Beruflich Dokumente
Kultur Dokumente
Jian-Bo Yang
Manchester Business School, The University of Manchester, Manchester, M60 1QD, UK
Quan-Gen Fang
Merchant Marine College, Shanghai Maritime University, Shanghai, 200135, PRC
Abstract: After the 9/11 terrorism attacks, the lock-out of the American West Ports in 2002 and the breakout of SARS
disease in 2003 have further focused mind of both the public and industrialists to take effective and timely measures for
assessing and controlling the risks related to container supply chains (CSCs). However, due to the complexity of the risks
in the chains, conventional quantitative risk assessment (QRA) methods may not be capable of providing sufficient safety
management information, as achieving such a functionality requires enabling the possibility of conducting risk analysis in
view of the challenges and uncertainties posed by the unavailability and incompleteness of historical failure data. Combing
the fuzzy set theory (FST) and an evidential reasoning (ER) approach, the paper presents a subjective method to deal with
the vulnerability-based risks, which are more ubiquitous and uncertain than the traditional hazard-based ones in the chains.
Keywords: Container supply chains, risk assessment, evidential reasoning, fuzzy sets, vulnerability.
they may not be well suited for dealing with the CSC set and ER methods.
systems in situations of having a high level of uncer-
tainty. One realistic way to cope with imprecision is 2.1 Complex CSCs
to use linguistic assessments. However, such linguis-
tic descriptions define risk assessment parameters to Modern CSCs are very large and complex. A typi-
a discrete extent so that they can at times be inade- cal door-to-door journey using a shipping container will
quate. Fuzzy set theory is well suited to model such involve the interaction of approximately 25 different
subjective linguistic variables and deal with discrete participants, generate 30-40 documents, use 2-3 differ-
problems[7] . In the theory, such linguistic variables can ent modes and be handled at as many as 12-15 phys-
be characterised by their membership functions to a set ical locations[9] . Compared to other logistics systems,
of categories, which describe the degrees of the linguis- CSCs have two distinctive features. One is that both
tic variables. physical and information flows move in the same direc-
tion, although the information flow should always be
From the viewpoint of risk analysis, a CSC can be
ahead of the physical flow. The other is that another
regarded as a complex engineering system, which is
sub-flow – custody flow is identified under the umbrella
constructed by some subsystems (i.e. ports and con-
of the physical flow in order to attempt critical assess-
tainerships) with the support of many components (i.e.
ment of the risks in the systems as comprehensively as
cranes and engines). In such a hierarchical structure, it
possible.
is usually the case that safety analysis at a higher level
makes use of the information produced at lower levels. Facing the complexity of the chains, the effec-
It is therefore extraordinarily important to synthesise tive risk analysis requires a generic model to describe
the risk evaluations of the components in a rational the functions, features, characteristics and attributes,
way so as to obtain the risk evaluations of the subsys- which are common to all CSCs. The generic model is
tems and the whole system. Actually, the importance therefore not a ‘typical’ container transport chain con-
of such a synthesis means is further enforced by the sidered in isolation but the hub of a chain of systems –
requirements of combining all judgements of multiple with a physical cargo flow system at the centre, follow-
experts on either one component or the whole system. ing an information flow system at the beginning and
deciding a custody flow system at the end. Each of
Unlike the risk evaluations in QRA, which are pre-
these systems interacts dynamically with the others at
cisely expressed by some numerical values (e.g. po-
and across all levels to constitute a comprehensive pic-
tential loss of life), the risk evaluations using fuzzy
ture of the CSC operation process, as shown in Fig.1.
sets are impossibly synthesized by using normal math-
ematic logical operations. An Evidential Reasoning
(ER) approach is well suited to model subjective cred-
ibility induced by partial evidence. The kernel of this
approach is an ER algorithm developed on the basis
of the Dempster-Shafer (D-S) theory, which requires
modelling the narrowing of the hypothesis set with the
requirements of the accumulation of evidence[8] .
