb.2025.103284</ext-link></mixed-citation></ref>
<ref id="ref8"><label>8</label><mixed-citation publication-type="journal"><string-name><surname>Deng</surname> <given-names>W</given-names></string-name>, <string-name><surname>Ma</surname> <given-names>X</given-names></string-name>, <string-name><surname>Qiao</surname> <given-names>W</given-names></string-name>. <article-title>A novel methodology to quantify the impact of safety barriers on maritime operational risk based on a probabilistic network</article-title>. <source>Reliab Eng Syst Saf</source>. <year>2024</year>;<volume>243</volume>:<fpage>109884</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ress.2023.109884">https://doi.org/10.1016/j.ress.2023.109884</ext-link></mixed-citation></ref>
<ref id="ref9"><label>9</label><mixed-citation publication-type="journal"><string-name><surname>Waskito</surname> <given-names>DH</given-names></string-name>, <string-name><surname>Kurt</surname> <given-names>RE</given-names></string-name>, <string-name><surname>Gusti</surname> <given-names>AP</given-names></string-name>, <string-name><surname>Bowo</surname> <given-names>LP</given-names></string-name>. <article-title>Assessing the risk of transporting battery electric vehicles through water transportation modes by integrating system theory and Bayesian Network approach</article-title>. <source>Ocean Eng</source>. <year>2025</year>;<volume>341</volume>:<fpage>122606</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.oceaneng.2025.122606">https://doi.org/10.1016/j.oceaneng.2025.122606</ext-link></mixed-citation></ref>
<ref id="ref10"><label>10</label><mixed-citation publication-type="journal"><string-name><surname>Dong</surname> <given-names>G</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Dai</surname> <given-names>M</given-names></string-name>. <article-title>Evaluating the resilience impacts of emission reduction policies in green liner shipping network along the New Maritime Silk Road</article-title>. <source>Reg Stud Mar Sci</source>. <year>2025</year>;<volume>86</volume>:<fpage>104209</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.rsma.2025.104209">https://doi.org/10.1016/j.rsma.2025.104209</ext-link></mixed-citation></ref>
<ref id="ref11"><label>11</label><mixed-citation publication-type="journal"><string-name><surname>Liu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Deng</surname> <given-names>J</given-names></string-name>, <string-name><surname>Shu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Gan</surname> <given-names>L</given-names></string-name>, <string-name><surname>Song</surname> <given-names>L</given-names></string-name>, <string-name><surname>Li</surname> <given-names>H</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>Z</given-names></string-name>. <article-title>Spatiotemporal prediction of offshore wind fields based on a hybrid deep learning model for maritime navigation</article-title>. <source>Ocean Coast Manag</source>. <year>2025</year>;<volume>269</volume>:<fpage>107841</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ocecoaman.2025.107841">https://doi.org/10.1016/j.ocecoaman.2025.107841</ext-link></mixed-citation></ref>
<ref id="ref12"><label>12</label><mixed-citation publication-type="journal"><string-name><surname>Liu</surname> <given-names>P</given-names></string-name>, <string-name><surname>Dong</surname> <given-names>X</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>P</given-names></string-name>. <article-title>An enhanced fuzzy cognitive map for human risk assessment in maritime transportation: Integrating causal mining and expert elicitation</article-title>. <source>Adv Eng Inform</source>. <year>2025</year>;<volume>68</volume>:<fpage>103624</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.aei.2025.103624">https://doi.org/10.1016/j.aei.2025.103624</ext-link></mixed-citation></ref>
<ref id="ref13"><label>13</label><mixed-citation publication-type="journal"><string-name><surname>Chen</surname> <given-names>P</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>A</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Dong</surname> <given-names>T</given-names></string-name>, <string-name><surname>Zeng</surname> <given-names>X</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>S</given-names></string-name>, <etal>et al.</etal> <article-title>Maritime Near-Miss prediction framework and model interpretation analysis method based on Transformer neural network model with multi-task classification variables</article-title>. <source>Reliab Eng Syst Saf</source>. <year>2025</year>;<volume>257</volume>:<fpage>110845</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ress.2025.110845">https://doi.org/10.1016/j.ress.2025.110845</ext-link></mixed-citation></ref>
