Loading [MathJax]/jax/output/SVG/jax.js
Research article

A fair evaluation of the potential of machine learning in maritime transportation

  • † All authors contributed equally and are co-first authors
  • Machine learning (ML) techniques are extensively applied to practical maritime transportation issues. Due to the difficulty and high cost of collecting large volumes of data in the maritime industry, in many maritime studies, ML models are trained with small training datasets. The relative predictive performances of these trained ML models are then compared with each other and with the conventional model using the same test set. The ML model that performs the best out of the ML models and better than the conventional model on the test set is regarded as the most effective in terms of this prediction task. However, in scenarios with small datasets, this common process may lead to an unfair comparison between the ML and the conventional model. Therefore, we propose a novel process to fairly compare multiple ML models and the conventional model. We first select the best ML model in terms of predictive performance for the validation set. Then, we combine the training and the validation sets to retrain the best ML model and compare it with the conventional model on the same test set. Based on historical port state control (PSC) inspection data, we examine both the common process and the novel process in terms of their ability to fairly compare ML models and the conventional model. The results show that the novel process is more effective at fairly comparing the ML models with the conventional model on different test sets. Therefore, the novel process enables a fair assessment of ML models' ability to predict key performance indicators in the context of limited data availability in the maritime industry, such as predicting the ship fuel consumption and port traffic volume, thereby enhancing their reliability for real-world applications.

    Citation: Xi Luo, Ran Yan, Shuaian Wang, Lu Zhen. A fair evaluation of the potential of machine learning in maritime transportation[J]. Electronic Research Archive, 2023, 31(8): 4753-4772. doi: 10.3934/era.2023243

    Related Papers:

    [1] Yijun Chen, Yaning Xie . A kernel-free boundary integral method for reaction-diffusion equations. Electronic Research Archive, 2025, 33(2): 556-581. doi: 10.3934/era.2025026
    [2] Jin Li, Yongling Cheng . Barycentric rational interpolation method for solving time-dependent fractional convection-diffusion equation. Electronic Research Archive, 2023, 31(7): 4034-4056. doi: 10.3934/era.2023205
    [3] Nelson Vieira, M. Manuela Rodrigues, Milton Ferreira . Time-fractional telegraph equation of distributed order in higher dimensions with Hilfer fractional derivatives. Electronic Research Archive, 2022, 30(10): 3595-3631. doi: 10.3934/era.2022184
    [4] Cheng Wang . Convergence analysis of Fourier pseudo-spectral schemes for three-dimensional incompressible Navier-Stokes equations. Electronic Research Archive, 2021, 29(5): 2915-2944. doi: 10.3934/era.2021019
    [5] Weijie Ding, Xiaochen Mao, Lei Qiao, Mingjie Guan, Minqiang Shao . Delay-induced instability and oscillations in a multiplex neural system with Fitzhugh-Nagumo networks. Electronic Research Archive, 2022, 30(3): 1075-1086. doi: 10.3934/era.2022057
    [6] Junseok Kim, Soobin Kwak, Hyun Geun Lee, Youngjin Hwang, Seokjun Ham . A maximum principle of the Fourier spectral method for diffusion equations. Electronic Research Archive, 2023, 31(9): 5396-5405. doi: 10.3934/era.2023273
    [7] Mufit San, Seyma Ramazan . A study for a higher order Riemann-Liouville fractional differential equation with weakly singularity. Electronic Research Archive, 2024, 32(5): 3092-3112. doi: 10.3934/era.2024141
    [8] Peng Gao, Pengyu Chen . Blowup and MLUH stability of time-space fractional reaction-diffusion equations. Electronic Research Archive, 2022, 30(9): 3351-3361. doi: 10.3934/era.2022170
    [9] Jun Liu, Yue Liu, Xiaoge Yu, Xiao Ye . An efficient numerical method based on QSC for multi-term variable-order time fractional mobile-immobile diffusion equation with Neumann boundary condition. Electronic Research Archive, 2025, 33(2): 642-666. doi: 10.3934/era.2025030
    [10] Yining Yang, Yang Liu, Cao Wen, Hong Li, Jinfeng Wang . Efficient time second-order SCQ formula combined with a mixed element method for a nonlinear time fractional wave model. Electronic Research Archive, 2022, 30(2): 440-458. doi: 10.3934/era.2022023
  • Machine learning (ML) techniques are extensively applied to practical maritime transportation issues. Due to the difficulty and high cost of collecting large volumes of data in the maritime industry, in many maritime studies, ML models are trained with small training datasets. The relative predictive performances of these trained ML models are then compared with each other and with the conventional model using the same test set. The ML model that performs the best out of the ML models and better than the conventional model on the test set is regarded as the most effective in terms of this prediction task. However, in scenarios with small datasets, this common process may lead to an unfair comparison between the ML and the conventional model. Therefore, we propose a novel process to fairly compare multiple ML models and the conventional model. We first select the best ML model in terms of predictive performance for the validation set. Then, we combine the training and the validation sets to retrain the best ML model and compare it with the conventional model on the same test set. Based on historical port state control (PSC) inspection data, we examine both the common process and the novel process in terms of their ability to fairly compare ML models and the conventional model. The results show that the novel process is more effective at fairly comparing the ML models with the conventional model on different test sets. Therefore, the novel process enables a fair assessment of ML models' ability to predict key performance indicators in the context of limited data availability in the maritime industry, such as predicting the ship fuel consumption and port traffic volume, thereby enhancing their reliability for real-world applications.



    The continuous development and wide-ranging utilization of the internet benefits several network users from several points of view [1]. In the meantime, security is highly significant with the vast exploitation of the network. Network security has undoubtedly been connected with programs, different information, networks, computers, and more, where the need for defense is to avoid adaptation and unauthorized access [2]. However, the increasing number of systems connected to the internet in e-Commerce, military and finance make them targets of network attacks, contributing to a lot of damage and risks [3]. Providing efficient approaches for identifying and protecting from attacks and maintaining network security is essential. Additionally, various categories of attacks have been frequently needed and processed in numerous ways [4]. Recognizing various types of network attack is the main problem that needs to be solved in network security, particularly those that have not been noticed. Researchers have recently employed different types of machine learning (ML) techniques for classifying network attacks without previous knowledge of their comprehensive features [5].

    Internet of things (IoT) networks have continuously exposed and modified the topology by connecting nodes and exiting the network in real time [6]. The lack of centralized network control tools makes them susceptible to security attacks. IoT devices can have superior features, including limited data storage, connection bandwidth, smaller memory size, and restricted power supply [7]. These limitations considerably affect the efficiency of security protocols for IoT platforms concerning development and effectiveness. Consequently, a competent intrusion detection system (IDS) for IoT networks will probably emerge due to the lack of the computational power needed [8]. Cyberattacks are highly difficult to recognize, as hackers utilize cutting-edge methods to take sensitive data while avoiding identification by IDS. The interaction between internetworks has also been subject to cyber-security vulnerabilities. Consequently, a novel technique can be essential for attack prevention activities and earlier intrusion detection [9].