The current study aims at developing a subjective
risk assessment method by combining fuzzy set theory
and an ER approach to deal with the uncertainty in
CSCs. In order to achieve this purpose, the paper iden-
tifies the major problems of CSC risk analysis; creates
four parameters to assess threat-based risks; applies a
Fault Tree Analysis (FTA) method to construct a hi-
erarchical structure so as to enable the application of Fig.1 The generic model of CSCs
the ER approach in the realm of supply chains; and
validates its feasibility by a case study of terrorists at-
tacking ports. 2.2 Definition of vulnerability
2 Major problems in the CSC risk anal- Although the vulnerability concept has been in
ysis use for more than twenty years since Timmerman’s
conceptualisation[10], presently, there is still no com-
The proposed subjective approach consists of the mon conceptualization of vulnerability, and the mean-
solutions of three major problems, which outline the ings of vulnerability are still ambiguous and fuzzy[11] .
necessary steps required for risk analysis using fuzzy Many of the discrepancies in the meanings of vulner-
Z. L. Yang et al./A Subjective Risk Analysis Approach of Container Supply Chains 87
ability arise from different epistemological orientations can be considered as a hierarchical diagram, consists
and subsequent methodological practices. In a supply of many ‘OR’ and ‘AND’ gates. Therefore, a specific
chain context, vulnerability can be defined as ‘an expo- rule is required to assign the weights on a rational ba-
sure to serious disturbances, arising from risks within sis and defined as ‘all input events of an ‘OR’ gate are
the supply chain as well as risks external to the supply given the same weight equal to that of the output event
chain[1] ’. However, the current research has indicated of the gate, and the weights of all input events of an
that either internal or external risks would originate ‘AND’ gate are assigned through dividing the weight
from a hazard or threat. Thus, the vulnerability will of the output event of the gate by the number of the
be considered from another viewpoint – its nature and input events.
consequently is defined as ‘an exposure to serious dis-
turbances, arising from a hazard or threat’. Compared 3 Subjective risk assessment of CSCs
with Chapman et al.’s concept, the analysis from vul-
nerability nature will more redound to the risk anal- 3.1 Risk analysis using fuzzy sets
ysis. After all, the first step to achieve any effective
risk analysis is to better understand the true nature of After the study of traditional quantitative safety
those risks. methods like Failure Mode, Effects and Criticality
Further studying the definition of the vulnerabil- Analysis (FMECA), it can be seen that there are
ity of the chains, one will appreciate the distinction three basic parameters – failure likelihood, consequence
between hazards and threats. Differing from the defi- severity and failure consequence probability (i.e. the
nition of a hazard, a threat can be defined as an action probability that possible consequences happen, given
or a potential action rather than a physical situation the occurrence of the failure), which are used in as-
likely to cause damage, harm or loss[12] . Threat-based sessing the safety associated with each failure mode of
risks are potentially greater than hazard-based risks be- a component and in determining safety level through
cause they are sometimes not within the focal compa- “Safety scores”[7]. Given that the consequence severity
nies’ direct control. Furthermore, it may be difficult or of a threat is determined by its own damage capability
even impossible to precisely determine the probability and external recall ability, four new parameters are pro-
distribution of the parameters for a practical/potential posed to carry out threat-based risk estimation. They
action. Therefore, the emphasis of this container sup- are “Will”, “Damage capability”, “Recall difficulty” and
ply chain risk analysis is placed on those threat-based “Damage probability”. The “Will” decides the failure
risks. likelihood of a threat-based risk. The combination of
“Damage capability” and “Recall difficulty” responds
2.3 Application of FTA to the consequence severity of the threat-based risk.
The “Damage probability” represents the failure conse-
FTA is a diagrammatic method used to evaluate the quence probability of the risk.
probability of an accident resulting from sequences and In fuzzy set theory, linguistic variables that are used
combinations of faults and failure events[13] . Because to describe the probability of the four parameters, can
of its many advantages, specially in the combination of be characterised by their fuzzy set membership func-
the qualitative and quantitative analysis to provide de- tions to a set of categories which describe the degrees
cision makers with an objective means of measuring the of “Will”, “Damage capability”, “Recall difficulty” and
risk levels of a targeting system, FTA has been widely “Damage probability” and which are usually graduated
applied to the risk analysis of various industries, in- from low to high. The typical linguistic variables and
cluding logistics chains. The application of FTA to the their membership functions for the four parameters of
current study, however, is worth noting the following: a threat may be defined and characterised as shown in
i) The qualitative FTA diagram is considered as a Tables 1-4. It is obviously possible to have some flexi-
hierarchical structure to apply an ER approach. bility in the definition of membership functions to suit
The hierarchical structure should be a qualitative different situations.