<ref id="ref14"><label>14</label><mixed-citation publication-type="journal"><string-name><surname>Ay</surname> <given-names>C</given-names></string-name>. <article-title>Human reliability analysis in inert gas operations with fuzzy CREAM-based Bayesian networks</article-title>. <source>Ocean Eng</source>. <year>2025</year>;<volume>339</volume>:<fpage>122196</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.oceaneng.2025.122196">https://doi.org/10.1016/j.oceaneng.2025.122196</ext-link></mixed-citation></ref>
<ref id="ref15"><label>15</label><mixed-citation publication-type="journal"><string-name><surname>Animah</surname> <given-names>I</given-names></string-name>. <article-title>Application of bayesian network in the maritime industry: Comprehensive literature review</article-title>. <source>Ocean Eng</source>. <year>2024</year>;<volume>302</volume>:<fpage>117610</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.oceaneng.2024.117610">https://doi.org/10.1016/j.oceaneng.2024.117610</ext-link></mixed-citation></ref>
<ref id="ref16"><label>16</label><mixed-citation publication-type="journal"><string-name><surname>Maidana</surname> <given-names>RG</given-names></string-name>, <string-name><surname>Kristensen</surname> <given-names>SD</given-names></string-name>, <string-name><surname>Utne</surname> <given-names>IB</given-names></string-name>, <string-name><surname>S&#x00F8;rensen</surname> <given-names>AJ</given-names></string-name>. <article-title>Risk-based path planning for preventing collisions and groundings of maritime autonomous surface ships</article-title>. <source>Ocean Eng</source>. <year>2023</year>;<volume>290</volume>:<fpage>116417</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.oceaneng.2023.116417">https://doi.org/10.1016/j.oceaneng.2023.116417</ext-link></mixed-citation></ref>
<ref id="ref17"><label>17</label><mixed-citation publication-type="journal"><string-name><surname>Kong</surname> <given-names>D</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Li</surname> <given-names>W</given-names></string-name>, <string-name><surname>He</surname> <given-names>W</given-names></string-name>. <article-title>Development of an improved Bayesian network method for maritime accident safety assessment based on multiscale scenario analysis theory</article-title>. <source>Reliab Eng Syst Saf</source>. <year>2024</year>;<volume>251</volume>:<fpage>110344</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ress.2024.110344">https://doi.org/10.1016/j.ress.2024.110344</ext-link></mixed-citation></ref>
<ref id="ref18"><label>18</label><mixed-citation publication-type="journal"><string-name><surname>Bokau</surname> <given-names>JRK</given-names></string-name>, <string-name><surname>Samad</surname> <given-names>R</given-names></string-name>, <string-name><surname>Park</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>D</given-names></string-name>. <article-title>From managing risk to reality: A case of maritime safety in Makassar Port, Indonesia using FRAM and AIS data analysis</article-title>. <source>Ocean Eng</source>. <year>2025</year>;<volume>339</volume>:<fpage>122012</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.oceaneng.2025.122012">https://doi.org/10.1016/j.oceaneng.2025.122012</ext-link></mixed-citation></ref>
<ref id="ref19"><label>19</label><mixed-citation publication-type="journal"><string-name><surname>Ledesma</surname> <given-names>O</given-names></string-name>, <string-name><surname>Lamo</surname> <given-names>P</given-names></string-name>. <article-title>Hybrid IoT network for real-time monitoring of maritime containers</article-title>. <source>Comput Netw</source>. <year>2025</year>;<volume>271</volume>:<fpage>111627</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.comnet.2025.111627">https://doi.org/10.1016/j.comnet.2025.111627</ext-link></mixed-citation></ref>
<ref id="ref20"><label>20</label><mixed-citation publication-type="journal"><string-name><surname>Xu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Peng</surname> <given-names>P</given-names></string-name>, <string-name><surname>Claramunt</surname> <given-names>C</given-names></string-name>, <string-name><surname>Qian</surname> <given-names>J</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>F</given-names></string-name>. <article-title>Resilience of the global maritime LNG network: From static Bow-tie to dynamic SIR modeling</article-title>. <source>Reliab Eng Syst Saf</source>. <year>2025</year>;<volume>265</volume>:<fpage>111605</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ress.2025.111605">https://doi.org/10.1016/j.ress.2025.111605</ext-link></mixed-citation></ref>