    Machine learning and deep learning (DL) approaches are currently used for intrusion detection, network abnormality detection, and avoidance. The DL technique should be utilized to increase the accuracy and proficiency of IDS in IoT devices [10]. Since hyperparameter tuning of the DL model remains a challenging process, metaheuristic algorithms can be used, which in turn improves the overall detection performance. Some of the recently developed metaheuristics are Liver cancer algorithm (LCA) [11], slime mould algorithm (SMA) [12,13], moth search algorithm (MSA) [14], hunger games search (HGS) [15], Runge Kutta method (RUN) [16], colony predation algorithm (CPA) [17], weighted mean of vectors (INFO) [18], Harris Hawks optimization (HHO) [19], Rime optimization algorithm (RIME) [20,21], etc.

    This article presents a weighted Salp swarm algorithm with a DL-powered cyber threat detection and classification (WSSADL-CTDC) technique for robust network security, utilizing a min-max normalization approach to scale data into even formats. In addition, it applies a shuffled frog leap algorithm (SFLA) to elect an optimum subset of features. The WSSADL-CTDC technique applies a hybrid convolutional autoencoder (CAE) model to identify and classify cyber threats. A WSSA-based hyperparameter tuning process can be employed to enhance the detection performance of the CAE model. The experimental analysis can be examined on a benchmark dataset.

    ● Uses SFLA to choose an optimum feature subset from the network security dataset. This process is crucial to mitigate the input data's dimensionality, enhance the technique's effectualness, and concentrate on the most appropriate features for recognizing cyber threats.

    ● Proposes a novel fusion CAE technique to detect and classify cyber threats within network traffic data. This method incorporates the robustness of convolutional neural networks (CNNs) and autoencoders (AEs), allowing for productive feature extraction and anomaly recognition in network data.

    ● The WSSADL-CTDC model augments the accomplishment of the CAE technique by implementing a WSSA-based hyperparameter tuning procedure.

    The remaining sections of the article are arranged as follows: Section 2 offers the literature review, and Section 3 represents the proposed method. Then, Section 4 elaborates on the evaluation of the results, and Section 5 completes the work.

    In [22], an ensemble DL algorithm was developed that implements the gains of the long short-term memory (LSTM) and AE technique. The LSTM was implemented to create an architecture on a standard time series of data. Khan et al. [23] projected an AE-based identification model using recurrent and convolutional networks. A two-phase sliding window (SW) was employed. Malicious activities in the raw time series were converted to fixed-length series using a first-phase SW. All series were transformed into constant time-dependent sub-series through additional small SW. In classification, fully connected networks employ the removed temporal-spatial features. Bibi et al. [24] developed a well-organized, self-learning, autonomous multi-vector attack intelligence and identification method. An innovative convolutional LSTM2D technique powered by the computational integrated device model (ConvLSTM2D) is developed. Das et al. [25] introduced a novel transient search optimization (TSO) method enabled by the optimum stacked sparse AE (OSSAE) method. This technique followed the TSA-based feature selection method. Furthermore, the Transient search optimization-optimum stacked sparse AE (TSA-OSSAE) method implements the SSAE method. Lastly, the hyperparameters of the SSAE technique were selected using a multi-versus optimizer (MVO) approach.

    In [26], the authors presented a graph pattern based on a technique equivalent to a deep hunter graph neural network (GNN) model. A GNN model was developed mainly with two new networks: feature embedding networks integrated with the indicators of compromise (IOC) data and graph embedding networks that took connections among IOCs. Ndife et al. [27] developed a Bayesian neural networks (BNNs) model called SGtechNet. Spatio-temporal feature engineering and uncertainty evaluation in Bayesian modeling are exploited. In [28], a two-stage IDS was developed. Initially, an adversarial training method was introduced employing the generative adversarial networks (GAN) method. In addition, a DL method was presented for the secondary detector to recognize intrusions. In [29], an IDS depended on DL, and a DL method for IDS was developed, employing the efficient recurrent neural networks (ERNN) method. Additionally, the effectiveness of the system in binary and multi-class classifications, as well as the count of neurons and diverse learning rate, has implications under the efficiency of the developed method. This technique relates the method to recurrent neural networks (RNN) and support vector machine (SVM) models.

    Zhou et al. [30] proposed a model to build a continuous leakage-resilient identity-based encryption (IBE) model with tight security. In [31], a bioinspired motion-sensitive technique is presented, which comprises spatial and temporal perception of motion cues, employing simple visual signal processing. Li et al. [32] presented a model employing the multi-scale radial basis function (MRBF) and Fisher vector (FV) encoding. The high-resolution time-frequency approach gray level co-ocurrence matrix (GLCM) texture descriptors and FV extraction are also utilized. Chen et al. [33] introduced a Lung-Dense attention network (LDANet) method. The residual spatial attention (RSA) method is employed to weigh spatial data, and the weight of every channel is calibrated utilizing the gated channel attention (GCA) technique. A dual attention guidance module (DAGM) technique is constructed for maximization. A lightweight dense block (LDB) technique is also utilized. In [34], a deep neural network (DNN) model is proposed, which excels in a localized and sparse approximation. Savanovi et al. [35] proposed an optimized ML model employing an altered firefly model. In [36], a novel feature selection (FS) model is introduced, which improves the gorilla troops optimizer (GTO) by incorporating the bird swarm modeling (BSA) technique. Jovanovic et al. [37] proposed an improved firefly model to tune the extreme gradient boosting (XGBoost) technique.

    His article introduces an innovative method for robust network security WSSADL-CTDC. The technique aims to detect the presence of cyber threats and accomplish network security using metaheuristics with DL models. Figure 1 demonstrates the entire procedure of this approach.

    Figure 1.  Overall process of the WSSADL-CTDC technique.

    Primarily, the technique WSSADL-CTDC employs a min-max normalization approach to normalize data [38]. In this study, the input data is standardized from the ranges 0 and +1 utilizing the specified Eq (3.1),

    Xn=XiXminXmaxXmin. (3.1)

    Here, Xi is the observed input value, Xmin and Xmax refer to the maximum and minimum values of the descriptive variables, and Xn represents the normalized input values at intervals of [1,+1].

