You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

26 August 2024

Multi-Objective Real-Time Planning of Evacuation Routes for Underground Mine Fires

,
,
and
1
School of Resources and Safety Engineering, Central South University, Changsha 410083, China
2
State Key Laboratory for Fine Exploration and Intelligent Development of Coal Resources, China University of Mining and Technology, No. 1 University Road, Xuzhou 221116, China
3
Changsha DIMINE Co., Ltd., Changsha 410221, China
*
Author to whom correspondence should be addressed.

Abstract

When a fire occurs underground, pre-existing emergency escape routes may become ineffective. Such scenarios necessitate the real-time planning of escape routes that consider evolving conditions and prioritize safety. This paper proposes a multi-objective real-time search method for emergency escape routes using dynamic programming to address these challenges. Firstly, this paper discusses how the evacuation of an underground mine fire caused by external factors depends on the fire monitoring system, personnel positioning system, and emergency evacuation system, as well as the modeling and solution methods of evacuation route planning. Then, based on fire smoke, CO, and temperature sensor data from the mine ventilation network structure and monitoring system, the possible smoke spread in the event of an underground fire was calculated. The objectives are to optimize both the shortest equivalent length of the path and the shortest time to walk through the smoke flow while ensuring that temporary escape time does not exceed the rated protection time of the self-rescuer. A mathematical model for emergency escape route planning is established under these conditions. A labeling algorithm based on dynamic programming is employed to find the Pareto optimal solution set of emergency evacuation routes that meet emergency requirements. Finally, two path evaluation indicators, namely “escape target priority” and “personnel temporary escape time”, are introduced to re-rank the solutions in the Pareto optimal set, thereby obtaining disaster evacuation routes with different priorities. Example verification shows that the algorithm can quickly solve the disaster evacuation routes that meet the actual disaster evacuation needs in complex networks. Example verification shows that the algorithm can quickly solve the emergency escape routes in complex networks that meet actual emergency escape needs.

1. Introduction

The mining industry is an important way for humans to obtain resources and is one of the most dangerous industrial sectors. For both coal mines and metallic non-metallic mines, underground mining is as important as open pit mining. The main accidents in underground mining include mine fires, poisoning and suffocation, explosions, mine inundation, collapse, roof falls, and rock collapse. Of these, mine fires, although not the most frequent, have a large impact area and on average cause a high number of casualties in a single incident. From 2008 to 2021, 29 fire accidents occurred in Chinese coal mines, killing 203 people [1]. In 2021, a fire accident occurred in the Listvyazhnaya coal mine in Siberia, Russia, due to a coal dust explosion, killing 51 people. The fires that occur more frequently in metallic non-metallic underground mines are exogenous fires caused by fires from manual welding operations or spontaneous combustion of cables. Exogenous fires in metal mines refer to fires formed by igniting underground combustibles under the action of external ignition sources. They also include exogenous fires induced by improper treatment of internal fires [2]. For example, improper electric welding operation, aging cables, spontaneous combustion of mining trucks, etc. The occurrence of external fires underground is sudden and develops rapidly. In addition to causing burns or heat illnesses, the high-temperature smoke flow generated by fires also causes a large amount of toxic and harmful gases such as carbon monoxide in the smoke flow to spread to the downwind side of the fire area through the ventilation system, reducing visibility and causing poisoning and suffocation. It also creates the risk of airflow disturbances in the ventilation system [3]. Therefore, when an exogenous fire occurs in an underground mine, it is particularly important to promptly detect and handle the fire and safely evacuate personnel. However, the current emergency response model necessitates extensive communication and feedback between underground workers, surface dispatch centers, and emergency rescue teams, which often leads to delayed responses and inefficient evacuations. Consequently, optimizing the use of underground monitoring systems and risk-avoidance infrastructure to enable automated evacuation route planning is of significant importance.
The successful evacuation of underground personnel in the event of a disaster must take into account the layout of the mine’s ventilation system, the exact location of the underground personnel, the location and type of underground fires, the protective capacity and layout of underground shelters, and the self-rescue capacity of personal protective equipment [4,5]. Underground personnel must be familiar with the layout of the mine ventilation system and know the common escape routes and safe exits. The location of the underground personnel should be determined by various sensors and transmitted to the emergency rescue control platform on the ground to help the rescue team on the ground carry out rescue and command. Through monitoring and active reporting, knowledge of the location of underground fires, the type of combustible materials, the development of the fire, and the assessment of the impact of high-temperature smoke streams, CO, and other toxic gases generated by the fire can help reduce and avoid the threat to the health and safety of underground fire [6]. Self-rescuers and refuges ensure the survival and mobility of personnel in the event of a fire, when they have to enter a fire-affected hazardous area, or when it is difficult for them to escape to the surface.
Currently, more and more countries have realized the importance of underground emergency evacuation systems and have put forward standards and requirements for the construction of underground emergency evacuation systems. For example, in 2010, China proposed to build six underground emergency evacuation systems, including monitoring and surveillance systems, emergency evacuation systems, compressed air self-rescue systems, water supply and rescue systems, personnel positioning systems, and communication systems, which greatly improved the emergency rescue capabilities when disasters occur in underground mines. What is more, the United States, Australia, South Africa, and other countries have also stipulated the relevant requirements for underground safety evacuation in the form of laws [7]. Underground safety systems make it possible to identify hazards at an early stage of a disaster and to quickly communicate with personnel and respond to the disaster. When a disaster cannot be controlled in time and personnel need to be evacuated from the well, the system provides guidance on evacuation information, ensures that current evacuation routes are feasible, and revises evacuation routes in real time in response to developments in the disaster. In addition, many researchers have studied different aspects of underground refuge systems, such as fire monitoring and identification methods, parameters of underground refuge chambers, and layout methods [8]. Zujing Zhang conducted a study on the dynamic coupled heat transfer characteristics between rock and air within refuge chambers under ventilated conditions [9]. Yong Li et al. investigated the physiological and psychological responses of individuals to high temperature, relative humidity, and carbon dioxide concentration within refuge chambers [10]. Katherine et al. proposed a pre-emptive training program aimed at helping miners acclimate to the environmental conditions of refuge chambers, thereby preparing them to cope with the physical and psychological stresses that may arise during an emergency [11]. While these studies have significantly contributed to the understanding of the safety of refuge facilities, human–environment interactions, and emergency preparedness training, there remains a lack of comprehensive research that integrates both the performance of refuge facilities and human responses into disaster management decision-making.
The current research on disaster avoidance route planning tends to focus on the simulation of disasters and route planning before the occurrence of a disaster, the auxiliary escape decision making in the event of a disaster is not fully considered, and the research on the multi-objective route planning problem, which takes into account the efficiency of the path and the safety factors, is not in-depth enough. Therefore, our proposed method utilizes real-time fire sensor data from underground during a disaster to assist in path planning, incorporating both safety and access efficiency. Drawing from the experience of actual projects, we have developed path selection criteria to determine the disaster avoidance routes that best align with the practical needs of evacuation and rescue operations.
Our approach is exemplified by applying it to a case study of an underground metal mine fire, where we generate a roadway accessibility network based on real-time sensor data. Based on the mathematical model of the resource-constrained shortest path, with the rated protection time of the self-rescuer as the constraint and with the shortest equivalent length of the roadway and the shortest time for personnel to walk in the smoke flow as the optimization goal, a mathematical model for escape route planning during mine fire was established. Then, the Pareto optimal solution set of the evacuation path from underground workers to the surface safety exit and the underground refuge chamber was solved based on the labeling algorithm of dynamic programming. The Pareto optimal solutions of all safety exits were re-ranked based on the safety exit priority and the time to escape from the dangerous area. An example verification was carried out in a metal mine. The results showed that the algorithm proposed in this paper can quickly obtain disaster avoidance routes that meet actual safety needs, thereby assisting and guiding emergency risk avoidance decisions in underground mines.
The rest of the paper is organized as follows. Section 2 introduces the related work on emergency escape systems and emergency escape route planning. Section 3 presents an algorithm for assigning equivalent lengths to underground roadways. Section 4 develops a mathematical model for evacuation routes and provides a solution algorithm along with a strategy for optimizing the solutions. Section 5 simulates disasters, solves evacuation paths, and discusses the obtained results. Finally, Section 6 draws a conclusion of the study.