<ref id="ref21"><label>21</label><mixed-citation publication-type="journal"><string-name><surname>Fan</surname> <given-names>H</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>H</given-names></string-name>, <string-name><surname>He</surname> <given-names>X</given-names></string-name>, <string-name><surname>Lyu</surname> <given-names>J</given-names></string-name>. <article-title>Navigating uncertainty: A dynamic Bayesian network-based risk assessment framework for maritime trade routes</article-title>. <source>Reliab Eng Syst Saf</source>. <year>2024</year>;<volume>250</volume>:<fpage>110311</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ress.2024.110311">https://doi.org/10.1016/j.ress.2024.110311</ext-link></mixed-citation></ref>
<ref id="ref22"><label>22</label><mixed-citation publication-type="journal"><string-name><surname>Dong</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Ren</surname> <given-names>H</given-names></string-name>, <string-name><surname>Tao</surname> <given-names>R</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>Y</given-names></string-name>. <article-title>Joint multi-objective optimization of maritime SAR equipment deployment using high-risk area recognition and SA-APSO</article-title>. <source>Comput Ind Eng</source>. <year>2025</year>;<volume>208</volume>:<fpage>111399</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.cie.2025.111399">https://doi.org/10.1016/j.cie.2025.111399</ext-link></mixed-citation></ref>
<ref id="ref23"><label>23</label><mixed-citation publication-type="journal"><string-name><surname>Cooper-Baldock</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Turnock</surname> <given-names>SR</given-names></string-name>, <string-name><surname>Sammut</surname> <given-names>K</given-names></string-name>. <article-title>Wake-informed 3D path planning for Autonomous Underwater Vehicles using A* and neural network approximations</article-title>. <source>Ocean Eng</source>. <year>2025</year>;<volume>332</volume>:<fpage>121353</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.oceaneng.2025.121353">https://doi.org/10.1016/j.oceaneng.2025.121353</ext-link></mixed-citation></ref>
<ref id="ref24"><label>24</label><mixed-citation publication-type="journal"><string-name><surname>Wang</surname> <given-names>W</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>J</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Shao</surname> <given-names>P</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>P</given-names></string-name>. <article-title>Process safety enhancement in maritime operations: A Bayesian network-based risk assessment framework for the RCEP region</article-title>. <source>Process Saf Environ Prot</source>. <year>2025</year>;<volume>194</volume>:<fpage>1235</fpage>&#x2013;<lpage>56</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.psep.2024.12.072">https://doi.org/10.1016/j.psep.2024.12.072</ext-link></mixed-citation></ref>
<ref id="ref25"><label>25</label><mixed-citation publication-type="journal"><string-name><surname>Onyshchenko</surname> <given-names>S</given-names></string-name>, <string-name><surname>Melnyk</surname> <given-names>O</given-names></string-name>. <article-title>Probabilistic assessment method of hydrometeorological conditions and their impact on the efficiency of ship operation</article-title>. <source>J Eng Sci Technol Rev</source>. <year>2021</year>;<volume>14</volume>(<issue>6</issue>):<fpage>132</fpage>&#x2013;<lpage>6</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.25103/jestr.146.15">https://doi.org/10.25103/jestr.146.15</ext-link></mixed-citation></ref>
<ref id="ref26"><label>26</label><mixed-citation publication-type="journal"><string-name><surname>Melnyk</surname> <given-names>O</given-names></string-name>, <string-name><surname>Onyshchenko</surname> <given-names>S</given-names></string-name>, <string-name><surname>Koryakin</surname> <given-names>K</given-names></string-name>. <article-title>Nature and origin of major security concerns and potential threats to the shipping industry</article-title>. <source>Sci J Silesian Univ Technol Ser Transp</source>. <year>2021</year>;<volume>113</volume>:<fpage>145</fpage>&#x2013;<lpage>53</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.20858/SJSUTST.2021.113.11">https://doi.org/10.20858/SJSUTST.2021.113.11</ext-link></mixed-citation></ref>