    At this stage, the WSSADL-CTDC technique applies SFLA to elect an optimum feature subclass. SFLA has a new population-based metaheuristic approach [39] that Integrates the social behaviors of the particle swarm optimization (PSO) technique and the benefits of the memetic algorithm [40]. In this approach, a population can be a group of frogs that find optimum food by employing search strategies relevant to the PSO technique. The search process is performed by alternating frogs' intra- and inter-cluster transmission to find food. Intra-cluster transmission is performed within the memeplex for local invention, and inter-cluster transmission is performed among the frogs belonging to the dissimilar memeplexes for global exploration. In classical SFLA, consider that the early population was randomly generated with a P number of frogs. Evaluate fitness values for every individual frog. Subsequently, arrange P in descending sequence of the fitness values. The frogs are then distributed into an M count of memeplexes, and every memeplex has N frogs. Here, the frog distribution can be performed thus: The initial frog moves to the initial memeplex, the next frog moves to the initial memeplex, frog M goes to the Mth memeplex and frog M+1 goes to the initial memeplex, up to the last frog. In every memeplex, Xb and Xw are the best and worst frogs based on fitness. Xg represents the frog with global fitness X. The position of the worst frog has been updated according to the random position or position of the global or local best frog so that the frog can move to the optimum solution. This can be mathematically modeled as the set of Eqs (3.2) and (3.3).

    Xw(new)=Xw+Stp, (3.2)
    Stp=rand(X)×(XbXw)StpmaxStp. (3.3)

    In Eq (3.3), Stp denotes the size of the leaping step of the frog with [1,1]. rand() represents the random integer. If Xw(new) generates the best solution, it replaces Xw. Otherwise, the computations in Eqs (3.2) and (3.3) are reiterated by replacing Xb with Xg. The new random solution can be replaced with Xw if there is no improvement. Thus, each memeplex is shuffled together to exchange data and generate a new population for the following search ranges.

    In this SFLA method, the objectives could be incorporated into a single objective equation, such as a preset weight that recognizes the significance of all the objectives [41]. In this study, an fitness function (FF) is implemented to integrate these FS objectives, as represented in Eq (3.4),

    Fitness(X)=αE(X)+β(1|R||N|). (3.4)

    Here, Fitness(X) denotes the fitness value of X, |R| and |N| which have the number of particular features α, and β describes the weights of the classification error. E(X) signifies the classification error rate employing the preferred features in the X subset, as well as the number of new features in the dataset and the reduction ratio α[0,1] and β=(1α).

    The WSSADL-CTDC technique applies a hybrid CAE model for the detection and classification of cyber threats. AE is a self-directed learning procedure that utilizes a neural network (NN) for representation learning [42]. It has a method for a model to learn how to encrypt input data. AEs have been used to map input data to low‐dimension spaces or representations of reduced areas. To fix this, a bottleneck is presented that implements a method to learn the condensed area of the input data. Figure 2 illustrates the CAE infrastructure.

    Figure 2.  Structure of CAE.

    An AE includes four modules: bottleneck layer (BL), encoder network (EN), reconstruction loss (RL), and decoder network (DN). EN is an NN that encrypts input data in a condensed area. The BL is the latter layer; the output is called encoded input data. N layers in an EN in which the latter layer (i.e., Nth layer) is BL. The arithmetical calculation used to signify the functioning of every layer existing in the EN can be revealed in Eq (3.5),

    Xei+1=fei(WVTeiXei+bei),i=0,1,2,,N, (3.5)

    where Xei denotes the input for the EN layer ith, fei denotes the activation function for the layer ith, bei is the bias for the layer ith, WVei signifies the weight vector for the ith layer, and Xei+1 refers to the output of the layer ith. DN is also known as an NN that consumes the output of the BL as input and attempts to renovate the original data. The number of layers in DN is similar to the number in the EN, in the opposite order. The last layer of the DN offers a loud regeneration of input data. The scientific expression used to signify the functioning of every layer existing in the DN is presented in Eq (3.6),

    Xdi+1=fdi(WTdiXdi+bdj),i=0,1,2,,N, (3.6)

    where Xdi denotes the input for the DN layer ith, X refers to the output of the layer ith, fdi refers to the activation function for the ith layer, bdi represents the bias for the ith layer, and WVdi signifies the weight vector for the layer ith. The dissimilarity between the original data XO and the renovated data XR is termed RL. The AE is trained by employing the backpropagation algorithm to reduce the RL.

    Mean squared error (MSE) and binary cross‐entropy (BCE) losses are dual, highly employed loss functions to calculate RL. These dual loss function formulas have been exposed in Eqs (3.7) and (3.8), while D denotes the number of samples in a dataset used by the AE,

    MSE(X0,XR)=1DDj=1(X0jXRj)2, (3.7)
    BCE(X0,XR)=1DDj=1X0jlogX0j+(1X0j)log(1XRj). (3.8)

    Eventually, the WSSA-based hyperparameter tuning process can be employed. SSA is a recent metaheuristic optimization technique introduced by Mirjalili et al. [43]. SSA must be stimulated by the navigation and swarming behaviors of salps in the oceans for food. The individual salp belongs to the Salpidae family and has a bottle-shaped body. Salps form chains, similar to flocks or swarms, in the deep ocean for foraging and navigation. The leader and followers are two levels of the salp chain. During navigation, the leaders are guided by the swarm (followers) in a multidimensional search range, resulting in the optimum solution (food source) for the optimizer problems. SSA begins with a random solution and later reinvents the search for optimum fitness of salps by exploiting and exploring the search range. The salp moves in the N‐dimension search range and updates the leader location according to the distance between a food source and the salp as Eq (3.9),

    x1i={Fi+r1((ubilbi)r2+lbi),r30,Fi+r1((ubilbi)r2+lbi),r3<0. (3.9)

    X1i - denotes the leader's location in the ith location.

    ubi,lbi - shows the upper and lower bounds of ith location.

    Fi - represents the food source location in ith location.

    r1 parameter - balances the exploration and exploitation in searching space.

    r1,r2,r3 - refer to random numbers (see Eq (3.10)), where L refers to the maximal iteration count, and l denotes the existing iteration,

    r1=2e(4lL)2. (3.10)

    Newton's law of motion updates the follower's location in Eq (3.11),

    xji=12at2+V0t, (3.11)

    v0 represents the initial speed;

    xji denotes the location of the jth follower at the ith dimension;

    t is the iteration;

    xji=12(xji+xj1i). (3.12)

    In SSA, salp forms chains for the foraging process. Salp navigates through the jet propulsion process. Based on the available information from the neighborhood, the leader updates the location with food sources. In a typical SSA approach, the follower salp updates the area according to Newton's law of motion. The model's ability to find solutions for the global search process is compromised due to its lost inertia parameter. Inertia controls the speed and direction of the object. However, such an approach only works well for multimodal and unimodal issues of smaller dimensions. However, this provides poor outcomes for high-dimension difficulties, representing poor convergence. Thus, the location update formula should be modified in all iterations to achieve the optimum solution.