FTA diagram, which means that the fault tree has
been reduced to a logically equivalent form (minimal Table 1 Will
Categories
cut sets) by using the Boolean algebra in terms of the Linguistic variables
1 2 3 4 5 6 7
specific combination of basic events sufficient for the Highly strong 0 0 0 0 0 0.75 1
undesired top event to occur[14] . Strong 0 0 0 0 0.75 1 0.25
ii) The weights of all events are distributed accord- Reasonably strong 0 0 0 0.75 1 0.25 0
Average 0 0 0.5 1 0.5 0 0
ing to a specifically defined rule.
Reasonably weak 0 0.25 1 0.75 0 0 0
The weights of all events in applying the ER method Weak 0.25 1 0.75 0 0 0 0
are determined considering that the fault tree, which Very weak 1 0.75 0 0 0 0 0
88 International Journal of Automation and Computing 1 (2005) 85-92
Table 2 Damage capability Then, those fuzzy operations in Equation (2) can
Categories be analysed and described as follows:
Linguistic variables
1 2 3 4 5 6 7 i) Cartesian product. Two Cartesian product oper-
Extremely big 0 0 0 0 0 0.75 1 ations can be separately defined by:
Big 0 0 0 0 0.75 1 0.25
Moderately big 0 0 0 0.75 1 0.25 0 µR×D = (µij
R×D )7×7
Average 0 0 0.5 1 0.5 0 0
Moderately small 0 0.25 1 0.75 0 0 0 µP ×W = (µij
P ×W )7×7 (4)
Small 0.25 1 0.75 0 0 0 0
Extremely small 1 0.75 0 0 0 0 0 where µij i j ij i j
R×D = min(µR , µD ), µP ×W = min(µP , µW ),
both i and j = 1, 2, · · · , 7.
Table 3 Recall difficulty
ii) Composition. The composition operation can be
Categories
Linguistic variables defined by:
1 2 3 4 5 6 7
Very difficult 0 0 0 0 0 0.75 1
µS = µ(R×D)◦ (P ×W ) = (µjS )1×7 (5)
Difficult 0 0 0 0 0.75 1 0.25
Moderately difficult 0 0 0 0.75 1 0.25 0
Average 0 0 0.5 1 0.5 0 0 where µjS = max(max(min(µ1i ij
R×D , µP ×W )), max(min
ij ij
Moderately easy 0 0.25 1 0.75 0 0 0 (µ2i 7i
R×D , µP ×W )), · · · , max(min(µR×D , µP ×W ))), both i
Easy 0.25 1 0.75 0 0 0 0 and j = 1, 2, · · · , 7.
Very easy 1 0.75 0 0 0 0 0
However, µS obtained only presents a relative safety
level, which can be measured in terms of the defined
Table 4 Damage probability
fuzzy safety expressions (i.e. “Poor”, “Fair”, “Aver-
Categories
Linguistic variables age” and “Good”). In another word, the risk of a threat
1 2 3 4 5 6 7
Definite 0 0 0 0 0 0.75 1 is required to be expressed by degrees to which it be-
Highly likely 0 0 0 0 0.75 1 0.25 longs to the safety expressions. The safety expressions
Reasonably likely 0 0 0 0.75 1 0.25 0 defined on the basis of Tables 1-4 can be shown in Table
Average 0 0 0.5 1 0.5 0 0
5 through satisfying the following conditions:
Reasonably unlikely 0 0.25 1 0.75 0 0 0
Unlikely 0.25 1 0.75 0 0 0 0 i) The expressions are exclusive for each category
Absolutely unlikely 1 0.75 0 0 0 0 0 by normalizing the membership values of the variables.
ii) SPoor = (RVery difficult × DExtremely big )◦
If W, D, R and P represent respectively “Will”, (PDefinite × WExtremely strong ).