<ref id="ref27"><label>27</label><mixed-citation publication-type="journal"><string-name><surname>Melnyk</surname> <given-names>O</given-names></string-name>, <string-name><surname>Bychkovsky</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Onishchenko</surname> <given-names>O</given-names></string-name>, <string-name><surname>Onyshchenko</surname> <given-names>S</given-names></string-name>, <string-name><surname>Volianska</surname> <given-names>Y</given-names></string-name>. <article-title>Development the method of shipboard operations risk assessment quality evaluation based on experts review</article-title>. <source>In: Studies in Systems, Decision and Control</source>, vol. <year>481</year>. <publisher-name>Springer</publisher-name>; <year>2023</year>. p. <fpage>695</fpage>&#x2013;<lpage>710</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-031-35088-7_40">https://doi.org/10.1007/978-3-031-35088-7_40</ext-link></mixed-citation></ref>
<ref id="ref28"><label>28</label><mixed-citation publication-type="journal"><string-name><surname>Koskina</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Onyshenko</surname> <given-names>S</given-names></string-name>, <string-name><surname>Drozhzhyn</surname> <given-names>O</given-names></string-name>, <string-name><surname>Melnyk</surname> <given-names>O</given-names></string-name>. <article-title>Efficiency of tramp fleet operating under the contracts of affreightment</article-title>. <source>Sci J Silesian Univ Technol Ser Transp</source>. <year>2023</year>;<volume>120</volume>:<fpage>137</fpage>&#x2013;<lpage>49</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.20858/sjsutst.2023.120.9">https://doi.org/10.20858/sjsutst.2023.120.9</ext-link></mixed-citation></ref>
<ref id="ref29"><label>29</label><mixed-citation publication-type="journal"><string-name><surname>Shumylo</surname> <given-names>O</given-names></string-name>, <string-name><surname>Yarovenko</surname> <given-names>V</given-names></string-name>, <string-name><surname>Malaksiano</surname> <given-names>M</given-names></string-name>, <string-name><surname>Melnyk</surname> <given-names>O</given-names></string-name>. <article-title>Comprehensive assessment of hull geometry influence of a modernized ship on maneuvering performance and propulsion system parameters</article-title>. <source>Pomorstvo</source>. <year>2023</year>;<volume>37</volume>(<issue>2</issue>):<fpage>314</fpage>&#x2013;<lpage>25</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.31217/p.37.2.13">https://doi.org/10.31217/p.37.2.13</ext-link></mixed-citation></ref>
<ref id="ref30"><label>30</label><mixed-citation publication-type="journal"><string-name><surname>Onishchenko</surname> <given-names>O</given-names></string-name>, <string-name><surname>Bukaros</surname> <given-names>A</given-names></string-name>, <string-name><surname>Melnyk</surname> <given-names>O</given-names></string-name>, <string-name><surname>Yarovenko</surname> <given-names>V</given-names></string-name>, <string-name><surname>Voloshyn</surname> <given-names>A</given-names></string-name>, <etal>et al.</etal> <article-title>Ship refrigeration system operating cycle efficiency assessment and identification of ways to reduce energy consumption of maritime transport</article-title>. <source>In: Studies in Systems, Decision and Control</source>, vol. <year>481</year>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>2023</year>. p. <fpage>641</fpage>&#x2013;<lpage>52</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-031-35088-7_36">https://doi.org/10.1007/978-3-031-35088-7_36</ext-link></mixed-citation></ref>
<ref id="ref31"><label>31</label><mixed-citation publication-type="journal"><string-name><surname>Zablotsky</surname> <given-names>YV</given-names></string-name>, <string-name><surname>Sagin</surname> <given-names>SV</given-names></string-name>. <article-title>Enhancing fuel efficiency and environmental specifications of a marine diesel when using fuel additives</article-title>. <source>Indian J Sci Technol</source>. <year>2016</year>;<volume>9</volume>(<issue>46</issue>):<fpage>Article 107516</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.17485/ijst/2016/v9i46/107516">https://doi.org/10.17485/ijst/2016/v9i46/107516</ext-link></mixed-citation></ref>
<ref id="ref32"><label>32</label><mixed-citation publication-type="journal"><string-name><surname>Sagin</surname> <given-names>S</given-names></string-name>, <string-name><surname>Madey</surname> <given-names>V</given-names></string-name>, <string-name><surname>Sagin</surname> <given-names>A</given-names></string-name>, <string-name><surname>Stoliaryk</surname> <given-names>T</given-names></string-name>, <string-name><surname>Fomin</surname> <given-names>O</given-names></string-name>, <etal>et al.</etal> <article-title>Ensuring reliable and safe operation of trunk diesel engines of marine transport vessels</article-title>. <source>J Mar Sci Eng</source>. <year>2022</year>;<volume>10</volume>(<issue>10</issue>):<fpage>Article 1373</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/jmse10101373">https://doi.org/10.3390/jmse10101373</ext-link></mixed-citation></ref>