    Here, a WSSA has been introduced according to weighted distance location updating to enhance the efficiency of traditional SSA. This model boosts the variety of the original SSA. The weighted location updating parameter was developed based on the findings of Shi and Eberhart (1998). The author initially established the idea of inertia weight and stated that it provides the best control through exploitation and exploration processes. The position updating approach can be adapted as a weighted sum of optimum positions rather than implementing averages to improve the search capability of a typical SSA. This approach can be obtained by evaluating the weight according to the coefficient vectors C1,C2, and C3. Location updating is modeled as the set of Eqs (3.13) to (3.16),

    w1=C1C2, (3.13)
    r2=C1C3, (3.14)
    x1i={w1Fi+r1((ubilbi)r2+lbi),r30,w2Fi+r1((ubilbi)r2+lbi),r3<0, (3.15)
    xji=12(w1+w2)(w2xji+w1xj1i). (3.16)

    This weighted location-update approach balances searching agents' exploitation and exploration capabilities. Furthermore, it improves the convergence rate and leads to better SSA performance.

    The WSSA algorithm has obtained an FF to achieve increased classification effectiveness. It evaluates a positive integer to denote the higher efficiency of the candidate solutions. The decrease in the classifier error rate can be measured as FF, as shown in Eq (3.17),

    fitness(xi)=Classifier Error Rate=100Number of Misclassified InstancesTotal Number of Instances. (3.17)

    The performance analysis of the WSSADL-CTDC system can be examined using the network-based detection of IoT botnet attacks (N-BaIoT) dataset [44]. It includes 11 classes with 1000 samples for each class, as defined in Table 1. The suggested technique is simulated using the Python 3.6.5 tool on PC i5-8600k, 250GB SSD, GeForce 1050Ti 4GB, 16GB RAM, and 1TB HDD. The parameter settings are provided: learning rate: 0.01, activation: ReLU, epoch count: 50, dropout: 0.5, and batch size: 5.

    Table 1.  N-BaIoT dataset.
    Class No. of Instances
    Mirai udppalain 1000
    Mirai udppalain 1000
    Mirai syn 1000
    Mirai scan 1000
    Mirai ack 1000
    Gafgyt udp 1000
    Gafgyt tcp 1000
    Gafgyt scan 1000
    Gafgyt junk 1000
    Gafgyt combo 1000
    Benign 1000
    Total instances 11000

     | Show Table
    DownLoad: CSV

    Figure 3 shows the confusion matrices acquired by the WSSADL-CTDC system with 80:20 and 70:30 of true positive rate per hour / true negative rate per hour (TRPH/TSPH) under the N-BaIoT dataset. The completed findings show effective recognition with 11 classes.

    Figure 3.  N-BaIoT dataset (a):(b) 80:20 TRPH/TSPH, and (c):(d) 70:30 TRPH/TSPH.

    The results of cyber threat detection of the WSSADL-CTDC technique in the N-BaIoT dataset are shown in Table 2 and Figure 4. The results obtained show that the WSSADL-CTDC system achieves effective findings in each class. According to 80% of TRPH, the WSSADL-CTDC method obtains an average Acc of 98.86%, Prec of 93.76%, Recall of 93.73%, FScore of 93.74%, and Matthews correlation coefficient (MCC) of 93.12%. In addition, on 20% of TSPH, the WSSADL-CTDC algorithm gains an average Acc of 99.13%, Prec of 95.23%, Recall of 95.25%, FScore of 95.23%, and MCC of 94.76%, respectively.

    Table 2.  Cyber threat detection outcomes of the WSSADL-CTDC model under the N-BaIoT.
    Classes Acc Prec Recall F-Score MCC
    TRPH (80%)
    Mirai udppalain 98.86 94.78 92.66 93.71 93.09
    Mirai udp 98.85 93.00 94.51 93.75 93.12
    Mirai syn 98.61 92.30 92.53 92.41 91.65
    Mirai scan 98.77 93.04 93.27 93.16 92.48
    Mirai ack 98.86 93.43 94.13 93.78 93.16
    Gafgyt udp 98.85 93.27 94.09 93.68 93.05
    Gafgyt tcp 98.88 93.70 94.05 93.88 93.26
    Gafgyt scan 98.92 94.23 94.12 94.18 93.58
    Gafgyt junk 98.93 92.70 95.92 94.28 93.71
    Gafgyt combo 99.00 95.01 93.81 94.41 93.86
    Benign 98.93 95.88 91.97 93.89 93.33
    Average 98.86 93.76 93.73 93.74 93.12
    TSPH (20%)
    Mirai udppalain 99.23 96.86 94.39 95.61 95.19
    Mirai udp 98.82 92.61 94.47 93.53 92.89
    Mirai syn 99.14 95.88 94.42 95.14 94.67
    Mirai scan 99.41 98.07 95.75 96.90 96.58
    Mirai ack 99.09 94.53 95.48 95.00 94.50
    Gafgyt udp 99.05 94.23 95.61 94.92 94.39
    Gafgyt tcp 99.00 93.85 94.82 94.33 93.78
    Gafgyt scan 99.18 94.62 95.65 95.14 94.69
    Gafgyt junk 99.50 95.94 98.44 97.17 96.91
    Gafgyt combo 98.91 93.40 95.19 94.29 93.69
    Benign 99.14 97.57 93.49 95.49 95.04
    Average 99.13 95.23 95.25 95.23 94.76

     | Show Table
    DownLoad: CSV
    Figure 4.  Average outcome of the WSSADL-CTDC system under N-BaIoT dataset.

    The cyber threat detection analysis of the WSSADL-CTDC technique in the N-BaIoT dataset can be seen in Table 3 and Figure 5. The results obtained show that the WSSADL-CTDC system obtains adequate results in all classes. According to 70% of TRPH, the WSSADL-CTDC algorithm receives an average Acc of 98. 22%, Prec of 90. 22%, Recall of 90. 21%, FScore of 90. 20%, and MCC of 89.23%. Furthermore, based on 30% of TSPH, the WSSADL-CTDC method acquires an average Acc of 98. 07%, Prec of 89. 39%, Recall of 89. 44%, FScore of 89. 39%, and MCC of 88. 34%, respectively.