3. Sensor-Based Network Weight Update Methodology

3.1. Calculation of the Equivalent Length of a Roadway

When a disaster occurs underground, the planning of the evacuation route should not only consider the length of the roadway, but also the conventional properties that affect the traffic efficiency, such as the roadway type, slope, width, and other structures that affect traffic. It should also consider whether there is smoke flow in the roadway and the smoke flow’s concentration, temperature, visibility and other properties during the disaster period. In order to comprehensively measure the impact of these parameters on the difficulty of roadway, the ratio of the roadway speed when affected by a certain factor to the roadway speed when not affected by a certain factor is used to define the roadway difficulty coefficient of a certain factor [31]. The formula is as follows:
k a t t r = v a t t r v n o r m
where k a t r r is the travel difficulty coefficient affected by a certain factor. v n o r m is the speed when it is not affected by a certain factor. v a t t r is the speed of traffic affected by a certain factor.
The equivalent length of a roadway is used to measure the efficiency of a roadway under the influence of all factors. The main factors affecting the efficiency of the roadway are combined and converted into the accessibility coefficient and the equivalent length of the roadway is obtained by multiplying the actual length by the accessibility coefficient and adding the sum of the equivalent lengths of the local obstacles inside the roadway. The equivalent length of the roadway ( i , j ) from node i to node j is expressed as w i j , then the equivalent length of the roadway is given by,
w i j = k h k w k g k v k s l i j + m = 1 n l m
where k h is the travel difficulty coefficient of the roadway height. k w is the travel difficulty coefficient of the roadway width. k g is the travel difficulty coefficient of the roadway slope. k v is the travel difficulty coefficient of the wind speed in the roadway. k s is the visibility difficulty coefficient of the roadway. l i j is the actual length of the roadway, m. n is the number of obstacles in the roadway from i to j . l m is the equivalent length value of the obstacle in the roadway from i to j , m.