“Damage capability”, “Recall difficulty” and “Damage iii) SFair = (RModerately difficult × DModerately big )◦
probability”, the fuzzy safety score S can be defined (PReasonably likely × WModerately strong ).
by using the following fuzzy set manipulation, which is iv) SAverage = (RModerately easy ×DModerately small )◦
developed on the basis of Karowski’s formula[15,7] : (PReasonably unlikely × WModerately weak ).
v) SGood = (RVery easy × DExtremely small )◦
S = (R × D)◦ (P × W ) (1) (PAbsolutely unlikely × WExtremely weak ).
where the symbol “◦” represents composition opera- Table 5 Safety expressions
tion and “×” the Cartesian product operation in the Categories
Linguistic variables
fuzzy set theory. The membership function of S is thus 1 2 3 4 5 6 7
described by: Poor 0 0 0 0 0 0.75 1
Fair 0 0 0 0.5 1 0.25 0
Average 0 0.25 1 0.5 0 0 0
µS = µ(R×D)◦ (P ×W ) . (2)
Good 1 0.75 0 0 0 0 0
The analyses for other distances between Si and 3.2 Synthesis of safety evaluations by hi-
other safety expressions can be conducted in a similar erarchical ER
way. The smaller the distance is, the closer Si to the
corresponding safety expressions. When the distance The S(Si ) obtained represents only the piece of es-
dij (j = 1, 2, 3 or 4) is equal to zero, Si is just the same timation from one assessor. When more pieces of es-
as the jth safety expression in terms of membership timation from different assessors emerge, they can be
functions. Because each dij is an unscaled distance, effectively synthesized by using an ER approach. The
in order to more clearly express the safety level of Si , approach has been widely applied to risk and safety
the reciprocals of the relative distances between Si and assessment[7]. In continuously researching and practic-
each safety expression dij are normalised into a new ing processes, the evidential reasoning algorithm has
index αij , (j = 1, 2, 3, 4). If dij = 0 it follows that αij been developed, improved and modified toward a more
is equal to 1 and the others are equal to 0. The αij can rational way[8] . The algorithm can be analysed by the
be defined as follows in other situations: following pathway.
Let A represent the set of the four safety expres-
1/dij
aij = 4
, j = 1, 2, 3, 4. (7) sions, which has been synthesized by two subsets A1
1/dij and A2 from two different assessors. Then, A, A1 and
j=1
A2 can separately be expressed by:
Each αij (j = 1, 2, 3, 4) represents the extent to A = {α1 “P oor”, α2 “F air”, α3 “Average”, α4 “Good”}
which Si belongs to the jth defined safety expression. A1 = {α11 “P oor”, α21 “F air”, α31 “Average”, α41 “Good”}
Thus, the safety levels of threat-based risks determined
by using a fuzzy set can be expressed as follows: A2 = {α12 “P oor”, α22 “F air”, α32 “Average”, α42 “Good”}.
S(Si ) ={(αi1 , “P oor”), (αi2 , “F air”), (αi3 , “Average”), Suppose the normalized relative weights of two
(αi4 , “Good”)}. safety assessors in the safety evaluation process are
given as ω1 and ω2 (ω1 + ω2 = 1) and ω1 and ω2 can be
To produce the risk degree of a threat for ranking estimated by using established methods such as simple
purposes, it is necessary to describe the four safety ex- rating methods or more elaborate methods based on
pressions using numerical values. The numerical values pair-wise comparisons.
associated with the defined safety expressions can be Suppose M1m and M2m (m = 1, 2, 3 or 4) are individ-
calculated by studying the categories and membership ually degrees to which the subsets A1 and A2 support
values in Table 5. Suppose Wp , Wf , Wa and Wg rep- the hypothesis that the safety evaluation is confirmed
resent the unscaled numerical values associated with to the four safety expressions. Then, M1m and M2m can
“Poor”, “Fair”, “Average” and “Good”, respectively. be obtained as follows:
Ws , Wm
, Wp and Wg can be calculated as follows:
Naturally, a numerical risk degree of the threat, can be H1 = H̄1 + H̃1 , H2 = H̄2 + H̃2 (12)
obtained by the following calculation:
where H̄n (n = 1 or 2), which represents the degree to
PS(Si) = αi1 ×0.079+αi2 ×0.384+αi3 ×0.695+αi4 ×1. which the other assessor can play a role in the assess-
(9) ment, and H̃n (n = 1 or 2), which is caused due to the
90 International Journal of Automation and Computing 1 (2005) 85-92
possible incompleteness in the subsets A1 and A2 , can The American West Coast Ports 11-day lock-out in
be described as follows respectively: October 2002 has caused a growing concern on how
serious the impacts of a major sophisticated attack re-
H̄1 = 1 − ω1 = ω2 , H̄2 = 1 − ω2 = ω1 (13) lated to container ports can be. Such a concern has fur-
4
ther been underscored by progressive terrorism groups’
H̃1 = ω1 (1 − am 1 2 3 4
1 ) = ω1 [1 − (α1 + α1 + α1 + α1 )] activities. Therefore, in this section, risk analysis is
m=1 carried out to assess the safety level of ports in CSCs
4 and identify the major factors causing the risk on a
H̃2 = ω2 (1 − am 1 2 3 4
2 ) = ω2 [1 − (α2 + α2 + α2 + α2 )]. proritised list.
