IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v13y2021i16p9137-d614945.html
   My bibliography  Save this article

Machine Learning-Based Models for Accident Prediction at a Korean Container Port

Author

Listed:
  • Jae Hun Kim

    (Department of Transportation & Logistics Engineering, Hanyang University, Ansan 15588, Korea)

  • Juyeon Kim

    (Department of Transportation & Logistics Engineering, Hanyang University, Ansan 15588, Korea)

  • Gunwoo Lee

    (Department of Transportation & Logistics Engineering, Hanyang University, Ansan 15588, Korea)

  • Juneyoung Park

    (Department of Transportation & Logistics Engineering, Hanyang University, Ansan 15588, Korea)

Abstract

The occurrence of accidents at container ports results in damages and economic losses in the terminal operation. Therefore, it is necessary to accurately predict accidents at container ports. Several machine learning models have been applied to predict accidents at a container port under various time intervals, and the optimal model was selected by comparing the results of different models in terms of their accuracy, precision, recall, and F1 score. The results show that a deep neural network model and gradient boosting model with an interval of 6 h exhibits the highest performance in terms of all the performance metrics. The applied methods can be used in the predicting of accidents at container ports in the future.

Suggested Citation

  • Jae Hun Kim & Juyeon Kim & Gunwoo Lee & Juneyoung Park, 2021. "Machine Learning-Based Models for Accident Prediction at a Korean Container Port," Sustainability, MDPI, vol. 13(16), pages 1-14, August.
  • Handle: RePEc:gam:jsusta:v:13:y:2021:i:16:p:9137-:d:614945
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/13/16/9137/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/13/16/9137/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. H. Rosoff & D. Von Winterfeldt, 2007. "A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 533-546, June.
    2. Concho, Ana Lisbeth & Ramirez-Marquez, Jose Emmanuel, 2010. "An evolutionary algorithm for port-of-entry security optimization considering sensor thresholds," Reliability Engineering and System Safety, Elsevier, vol. 95(3), pages 255-266.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Aleksandar Aleksić & Milan Ranđelović & Dragan Ranđelović, 2023. "Using Machine Learning in Predicting the Impact of Meteorological Parameters on Traffic Incidents," Mathematics, MDPI, vol. 11(2), pages 1-30, January.
    2. Filom, Siyavash & Amiri, Amir M. & Razavi, Saiedeh, 2022. "Applications of machine learning methods in port operations – A systematic literature review," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 161(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Stuart Van Weele & Jose Emmanuel Ramirez-Marquez, 2012. "Optimization of inspection for dual contraband using a genetic algorithm," Journal of Risk and Reliability, , vol. 226(5), pages 508-525, October.
    2. Zheng Tang & Yijia Li & Xiaofeng Hu & Huanggang Wu, 2019. "Risk Analysis of Urban Dirty Bomb Attacking Based on Bayesian Network," Sustainability, MDPI, vol. 11(2), pages 1-12, January.
    3. Romero, Pablo & Graneri, Jorge & Viera, Omar & Moscatelli, Sandro & Tansini, Libertad, 2016. "A Multi-Tree Committee to assist port-of-entry inspection decisions," European Journal of Operational Research, Elsevier, vol. 253(1), pages 170-177.
    4. Kinnon, Michael Mac & Razeghi, Ghazal & Samuelsen, Scott, 2021. "The role of fuel cells in port microgrids to support sustainable goods movement," Renewable and Sustainable Energy Reviews, Elsevier, vol. 147(C).
    5. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
    6. Henry H. Willis & Tom LaTourrette, 2008. "Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 325-339, April.
    7. HOSSAIN, Niamat Ullah Ibne & Amrani, Safae El & Jaradat, Raed & Marufuzzaman, Mohammad & Buchanan, Randy & Rinaudo, Christina & Hamilton, Michael, 2020. "Modeling and assessing interdependencies between critical infrastructures using Bayesian network: A case study of inland waterway port and surrounding supply chain network," Reliability Engineering and System Safety, Elsevier, vol. 198(C).
    8. Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
    9. Wang, Jia & Ni, Shunjiang & Shen, Shifei & Li, Shuying, 2019. "Empirical study of crowd dynamic in public gathering places during a terrorist attack event," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 523(C), pages 1-9.
    10. Samrat Chatterjee & Daniel E. Salazar & Isaac Maya, 2014. "A Systems Approach for Evaluating the Effectiveness of Radiological and Nuclear Detection Architectures in Urban Areas," Systems Engineering, John Wiley & Sons, vol. 17(2), pages 157-165, June.
    11. Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
    12. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    13. Niyazi Onur Bakır, 2008. "A Decision Tree Model for Evaluating Countermeasures to Secure Cargo at United States Southwestern Ports of Entry," Decision Analysis, INFORMS, vol. 5(4), pages 230-248, December.
    14. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
    15. Michael Greenberg, 2011. "Risk analysis and port security: some contextual observations and considerations," Annals of Operations Research, Springer, vol. 187(1), pages 121-136, July.
    16. Yan, Xihong & Nie, Xiaofeng, 2016. "Optimal placement of multiple types of detectors under a small vessel attack threat to port security," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 93(C), pages 71-94.
    17. Hossain, Niamat Ullah Ibne & Nur, Farjana & Hosseini, Seyedmohsen & Jaradat, Raed & Marufuzzaman, Mohammad & Puryear, Stephen M., 2019. "A Bayesian network based approach for modeling and assessing resilience: A case study of a full service deep water port," Reliability Engineering and System Safety, Elsevier, vol. 189(C), pages 378-396.
    18. Zhu, Huaxing & Zhang, Chi, 2019. "Expanding a complex networked system for enhancing its reliability evaluated by a new efficient approach," Reliability Engineering and System Safety, Elsevier, vol. 188(C), pages 205-220.
    19. Guozhen Xiong & Chi Zhang & Fei Zhou, 2017. "A robust reliability redundancy allocation problem under abnormal external failures guided by a new importance measure," Journal of Risk and Reliability, , vol. 231(2), pages 180-199, April.
    20. Ana Concho & José Ramirez-Marquez, 2012. "Optimal design of container inspection strategies considering multiple objectives via an evolutionary approach," Annals of Operations Research, Springer, vol. 196(1), pages 167-187, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:13:y:2021:i:16:p:9137-:d:614945. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.