3.2. Network Weight Update Algorithm

When a fire occurs underground, as the fire smoke spreads, the passability and efficiency of the downwind side of the roadway decreases as the smoke stream encroaches. In this case, the weights on the edges of the graph increase with the concentration of the smoke stream in the roadway or decrease as the smoke stream is expelled. The roadway network is represented as a directed graph G = ( V , E ) , where V denotes the set of all points in the graph and E denotes the set of all pairs of points in the graph, i.e., the set of edges. For any edge ( i , j ) E , there is an equivalent length w i j . The path is a finite set of nodes, denoted by P, then P = v 0 , v 1 , , v p . For any road P , the sum of equivalent lengths is denoted as W .
Equivalent length is a measure of roadway passability. Parameters related to roadway passability during catastrophic periods are mainly obtained in real time through real-time monitoring by underground monitoring and surveillance systems, in addition to reporting by underground personnel. The monitoring and control system monitors various toxic and hazardous gases underground through sensors such as carbon monoxide, nitrogen dioxide, and smoke. The arrangement of sensors is the key to disaster monitoring, and the arrangement method is based on the type of mine and the characteristics of the disaster. Coal mines mainly arrange carbon monoxide sensors to monitor fire in the return-airway and the downwind side of the belt conveyor, the observation point of spontaneous combustion, and the firewall of the closed fire zone [32]. In addition to carbon monoxide and smoke sensors on the downwind side of the belt conveyor, metal mines are encouraged to arrange carbon monoxide or nitrogen dioxide sensors for blasting smoke in the middle of production, in the sectional inlet and return airways, and in the return airway of the excavation roadway.
However, due to cost considerations, it is impossible to deploy sensors in every roadway downhole, so the smoke flow arrival times of all sensor downstream nodes are derived based on Dijkstra’s algorithm, and a network of roadway passability is generated. The specific implementation of the algorithm is shown in Figure 1.
Figure 1. Emergency escape network weighting algorithm.
The specific steps of the algorithm are described as follows:
Step 1: Obtain the position of all sensors and initialize them to the non-alarm state. Add all sensors to the non-alarm set and initialize the roadway network weights;
Step 2: Determine whether to interrupt sensor monitoring. If not, refresh the sensor data and execute the next step; if yes, jump to step 7.
Step 3: Determine whether there is a sensor alarm, if yes, execute the next step; if no, jump to step 2;
Step 4: Move the alarming sensor out of the non-alarm set and add it to the alarm set;
Step 5: Use the Dijkstra algorithm to traverse the downstream nodes of each alarm sensor and calculate the arrival time of the downstream node smoke flow. If the node is downstream of multiple alarm sensors, take the first arrival time of the smoke flow;
Step 6: Recalculate the equivalent length of the roadway and output the network weight, jump to step 2;
Step 7: Complete the time-varying network weight solution.

4. Mathematical Models and Algorithms for Emergency Escape Routes

4.1. Shortest Path Problem with Resource with Constraints

The shortest path problem with resource with constraints (SPPRC) is a variant of the shortest path problem [33]. The problem intends to find a path from a network that goes from an origin to an end point and satisfies a set of constraints based on a set of resources, where resources refer to traveling time, cost, etc. For any path in the graph, from the start point i of one of the edges to the end point j of this edge, resource extension functions (REFs) should be satisfied for any kind of resource on the edge. Resource extension functions are generally defined as
f i j ( T i ) = T i + t i j
where T i is the resource vector on node. t i j is the resource weight on directed edge < i , j > . f i j ( T i ) is the new resource vector starting from the resource vector T i on point i , extending to point through the directed edge < i , j > .
For any path P = ( v 0 , v 1 , , v p ) in the graph, define the resource vector T p [ a v p , b v p ] at the end point of p the path, where a v p , b v p are the lower and upper limits of the resource at that point. Define Γ ( P ) as the set of all feasible resource vectors at the end point v p of path P = ( v 0 , v 1 , , v p ) . Then, the resource-constrained shortest path problem can be expressed as follows: in a path P , if the resource vector at its end point p satisfies the upper and lower limits and for all points other than the end point i = 0 , , p 1 on the path, there exists a resource vector that satisfies the resource upper and lower limits on each point, that is T i [ a v i , a v i + 1 ] ; and so that for all i = 0 , , p 1 , f v i , v i + 1 ( T i ) T i + 1 holds true and the path P is resource feasible. The classic SPPRC can be expressed as
Γ ( P ) = { T p [ a v p , b v p ] : T i [ a v i , b v i ] , f v i , v i + 1 ( T i ) T i + 1 , i = 0 , , p 1 }
where i = 0 , , p 1 is the node other than the end point and T i [ a v i , b v i ] is the resource vector on node i that meets the upper and lower limit constraints. f v i , v i + 1 ( T i ) T i + 1 is the constraint that the resource vector extending from node i to node j is less than or equal to the resource vector at node j , ensuring that the resource consumption in the current extension direction of the path is minimal.