m=1 Terrorists attacking ports would highly likely hap-
pen through two ways: to attack the channel/ water-
Suppose αm (m = 1, 2, 3 or 4) represents the non-
way or bomb the quayside infrastructures/ facilities of
normalized degree to which the safety evaluation is con-
the terminals. Using the FTA method, a fault tree re-
firmed to the four safety expressions as a result of the
lated to a terrorism threat in ports can be constructed
synthesis of the judgments produced by assessors 1 and
in Fig.2.
2. Suppose HU represents the non-normalized remain-
ing belief unassigned after the commitment of belief to
the four safety expressions as a result of the synthesis
of the judgments produced by assessors 1 and 2. The
evidential reasoning algorithm can be stated as follows:
αm = K(M1m M2m + M1m H2 + H1 M2m )
H̄U = K(H̄1 H̄2 )
H̃U = K(H̃1 H̃2 + H̃1 H2 + H1H̃2 )
4
4
K = [1 − M1T M2R ]−1 . (14)
T =1 R=1
R=T
‘µS = µ(R×D)◦ (P×W ) ’ and the Best-Fit method in Sec- above as the safety of the top event has been assessed
tion 3.1. The ranking of the basic events can then as ‘Good’ to the extent of 9.3 percent.
be obtained using the method of studying the fuzzy The above gives an overall picture of the safety es-
membership values and categories. The results of the timate of this top event. The safety score representing
calculation are shown in Table 7. the safety level of the top event can be seen as a refer-
Step 3. applies the ER approach and its attached ence for considering the effectiveness of risk control op-
software IDS (Intelligent Decision System via Eviden- tions and the comparison with other hazardous events
tial Reasoning)[8] to calculate the safety level of the top for making decisions if necessary.
event which can be expressed by its safety score shown
in Fig.3: 5 Conclusion
STerrorism ={0.276, “P oor”, 0.461, “F air”, 0.17, The safety consciousness in the supply chain indus-
try has been significantly growing over the last several
“Average”, 0.093, “Good”}.
years. This paper providing a subjective risk assess-
ment method for the organisations involved in CSCs
enables them to assess the vulnerability of the chains
and to support the safety planning for both mitigat-
ing and continuity actions. The marriage of fuzzy
sets and ER to deal with uncertainty can also facil-
itate risk assessment and be tailored and applied to
more management-related industries, where risks usu-
ally arise from threats rather than hazards.
References
[1] P. Chapman, M. Christopher, U. Jüttner, H. Peck, R. Wild-
ing, Identifying and managing supply-chain vulnerability,
Logistics & Transport Focus, vol. 4, no. 4, pp. 17, 2002.
[2] Z. L. Yang, S. Bonsall, W. Alan, J. Wang, Reliable container
Fig.3 The safety level expressed by safety score line supply chains - a new risk assessment framework for im-
proving safety performance, WMU Journal of Maritime Af-
fairs, vol. 4, no. 1, pp. 107–122, 2005.
From the above results, it is obvious that the six ba- [3] M. U. Thomas, Supply chain reliability for contingency oper-
sic events (i.e. EXT-CHA and VES-CHA) have been ations, Annual Reliability and Maintainability Symposium,
assessed as ‘Good’ to a quite small extent. For example, pp. 61–67, WA, USA, 2002.
[4] D. Garg, Y. Narahari, N. Viswanadham, Design of Six Sigma
the event EXT-CHA has been assessed as ‘Good’ with supply chains, Proceedings - IEEE International Conference
a belief of 13.9 percent; the event VES-CHA has been on Robotics and Automation, pp. 1737–1742, Taibei, 2003.
evaluated to a significantly smaller extent as ‘Good’ [5] R. R. Pai, V. R. Kallepalli, R. J. Caudill, M. C. Zhou, Meth-
with 1.8 percent. Since the safety of the top event is ods towards supply chain risk analysis, Proceedings of the
IEEE International Conference on Systems, Man and Cy-
determined by the safety of each basic event, the top bernetics, vol. 5, pp. 4560–4565, 2003.
event safety should be evaluated as ‘Good’ to a small [6] G. Svensson, A conceptual framework of vulnerability in
extent. This is in harmony with the results obtained firms’ inbound and outbound logistics flows, International
Journal of Physical Distribution and Logistics Management, erests include safety and reliability based design and operations
vol. 32, no. 2, pp. 110–134, 2002. of large marine and offshore systems.