<ref id="ref33"><label>33</label><mixed-citation publication-type="journal"><string-name><surname>Malaksiano</surname> <given-names>NA</given-names></string-name>. <article-title>Exact inclusions of Gehring classes in Muckenhoupt classes</article-title>. <source>Mathematical Notes</source>, <year>2001</year>;<volume>70</volume>(<issue>5-6</issue>), <fpage>673</fpage>&#x2013;<lpage>681</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1023/a:1012983028054">https://doi.org/10.1023/a:1012983028054</ext-link></mixed-citation></ref>
<ref id="ref34"><label>34</label><mixed-citation publication-type="journal"><string-name><surname>Lapkina</surname> <given-names>IO</given-names></string-name>, <string-name><surname>Malaksiano</surname> <given-names>MO</given-names></string-name>, <string-name><surname>Malaksiano</surname> <given-names>MO</given-names></string-name>. <article-title>Optimization of the structure of sea port equipment fleet under unbalanced load</article-title>. <source>Actual Probl Econ</source>. <year>2016</year>;<volume>183</volume>(<issue>9</issue>):<fpage>364</fpage>&#x2013;<lpage>71</lpage>.</mixed-citation></ref>
<ref id="ref35"><label>35</label><mixed-citation publication-type="journal"><string-name><surname>Chachra</surname> <given-names>A</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ram</surname> <given-names>M</given-names></string-name>. <article-title>A Markovian approach to reliability estimation of series-parallel system with Fermatean fuzzy sets</article-title>. <source>Comput Ind Eng</source>. <year>2024</year>;<volume>190</volume>:<fpage>Article 110081</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.cie.2024.110081">https://doi.org/10.1016/j.cie.2024.110081</ext-link></mixed-citation></ref>
<ref id="ref36"><label>36</label><mixed-citation publication-type="journal"><string-name><surname>Singh</surname> <given-names>KU</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>A</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>T</given-names></string-name>, <string-name><surname>Ram</surname> <given-names>M</given-names></string-name>. <article-title>Image-based decision making for reliable and proper diagnosing in NIFTI format using watermarking</article-title>. <source>Multimed Tools Appl</source>. <year>2022</year>;<volume>81</volume>(<issue>27</issue>):<fpage>39577</fpage>&#x2013;<lpage>603</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s11042-022-12192-9">https://doi.org/10.1007/s11042-022-12192-9</ext-link></mixed-citation></ref>
<ref id="ref37"><label>37</label><mixed-citation publication-type="journal"><string-name><surname>Kumar</surname> <given-names>A</given-names></string-name>, <string-name><surname>Bisht</surname> <given-names>S</given-names></string-name>, <string-name><surname>Goyal</surname> <given-names>N</given-names></string-name>, <string-name><surname>Ram</surname> <given-names>M</given-names></string-name>. <article-title>Fuzzy reliability based on hesitant and dual hesitant fuzzy set evaluation</article-title>. <source>Int J Math Eng Manag Sci</source>. <year>2021</year>;<volume>6</volume>(<issue>1</issue>):<fpage>166</fpage>&#x2013;<lpage>79</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.33889/IJMEMS.2021.6.1.010">https://doi.org/10.33889/IJMEMS.2021.6.1.010</ext-link></mixed-citation></ref>
<ref id="ref38"><label>38</label><mixed-citation publication-type="journal"><string-name><surname>Kormych</surname> <given-names>B</given-names></string-name>, <string-name><surname>Malyarenko</surname> <given-names>T</given-names></string-name>, <string-name><surname>Wittke</surname> <given-names>C</given-names></string-name>. <article-title>Rescaling the legal dimensions of grey zones: Evidence from Ukraine</article-title>. <source>Glob Policy</source>. <year>2023</year>;<volume>14</volume>(<issue>3</issue>):<fpage>516</fpage>&#x2013;<lpage>30</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/1758-5899.13233">https://doi.org/10.1111/1758-5899.13233</ext-link></mixed-citation></ref>
<ref id="ref39"><label>39</label><mixed-citation publication-type="journal"><string-name><surname>Kormych</surname> <given-names>B</given-names></string-name>, <string-name><surname>Averochkina</surname> <given-names>T</given-names></string-name>, <string-name><surname>Demin</surname> <given-names>S</given-names></string-name>, <string-name><surname>Savych</surname> <given-names>O</given-names></string-name>. <article-title>Management in the field of innovative and import-substituting cluster in the modern Asian economy</article-title>. <source>Int J Manag Bus Res</source>. <year>2019</year>;<volume>9</volume>(<issue>4</issue>):<fpage>204</fpage>&#x2013;<lpage>14</lpage>.</mixed-citation></ref>