4.2. Mathematical Model of Emergency Escape Routes

When searching for an underground escape route, feasible exits include the main and secondary shaft exits and in times of emergency, the return air shafts can also be used as an escape route. When the situation is serious and it is not possible to reach the surface exits in time, the underground personnel should enter the refuge in time to escape and wait for rescue. In the event of a disaster, the first step is to wear a self-rescuer. According to the regulations, self-rescuers should be rated for a minimum of 30 min, and when two self-rescuers cannot be relied upon to reach the surface, an emergency refuge system, such as a removable refuge, or a temporary or permanent refuge should be installed underground.
In general, the downhole shortest emergency escape route problem considering downhole avoidance facilities can be described as follows: for a network G = N , E , N is the set of nodes, and E is the set of edges. N = n , E = e . Using i and j to represent any pair of nodes, the directed edge from i to j is denoted as i , j . The equivalent weight of the directed edge i , j is denoted as w i j and the time of passage is denoted as t i j . w i j and t i j are both non-negative real numbers. For any path P from the start to the end, the sum of the equivalent lengths of the path is W , and the total time spent traveling through the smoke stream is T . The logic variable x i j represents whether the directed edge ( i , j ) is on the path from the personnel position to the goal position, taking 1 if it is and 0 if it is not. At most, each node passes through once. The shortest path that satisfies the requirements that the time in the smoke flow from the start of escape does not exceed the rated protection time of the self-rescuer must be found, and the escape path is relatively short and has the shortest escape time in the smoke flow.
To sum up, the mathematical model of the underground emergency escape route considering the underground emergency facilities can be described as follows,
min W = i = 1 n j = 1 n x i j w i j   min T = i = 1 n j = 1 n y i j x i j t i j   s . t . j x i j j x j i = { 1 if i = 0 1 if   i = D   i N 0 otherwise   j x i j 1 i N   ( i , j ) x i j t ( i , j ) T ( i , j ) E   x i j { 0 , 1 } ( i , j ) E   y i j { 0 , 1 } ( i , j ) E

4.3. Labeling Algorithm Based on Dynamic Programming

A general algorithm for solving constrained shortest circuits is the labeling algorithm based on dynamic programming [34]. The algorithm degenerates into Dijkstra’s algorithm when there is only one type of weight on the edges of the network and only one objective function for the shortest path model. The labels in this algorithm refer to the data structure that stores the paths as well as the distances of the paths and the traveling time in the smoke stream. The algorithm starts from the starting point and gradually searches for feasible paths and records them in the labels. The same node will generate different labels when it is reached through different paths. The REFs are used to generate and determine whether the labels are legal and construct the solution set space of feasible paths; the dominance function is used to determine the dominant relationship between the labels on the same node. If a label is dominated, it means that the path represented by the label is not the shortest path or cannot constitute the shortest path to the end point. Then, in order to speed up the solution, the label should be discarded. A reasonable dominance function is the key to accelerating the algorithm solution.
Label data structure:
struct Label{
  Vector<int> Path;//Path
  int Equal_Distance;//Equivalent length
  int Time_in_smoke;//Time spent walking in the smoke
  int Time_escape_smoke_area;//Time to leave the smoke area
}
Resource Expansion Function(REFs): The Resource Expansion Function specifies the change in each resource (path length, cost, etc.) from the start point to the end point on each edge. It provides a lower bound on the resource value at the end point based on the start point to resource value. For any resource r , the resource consumption at the node i is T i , and the weight of that resource on the edge < i , j > is t i j ; hence, the resource consumption at the node is j
f i j r ( T i ) = T i r + t i j r
where f i j r T i is the resource consumption of resource r based on the resource consumption at node i expanded along edges < i , j > .
Dominance function: The two attributes of the path equivalent length and the travel time in the smoke flow in this problem are represented by the vector < W , T > . Since the two resource attributes in this problem are non-negative, the resource expansion function is non-decreasing. Therefore, for labels L 1 = < W 1 , T 1 > and labels L 2 = < W 2 , T 2 > , if W 1 W 2 and T 1 T 2 , then label L 1 is dominated by label L 2 . All non-dominated labels on a node form a Pareto optimal set [35].
A constrained shortest path example based on two resources is shown in Figure 2. Starting from the starting point S, there are two labels, s-2-1 and s-1 at node 1, and the resource vectors are (1,2) and (2,1), respectively, and there is no dominance relationship; at node 2, there are two labels, s-1-2 and s-2, and the resource vectors are (2.5,2) and (0.5,1), respectively, and the former is dominated by the latter. Therefore, the path s-1-2 is abandoned and no longer expanded. Finally, at node t, there are three labels, s-2-t, s-2-1-t, and s-1-t, and the resource vectors are (3,3), (4,2), and (5,1), respectively, and there is no dominant relationship between them. Therefore, all three paths are Pareto optimal solutions.
Figure 2. Case of the shortest path problem with constraints on two resources.
The algorithm flow of the constrained shortest path model emergency route planning problem is shown in Figure 3.
Figure 3. The flow chart of the RCSPP algorithm.
The specific steps are as follows.
Step 1: Firstly, read the roadway and mine ventilation network information to construct the escape and emergency escape information network G ; obtain the personnel position s as well as the escape target d ; define the set of unprocessed labels as U = { ( s ) } , containing only one path; and define the set of labels that have been processed as P = { } , which is initialized to be the empty set.
Step 2: Determine whether the set U is empty. If yes, the procedure ends and outputs all labels on the target node d . If not, take out the labels L t on v of the node from the set U .
Step 3: Determine whether the label L t is dominated by other labels on node i . If yes, delete the label L t and go back to step (2) and if no, perform the next step.
Step 4: Iterate to judge and delete all labels on node i that are dominated by label L t . Add the label L t to the set P . Compute the new labels from node i to all adjacent nodes and determine whether the REFs is satisfied. If yes, proceed to the next step. If no, remove the new label L i and go back to step 3.
Step 5: Add the new label L i to the set U .