[7] J. Wang, J. B. Yang, P. Sen, Multi-person and multi-
attribute design evaluations using evidential reasoning based
on subjective safety and cost analyses, Reliability Engineer- Steve Bonsall received his BSc in
ing and System Safety, vol. 52, no. 2, pp. 113–128, 1996. Marine Science from Liverpool Poly-
[8] J. B. Yang, D. L. Xu, On the evidential reasoning algorithm technic, UK in 1977 and PhD in Mar-
for multiple attribute decision analysis under uncertainty, itime Technology from Liverpool John
IEEE Transactions on Systems, Man and Cybernetics - Part Moores University, UK in 2001, respec-
A: Systems and Humans, vol. 32, no. 3, pp. 289–304, 2002. tively. He is currently the maritime
[9] OECD, Security in maritime transport: risk factors and eco- programme coordinator and principal
nomic impact, Maritime Transport Committee of OECD Re- lecturer at the School of Engineering
port, France, 2003. of Liverpool John Moores University,
[10] P. Timmerman, Vulnerability, resilience and the collapse of UK.
society, Institute of Environmental Studies, University of Dr. Bonsall’s major research inter-
Toronto, Toronto, 1981. ests include container terminal operations, container supply
[11] J. Weichselgartner, Disaster mitigation: the concept of vul- chains and developments in maritime leisure.
nerability revisited, Disaster Prevention and Management,
vol. 10, no. 2, pp. 85–94, 2001. Jian-Bo Yang received his BEng and
[12] H. T. Burns, P. Cordire, T. Eriksson, Security Risk Assess- MEng degrees in Control Engineering
ment and Control, Perpetuity Press Ltd., Leicester, UK, at North Western Polytechnic Univer-
2003. sity, Xi’an, China in 1981 and 1984,
[13] A. Pillay, J. Wang, Technology and Safety of Marine Sys- and PhD degree in Systems Engineer-
tems, Elsevier Science Ltd., Oxford, UK, 2003. ing at Shanghai Jiao Tong University,
[14] E. J. Henley, H. Kumarnoto, Probability Risk Assessment, Shanghai, China in 1987. He is Chair
IEEE Press, NY, USA, 1992. of Decision and System Sciences at the
[15] W. Karwowski, A. Mital, Potential applications of fuzzy sets Manchester Business School, The Uni-
in industrial safety engineering, Fuzzy Sets and Systems, vol. versity of Manchester, UK.
19, no. 2, pp. 105–120, 1986. Professor Yang’s main research int-
erests include intelligent decision analysis and support under un-
Zaili Yang received his BSc in For- certainties, multiobjective optimisation, system modelling, sim-
ulation and control with applications in both engineering and
eign Trade Transportation from Dalian
Maritime University, China in 2001 management systems.
and MSc in International Transport
from Cardiff University, UK in 2003, Quangen Fang received his BSc in
respectively. Since 2003, he has been a Navigation from Shanghai Maritime
PhD student in the School of Engineer- University, China in 1976 and MSc in
ing of Liverpool John Moores Univer- Maritime Education and Training from
sity, UK. His research interests include World Maritime University, Sweden in
risk assessment of container supply 1991, respectively. He is currently a
chains, in particular, subjective risk professor and Director of the Navi-
analysis using fuzzy set and Bayesian probability theories. gation Simulator Training Centre of
Shanghai Maritime University, China.
Jin Wang received his BSc in Ma- Professor Fang’s major research in-
rine Automation from Dalian Maritime terests include ship simulation, naviga-
tion studies and ship operations.
University, China in 1983, MSc in Ma-
rine Engineering and PhD in Maritime
Safety Engineering from the Univer-
sity of Newcastle upon Tyne in 1989
and 1994, respectively. He is Professor
of Marine Technology at the School of
Engineering of Liverpool John Moores
University, UK.
Professor Wang’s major research int-