<ref id="ref40"><label>40</label><mixed-citation publication-type="journal"><string-name><surname>Faizatama</surname> <given-names>AM</given-names></string-name>, <string-name><surname>Firdaus</surname> <given-names>N</given-names></string-name>, <string-name><surname>Adiputra</surname> <given-names>R</given-names></string-name>, <string-name><surname>Prabowo</surname> <given-names>AR</given-names></string-name>, <string-name><surname>Ghanbari-Ghazijahani</surname> <given-names>T</given-names></string-name>, <string-name><surname>Fazeres-Ferradosa</surname> <given-names>T</given-names></string-name>, <etal>et al.</etal> <article-title>Hydrodynamic impact of cold-water pipes and mooring systems on KVLCC2 for floating OTEC platforms</article-title>. <source>Ocean Eng</source>. <year>2025</year>;<volume>341</volume>:<fpage>Article 122491</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.oceaneng.2025.122491">https://doi.org/10.1016/j.oceaneng.2025.122491</ext-link></mixed-citation></ref>
<ref id="ref41"><label>41</label><mixed-citation publication-type="journal"><string-name><surname>Sagin</surname> <given-names>SV</given-names></string-name>, <string-name><surname>Sagin</surname> <given-names>SS</given-names></string-name>, <string-name><surname>Madey</surname> <given-names>V</given-names></string-name>. <article-title>Analysis of methods of managing the environmental safety of the navigation passage of ships of maritime transport</article-title>. <source>Technol Audit Prod Res</source>. <year>2023</year>;<volume>4</volume>(<issue>3</issue>):<fpage>33</fpage>&#x2013;<lpage>42</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.15587/2706-5448.2023.286039">https://doi.org/10.15587/2706-5448.2023.286039</ext-link></mixed-citation></ref>
<ref id="ref42"><label>42</label><mixed-citation publication-type="journal"><string-name><surname>Varbanets</surname> <given-names>R</given-names></string-name>, <string-name><surname>Minchev</surname> <given-names>D</given-names></string-name>, <string-name><surname>Kucherenko</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zalozh</surname> <given-names>V</given-names></string-name>, <string-name><surname>Kyrylash</surname> <given-names>O</given-names></string-name>, <string-name><surname>Tarasenko</surname> <given-names>T</given-names></string-name>. <article-title>Methods of real-time parametric diagnostics for marine diesel engines</article-title>. <source>Pol Marit Res</source>. <year>2024</year>;<volume>31</volume>(<issue>3</issue>):<fpage>71</fpage>&#x2013;<lpage>84</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2478/pomr-2024-0037">https://doi.org/10.2478/pomr-2024-0037</ext-link></mixed-citation></ref>
<ref id="ref43"><label>43</label><mixed-citation publication-type="journal"><string-name><surname>Bilan</surname> <given-names>T</given-names></string-name>, <string-name><surname>Kaplin</surname> <given-names>M</given-names></string-name>, <string-name><surname>Makarov</surname> <given-names>V</given-names></string-name>, <string-name><surname>Perov</surname> <given-names>M</given-names></string-name>, <string-name><surname>Novitskii</surname> <given-names>I</given-names></string-name>, <string-name><surname>Zaporozhets</surname> <given-names>A</given-names></string-name>, <etal>et al.</etal> <article-title>The balance and optimization model of coal supply in the flow representation of domestic production and imports: The Ukrainian case study</article-title>. <source>Energies</source>. <year>2022</year>;<volume>15</volume>(<issue>21</issue>):<fpage>Article 8103</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/en15218103">https://doi.org/10.3390/en15218103</ext-link></mixed-citation></ref>
<ref id="ref44"><label>44</label><mixed-citation publication-type="journal"><string-name><surname>Eremenko</surname> <given-names>V</given-names></string-name>, <string-name><surname>Zaporozhets</surname> <given-names>A</given-names></string-name>, <string-name><surname>Isaenko</surname> <given-names>V</given-names></string-name>, <string-name><surname>Babikova</surname> <given-names>K</given-names></string-name>. <article-title>Application of wavelet transform for determining diagnostic signs</article-title>. <source>CEUR Workshop Proc</source>. <year>2019</year>;<volume>2387</volume>:<fpage>202</fpage>&#x2013;<lpage>14</lpage>.</mixed-citation></ref>