4.4. Path Optimization Strategy

The above algorithm yields a Pareto optimal set, in which any path is not dominant in terms of the two attributes of equivalent length and time spent walking in the smoke relative to other paths. In order to achieve real-time path-assisted decision making, it is also necessary to consider parameters such as the choice of disaster escape exits and the time to escape the disaster area. The target of the escape exit is to prioritize surface exits such as the auxiliary shaft and the main shaft. When no solution can be found for all surface exits, the refuge chamber is used as the escape exit.
In addition, in order to ensure that the underground personnel escape from the potentially affected area as soon as possible, not only should the route with the least time of exposure to the disaster be chosen but also the route with the fastest access to the roadway that is not attacked by the smoke flow should be chosen. Taking a feasible solution of an emergency escape route < v 0 , v 1 , v n > as an example, if all the edges after the path reaches node i are safe edges, the time to reach point i is defined as a temporary escape time. For paths arriving at the same end point, the path with shorter temporary de-risking time is taken as the better path. The path optimization strategy is shown in Figure 4.
Figure 4. Path optimization strategy.

5. Case Studies

5.1. Experimental Model of Ventilation System

The iVent 3D Mine Ventilation System is a mine ventilation system software with functions such as ventilation network drawing, 3D visualization, ventilation network solution, ventilation facility control, etc. It can design mine ventilation systems and help ventilation engineers dynamically maintain ventilation systems during mine production [36].
The ventilation network of an iron ore mine is modeled as an example. The ventilation network graph of this mine has 494 nodes and 660 edges. The ventilation method is forced ventilation, with air entering through the west shaft and returning through the east return shaft as well as the main and auxiliary shafts. Workers can escape to the surface through the main and secondary shafts, inclined shafts, and the intake shaft. All draw raises, return air shafts, etc., are made impassable. One refuge is located at Level −330 and one at Level −175. These chambers will allow workers to escape to the surface if they are unable to do so. The mine ventilation system for the mine is shown in Figure 5 and Figure 6:
Figure 5. A mine ventilation network of an iron ore mine.
Figure 6. Three-dimensional mine ventilation diagram of an iron ore mine.

5.2. Simulation Result and Discussion

It is assumed that the location of an underground evacuee is in a roadway at the lowest elevation of the underground mine, Level −245. CO and smoke sensors are mainly located in the inlet and return airways of each production section and sub-section, as well as in the return air outlets of forced ventilation roadways.
Assume that a fire occurs in the −110 horizontal transport roadway at the bottom of the west wind shaft underground due to the aging of electromechanical equipment, and the smoke spreads along the ventilation system. The time sequence of the underground sensors alarming in sequence since the fire occurred is shown in Table 1. The range of the underground contaminated by smoke obtained by the algorithm search is shown in Figure 7. As shown in the table, the earliest smoke sensors located in the inlet airway detected the fire 11 s after its ignition. If no effective control measures, such as air reversing, are implemented or if these measures fail, all underground sensors will gradually trigger alarms over the course of approximately 1771 s. This indicates that carbon monoxide and smoke from the fire will spread to all underground locations.
Table 1. Sensor alarm time and sequence.
Figure 7. Smoke diffusion pollution range of underground fire.
Based on the attributes such as smoke diffusion time generated by sensor data, the passability network of the underground roadways is assigned; then, the location of the underground personnel is taken as the starting point and the four surface safety exits of the main shaft, auxiliary shaft, inclined shaft, and air intake shaft and the two underground refuge chambers are used as escape targets. The route-finding process is constrained by the self-rescuer-rated protection time of 30 min according to the safety regulations. The equivalent length of the route and the hazardous time attribute are used as the path dominance attributes to obtain the routes for underground personnel to reach each escape location. Based on the dynamic programming labeling algorithm, the optimal route that meets the rated protection time of the self-rescuer and has a shorter equivalent length and travel time in the smoke stream is found. By prioritizing escape targets and escaping from the danger zone as early as possible, feasible evacuation routes are sorted. In addition, to investigate the effect of response time on route planning, we explored feasible avoidance routes for the same personnel location after 12 s, 300 s, and 1200 s of the disaster, respectively. The path visualization results are shown in Figure 8; the path sorting results are shown in Table 2:
Figure 8. Evacuation routes to different destinations. (a) Route to the main shaft. (b) Route to the auxiliary shaft. (c) Route to the incline shaft. (d) Route to the chamber refuge1. (e) Route to the chamber refuge2.
Table 2. Ranked results of evacuation routes.
If the evacuation command is issued immediately after the sensor alarm (12 s), a total of five feasible avoidance routes can be obtained at this point. In this case, a total of five paths were obtained. The escape targets of Paths 1, 2, and 3 are the main and second shafts and the east return air shaft, respectively, and they are surface exits, so they are prioritized over the routes with the refuge chamber as the target; because the fire occurred in the −110 horizontal transport roadway under the west wind shaft, most of the paths with the west wind shaft as the escape target are in the smoke flow, and the algorithm cannot find a feasible solution that meets the rated protection time of the self-rescuer. Among all feasible solutions, Path 1 and Path 2 do not go through the smoke stream and have the highest security, but the equivalent length is relatively long. Path 3 has to walk in the smoke for about 681 s and it takes about 825 s to completely escape the smoke invasion area, so paths 1 and 2 should be given priority; when a path leading to a safe exit on the surface is available, the refuge chamber is generally not used as an escape target; on the contrary, when the disaster situation is out of control, that is, all surface exits cannot be solved and only the route with the refuge chamber as the target point has a feasible solution, the refuge chamber should be used as the escape target.
Delays in evacuation can lead to a reduction in the number of possible routes and a deterioration in the safety of those routes. Evacuating immediately at the first sensor alarm, at 12 s, allows escape to all surface exits and refuge chambers. By evacuating at 300 s, all routes are affected by the smoke flow for a longer period of time and the route to the main shaft becomes impassable. At 1200 s, it is no longer safe to evacuate to the surface area and the only option is to go to the nearest refuge and wait for help.
Since the resource vector in the label data structure of this algorithm is less than the equivalent length, the walking time in the smoke flow increases, which contains only two elements, and it is easy to form a dominant relationship between any two labels. Therefore, for any escape target, only one feasible path with the shortest length, the shortest walking time in the smoke flow, and meeting the rated protection time of the self-rescuer is obtained. We also compared planning algorithms with the classical disaster avoidance route and the results show that in scenarios with a small range of disaster impacts, the results of the present method are basically the same as those of the classical methods; in scenarios with severe disaster development and long distances between the avoidance starting point and the target point, the present algorithm has the potential to obtain multiple better solutions. Compared to traditional models, our approach integrates two critical safety indices: path length and path safety. In the event of a large-scale underground disaster, this method assesses the safety of available exits and plans feasible evacuation routes. Ultimately, it prioritizes these routes based on the safety indices, guiding underground personnel in making informed and rational decisions to evacuate.

