As a system exposed to the natural environment,the shipping network will face natural and human risk factors,such as natural disasters,terrorist attacks,etc.Under the influence of these risk factors,the transportation function of the network will decline,and the extent of the decline can reflect the level of network vulnerability.This paper studies the vulnerability of the Maritime Silk Road container route network,and proposes effective protection and remedy methods for the results.Firstly,it introduces the definition of container route network vulnerability,the risk factors that affect the normal operation of the network,and then builds the network topology map to analyze the vulnerability of the topology network from the local and global perspectives.The purpose of the local vulnerability analysis is to find the most vulnerable link in the Maritime Silk Road container route network,namely the most important port links and maritime transport channels and regional links to the network.The entropy weight method is used to calculate the weight of each quantitative indicator describing the network transportation performance,so as to construct a local vulnerability evaluation model.The purpose of the global vulnerability analysis is to evaluate the vulnerability of the network when it is subject to different types and different amplitudes from the perspective of the network as a whole.Finally,based on the vulnerability evaluation results,the backup network is used to optimize the network structure,and the optimized network is analyzed separately for local and global vulnerability,and the results are compared with the vulnerability before optimization.The analysis of local vulnerability shows that Shanghai Port and the South China Sea are the most important links in the network.The global vulnerability study indicates that the network is particularly vulnerable when it is deliberately attacked by terrorist attacks,indicating that it focuses on protecting the Shanghai Port and the South China Sea,and taking measures at the same time.Preventing deliberate attacks can effectively reduce the vulnerability of the network.By optimizing the network structure,the vulnerability of the network is greatly reduced,whether from the local or global perspective,indicating that the redundancy of the network can be reduced by means of redundant backup. |