    Table 3.  Cyber threat detection analysis of WSSADL-CTDC algorithm with N-BaIoT dataset.
    Classes Acc Prec Recall F-Score MCC
    TRPH (70%)
    Mirai udppalain 98.32 88.59 92.91 90.70 89.81
    Mirai udp 97.77 88.27 87.27 87.77 86.54
    Mirai syn 98.48 92.79 90.27 91.52 90.69
    Mirai scan 98.36 91.94 89.53 90.72 89.83
    Mirai ack 98.22 91.01 89.61 90.30 89.33
    Gafgyt udp 98.49 92.10 91.58 91.84 91.01
    Gafgyt tcp 98.48 91.60 92.23 91.91 91.08
    Gafgyt scan 97.68 88.77 85.37 87.04 85.78
    Gafgyt junk 98.14 89.34 89.74 89.54 88.52
    Gafgyt combo 98.38 89.99 92.66 91.30 90.42
    Benign 98.09 87.96 91.15 89.52 88.49
    Average 98.22 90.22 90.21 90.20 89.23
    TSPH (30%)
    Mirai udppalain 98.12 91.43 89.16 90.28 89.25
    Mirai udp 98.21 88.49 91.81 90.12 89.15
    Mirai syn 98.61 92.08 92.69 92.38 91.62
    Mirai scan 98.12 91.12 88.78 89.94 88.91
    Mirai ack 98.18 90.43 88.54 89.47 88.48
    Gafgyt udp 97.94 87.89 88.50 88.19 87.07
    Gafgyt tcp 98.39 87.67 94.27 90.85 90.04
    Gafgyt scan 97.67 89.25 84.12 86.61 85.38
    Gafgyt junk 97.55 88.10 86.16 87.12 85.77
    Gafgyt combo 97.97 86.64 91.10 88.81 87.73
    Benign 98.03 90.20 88.75 89.47 88.38
    Average 98.07 89.39 89.44 89.39 88.34

     | Show Table
    DownLoad: CSV
    Figure 5.  Average outcome of WSSADL-CTDC algorithm with N-BaIoT dataset.

    The Acc curves for training (TR) and validation (VL) are illustrated in Figure 6 for the WSSADL-CTDC methodology with the N-BaIoT dataset providing valuable insight into its performance on various epochs. Specifically, it shows constant improvement at both TR and testing (TS) Acc with improving epochs, demonstrating the model's proficiency in learning and recognizing patterns in both TR and TS data. The upward trend in TS Acc emphasizes the model adaptability to the TR dataset and its ability to generate correct predictions on unnoticed data, underscoring the robust generalization capabilities.

    Figure 6.  Acc curve of WSSADL-CTDC system under N-BaIoT dataset.

    Figure 7 displays a wide-ranging overview of the TR and TS loss values for the WSSADL-CTDC algorithm with the N-BaIoT dataset at different epochs. The TR loss is reliably minimized as the model refines its weights to decrease classification errors in both datasets. The loss curves exemplify the alignment of the model with TR data, highlighting its ability to capture patterns efficiently. Consider the continuous improvement of parameters in the WSSADL-CTDC technique, which aims to diminish the discrepancies between predictions and actual TR labels.

    Figure 7.  Loss curve of WSSADL-CTDC model with N-BaIoT database.

    Regarding the precision-recall (PR) curve in Figure 8, the findings confirm that the WSSADL-CTDC system in the N-BaIoT dataset consistently achieves increased PR values in every class. These findings emphasize the model's better capacity to discriminate among diverse classes, underscoring its efficiency in accurately recognizing class labels.

    Figure 8.  PR curve of WSSADL-CTDC model at N-BaIoT dataset.

    Furthermore, in Figure 9, receiver operating characteristic (ROC) curves produced by the WSSADL-CTDC technique are denoted under the N-BaIoT dataset, representing its proficiency in differentiating between classes. These curves offer valuable insights into how the trade-off between false positive rate (FPR) and true positive rate (TPR) differs through diverse classification epochs and thresholds. The results underscore the accuracy of the model's classification on numerous class labels, emphasizing its efficacy in covering diverse classification challenges.

    Figure 9.  ROC curve of WSSADL-CTDC model with N-BaIoT dataset.

    The detailed comparative statement of the WSSADL-CTDC technique with existing ones under the N-BaIoT dataset is given in Table 4 and Figure 10 [42]. These outcomes infer that the WSSADL-CTDC system performs better than other systems. It is noted that the deep belief network (DBN), LSTM, bat algorithm (BA)-NN, and PSO-NN models perform poorly, whereas the lightweight gradient-based algorithm (LGBA)-NN and multi-factor optimization random error linear model (MFO-RELM) models achieve reasonable results. However, the WSSADL-CTDC technique performs better with a maximum Acc of 99.13%, Prec of 95.23%, Recall of 95.25%, and FScore of 95.23%.

    Table 4.  Comparison analysis of the WSSADL-CTDC model with other algorithms under N-BaIoT dataset.
    Methods Acc Prec Recall F-Score
    DBN Algorithm 89.47 89.48 90.03 89.40
    LSTM Model 89.88 89.63 89.92 89.61
    BA-NN Model 91.20 84.53 88.02 84.68
    PSO-NN Model 90.30 83.94 88.81 84.31
    LGBA-NN Model 96.35 87.34 92.42 89.18
    MFO-RELM 98.91 94.93 93.95 93.94
    WSSADL-CTDC 99.13 95.23 95.25 95.23

     | Show Table
    DownLoad: CSV
    Figure 10.  Comparison analysis of the WSSADL-CTDC model under the N-BaIoT dataset.

    The computation time (CT) analysis of the WSSADL-CTDC methodology can be compared with other systems, as described in Table 5 and Figure 11. The findings show that the WSSADL-CTDC technique obtains a CT decrease of 0.46 s. Alternatively, the DBN, LSTM, BA-NN, PSO-NN, LGBA-NN, and MFO-RELM algorithms gain improved CT expressed in seconds units 4.67, 3.65, 2.64, 2.89, 2.71, and 1.94, respectively. Consequently, the WSSADL-CTDC method has been employed for superior performance over other compared algorithms.

    Table 5.  Computation time analysis of the WSSADL-CTDC model with other systems.
    Methods Computational Time (sec)
    DBN Algorithm 4.67
    LSTM Model 3.65
    BA-NN Model 2.64
    PSO-NN Model 2.89
    LGBA-NN Model 2.71
    MFO-RELM 1.94
    WSSADL-CTDC 0.46

     | Show Table
    DownLoad: CSV
    Figure 11.  Computation time of the WSSADL-CTDC model with other systems.

    These results state that the WSSADL-CTDC technique improves the network security performance.

    This article introduces an innovative WSSADL-CTDC method for robust network security. The WSSADL-CTDC technique aims to detect the presence of cyber threats and accomplish network security using metaheuristics with DL models. To achieve this, the WSSADL-CTDC technique implements a min-max normalization approach to scale the data into a uniform format. In addition, the WSSADL-CTDC technique applies SFLA to elect an optimal subset of features. The WSSADL-CTDC technique applies a hybrid CAE model for cyber threat detection and classification. A WSSA-based hyperparameter tuning method can be employed to enhance the detection performance of the CAE model. The simulation result of the WSSADL-CTDC technique can be evaluated under the benchmark dataset. The extensive analysis of the results found that the WSSADL-CTDC technique performed better than comparable methods on different measures. The WSSADL-CTDC technique may encounter scalability threats with more extensive datasets and benefit from real-time utilization optimizations in dynamic network environments. Future studies may focus on improving scalability and enabling real-time deployment.