6. Conclusions

This study investigates the planning of emergency escape routes for underground personnel in the event of an exogenous fire in an underground mine. It considers real-time disaster development, personnel location, the protective capacity of self-rescuers, and the location of underground refuge chambers. Using alarm sensor data and Dijkstra’s algorithm, we predicted the arrival time of smoke flow at each underground location. We then established a bi-objective optimization model that aims to minimize both the shortest equivalent length of the emergency escape route and the time that personnel are affected by smoke flow, thereby ensuring the efficiency and safety of the escape routes. A dynamic programming-based labeling algorithm is employed to solve the model, facilitating the identification of optimal routes across all emergency escape options. This is achieved through the inclusion of two labeled elements in the model and the application of a stricter dominance rule. For multiple feasible emergency escape routes that consist of various exits and Pareto-optimal sets for the same exit, a path preference strategy is implemented. This strategy prioritizes surface exits and minimizes temporary escape time in accordance with safety requirements. Ultimately, the route with the shortest path length and highest safety is selected from all feasible options. This approach avoids the influence of decision makers’ risk preferences, which can occur with traditional weighting methods.
However, the prediction of fire development in this study is based on the premise that the fire development is in a stable stage and there is no airflow reversal in the ventilation system. How to integrate all the sensor data from underground to predict the trend of the disaster and the change in the ventilation system will be the key point to be solved in the future. Moreover, the reliability of sensor data, which this study assumes to be consistently accurate, presents another limitation. In real-world scenarios, sensor failures, inaccuracies, or delays in data transmission could significantly impact the model’s effectiveness. Future work should address these issues by incorporating sensor reliability factors into the model, as well as developing strategies to mitigate the effects of potential data inaccuracies. In our future work, we will investigate how to predict fire development and changes in the state of the ventilation system based on sensor data at the time of the fire and to provide a more accurate assessment of the risk at various locations underground during a fire. We hope that our work will provide a new perspective to other scholars in the area of evacuation of people from exogenous fires in underground mines.

Author Contributions

Conceptualization, L.B.; methodology, L.B. and D.Z.; software, L.B.; validation, L.B., Y.L. and D.Z.; formal analysis, L.B., Y.L., D.Z. and L.W.; investigation, L.B., Y.L., D.Z. and L.W.; resources, L.B. and D.Z.; data curation, L.B.; writing—original draft preparation, L.B. and Y.L.; writing—review and editing, L.B., Y.L., D.Z. and L.W.; visualization, L.B., Y.L. and L.W.; supervision, D.Z.; project administration, L.B.; funding acquisition, L.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Program of China, grant number 2023YFC2907305, and the State Key Laboratory for Fine Exploration and Intelligent Development of Coal Resources, CUMT, grant number SKLCRSM24KF003.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article; further inquiries can be directed to the corresponding author.

Acknowledgments

We also thank the reviewers for their comments and suggestions to improve the quality of the paper.