<ref id="ref45"><label>45</label><mixed-citation publication-type="journal"><string-name><surname>Melnyk</surname> <given-names>O</given-names></string-name>, <string-name><surname>Kuznichenko</surname> <given-names>S</given-names></string-name>, <string-name><surname>Onishchenko</surname> <given-names>O</given-names></string-name>. <article-title>Impact of AIS manipulation on shipping safety and strategic countermeasures</article-title>. <source>Lex Portus</source>. <year>2024</year>;<volume>10</volume>(<issue>4</issue>):<fpage>31</fpage>&#x2013;<lpage>9</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.62821/lp10403">https://doi.org/10.62821/lp10403</ext-link></mixed-citation></ref>
<ref id="ref46"><label>46</label><mixed-citation publication-type="journal"><string-name><surname>Melnyk</surname> <given-names>OM</given-names></string-name>, <string-name><surname>Onishchenko</surname> <given-names>OA</given-names></string-name>, <string-name><surname>Shibaev</surname> <given-names>OG</given-names></string-name>, <string-name><surname>Kuznichenko</surname> <given-names>SO</given-names></string-name>, <string-name><surname>Bulgakov</surname> <given-names>MP</given-names></string-name>, <string-name><surname>Shcherbina</surname> <given-names>OV</given-names></string-name>, <etal>et al.</etal> <article-title>Development of strategies for reducing nitrous oxide emissions from marine diesel engines</article-title>. <source>J Chem Technol</source>. <year>2024</year>;<volume>32</volume>(<issue>2</issue>):<fpage>465</fpage>&#x2013;<lpage>79</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.15421/jchemtech.v32i2.297410">https://doi.org/10.15421/jchemtech.v32i2.297410</ext-link></mixed-citation></ref>
</ref-list>
<sec id="sec008">
<title>Glossary of Symbols</title>
<table-wrap id="GT1">
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Symbol</th>
<th valign="top" align="left">Definition</th>
<th valign="top" align="center">Units / Range</th>
<th valign="top" align="left">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">&#x03A6;(<italic>t</italic>)</td>
<td valign="top" align="left">System performance function</td>
<td valign="top" align="center">[0&#x2013;1]</td>
<td valign="top" align="left">Normalized operational state of the port network at time <italic>t</italic>.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>R</italic>(<italic>t</italic>)</td>
<td valign="top" align="left">Instantaneous risk level</td>
<td valign="top" align="center">[0&#x2013;1]</td>
<td valign="top" align="left">Probability-weighted measure of operational vulnerability.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>R<sub>net</sub></italic>(<italic>t</italic>)</td>
<td valign="top" align="left">Network-level risk</td>
<td valign="top" align="center">[0&#x2013;1]</td>
<td valign="top" align="left">Aggregated risk across all subsystems considering interdependencies.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>RI</italic></td>
<td valign="top" align="left">Resilience Index</td>
<td valign="top" align="center">[0&#x2013;1]</td>
<td valign="top" align="left">Mean normalized availability; the higher the RI, the more resilient the system.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>ETL</italic></td>
<td valign="top" align="left">Expected Throughput Loss</td>
<td valign="top" align="center">hours / normalized</td>
<td valign="top" align="left">Cumulative loss of functionality over time due to disruptions.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>&#x03B1;</italic></td>
<td valign="top" align="left">Degradation rate</td>
<td valign="top" align="center">0.1&#x2013;0.3</td>
<td valign="top" align="left">Parameter describing barrier performance decay rate.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>&#x03B1;</italic></td>
<td valign="top" align="left">Recovery rate</td>
<td valign="top" align="center">0.05&#x2013;0.25</td>
<td valign="top" align="left">Rate of performance restoration during mitigation.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>&#x03B3;</italic></td>
<td valign="top" align="left">Risk transfer coefficient</td>
<td valign="top" align="center">0&#x2013;1</td>
<td valign="top" align="left">Coupling intensity between connected nodes (risk propagation).</td>
</tr>
<tr>
<td valign="top" align="left"><italic>w<sub>i</sub></italic></td>
<td valign="top" align="left">Weighting factor</td>
<td valign="top" align="center">&#x03A3;w_i = 1</td>
<td valign="top" align="left">Relative importance of each subsystem or criterion.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>B</italic>(<italic>t</italic>)</td>
<td valign="top" align="left">Budget / resource constraint</td>
<td valign="top" align="center">[0&#x2013;1]</td>
<td valign="top" align="left">Available fraction of total mitigation resources at time <italic>t</italic>.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>U</italic>(<italic>t</italic>)</td>
<td valign="top" align="left">Control input</td>
<td valign="top" align="center">[0&#x2013;1]</td>
<td valign="top" align="left">Decision variable defining mitigation or maintenance action.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>H</italic></td>
<td valign="top" align="left">Prediction horizon</td>
<td valign="top" align="center">steps (e.g., 10)</td>
<td valign="top" align="left">Time window for MPC optimization.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>&#x03BC;</italic></td>
<td valign="top" align="left">Disturbance factor</td>
<td valign="top" align="center">&#x2013;</td>
<td valign="top" align="left">Represents stochastic external effects (e.g., weather, cyber event).</td>
</tr>
<tr>
<td valign="top" align="left"><italic>RTO</italic></td>
<td valign="top" align="left">Recovery Time Objective</td>
<td valign="top" align="center">hours</td>
<td valign="top" align="left">Maximum acceptable downtime for restoration.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>RRR</italic></td>
<td valign="top" align="left">Resilience Recovery Rate</td>
<td valign="top" align="center">[0&#x2013;1]</td>
<td valign="top" align="left">Rate of recovery of system performance after disruption.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>f<sub>i</sub></italic>(<italic>t</italic>)</td>
<td valign="top" align="left">Risk impact function</td>
<td valign="top" align="center">arbitrary</td>
<td valign="top" align="left">Quantifies the impact of risk event <italic>i</italic> over time.</td>
</tr>
<tr>
<td valign="top" align="left"><italic>C<sub>i</sub></italic></td>
<td valign="top" align="left">Cost coefficient</td>
<td valign="top" align="center">monetary units</td>
<td valign="top" align="left">Cost associated with mitigation or maintenance action.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<app-group>
<app id="A1">
<title>Appendix</title>
<sec id="A1-1">
<title>Appendix A. Computational Reproducibility</title>
<sec id="A1-1-1">
<title>Environment and seed</title>
<list list-type="bullet">
<list-item><p>Python 3.11, NumPy 1.26, CVXPY 1.4</p></list-item>
<list-item><p>Random seed: np.random.seed(42)</p></list-item>
</list>
</sec>
<sec id="A1-1-2">
<title>CVXPY sketch (aligns with Eqs. (10)&#x2013;(14))</title>
<p>import cvxpy as cp</p>
<p># decision variables</p>
<p>x = cp.Variable(n) # mitigation decision vector</p>
<p>r = cp.Variable(T) # risk trajectory</p>
<p># parameters (loaded from params.json)</p>
<p>W = cp.Parameter(n, nonneg=True) # weights (from AHP/FMEA)</p>
<p>P = cp.Parameter((T,n), nonneg=True) # posteriors P(H_i|E_t)</p>
<p>C = cp.Parameter(T, nonneg=True) # consequence profile</p>
<p># objective: minimize total risk exposure</p>
<p>obj = cp.Minimize(cp.sum(cp.multiply(r, C)))</p>
<p># constraints (illustrative)</p>
<p>constraints = [</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;r == (1 - cp.prod(1 - P, axis=1)), # risk from posteriors (schematic)</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;cp.sum(x) &#x003C;= C_max, # resource constraint</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;x &#x003E;= 0</p>
<p>]</p>
<p>prob = cp.Problem(obj, constraints)</p>
<p>prob.solve(solver="ECOS")</p>
</sec>
<sec id="A1-1-3">
<title>Pseudo-code (pipeline)</title>
<p>Input: AHP weights w, FMEA RPN, priors p0, evidence stream E_t</p>
<p>For t = 1..T:</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;# Bayesian update</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;p_post(t) = BayesUpdate(p_prior(t-1), E_t)</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;# Network reliability</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;R_net(t) = &#x220F;_i [1 - p_post_i(t)] # or dependent form with &#x03C1;_ij</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;# ETL/RI update</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;ETL + = (1/T) * [1 - R_net(t)]</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;RI = 1 - ETL</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;# DSS optimization</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;x_t = argmin_x &#x2211;_i w_i * RPN_i * p_post_i(t) s.t. constraints</p>
<p>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;update(p_prior(t)) &#x2190; f(x_t) # feedback to next step</p>
<p>Output: RI, decisions {x_t}</p>
</sec>
<sec id="A1-1-4">
<title>Files</title>
<list list-type="bullet">
<list-item><p>/params/weights_ahp.json, /params/rpn_fmea.json, /params/scenario_case1.json</p></list-item>
<list-item><p>/code/main.py, /code/opt_cvxpy.py</p></list-item>
<list-item><p>/data/logs_case1.csv</p></list-item>
</list>
</sec>
</sec>
</app>
</app-group>
</back>
</article>