    Maha M. Althobaiti: Conceptualization, validation, formal analysis, investigation, resources, software, writing–original draft, writing–review & editing; José Escorcia-Gutierrez: Methodology, validation, formal analysis, investigation, visualization, writing–original draft, writing–review & editing. All authors have read and approved the final version of the manuscript for publication.

    During the revision of this work, the authors used the writefull language check embedded in Overleaf to improve English grammar, proofread and rephrase certain sentences in order to minimize the iThenticate similarity index. Following the use of these tools and services, the authors reviewed and edited the content as necessary, assuming full responsibility for the content of the publication.

    The authors would like to acknowledge the Deanship of Graduate Studies and Scientific Research, Taif University for funding this work.

    The authors declare that they have no conflict of interest. The manuscript was written with the contributions of all authors. All authors have approved the final version of the manuscript.



    [1] M. I. Jordan, T. M. Mitchell, Machine learning: Trends, perspectives, and prospects, Science, 349 (2015), 255–260. https://doi.org/10.1126/science.aaa8415 doi: 10.1126/science.aaa8415
    [2] I. H. Sarker, Machine learning: Algorithms, real-world applications and research directions, SN Comput. Sci., 2 (2021), 1–21. https://doi.org/10.1007/s42979-021-00592-x doi: 10.1007/s42979-021-00592-x
    [3] Y. Zhang, C. Ling, A strategy to apply machine learning to small datasets in materials science, npj Comput. Mater., 4 (2018). https://doi.org/10.1038/s41524-018-0081-z doi: 10.1038/s41524-018-0081-z
    [4] N. Ghadami, M. Gheibi, Z. Kian, M. G. Faramarz, R. Naghedi, M. Eftekhari, et al., Implementation of solar energy in smart cities using an integration of artificial neural network, photovoltaic system and classical Delphi methods, Sustainable Cities Soc., 74 (2021), 103149. https://doi.org/10.1016/j.scs.2021.103149 doi: 10.1016/j.scs.2021.103149
    [5] R. Yan, S. Wang, H. N. Psaraftis, Data analytics for fuel consumption management in maritime transportation: Status and perspectives, Transp. Res. Part E Logist. Transp. Rev., 155 (2021), 102489. https://doi.org/10.1016/j.tre.2021.102489 doi: 10.1016/j.tre.2021.102489
    [6] R. Yan, S. Wang, L. Zhen, G. Laporte, Emerging approaches applied to maritime transport research: Past and future, Commun. Transp. Res., 1 (2021), 100011. https://doi.org/10.1016/j.commtr.2021.100011 doi: 10.1016/j.commtr.2021.100011
    [7] T. Uyanık, Ç. Karatuğ, Y. Arslanoğlu, Machine learning approach to ship fuel consumption: A case of container vessel, Transp. Res. Part D Transp. Environ., 84 (2020), 102389. https://doi.org/10.1016/j.trd.2020.102389 doi: 10.1016/j.trd.2020.102389
    [8] A. Mazaheri, J. Montewka, P. Kujala, Modeling the risk of ship grounding—a literature review from a risk management perspective, WMU J. Marit. Aff., 13 (2014), 269–297. https://doi.org/10.1007/s13437-013-0056-3 doi: 10.1007/s13437-013-0056-3
    [9] B. Wu, X. Yan, T. L. Yip, Y. Wang, A flexible decision-support solution for intervention measures of grounded ships in the Yangtze River, Ocean Eng., 141 (2017), 237–248. https://doi.org/10.1016/j.oceaneng.2017.06.021 doi: 10.1016/j.oceaneng.2017.06.021
    [10] R. Yan, S. Wang, C. Peng, Ship selection in port state control: Status and perspectives, Marit. Policy Manage., 49 (2022), 600–615. https://doi.org/10.1080/03088839.2021.1889067 doi: 10.1080/03088839.2021.1889067
    [11] Z. Yang, Z. Yang, J. Yin, Realising advanced risk-based port state control inspection using data-driven Bayesian networks, Transp. Res. Part A Policy Pract., 110 (2018), 38–56. https://doi.org/10.1016/j.tra.2018.01.033 doi: 10.1016/j.tra.2018.01.033
    [12] Y. Leonov, V. Nikolov, A wavelet and neural network model for the prediction of dry bulk shipping indices, Marit. Econ. Logist., 14 (2012), 319–333. https://doi.org/10.1057/mel.2012.10 doi: 10.1057/mel.2012.10
    [13] Z. Yang, E. E. Mehmed, Artificial neural networks in freight rate forecasting, Marit. Econ. Logist., 21 (2019), 390–414. https://doi.org/10.1057/s41278-019-00121-x doi: 10.1057/s41278-019-00121-x
    [14] Q. Bi, K. E. Goodman, J. Kaminsky, J. Lessler, What is machine learning? A primer for the epidemiologist, Am. J. Epidemiol., 188 (2019), 2222–2239. https://doi.org/10.1093/aje/kwz189 doi: 10.1093/aje/kwz189
    [15] F. A. Faber, A. Lindmaa, O. A. Von Lilienfeld, R. Armiento, Machine learning energies of 2 million elpasolite (ABC2D6) crystals, Phys. Rev. Lett., 117 (2016), 135502. https://doi.org/10.1103/PhysRevLett.117.135502 doi: 10.1103/PhysRevLett.117.135502
    [16] W. Ng, B. Minasny, W. D. S. Mendes, J. A. M. Demattê, The influence of training sample size on the accuracy of deep learning models for the prediction of soil properties with near-infrared spectroscopy data, Soil, 6 (2020), 565–578. https://doi.org/10.5194/soil-6-565-2020 doi: 10.5194/soil-6-565-2020
    [17] C. Baur, S. Albarqouni, N. Navab, Semi-supervised deep learning for fully convolutional networks, in Medical Image Computing and Computer Assisted Intervention−MICCAI 2017, Springer, (2017), 311–319. https://doi.org/10.48550/arXiv.1703.06000
    [18] N. Doulamis, A. Doulamis, Semi-supervised deep learning for object tracking and classification, in 2014 IEEE International Conference on Image Processing (ICIP), (2014), 848–852. https://doi.org/10.1109/ICIP.2014.7025170