Conflicts of Interest

Author Lin Bi and Deyun Zhong were employed by the company Changsha DIMINE Co. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Zhang, X.; Dong, Y.; Xu, D. Law analysis and prediction research of coal mine accidents in China from 2008 to 2021. Min. Saf. Environ. Prot. 2023, 50, 136–140+146. [Google Scholar] [CrossRef]
  2. Song, Z.; Kuenzer, C. Coal Fires in China over the Last Decade: A Comprehensive Review. Int. J. Coal Geol. 2014, 133, 72–99. [Google Scholar] [CrossRef]
  3. Banerjee, S.C. Prevention and Combating Mine Fires; CRC Press: London, UK, 2021; ISBN 978-1-00-321122-8. [Google Scholar]
  4. Lotero, S.; Androulakis, V.; Khaniani, H.; Hassanalian, M.; Shao, S.; Roghanchi, P. Optimizing Fire Emergency Evacuation Routes in Underground Coal Mines: A Lightweight Network Flow Approach. Tunn. Undergr. Space Technol. 2024, 146, 105637. [Google Scholar] [CrossRef]
  5. Wang, J.; Xiao, J.; Xue, Y.; Wen, L.; Shi, D. Optimization of Airflow Distribution in Mine Ventilation Networks Using the Modified Sooty Tern Optimization Algorithm. Min. Metall. Explor. 2024, 41, 239–257. [Google Scholar] [CrossRef]
  6. Wang, J.; Xue, Y.; Xiao, J.; Shi, D. Diffusion Characteristics of Airflow and CO in the Dead-End Tunnel with Different Ventilation Parameters after Tunneling Blasting. ACS Omega 2023, 8, 36269–36283. [Google Scholar] [CrossRef]
  7. Halim, A.E.; Brune, J.F. Do Refuge Chambers Represent a Good Strategy to Manage Emergencies in Underground Coal Mines? Min. Metall. Explor. 2019, 36, 1191–1199. [Google Scholar] [CrossRef]
  8. Yuan, L.; Thomas, R.A.; Zhou, L. Characterization of a Mine Fire Using Atmospheric Monitoring System Sensor Data. Min. Eng. 2017, 69, 57–62. [Google Scholar] [CrossRef]
  9. Zhang, Z.; Wu, H.; Wang, K.; Day, R.; Yuan, Y. Thermal Performance of a Mine Refuge Chamber with Human Body Heat Sources under Ventilation. Appl. Therm. Eng. 2019, 162, 114243. [Google Scholar] [CrossRef]
  10. Li, Y.; Yuan, Y.; Li, C.; Han, X.; Zhang, X. Human Responses to High Air Temperature, Relative Humidity and Carbon Dioxide Concentration in Underground Refuge Chamber. Build. Environ. 2018, 131, 53–62. [Google Scholar] [CrossRef]
  11. Margolis, K.A.; Westerman, C.Y.K.; Kowalski-Trakofler, K.M. Underground Mine Refuge Chamber Expectations Training: Program Development and Evaluation. Saf. Sci. 2011, 49, 522–530. [Google Scholar] [CrossRef]
  12. Reddy, N.S.; Saketh, M.S.; Dhar, S. Review of Sensor Technology for Mine Safety Monitoring Systems: A Holistic Approach. In Proceedings of the 2016 IEEE First International Conference on Control, Measurement and Instrumentation (CMI), Kolkata, India, 8–10 January 2016; pp. 429–434. [Google Scholar]
  13. Deng, J.; Li, X.; Wang, K. Research progress and prospect of mine fire intelligent monitoring and early warning technology in recent 20 years. Coal Sci. Technol. 2024, 52, 154–177. [Google Scholar] [CrossRef]
  14. Wang, Z.; Zhang, T.; Huang, X. Predicting Real-Time Fire Heat Release Rate by Flame Images and Deep Learning. Proc. Combust. Inst. 2023, 39, 4115–4123. [Google Scholar] [CrossRef]
  15. Li, S.; Yun, J.; Feng, C.; Gao, Y.; Yang, J.; Sun, G.; Zhang, D. An Indoor Autonomous Inspection and Firefighting Robot Based on SLAM and Flame Image Recognition. Fire 2023, 6, 93. [Google Scholar] [CrossRef]
  16. Jiang, S.; Skibniewski, M.J.; Yuan, Y.; Sun, C.; Lu, Y. Ultra-Wide Band Applications in Industry: A Critical Review. J. Civ. Eng. Manag. 2011, 17, 437–444. [Google Scholar] [CrossRef]
  17. Alarifi, A.; Al-Salman, A.; Alsaleh, M.; Alnafessah, A.; Al-Hadhrami, S.; Al-Ammar, M.A.; Al-Khalifa, H.S. Ultra Wideband Indoor Positioning Technologies: Analysis and Recent Advances. Sensors 2016, 16, 707. [Google Scholar] [CrossRef]
  18. Chehri, A.; Fortier, P.; Tardif, P.M. UWB-Based Sensor Networks for Localization in Mining Environments. Ad Hoc Netw. 2009, 7, 987–1000. [Google Scholar] [CrossRef]
  19. Renaudin, V.; Ortiz, M.; Perul, J.; Torres-Sospedra, J.; Jiménez, A.R.; Pérez-Navarro, A.; Martín Mendoza-Silva, G.; Seco, F.; Landau, Y.; Marbel, R.; et al. Evaluating Indoor Positioning Systems in a Shopping Mall: The Lessons Learned From the IPIN 2018 Competition. IEEE Access 2019, 7, 148594–148628. [Google Scholar] [CrossRef]
  20. Ou, S.; Jin, L.; Li, S.; Wang, S.; Li, Y.; Huang, Z. Study on External Protective System of Waterproofing Refuge Chamber in Guilaizhuang Gold Mine. In Proceedings of the 3rd International Symposium on Mine Safety Science and Engineering, Montreal, QC, Canada, 13–19 August 2016; pp. 236–242. [Google Scholar]
  21. Zhang, Z.; Jin, T.; Wu, H.; Day, R.; Gao, X.; Wang, K.; Mao, R. Experimental Investigation on Environmental Control of a 50-Person Mine Refuge Chamber. Build. Environ. 2022, 210, 108667. [Google Scholar] [CrossRef]
  22. Zhang, Z.; Guo, W.; Gao, X.; Wu, H.; Mao, R. Investigation on Temperature Control Based on Cooled Mine Compressed Air for Mine Refuge Chamber with High-Temperature Surrounding Rock. Int. J. Therm. Sci. 2023, 187, 108201. [Google Scholar] [CrossRef]
  23. Guo, W.; Zhang, Z.; Wu, H.; Ge, L.; Liang, X.; Mao, R. Experimental Study on Cooling and Dehumidification Performance of an Ice Storage Air Conditioner Used in Underground Refuge Chamber. Int. Commun. Heat Mass Transf. 2023, 146, 106930. [Google Scholar] [CrossRef]
  24. Shao, Z.; Yang, Y.C.; Kumral, M. Optimal Refuge Chamber Position in Underground Mines Based on Tree Network. Int. J. Inj. Control. Saf. Promot. 2023, 30, 294–309. [Google Scholar] [CrossRef] [PubMed]
  25. Shengzhu, Z.; Zongzhi, W.; Rui, Z.; Jianning, K. Dynamic Numerical Simulation of Coal Mine Fire for Escape Capsule Installation. Saf. Sci. 2012, 50, 600–606. [Google Scholar] [CrossRef]
  26. Johnson, A.T.; Scott, W.H.; Koh, F.C.; Phelps, S.J.; Francis, E.B.; Lopresti, E. How Far Can One Walk Wearing a Self-Contained Self Rescuer? J. Occup. Environ. Hyg. 2007, 4, 49–53. [Google Scholar] [CrossRef]
  27. Huy, N.D.; Khai, N.C.; Thinh, N.V.; Quang, N.V.; Chien, N.M.; Duy, N.K. Simulating and Predicting Escape Routes for Ventilation Network of Duong Huy Coal Company Using Ventsim DESIGN Software. Inz. Miner. 2022, 2, 151–157. [Google Scholar] [CrossRef]
  28. Shi, X.; Gai, W.; Xu, K. Bi-Objective Rescue Path Selection Optimization for Mine Fires Based on Quantitative Risk Assessment. Saf. Sci. 2022, 146, 105492. [Google Scholar] [CrossRef]
  29. Salami, O.B.; Xu, G.; Kumar, A.R.; Pushparaj, R.I. Underground Mining Fire Hazards and the Optimization of Emergency Evacuation Strategies (EES): The Issues, Existing Methodology and Limitations, and Way Forward. Process Saf. Environ. Prot. 2023, 177, 617–634. [Google Scholar] [CrossRef]
  30. Leung, M.-F.; Wang, J. A Collaborative Neurodynamic Approach to Multiobjective Optimization. IEEE Trans. Neural Netw. Learn. Syst. 2018, 29, 5738–5748. [Google Scholar] [CrossRef]
  31. Jinzhang, J.; Fengxiao, W. Study on Emergency Escape Route Planning under Fire Accidents in the Burtai Coal Mine. Sci. Rep. 2022, 12, 13074. [Google Scholar] [CrossRef]
  32. Bhattacharjee, S.; Roy, P.; Ghosh, S.; Misra, S.; Obaidat, M.S. Wireless Sensor Network-Based Fire Detection, Alarming, Monitoring and Prevention System for Bord-and-Pillar Coal Mines. J. Syst. Softw. 2012, 85, 571–581. [Google Scholar] [CrossRef]
  33. Irnich, S.; Desaulniers, G. Shortest Path Problems with Resource Constraints. In Column Generation; Springer: Boston, MA, USA, 2006; pp. 33–65. ISBN 978-0-387-25485-2. [Google Scholar]
  34. Touati Moungla, N.; Létocart, L.; Nagih, A. An Improving Dynamic Programming Algorithm to Solve the Shortest Path Problem with Time Windows. Electron. Notes Discret. Math. 2010, 36, 931–938. [Google Scholar] [CrossRef][Green Version]
  35. Gunantara, N. A Review of Multi-Objective Optimization: Methods and Its Applications. Cogent Eng. 2018, 5, 1502242. [Google Scholar] [CrossRef]
  36. Zhong, D.; Wang, L.; Wang, J.; Jia, M. An Efficient Mine Ventilation Solution Method Based on Minimum Independent Closed Loops. Energies 2020, 13, 5862. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.