    [19] H. Wu, S. Prasad, Semi-supervised deep learning using pseudo labels for hyperspectral image classification, IEEE Trans. Image Process., 27 (2017), 1259–1270. https://doi.org/10.1109/TIP.2017.2772836 doi: 10.1109/TIP.2017.2772836
    [20] J. P. Petersen, O. Winther, D. J. Jacobsen, A machine-learning approach to predict main energy consumption under realistic operational conditions, Ship Technol. Res., 59 (2012), 64–72. https://doi.org/10.1179/str.2012.59.1.007 doi: 10.1179/str.2012.59.1.007
    [21] D. Ronen, The effect of oil price on the optimal speed of ships, J. Oper. Res. Soc., 33 (1982), 1035–1040. https://doi.org/10.1057/jors.1982.215 doi: 10.1057/jors.1982.215
    [22] S. C. Ryder, D. Chappell, Optimal speed and ship size for the liner trades, Marit. Policy Manage., 7 (1980), 55–57. https://doi.org/10.1080/03088838000000053 doi: 10.1080/03088838000000053
    [23] S. Wang, Q. Meng, Sailing speed optimization for container ships in a liner shipping network, Transp. Res. Part E Logist. Transp. Rev., 48 (2012), 701–714. https://doi.org/10.1016/j.tre.2011.12.003 doi: 10.1016/j.tre.2011.12.003
    [24] C. Gkerekos, I. Lazakis, G. Theotokatos, Machine learning models for predicting ship main engine fuel oil consumption: A comparative study, Ocean Eng., 188 (2019), 106282. https://doi.org/10.1016/j.oceaneng.2019.106282 doi: 10.1016/j.oceaneng.2019.106282
    [25] T. Uyanık, Y. Yalman, Ö. Kalenderli, Y. Arslanoğlu, Y. Terriche, C. L. Su, et al., Data-driven approach for estimating power and fuel consumption of ship: A case of container vessel, Mathematics, 10 (2022), 4167. https://doi.org/10.3390/math10224167 doi: 10.3390/math10224167
    [26] X. Li, Y. Du, Y. Chen, S. Nguyen, W. Zhang, A. Schönborn, et al., Data fusion and machine learning for ship fuel efficiency modeling: Part I–Voyage report data and meteorological data, Commun. Transp. Res., 2 (2022), 100074. https://doi.org/10.1016/j.commtr.2022.100074 doi: 10.1016/j.commtr.2022.100074
    [27] Y. Du, Y. Chen, X. Li, A. Schönborn, Z. Sun, Data fusion and machine learning for ship fuel efficiency modeling: Part Ⅱ–Voyage report data, AIS data and meteorological data, Commun. Transp. Res., 2 (2022), 100073. https://doi.org/10.1016/j.commtr.2022.100073 doi: 10.1016/j.commtr.2022.100073
    [28] S. Wang, R. Yan, X. Qu, Development of a non-parametric classifier: Effective identification, algorithm, and applications in port state control for maritime transportation, Transp. Res. Part B Methodol., 128 (2019), 129–157. https://doi.org/10.1016/j.trb.2019.07.017 doi: 10.1016/j.trb.2019.07.017
    [29] R. Yan, S. Wang, K. Fagerholt, A semi-"smart predict then optimize" (semi-SPO) method for efficient ship inspection, Transp. Res. Part B Methodol., 142 (2020), 100–125. https://doi.org/10.1016/j.trb.2020.09.014 doi: 10.1016/j.trb.2020.09.014
    [30] S. Wu, X. Chen, C. Shi, J. Fu, Y. Yan, S. Wang, Ship detention prediction via feature selection scheme and support vector machine (SVM), Marit. Policy Manage., 49 (2022), 140–153. https://doi.org/10.1080/03088839.2021.1875141 doi: 10.1080/03088839.2021.1875141
    [31] WRS, World Shipping Register, 2023. Available from: https://world-ships.com/.
    [32] W. Yi, S. Wu, L. Zhen, G. Chawynski, Bi-level programming subsidy design for promoting sustainable prefabricated product logistics, Cleaner Logist. Supply Chain, 1 (2021), 100005. https://doi.org/10.1016/j.clscn.2021.100005 doi: 10.1016/j.clscn.2021.100005
    [33] W. Yi, L. Zhen, Y. Jin, Stackelberg game analysis of government subsidy on sustainable off-site construction and low-carbon logistics, Cleaner Logist. Supply Chain, 2 (2021), 100013. https://doi.org/10.1016/j.clscn.2021.100013 doi: 10.1016/j.clscn.2021.100013
    [34] X. Bai, L. Cheng, Ç. Iris, Data-driven financial and operational risk management: Empirical evidence from the global tramp shipping industry, Transp. Res. Part E Logist. Transp. Rev., 158 (2022), 102617. https://doi.org/10.1016/j.tre.2022.102617 doi: 10.1016/j.tre.2022.102617
    [35] X. Chen, S. Wu, Y. Liu, W. Wu, S. Wang, A patrol routing problem for maritime crime-fighting, Transp. Res. Part E Logist. Transp. Rev., 168 (2022), 102940. https://doi.org/10.1016/j.tre.2022.102940 doi: 10.1016/j.tre.2022.102940
    [36] Z. Song, W. Tang, R. Zhao, G. Zhang, Implications of government subsidies on shipping companies' shore power usage strategies in port, Transp. Res. Part E Logist. Transp. Rev., 165 (2022), 102840. https://doi.org/10.1016/j.tre.2022.102840 doi: 10.1016/j.tre.2022.102840
    [37] Z. Tan, X. Zeng, S. Shao, J. Chen, H. Wang, Scrubber installation and green fuel for inland river ships with non-identical streamflow, Transp. Res. Part E Logist. Transp. Rev., 161 (2022), 102677. https://doi.org/10.1016/j.tre.2022.102677 doi: 10.1016/j.tre.2022.102677
    [38] Z. Tan, M. Zhang, S. Shao, J. Liang, D. Sheng, Evasion strategy for a coastal cargo ship with unpunctual arrival penalty under sulfur emission regulation, Transp. Res. Part E Logist. Transp. Rev., 164 (2022), 102818. https://doi.org/10.1016/j.tre.2022.102818 doi: 10.1016/j.tre.2022.102818
    [39] L. Zhen, W. Wang, S. Lin, Analytical comparison on two incentive policies for shore power equipped ships in berthing activities, Transp. Res. Part E Logist. Transp. Rev., 161 (2022), 102686. https://doi.org/10.1016/j.tre.2022.102686 doi: 10.1016/j.tre.2022.102686
    [40] P. Cariou, M. Q. Mejia Jr, F. C. Wolff, An econometric analysis of deficiencies noted in port state control inspections, Marit. Policy Manage., 34 (2007), 243–258. https://doi.org/10.1080/03088830701343047 doi: 10.1080/03088830701343047
    [41] P. Cariou, M. Q. Mejia, F. C. Wolff, Evidence on target factors used for port state control inspections, Mar. Policy, 33 (2009), 847–859. https://doi.org/10.1016/j.marpol.2009.03.004 doi: 10.1016/j.marpol.2009.03.004
    [42] Ş. Şanlıer, Analysis of port state control inspection data: The Black Sea Region, Mar. Policy, 112 (2020), 103757. https://doi.org/10.1016/j.marpol.2019.103757 doi: 10.1016/j.marpol.2019.103757
    [43] Tokyo MoU, Black–Grey–White lists, 2017. Available from: https://www.tokyo-mou.org/doc/Flag%20performance%20list%202020.pdf.
    [44] Tokyo MoU, Information sheet of the new inspection regime (NIR), 2014. Available from: https://www.tokyo-mou.org/doc/NIR-information%20sheet-r.pdf.
    [45] Paris MoU, Criteria for responsibility assessment of recognized organizations (RO), 2013. Available from: https://www.parismou.org/criteria-ro-responsibility-assessment.
    [46] C. M. Bishop, Pattern Recognition and Machine Learning (Information Science and Statistics), Springer-Verlag, 2006.
    [47] T. Hastie, R. Tibshirani, J. H. Friedman, The Elements of Statistical Learning: Data Mining, Inference, and Prediction, Springer, New York, 2009.
    [48] M. H. Hassoun, Fundamentals of Artificial Neural Networks, MIT press, Cambridge, 1995.
    [49] K. L. Priddy, P. E. Keller, Artificial Neural Networks: An Introduction, Society of Photo-Optical Instrument Engineers (SPIE), Bellingham, 2005.
    [50] D. P. Kingma, J. Ba, Adam: A method for stochastic optimization, arXiv preprint, (2017), arXiv: 1412.6980. https://doi.org/10.48550/arXiv.1412.6980
    [51] A. Dadashi, M. A. Dulebenets, M. M. Golias, A. Sheikholeslami, A novel continuous berth scheduling model at multiple marine container terminals with tidal considerations, Marit. Bus. Rev., 2 (2017), 142–157. https://doi.org/10.1108/MABR-02-2017-0010 doi: 10.1108/MABR-02-2017-0010
    [52] M. A. Dulebenets, A novel memetic algorithm with a deterministic parameter control for efficient berth scheduling at marine container terminals, Marit. Bus. Rev., 2 (2017), 302–330. https://doi.org/10.1108/MABR-04-2017-0012 doi: 10.1108/MABR-04-2017-0012
    [53] M. Kavoosi, M. A. Dulebenets, O. Abioye, J. Pasha, O. Theophilus, H. Wang, et al., Berth scheduling at marine container terminals: A universal island-based metaheuristic approach, Marit. Bus. Rev., 5 (2019), 30–66. https://doi.org/10.1108/MABR-08-2019-0032 doi: 10.1108/MABR-08-2019-0032
    [54] M. Kavoosi, M. A. Dulebenets, O. F. Abioye, J. Pasha, H. Wang, H. Chi, An augmented self-adaptive parameter control in evolutionary computation: A case study for the berth scheduling problem, Adv. Eng. Inform., 42 (2019), 100972. https://doi.org/10.1016/j.aei.2019.100972 doi: 10.1016/j.aei.2019.100972
    [55] M. A. Dulebenets, An Adaptive Island Evolutionary Algorithm for the berth scheduling problem, Memet. Comput., 12 (2020), 51–72. https://doi.org/10.1007/s12293-019-00292-3 doi: 10.1007/s12293-019-00292-3
    [56] D. Kizilay, D. T. Eliiyi, A comprehensive review of quay crane scheduling, yard operations and integrations thereof in container terminals, Flexible Serv. Manuf. J., 33 (2021), 1–42. https://doi.org/10.1007/s10696-020-09385-5 doi: 10.1007/s10696-020-09385-5
    [57] B. G. Zweers, S. Bhulai, R. D. van der Mei, Planning hinterland container transportation in congested deep-sea terminals, Flexible Serv. Manuf. J., 33 (2021), 583–622. https://doi.org/10.1007/s10696-020-09387-3 doi: 10.1007/s10696-020-09387-3
    [58] S. Tang, S. Xu, J. Gao, M. Ma, P. Liao, Effect of service priority on the integrated continuous berth allocation and quay crane assignment problem after port congestion, J. Mar. Sci. Eng., 10 (2022), 1259. https://doi.org/10.3390/jmse10091259 doi: 10.3390/jmse10091259
    [59] L. Guo, J. Zheng, H. Du, J. Du, Z. Zhu, The berth assignment and allocation problem considering cooperative liner carriers, Transp. Res. Part E Logist. Transp. Rev., 164 (2022), 102793. https://doi.org/10.1016/j.tre.2022.102793 doi: 10.1016/j.tre.2022.102793
    [60] L. Kolley, N. Rückert, M. Kastner, C. Jahn, K. Fischer, Robust berth scheduling using machine learning for vessel arrival time prediction, Flexible Serv. Manuf. J., 35 (2023), 29–69. https://doi.org/10.1007/s10696-022-09462-x doi: 10.1007/s10696-022-09462-x
    [61] J. He, N. Yan, J. Zhang, T. Wang, Battery electric buses charging schedule optimization considering time-of-use electricity price, J. Intell. Connected Veh., 5 (2022), 138–145. https://doi.org/10.1108/JICV-03-2022-0006 doi: 10.1108/JICV-03-2022-0006
    [62] X. Qu, Y. Liu, Y. Chen, Y. Bie, Urban electric bus operation management: Review and outlook, J. Automot. Saf. Energy, 3 (2022), 407–420.
    [63] C. Sun, B. Liu, F. Sun, Review of energy-saving planning and control technology for new energy vehicles, J. Automot. Saf. Energy, 4 (2022), 593–616.
    [64] H. Wang, M. Ouyang, J. Li, F. Yang, Hydrogen fuel cell vehicle technology roadmap and progress in China, J. Automot. Saf. Energy, 2 (2022), 211–224.
    [65] L. Xu, S. Jin, B. Li, J. Wu, Traffic signal coordination control for arterials with dedicated CAV lanes, J. Intell. Connected Veh., 5 (2022), 72–87. https://doi.org/10.1108/JICV-08-2021-0015 doi: 10.1108/JICV-08-2021-0015
  • This article has been cited by:

    1. Yiyi Liu, Xueqing Teng, Xiaoqiang Yan, Hong Zhang, A second-order, unconditionally invariant-set-preserving scheme for the FitzHugh-Nagumo equation, 2025, 189, 08981221, 161, 10.1016/j.camwa.2025.04.013
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1799) PDF downloads(109) Cited by(0)

Figures and Tables

Figures(5)  /  Tables(6)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog