Next Article in Journal
Wildfire Mitigation and Evaluation of Firebreaks Through FlamMap Simulations in High-Susceptibility Areas of the Metropolitan District of Quito
Previous Article in Journal
Lightweight YOLOv5s Model for Early Detection of Agricultural Fires
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Investigation into the Rescue-Path Planning Algorithm for Multiple Mine Rescue Teams Based on FA-MDPSO and an Improved Force-Directed Layout

1
College of Arts, Xi’an University of Science and Technology, Xi’an 710054, China
2
College of Safety Science and Engineering, Xi’an University of Science and Technology, Xi’an 710054, China
*
Author to whom correspondence should be addressed.
Fire 2025, 8(5), 188; https://doi.org/10.3390/fire8050188
Submission received: 20 April 2025 / Revised: 2 May 2025 / Accepted: 6 May 2025 / Published: 8 May 2025

Abstract

:
It is noted that existing mine emergency-rescue algorithms have overlooked the requirement for multi-route sharing at critical nodes and have offered limited network visualisation. Consequently, a multi-team rescue-path-planning algorithm based on FA-MDPSO (Firefly Algorithm-Multiple Constraints Discrete Particle Swarm Optimisation) was proposed, and a graph-structure optimisation method combining a Force-Directed Layout with Breadth-First Search was introduced for node arrangement and visualisation. Methodologically, the superiority of the improved DPSO (Discrete Particle Swarm Optimisation) in route-planning precision was first validated on the DIMACS dataset. Subsequently, the hyperparameters of MDPSO (Multiple Constraints Discrete Particle Swarm Optimisation) were optimised by means of four intelligent algorithms—ACO (Ant Colony Optimization), FA (Firefly Algorithm), GWO (Grey Wolf Optimizer) and WOA (Whale Optimization Algorithm). Finally, simulations of one to three rescue-team deployments were conducted within a mine-fire scenario, and node-importance analysis was performed. Results indicated that FA-MDPSO achieved comprehensive superiority in route precision, search efficiency and convergence speed, with FA-based hyperparameter optimisation proving most effective in comparative experiments. The graph-structure optimisation was found to substantially reduce crossings and enhance hierarchical clarity. Moreover, the three-team deployment yielded the shortest equivalent path (56,357.02), and node-visitation frequency was observed to be highly concentrated on a small number of key nodes. This not only significantly improves the collaborative rescue efficiency but also provides intuitive and practical technical support for intelligent mine rescue operations. It lays an important foundation for optimising mine emergency rescue plans, ensuring the safety of underground personnel, and promoting the intelligent development of mines.

1. Introduction

When a mine fire occurs, fatalities and property losses are incurred, and the formulation of appropriate disaster-relief and disaster-avoidance strategies is of considerable practical significance for the protection of underground personnel and the coordination of rescue teams. With the advancement of mine automation and unmanned operations, numerous novel theories and technologies have been applied to mine disaster relief and personnel sheltering. From an algorithmic perspective, current mine-disaster mitigation efforts have been centred on graph-theoretic algorithms, intelligent optimisation algorithms and heuristic search algorithms, with corresponding avoidance strategies devised and escape routes planned for underground miners. However, in practice, during a fire outbreak, certain areas may experience insufficient oxygen supply and severe fire conditions, rendering standard sheltering procedures impracticable. Consequently, mine rescue teams are required to be deployed to assist in extricating trapped miners. In 2018, an underground conveyor-belt fire at the Palabora copper mine in South Africa resulted in five miners being killed and one reported missing. In 2021, a methane explosion at the Kuzbass coal mine in Russia triggered a fire that caused at least 52 fatalities and 57 injuries. In 2023, the spontaneous combustion of fragmented media at the Gengcun coal mine in China led to a fire causing five deaths. In 2024, a fire at a coal mine in Nagaland, north-eastern India, was responsible for at least six deaths and four injuries. Such mine-fire incidents have had an indelible impact on the development of the mining industry and have inflicted irreversible losses on the families of the victims. To date, mine rescue strategies have been primarily focused on the planning of personnel escape routes, with limited research addressing the coordinated deployment of multiple rescue teams for underground rescue operations. In situations where miner escape-route planning is rendered ineffective, disaster-relief algorithms requiring reduced response times and enhanced rescue efficiency must be developed, and rescue-team deployment strategies must be formulated to ensure safe evacuation and the protection of personnel.
Strategies for mine-personnel disaster avoidance and evacuation have been primarily concentrated on algorithmic research and the optimisation of emergency-rescue systems. Algorithmic studies have chiefly involved the refinement of graph-theoretic algorithms, intelligent-optimisation algorithms and heuristic-search algorithms, and the construction of methods for calculating tunnel equivalent lengths and for shortest-path searches tailored to mine topologies, ultimately enabling personnel disaster-avoidance and evacuation.
A dynamic-programming model for optimal mine emergency-rescue routing based on a Dijkstra-ACO hybrid algorithm was proposed by Lu Guoju and Shi Wenfang [1], in which the Dijkstra algorithm was utilised to identify an initial optimal path and subsequently optimised by the ACO algorithm to determine the final optimal route. A multiobjective real-time search method founded on dynamic programming was introduced by Lin Bi, Yulong Liu et al. [2], employing Pareto-optimal solution sets to rank identified evacuation paths and thus realise an evacuation model for complex mine networks that satisfies practical escape-route planning requirements. An interactive “human–environment–computer” system was constructed by Wei Li, Yongming Wang et al. [3] through the integration of the A*-3D Time algorithm with mixed-reality (MR) technology; mine spatial geometry and escape-time data were adopted, and Comsol was employed to simulate mine water-inrush scenarios, thereby implementing an assisted-escape system for miners. An evacuation-route planning method based on an improved A* algorithm was put forward by Yulun Zhu, Gui Zhang et al. [4], in which FAHP-CRITIC combined weighting analysis was applied to assess evacuation factors, five fire-ground zones were delineated, and dynamic fire-spread trends were incorporated to support personnel disaster-avoidance. A multiscenario, cross-scale smoke-control strategy for mine fires was advanced by Haiqing Hao, Shuguang Jiang et al. [5], on the basis of which an optimal-escape-route planning method was devised to provide guidance for mine-fire prevention, smoke extraction, and emergency rescue. A numerical-simulation-based evacuation-route planning method under a full-scale mine-fire scenario was designed by Menghui Xiao, Cuifeng Du et al. [6], predicated on smoke-diffusion characteristics and fire-induced pressure variations; it was demonstrated that CO concentration diminishes at tunnel corners and that both CO concentration and temperature decrease with depth, indicating that miners should evacuate along curved structures. A research framework combining mine-fire simulation with the Ford-Fulkerson algorithm was presented by Simo Lotero, Vasilis Androulakis et al. [7], in which fire-induced hazards were quantified according to MSHA safety standards to enable the planning and evaluation of safe evacuation routes. An underground escape-route planning system based on the MSPFA was developed by Zhenguo Yan, Zhixin Qin et al. [8], utilising DXF technology to visualise evacuation paths and to facilitate dynamic adjustment of routes and optimisation of emergency-avoidance strategies during a fire. An improved Dijkstra algorithm, combined with simulation-model techniques for the analysis of personnel disaster-avoidance strategies under mine-disaster conditions and for one-time determination of the optimal path, was proposed by Guoju Lu, Guofei Zhao et al. [9]. A TRTV obstacle-avoidance planning method was applied by Xin Zhang, Chunyu Yang et al. [10], and, through the design of the RGPSO algorithm, an improved obstacle-avoidance planning algorithm was advanced; four representative map benchmarks were employed to demonstrate TRTV’s capacity for narrow-passage navigation and dead-zone avoidance in complex environments. Finally, an underground-mine vehicle path-planning method based on an improved A* algorithm and a fuzzy-control dynamic window was proposed by Chuanwei Zhang, Xinyue Yang et al. [11], and its effectiveness and feasibility were experimentally validated in order to meet the requirements of underground-vehicle route planning. In the field of deep learning and multi-agent collaborative rescue strategies, an improved multi-agent reinforcement learning method was proposed by Qingqing Wang, Hong Liu and others [12]. By integrating it with an improved social force model, the problem of mutual influence among agents in crowd simulation was effectively addressed, and excellent results were obtained in crowd evacuation. A review of multi-robot systems for Search and Rescue (SAR) operations was carried out by Jorge Peña Queralta, Jussi Taipalmaa and others [13]. This review provided certain new technical ideas for robot collaborative operations under factors such as active perception, shared autonomy, and awareness of the victim’s situation. A multi-agent discrete search and rescue path-planning problem based on mixed-integer linear programming was put forward by Jean Berger and Nassirou Lo [14]. Network modelling and CPLEX technology were successfully utilised, and the calculation results verified its value and effectiveness.
Optimisation of the emergency-rescue system has been primarily achieved through the application of evaluation methodologies and simulation-software analyses, and by the development of corresponding mathematical evaluation models to facilitate the allocation of mine emergency-rescue resources and the feasibility analysis of existing disaster-relief strategies, thereby refining current personnel-rescue procedures. A mine-fire emergency-rescue resource-allocation model was designed using Ventsim software by Nie Rongshan and Wang Zhen [15], in which factors influencing the allocation process were analysed, the relationship between resource-allocation volumes and underground resource availability was examined, and the linkage between mine incidents and command decisions was established. An emergency–rescue–capability evaluation model for mine water-inrush accidents, based on an improved combination-weighting method and an MPA-optimised BPNN algorithm, was proposed by Wei Wang, Xinchao Cui et al. [16] and applied in a Shanxi coal mine in China, thereby achieving accurate and effective evaluation of water-inrush rescue capabilities. Feedback on the usefulness of 21 proposed evacuation–intervention measures was collected by Eugene A. Gyawu, Danise A. Baker et al. [17], and the relationships between these measures and specific miner demographic parameters were assessed; the results indicated that SCSRs and RAs were the most beneficial interventions, and self-evacuation measures were improved via human–system integration. Multiple data-collection methods were employed by Moshood Onifade [18] to gather information on safety practices, mine rescue and safety management, and subsequent analyses demonstrated that self-rescue preparedness is among the most critical factors for an organised and timely response to mine emergencies. A digital-twin system for on-site mine-rescue environments was introduced by Hu Wen, Shengkai Liu et al. [19], in which the overall architecture, functional features and essential system–construction technologies were presented; the system was then applied to emergency rescue in a mine, resulting in enhanced rescue success rates. An assessment model based on grey system theory and a grey evaluation model was developed by Kejiang Lei, Dandan Qiu et al. [20] and deployed at the Lugou coal mine, culminating in the establishment of a mine-fire emergency-rescue indicator-system risk-assessment framework. Principal risk indicators—namely firefighting equipment, command decision-making, emergency education and training, and fire-alarm systems—were identified, and corresponding control measures were devised across four domains (rescue-organisation support, personnel support, material support and information support), thereby enhancing the fire-emergency rescue capability of the Lugou coal mine.
Currently, efforts in mine-personnel disaster-avoidance and relief are mainly concentrated on the planning of underground miners’ evacuation routes. However, research on the coordinated rescue of multiple teams at designated locations is relatively limited. Moreover, existing mine emergency-rescue algorithms have neglected the requirement for multi-route sharing at critical nodes, and the network visualisation they provide is limited. Consequently, a study has been undertaken to address the selection of rescue-team size and the efficient deployment of multiple teams to rescue numerous entrapped individuals underground, and an FA-MDPSO (Firefly Algorithm-Multiple Constraints Discrete Particle Swarm Optimisation) algorithm has been proposed for rapid multi-team rescue operations. In order to enhance the balance between fitness computation, node-search coverage, population diversity and weighted convergence time within the MDPSO (Multiple Constraints Discrete Particle Swarm Optimisation) framework, a fitness function that comprehensively incorporates these criteria has been designed and subsequently optimised via the FA (Firefly Algorithm) to improve MDPSO efficacy. To further refine rescue protocols, a node-importance analysis method has been introduced to facilitate the optimisation of mine emergency-rescue strategies. Moreover, to accommodate the constraints of mine-site environments, a graph-structure optimisation approach combining a force-directed layout with breadth-first search has been proposed to assist in on-site emergency-rescue command and control. Ultimately, the proposed methods are intended to provide technical support for the realisation of intelligent mine emergency-rescue operations.

2. Materials and Methods

Figure 1 is partitioned into two principal modules by means of dashed boxes, wherein the multi-team evacuation-path planning of MDPSO and the FA-based parameter-optimisation process are elucidated. In the upper module, the “Multiple Constraints DPSO for Rescue Path Planning” component presents a schematic of the particle-based optimal-path search, the velocity-update equations, the heuristic-scoring and phero-mone-update mechanisms, and the methods by which path cost and overall fitness are evaluated for single- and multi-team rescue deployments. To the right, the “Firefly Algo-rithm” component is employed to optimise parameters c_x, c_1_min, c_1_max, c_2, and c_3 by means of the optimal-fitness evaluation function, thereby enhancing the performance of the improved DPSO algorithm. In the lower module, the “Node Layout Optimisation Method” utilises a layout strategy combining a force-directed algorithm with breadth-first search: repulsive and attractive forces between nodes are computed, and, by way of velocity and position update equations alongside a system-energy evaluation, a visually layered mine-network graph is realised, as exemplified in the figure on the right. The complete flowchart thus systematically depicts the end-to-end technical framework from algorithmic optimisation through to result visualisation. The FA and the MDPSO are combined through five parameters, namely c_x, c_1_min, c_1_max, c_2, and c_3. The fitness function is used as the evaluation function to optimise these five parameters. The results of the optimisation are fed back to the MDPSO algorithm, and the five parameters within the algorithm are adjusted. Eventually, the optimisation of the parameters is achieved. Among them, the orange part represents the parameters to be optimised, the yellow part indicates the parameters that are currently being iteratively optimised, and the green part signifies that the parameter optimisation has been completed.

2.1. MDPSO Multi-Team Rescue Strategy Theory

Discrete Particle Swarm Optimisation (DPSO) is defined as a global-optimisation method directed at discrete spaces, in which collective behaviour is simulated to identify optimal solutions within a discrete domain [21]. On the basis of the DPSO algorithm, an MDPSO rescue algorithm suitable for multi-team rescue operations has been formulated; its fundamental principles are outlined below.

2.1.1. Definition of the Initial Graph-Structure Problem and Formulation of the Solution

The mine pathfinding process is commonly modelled as an undirected graph under the tunnel topology and is defined as G = ( V , E ) . The vertex set V = { 1 , 2 , , N } is taken to represent the key nodes within the mine, while the edge set E V × V denotes the directly accessible passages between nodes. The distance between nodes i and j is denoted by d i j ; should nodes i and j not be directly connected, d i j is assigned an infinite value.
In the multi-team pathfinding process, it is required that the set of requisite nodes be defined and that the overall planned route be configured as a closed loop: rescue teams are deployed from the shaft entrance (denoted s ), personnel are extricated from within the mine, and the teams return to the shaft entrance, thereby finalising the rescue. The set of requisite nodes is denoted by R V , comprising those nodes which must be traversed by at least one rescue team.
To enable coordinated scheduling of multiple rescue teams, the set of requisite nodes R is partitioned in accordance with the number of available teams, K . By segmenting R , candidate requisite-node sequences R g ( g = 1 , 2 , , K ) are obtained; the route sequence for each rescue team—comprising the start node, the requisite nodes within the corresponding partition and the end node—is represented by Equation (1).
P ( g ) = { s , r 1 ( g ) , r 2 ( g ) , , r n g ( g ) , s }

2.1.2. Principle of Single-Segment Path Planning

For each segment (whether between consecutive requisite nodes within a partition, from the start node to a requisite node, or from a requisite node to the end node), the MDPSO algorithm is employed to determine the optimal path.
(1)
Particle Representation and Initialisation
Each particle is used to represent a candidate path x . The vector x is of length equal to the number of nodes; its non-zero entries sequentially record the nodes traversed, and any remaining positions are padded with zero. Initial paths are generated by a heuristic search function, namely a Random Depth-First Search (DFS). For a given path x = p 1 , p 2 , , p n , after the zero values have been removed, the fitness is defined as the total cost of the path, as given by Equation (2).
f ( x ) = i = 1 m 1   d p i , p i + 1
In Equation (2), f ( x ) denotes the fitness value, representing the total cost.
A velocity matrix is constructed as a binary matrix V { 0 , 1 } N × N , which characterises the “velocity” of a particle by indicating which node pairs are subject to adjustment. The initial velocity is determined by a random matrix that accounts for both symmetric and asymmetric constraints.
(2)
Velocity-Update Method
In the discrete domain, velocity updating is effected via the assembly of multiple components, each corresponding to particle inertia, convergence towards the personal best P b e s t , and convergence towards the global best G b e s t . The inertia weight is dynamically varied as a function of the iteration count, as expressed in Equation (3).
w = c 1 _ m a x i t e r m a x _ i t e r ( c 1 _ m a x c 1 _ m i n )
In Equation (3), c 1 _ m a x and c 1 _ m i n are defined, respectively, as the upper-limit and lower-limit weights.
The velocity-update mechanism comprises three components: the inertia component, the personal-best convergence component and the global-best convergence component. The inertia component V 1 is defined by Equation (4).
V 1 = P M 2 V M ( V c u r r e n t , w )
In Equation (4), the function PM2VM is employed to generate a new matrix from the current velocity matrix and the weight w . The calculation method of the PM2VM function: Suppose the current path matrix is V c u r r e n t , the frequency is w, and the order of the matrix V c u r r e n t is n . A random n × n matrix R is generated and symmetrized to obtain R = 1 2 ( R + R T ) . Subsequently, two intermediate matrices P 1 = P f and P 2 = P R are calculated. Finally, V 1 is calculated. For each element ( i , j ) in the matrix, V 1 i , j is determined as V 1 i , j = 1 , P 1 i , j > P 2 i , j 0 , P 1 i , j P 2 i , j .
The personal-best convergence component is given by Equation (5).
V 2 = P M 2 V M s u b M P b e s t , V c u r r e n t , c 2
In Equation (5), the function s u b M is used to compute the difference between the personal-best adjacency matrix P b e s t and the current velocity matrix, and this difference is then subjected to PM2VM and scaled by the coefficient c 2 . The calculation method of the s u b M function: Suppose the matrices P b e s t and V c u r r e n t are of the same order, and the order of the matrices is n . First, an n × n matrix filled with all 1s, denoted as 1 n × n , is created, so that t e m p M 1 = 1 n × n . Then, the matrix difference t e m p M 2 = M 1 M 2 is calculated. Finally, a logical AND operation is performed to obtain the result matrix r e s u l t M . For each element ( i , j ) in the matrix, r e s u l t M i , j is given by t e m p M 1 ( i , j ) t e m p M 2 ( i , j ) .
The global-best convergence component is represented by Equation (6).
V 3 = P M 2 V M s u b M G b e s t , V c u r r e n t , c 3
Finally, these components are combined via an intersection operation to produce the final velocity update V , as specified in Equation (7).
V = a n d M ( V 1 , a n d   M ( V 2 , V 3 ) )
In this formulation, the function a n d M applies bitwise logic to determine which candidate edges are activated.
(3)
Path-Adjustment Method Based on Candidate Edges
From the updated velocity matrix V , a candidate-edge set E is constructed, as specified by Equation (8).
E = { ( i , j ) V ( i , j ) = 1   and d i j < }
s c o r e i j = τ i j α 1 d i j β C p a r a m
For each candidate edge, the heuristic score is calculated in accordance with Equation (9), wherein τ i j denotes the pheromone level on edge ( i , j ) and α and β govern the relative influence of pheromone intensity and distance heuristic, respectively. C p a r a m serves as an additional scaling factor. The selection probability for each candidate edge is then defined by Equation (10). An edge e * = ( i * , j * ) is randomly selected based on the cumulative probabilities; the chosen edge is incorporated into the current path, and the local node ordering is subsequently adjusted to yield the updated route.
p i j = s c o r e i j ( k , l ) E   s c o r e k l
(4)
Pheromone-Update Mechanism
Upon the conclusion of each iteration, a global pheromone update is performed for all edges. Initially, pheromone evaporation is applied in accordance with Equation (11), where ρ represents the evaporation coefficient. Thereafter, pheromone reinforcement is conducted along every edge of the global best path P g l o b a l = { p 1 , p 2 , , p m } , with a symmetric update of τ p i , p i + 1 as defined by Equation (12).
τ i j τ i j ( 1 ρ )
τ p i , p i + 1 τ p i , p i + 1 + 1 F g l o b a l

2.1.3. Overall Fitness and Scheme Evaluation Method for Multi-Team Rescue

In order to facilitate effective multi-team rescue, each grouping scheme (i.e., the combination of routes assigned to each rescue team) is assessed by means of two components:
(1)
Single-Team Path Cost
f g = C o s t ( P ( g ) ) = i = 1 | P ( g ) | 1   d p i ( g ) , p i + 1 ( g )
The cost of each individual rescue-team path is denoted by f g = C o s t ( P ( g ) ) , as given in Equation (13). The maximum of these costs across all K teams is then used to define the bottleneck of the rescue strategy, namely F g r o u p = m a x g = 1 , , K   f g .
(2)
Requisite-Node Coverage
The union of nodes covered by all teams is denoted by V c o v e r , as specified in Equation (14).
V c o v e r = g = 1 K   { p P ( g ) p > 0 }
In Equation (14), should the set of requisite nodes R not be entirely included within V c o v e r ( i . e . ,   \ R V c o v e r ) , a penalty of 10 6 is imposed. The overall fitness of the grouping scheme is then formulated in Equation (15).
F t o t a l = F g r o u p + I { R V c o v e r } × P e n a l t y
In Equation (15), where I { · } denotes the indicator function.

2.1.4. Construction of the Overall Rescue Scheme and Node-Importance Statistics

(1)
Construction of the Overall Scheme
Upon solution and evaluation of each grouping scheme, the scheme exhibiting the minimum overall fitness is selected. The individual rescue-team routes are denoted { P ( 1 ) , P ( 2 ) , , P ( K ) } and these routes are concatenated to form the final closed-loop path, as specified in Equation (16).
P o v e r a l l = P ( 1 ) P ( 2 ) P ( K )
(2)
Node-Visit Counting
Throughout the search process, the frequency with which each node v is covered by all rescue teams is recorded for subsequent analysis of node importance, as defined in Equation (17).
VisitCount ( v ) = g = 1 K   I { v P ( g ) }

2.2. Firefly Algorithm Heuristic Optimisation Theory

The Firefly Algorithm (FA) is a heuristic method inspired by the flashing behaviour of fireflies, in which their bioluminescent signals are treated as an attraction mechanism [22]. Since MDPSO is capable of identifying a final solution, a composite fitness function that integrates node-search coverage, diversity and convergence-time weighting has been devised to enhance the optimisation performance of MDPSO in rescue-path planning.

2.2.1. Fitness-Function Computation Method for Mine-Tunnel Topologies

(1)
Search Coverage Computation Method
In order to effectively improve search coverage, the coverage metric has been defined as Equation (18).
C o v e r a g e = V N n o d e
In Equation (18), where N n o d e denotes the total number of nodes in the mine tunnels, V represents the count of unique nodes visited during the rescue-path search, and Coverage is the search-coverage ratio.
(2)
Path Diversity Computation Method
Path diversity quantifies the degree of dissimilarity among previously explored routes. Within the algorithm, the Jaccard similarity coefficient is employed to measure the similarity between any two paths P 1 and P 2 :
J P 1 , P 2 = P 1 P 2 | P 1 P 2 |
In Equation (19), where P 1 P 2 is the number of nodes common to both paths, and | P 1 P 2 | is the cardinality of their union. Given a historical set of paths P 1 , P 2 , , P n , the cumulative similarity S between the latest path P n and all preceding paths is defined as Equation (20).
S = i = 1 n 1   J ( P i , P n )
To normalise for the total number of possible pairwise comparisons, n ( n 1 ) 2 , a diversity metric is constructed as Equation (21), indicating that diversity decreases as path similarity increases.
D i v e r s i t y = 1 S n ( n 1 ) 2
(3)
Convergence–Time Computation Method
The convergence–time evaluation comprises three elements: the recording of the best fitness values, the definition of the relative change rate, and the specification of convergence–judgement criteria, as expressed in Equations (22)–(24). Let Δ f ( t ) denote the best-fitness change at iteration t , and ε the convergence threshold (set to 0.001). If Δ f ( t ) < ε , Δ f ( t + 1 ) < ε , Δ f ( t + k 1 ) < ε holds for k successive iterations, convergence is deemed to have occurred, and the convergence time T c is assigned the value of the initial iteration t .
Δ f ( t ) = | f ( t + 1 ) f ( t ) | | f ( t ) |
Δ f ( t ) < ε
Δ f ( t ) < ε , Δ f ( t + 1 ) < ε , , Δ f ( t + k 1 ) < ε
T c = m i n t { 1 , 2 , , m a x i t e r k + 1 } Δ f ( t + i ) < ε , i = 0 , 1 , , k 1
In Equation (25), if convergence is detected, otherwise, T c = m a x _ i t e r .
By combining the three criteria above, the final fitness-value computation is expressed as Equation (26).
f i t n e s s = w c o v 1 C o v e r a g e + w d i v 1 D i v e r s i t y + w c o n v T c
In Equation (26), where the weighting coefficients are w c o v = 0.4 , w d i v = 0.3 , w c o n v = 0.3 .

2.2.2. Firefly Algorithm Optimisation Principles

(1)
Fitness-Related Calculation Method
Let the solution at firefly i be denoted by x i . To avoid division by zero, a small positive constant δ was introduced ( δ = 10 6 ) . The brightness I i is then defined in Equation (27).
I i = 1 f ( x i ) + δ
In Equation (27), I i denotes the brightness of firefly i , so that, in a minimisation context, fireflies with lower objective-function values exhibit higher brightness. The term f ( x i ) represents the fitness of the solution at firefly i .
(2)
Attractiveness Function Calculation Method
The attractiveness between fireflies is computed as per Equation (28).
β i j = β 0 I j I i e x p ( γ r i j 2 ) = β 0 f ( x i ) + δ f ( x j ) + δ e x p ( γ r i j 2 )
In Equation (28), β 0 is the base attractivity constant, representing the attractive force when two fireflies are co-located and their brightness ratio equals one. The symbols I i and I j denote the brightnesses of fireflies i and j , respectively, while f x i and f x j are their fitness values. The light-absorption coefficient γ (together with β 0 ) determines the rate at which attractiveness decays with distance. The Euclidean distance r i j = x i x j = k = 1 d   ( x i , k x j , k ) 2 , where d is the dimensionality of the search space, influences the attractiveness such that greater distances yield weaker attraction. The exponential term e x p ( γ r i j 2 ) serves as the distance-attenuation factor.
(3)
Position Update Equation
According to Equation (29), whenever the fitness of firefly j exceeds that of firefly i , firefly iii is moved towards firefly j . A random-perturbation factor α 0 and a random vector ε i uniformly distributed in [ 0 , 1 ] are included to maintain stochastic exploration.
x i t + 1 = x i t + β ( r i j ) x j t x i t + α 0 ε i 0.5

2.3. Force-Directed + Breadth-First Search Graph-Structure Optimisation Theory

In order to more effectively present rescue-team routes in alignment with conventional mine ventilation-network diagrams, a Force-Directed + BFS(Breadth-First Search) graph-structure optimisation method was developed to enable efficient command of rescue teams [23,24].

2.3.1. Inter-Node Force Computation Method

For the original graph, the initial positions of the nnn nodes, p i ( 0 ) = ( x i ( 0 ) , y i ( 0 ) ) , were generated at random within an ellipse of semi-major axis a and semi-minor axis b . Polar coordinates were sampled via r i = U n i f o r m ( 0 , 1 ) , θ i = 2 π U n i f o r m ( 0 , 1 ) , and converted to Cartesian coordinates by x i ( 0 ) = a r i c o s θ i , y i ( 0 ) = b r i s i n θ i . All nodes were initialised with zero velocity, i . e . ,   \ v i ( 0 ) = ( 0 , 0 ) , i = 1 , 2 , , n .
(1)
Repulsive-Force Computation
During each iteration, nodes were subjected to both repulsive and attractive forces. For any node pair ( i , j ) , the displacement vector was defined as Δ p i j = ( x j x i , y j y i ) , and the squared distance was computed as r i j 2 = ( x j x i ) 2 + ( y j y i ) 2 + ϵ , where ϵ is a small constant introduced to prevent division by zero. Consequently, the distance was given by r i j = r i j 2 . Adopting a Coulomb-law formulation, the scalar repulsive force was defined by Equation (30).
F r e p ( r i j ) = k _ r e p r i j 2
In Equation (30), where k _ r e p is the repulsion constant (set to 3000).
The repulsive force acting on node iii was then obtained as per Equation (31), and node j was subjected to an equal and opposite force (Equation (32)). By superposing the repulsive forces over all node pairs, the total repulsive force on each node was acquired, as shown in Equation (33).
F r e p , i ( i j ) = F r e p ( r i j ) Δ p i j r i j
F r e p , j ( i j ) = + F r e p ( r i j ) Δ p i j r i j
F r e p , i = j i   F r e p , i ( i j )
(2)
Attractive-Force Computation Method
For any node pair ( i , j ) connected by an edge in the graph, the attractive force is computed using a linear-spring model. The scalar form of the attraction is defined by Equation (34):
F a t t r ( r i j ) = k _ a t t r × r i j
In Equation (34), where k _ a t t r is the attraction constant, set to 0.05.
For the edge ( i , j ) , the force acting on node i is given by
F a t t r , i ( i j ) = + F a t t r ( r i j ) Δ p i j r i j
And the force acting on node j is
F a t t r , j ( i j ) = F a t t r ( r i j ) Δ p i j r i j
The total attractive force on node i is obtained by summing over all incident edges:
F a t t r , i = j : A ( i , j ) = 1   F a t t r , i ( i j )
Finally, the net force on node i is expressed as the sum of its repulsive and attractive components:
F i = F r e p , i + F a t t r , i

2.3.2. Velocity and Position Update Method

On this basis, a discrete time-step d t and a damping coefficient d a m p were used to update each node’s velocity and position. The velocity update was given by Equation (39):
v i ( t + 1 ) = d a m p v i ( t ) + d t F i ( t )
In this expression, d a m p denotes the velocity–decay coefficient (set to 0.85) and d t is the time step (taken to be 1.0). The new position was then obtained from the updated velocity, as shown in Equation (40):
p i ( t + 1 ) = p i ( t ) + d t v i ( t + 1 )

2.3.3. Node Constraints and Adjustment Method

To ensure that all nodes remained within the ellipse, the constraint x i 2 a 2 + y i 2 b 2 1 was imposed. If the updated node position p i = ( x i , y i ) violated this condition (i.e., \ x i 2 a 2 + y i 2 b 2 > 1 ), it was projected back onto the ellipse boundary by scaling with s i = 1 x i 2 a 2 + y i 2 b 2 and the node coordinates were updated as ( x i , y i ) s i x i , y i .
A BFS algorithm was then employed to compute the hierarchical level L i of each node relative to a reference node, within the interval [ L m i n , L m a x ] . An ideal vertical coordinate was defined by y i d e s = b + 2 b L i L m i n L m a x L m i n . Each node’s y -coordinate was interpolated towards this target via y i 1 α y y i + α y y i d e s , where α y (set to 0.2) is an adjustment factor.
After each iteration, the system’s kinetic energy was calculated as per Equation (41):
E k i n = 1 2 i = 1 n   v x , i 2 + v y , i 2
In Equation (41), convergence was deemed to have been achieved, and iterations were terminated once E k i n < 10 6 .
To ensure that certain nodes remained within the graphical bounds, the values y t o p = m a x i   y i + 10 , y b o t t o m = m i n i   y i 10 were defined. Nodes exceeding y t o p = m a x i   y i + 10 , and those below y b o t t o m = m i n i   y i 10 were assigned y i = y t o p , y i = y b o t t o m , thus finalising the node-layout optimisation.

2.4. Tunnel Equivalent-Length Computation Under Fire Conditions

The computation of tunnel equivalent length during fire was recognised as a critical component for multi-team rescue-path planning. Based upon the methodology of Zhenguo Yan, Zhixin Qin et al. [8], the fire-period tunnel equivalent length was determined in accordance with Equations (42)–(45).
τ U i j = α 4 α 1 α 2 α 3 v ( U i j ) + ε = 1 n β ε [ t U i j ] μ i μ j + t
t U i j = α 4 α 1 α 2 α 3 u ( U i j )
ϵ = 601.85 α 2 e 0.08 θ
ϵ m a x = 1812 e 0.046 θ
In these four Equations, α 1 is the influence coefficient of the roadway height. α 2 is the influence coefficient of the roadway slope. α 3 is the influence coefficient of the obstacles in the roadway. α 4 is the roadway length, m. v ( U i j ) is the predicted escape speed of personnel without smoke spreading in the roadway, m/s. u ( U i j ) is the predicted escape speed of personnel when smoke spreads along roadways, m/s. t U i j is the predicted time needed for personnel pass through the roadway in the case of smoke spreading, s. t is the temperature threshold. β ε is the influence coefficient of different toxic and harmful gas concentrations in the roadway. μ i , μ j is the coefficient of the end points of the roadway, i and j , when there are toxic and harmful gases in the connecting roadway; the coefficient is a multiple of 1.5 when the same toxic and harmful gases exist in the connecting roadway. ϵ is the time when the roadway is allowed to reach high temperatures, min. θ is the temperature, °C. ϵ m a x is the maximum endurance time of the human body in a high-temperature environment.

3. Results

In order to more effectively verify the effectiveness of the model, performance tests were conducted on large-scale networks as a supplement to verify the scalability of the algorithm in complex scenarios. In this section, multiple datasets from the DIMACS graph-theoretic benchmark suite, namely Dsjc250.5, Dsjc500.1, flat300_28_0, r250.5, and r1000.5 were selected for model performance evaluation. Among them, Dsjc250.5, Dsjc500.1, flat300_28_0, r250.5, and r1000.5 have 250, 500, 300, 250, and 1000 nodes, respectively. Finally, a simplified mine model derived from an actual Shaanxi mine was employed as test data to validate the optimality of both the node-layout optimisation and the multi-team rescue-route planning results.

3.1. Analysis of the Improved DPSO Algorithm’s Path-Planning Capability

To abstract the mine galleries, the prevailing approach of converting mine-excavation engineering plans into ventilation-system diagrams was adopted, thereby yielding a mine-ventilation network graph that maps the physical tunnels onto a network topology. Given that the number of internal tunnel nodes does not exceed 1000, the DIMACS instances Dsjc250.5, Dsjc500.1, flat300_28_0, r250.5, and le450_25c were assembled to formulate shortest-path problems spanning from the smallest to the largest numbered nodes. Path planning was then performed under both persistent-pheromone and reset-pheromone conditions, with analyses conducted to assess the impact of varying edge-weight perturbation and particle counts on planning performance. Optimal model parameters were subsequently chosen to enhance the accuracy of multi-team rescue-route planning within the mine.
Four algorithms—the improved DPSO, GA (Genetic Algorithm), TS (Tabu Search) and SA (Simulated Annealing)—were compared across the five case studies (Dsjc250.5, Dsjc500.1, flat300_28_0, r250.5 and le450_25c). Each case was subjected to ten perturbation events, with edge-weight disturbances set at 10%, 30%, 50%, and 70%. Performance under persistent- and reset-pheromone scenarios was contrasted by means of absolute error, and the resulting error distributions were visualised via boxplots and heatmaps [25,26,27,28].
In Figure 2, SA results are depicted in purple, TS in blue, GA in orange and DPSO in green. Across all disturbance levels (0.1, 0.3, 0.5, and 0.7), the median marker for DPSO (solid green) remains consistently lower than those of SA, TS, and GA, indicating that DPSO typically yields solutions with smaller deviations. The DPSO box (green outline) exhibits the smallest IQR (interquartile range) and shortest whiskers, demonstrating minimal fitness variability and strong robustness. Furthermore, DPSO produces the fewest outliers (circles beyond the whiskers) at each disturbance level, signifying a reduced sensitivity to edge-weight fluctuations and resilience against single, large-scale perturbations.
In the heatmap presented in Figure 3, colour intensity (dark blue → yellow) corresponds to median magnitude. The DPSO row is predominantly dark blue (lowest range), whereas GA, SA, and TS display lighter blues and occasional yellow cells (higher ranges). Across all four disturbance-level columns, DPSO’s cells remain at similarly low colour grades, evidencing that its performance degrades only marginally with increasing perturbation strength.
It is reasoned that, in dynamic scenarios, DPSO maintains and continually reinforces pheromone information along the global best path, enabling rapid recovery to near-optimal regions following each disturbance. By combining the global search capability of particle swarms with local refinement mechanisms, DPSO circumvents entrapment in local optima while preserving convergence speed. In contrast to GA’s recombination/mutation, TS’s tabu-neighbourhood strategy and SA’s stochastic jumps, DPSO’s velocity-and-position update scheme is shown to sustain superior stability and faster adaptive response under dynamic conditions.

3.2. Node-Layout Optimisation

In order to perform effective node-layout optimisation, a Force-Directed + BFS graph-structure optimisation theory was applied. A method for transforming the original mine-network diagram into an elliptical-layout network was developed, thereby rendering the mine diagram more visually appealing and conducive to command-and-control decisions during rescue operations. Furthermore, this transformation methodology may provide algorithmic support for the layout optimisation of large-scale network-diagram datasets.
To conduct a more effective analysis, a simplified model of a real mine system was selected, based on the fire escape routes in mine planning, so that the path-finding process inside the mine roadway can be presented more clearly and meticulously. For the verification of large-scale roadways, the roadway topological structure of DIMACS was analysed.
Figure 4 shows the composite topology of airflow and rescue routes within the coal mine tunnel network, which is presented under the state of fire–smoke propagation. All nodes are depicted as grey circles; the rescue-start node is highlighted by a green circle (node 1), and the locations of trapped personnel are indicated by red circles (nodes 15, 19 and 21). Arrow directions denote airflow: green arrows signify fresh air being pumped in from the entrance towards each node, whereas red arrows indicate the backflow of contaminated air along the routes. The numerical labels on each edge correspond to the equivalent length of that tunnel segment. The network is laid out from top to bottom and left to right in accordance with the hierarchical order of the rescue path, making the fresh-air channels from the start node to each trapped node immediately apparent. Along the main trunk path (1→3→5→6→13→14→17→18→21), contiguous green arrows ensure adequate fresh-air supply; on the branches (e.g., 6→19 and 13→12→11→10→8→4→2→…), red arrows reveal the routes of contaminated-air recirculation [29]. The locations of the pollutant location are situated in the middle of node 2, node 12 and node 13, as well as at the location of node 15. Therefore, the airflow in this area is considered to be stale air.
In the node-layout optimisation process, the efficacy of the force-directed layout was demonstrated by comparison with a conventional top-down layered layout. The parameters used for the force-directed optimisation are listed in the accompanying table. In the left panel of Figure 5, the top-down layered layout exhibits numerous node crossings, which are generally avoided to improve graphical clarity. In contrast, the right panel shows the force-directed, ellipse-style arrangement: nodes 20 and 21 are positioned accurately at the top of the diagram, node 1 at the bottom, and all nodes follow an elliptical distribution. The rescue route is drawn in red in the left panel and in blue in the right panel. Overall, the force-directed layout yields a visually appealing and unambiguous node arrangement, thereby supporting effective on-site rescue command.
In Table 1, the parameters a , b , and p are defined as follows: a is taken as the semi-major axis length of the ellipse used for layout; b is taken as the semi-minor axis length; and p denotes the scaling exponent applied during the secondary positional adjustment within the ellipse. The force-directed algorithm parameters comprise k_rep, k_attr, damp, dt, and k_rep. The constant k_rep governs the magnitude of the repulsive force between any two nodes, while k_attr governs the magnitude of the attractive force for each actual edge in the graph. The damping coefficient damp is applied to node-velocity updates to simulate frictional or resistive forces and to inhibit excessive oscillations. The time step dt is employed for the integration of velocity and position updates. The maximum iteration count, maxIter, specifies the maximum number of adjustment cycles permitted, and the minimum kinetic-energy threshold, minEnergy, provides an early-termination criterion for the layout process: if 1 2 v x 2 + v y 2 < m i n E n e r g y convergence is assumed and iterations cease. Moreover, node 1 was assigned to the lowest BFS layer and nodes 20 and 21 to the highest BFS layer, thereby ensuring that nodes are arranged in accordance with their connectivity and designated importance.
To optimise the node layout position more effectively, the grid search algorithm is employed. Three key parameters, namely k_rep, k_attr, and damp, are utilised to optimise the node layout position. Three parameters, namely the optimal distribution distance, the node deviation value, and the average node deviation value, are adopted as the parameters for node layout optimisation. The optimal distribution distance d i s t a n c e = A c r N n o d e , where A c r represents the area of the ellipse and N n o d e is the number of nodes. The node deviation value d e v i a t i o n = D x , i D x , i + 1 2 + D y , i D y , i + 1 2 d i s t a n c e , in which D x , i and D y , i are the coordinates of the i th node in the x and y directions, respectively, and d i s t a n c e is the optimal distribution distance calculated above [30]. The average node deviation value a v g _ d e v i a t i o n = i = 1 n 1 d e v i a t i o n i n 1 , where d e v i a t i o n i is the deviation value between all adjacent nodes, and then it is divided by the number of nodes minus 1. During the grid search process, after calculating the average node deviation value a v g _ d e v i a t i o n for each set of parameters (k_rep, k_attr, damp), it is compared with the currently recorded minimum node deviation value b e s t _ a v g _ d e v i a t i o n . If the current a v g _ d e v i a t i o n is less than b e s t _ a v g _ d e v i a t i o n , b e s t _ a v g _ d e v i a t i o n is updated, and the corresponding parameters k_rep, k_attr and damp are recorded. The selection range of the parameter k_rep is [1000, 5000], the selection range of the parameter k_attr is [0.01, 0.1], and the selection range of the parameter damp is [0.8, 0.9]. The final parameter selection results are k _ r e p = 3000 , k _ a t t r = 0.05 , d a m p = 0.85 , and the average node deviation value d e v i a t i o n = 0.74 .

3.3. Comparative Analysis of Optimisation Algorithms

To facilitate a more effective optimisation of algorithmic performance, the fitness function f i t n e s s = w c o v 1 C o v e r a g e + w d i v 1 D i v e r s i t y + w c o n v T c was employed, and four widely used heuristic optimisers—ACO (Ant Colony Optimization), FA (Firefly Algorithm), GWO (Grey Wolf Optimizer) and WOA (Whale Optimization Algorithm)—were contrasted. The respective parameter configurations are detailed in Table 2.
In Table 2, the number of iterations (numIterations) was unified at 100 for all algorithms. For ACO, the number of ants (numAnts) determines the count of solutions constructed in parallel during each iteration, and the greediness threshold q0 controls whether, when a random number is less than or equal to q0, the ant selects the edge with maximum pheromone or otherwise resorts to roulette-wheel selection. In FA, the quantity of fireflies (numFireflies) governs the number of solutions updated; the base attractiveness constant beta0 dictates the strength of inter-firefly attraction; the light-absorption coefficient gamma modulates the decay of attractiveness with distance; and the random-perturbation factor alpha0 preserves population diversity. In GWO, the size of the wolf pack (numWolves) sets the number of solutions updated, and the parameter a_max determines the balance between exploration and exploitation, analogous to a probabilistic selection mechanism. In WOA, the number of whales (numWhales) specifies the solution-set size; a_max controls the step length of the search; and the parameter b defines the spiral-shaped movement characteristic exhibited by whales when encircling prey. In the FA, beta0 is set to 1. An excessively large value of beta0 can lead to the algorithm becoming trapped in a local optimal solution, while an excessively small value of beta0 can cause the convergence to be too slow. Gamma is set to 1; a too large value of gamma will result in a smaller interaction range of fireflies, which is more conducive to local search, whereas a too small value of gamma will lead to an overly large interaction range of fireflies, making it more suitable for global search. Alpha is set to 0.2; an excessively small value of alpha can cause the algorithm to be trapped in a local optimum, and an excessively large value of alpha will make it difficult for the algorithm to converge. Through multiple comparisons, it has been found that such parameter settings can better balance the local optimum and the global optimum [31].
For effective optimisation, the MDPSO hyperparameters c_x, c_1_min, c_1_max, c_2, c_3 were subjected to tuning using the constructed fitness function. The optimisation outcomes are illustrated in Figure 6: the ACO algorithm is represented by the blue curve; the GWO algorithm by the orange curve; the WOA algorithm by the yellow curve; and the FA by the purple curve. Among these, the ACO algorithm did not fully converge, whereas GWO and WOA achieved slightly higher fitness values yet still outperformed ACO. The FA was found to be optimal, exhibiting a comparatively low fitness level from the initial iteration.
Figure 7 presents a line-heatmap of the FA-driven parameter-optimisation process for MDPSO. The colormap on the right indicates the mapping between fitness values and colours, with red denoting larger fitness values and blue denoting smaller ones. During the FA optimisation, the optimal parameter trajectory is depicted as a deep-blue line. The first axis corresponds to fitness values; the second to c_x; the third to c_1_min; the fourth to c_2; and the fifth to c_3. The optimal parameter set was determined to be: c _ x = 0.737872 , c _ 1 _ m i n = 0.135363 , c _ 1 _ m a x = 0.521081 , c _ 2 = 0.6337 , c _ 3 = 0.692428 .
In Figure 8, The FA is characterised by the clearest parameter-fitness relationships: the Pearson correlation coefficient between c_1_min and fitness reaches +0.85, whereas those between c_2 and fitness and between c_3 and fitness are approximately −0.71 and −0.81, respectively. It may thus be inferred that an increase in c_1_min together with reductions in c_2 and c_3 results in a marked improvement in final fitness—a unidirectional, strongly linear relationship that greatly eases parameter tuning. By contrast, within the WOA algorithm, near-unity collinearity among parameters renders their individual effects indistinguishable, thereby inhibiting targeted adjustment; under ACO, parameter-fitness correlations are negligible (coefficients near zero), indicating that modifications to any single parameter produce only marginal performance changes; and although GWO exhibits moderate correlations (circa ± 0.3–0.7), it lacks the simultaneous presence of strong positive and strong negative sensitivities that would enable a focused optimisation strategy. In FA, however, the distribution of parameter sensitivities is balanced—some parameters exert strong positive influence, others strong negative, and some remain neutral—thereby establishing a “push-pull” dynamic in which raising certain parameters “pulls” performance upwards while suppressing others “pushes” inferior solutions away, leading to an efficient and stable route to performance enhancement.
In Figure 9, from the FA scatter matrix, it can be observed that, in the five-dimensional space defined by c_1_min, c_x, c_1_max, c_2, and c_3, the samples maintain a relatively uniform coverage while exhibiting weak to moderate pairwise linear correlations. The histograms on the diagonal indicate that c_1_min and c_2 tend to cluster in the mid-to-high value ranges, whereas the distribution of c_3 is slightly skewed towards mid-to-low values; such a distribution is conducive to preserving sufficient exploration during the global search phase. The off-diagonal scatter plots reveal, for instance, a mild negative correlation between c_1_min and c_3, and a weak positive correlation between c_x and c_2. These relationships suggest that the cognitive-learning and social-learning components of the FA algorithm can be tuned relatively independently, thereby mitigating the risk of premature convergence arising from strong inter-parameter coupling.
Based on this, the t-test method and p-value test were adopted to analyse the comparison results of the four algorithms from a statistical perspective. The predicted fitness values of different algorithms were used as the inspection criteria, and relevant analyses were carried out to verify the correlations among the four algorithms. The results show that when comparing WOA with ACO, the t-statistic is −25.33 and the p-value is 0.00050. When comparing WOA with FA, the t-statistic is 22.32 and the p-value is 0.00059. When comparing WOA with GWO, the t-statistic is −19.86 and the p-value is 0.00052. When comparing ACO with FA, the t-statistic is 28.07 and the p-value is 0.00061. When comparing ACO with GWO, the t-statistic is 18.41 and the p-value is 0.00090. When comparing FA with GWO, the t-statistic is −29.48 and the p-value is 0.00024. Through comprehensive comparison, it is found that the t-value of FA is the smallest, and the p-values of the four algorithms are all less than 0.05, which meets the requirements of the hypothesis test and verifies the high efficiency of the FA.

3.4. Rescue-Route Planning Results

An experiment was conducted to plan the underground rescue routes for multiple teams, with nodes 19, 15, and 21 selected as the trapped-person locations. The number of rescue teams was varied from one to three, and the FA-optimised parameters c _ x = 0.737872 , c _ 1 _ m i n = 0.135363 , c _ 1 _ m a x = 0.521081 , c _ 2 = 0.6337 , c _ 3 = 0.692428 were employed.
Using the MDPSO algorithm, the rescue routes for each grouping were computed, and the results are summarised in Table 3. In Table 3, the longest path length for each configuration is reported. For the single-team scenario, the route length of 72,242.02 corresponds to the only team visiting nodes 15, 19 and 21 in sequence. In the two-team configuration, the maximum route length was 66,294.86: the first team traversed nodes 15 and 19, while the second team covered node 21. In the three-team case, the longest route remained 66,294.86, with each team assigned to a single node (team 1 to node 15, team 2 to node 19 and team 3 to node 21). Although two teams or three teams both yielded feasible routes, the three-team deployment achieved the shortest equivalent path of 56,357.02 and was therefore selected as the optimal configuration.
Figure 10 is presented as the outcome of the multi-team rescue-route planning. The network is arranged using a hybrid Force-Directed + BFS layout: all 21 nodes are shown as white circles with black borders, and the underlying topology is depicted with thin black arcs. Four high-contrast colours are employed to distinguish each rescue team’s route allocation: The deep-red trunk path (nodes 1→3→5→6→13) is rendered as the shared backbone route for all teams. The blue essential segment (nodes 14→15) is highlighted as the mandatory route for the first team. The orange branch arc (nodes 6→19) marks the route assigned to the second team. The yellow extension segment (nodes 14→17→18→21) indicates the third team’s path along the northern branch.

3.5. Node Importance Analysis

In Figure 11, the “Node vs. Team-Count Heatmap” (top-left), a colour gradient from deep indigo (lowest visit frequency) through pale green (moderate) to bright yellow (highest) is employed. When only one rescue team is deployed (first column), the vast majority of nodes appear in deep indigo or indigo, indicating very low visit counts. With two teams (second column), certain hub nodes transition to green hues, reflecting a marked increase in visit frequency. Under three-team deployment (third column), a number of critical nodes (e.g., \ nodes 1, 3, 6, and 12) are rendered bright yellow, signifying highly concentrated visitation. This visualisation intuitively demonstrates that, as team count increases, both the overall visit frequency and its concentration on a small set of key nodes rise.
In the “Grouped Bar Chart” (top-right), three shades of blue distinguish the deployment scenarios: dark blue for “1 Team”, teal blue for “2 Teams”, and steel blue for “3 Teams”. For each node, the three adjacent bars form a stepped increase from dark blue through steel blue: peripheral nodes exhibit near-zero dark-blue bars, slight teal-blue increments, and prominent steel-blue bars at principal hubs (nodes 1, 3, 6 and 12). This chart quantitatively confirms that increased team numbers shift visitation towards core nodes, thereby intensifying visit concentration.
The “Rank-Frequency Curve” (bottom-left) depicts descending order visit counts under the three scenarios, again using dark blue, teal blue, and steel blue. All three curves display long-tail distributions; however, the steel-blue curve lies highest overall, followed by the teal-blue curve, and finally the dark-blue curve, indicating that three teams achieve the broadest coverage, two teams the next, and one team the least. Beyond validating the rise in total visits with team number, this plot also reveals the “long-tail” nature of node importance, wherein a few nodes account for the majority of visits.
The “Radial Plot of Visit Counts” (bottom-right) arranges nodes uniformly around a polar coordinate system, with dark blue, teal blue, and steel blue radial lines representing the visit counts for one, two, and three teams, respectively. Pronounced peaks appear on the steel-blue curve at nodes 6, 12, and 3, with diminishing peak magnitudes on the teal-blue and dark-blue curves. This polar visualisation enables immediate comparison of node importance and distribution patterns across deployment scenarios, further illustrating the trend of visit focus consolidating on the same core nodes as team number increases.

4. Discussion

An MDPSO-based multi-team rescue-path planning algorithm, optimised via the Firefly Algorithm (FA), has been developed. Specifically
(1)
An improved DPSO algorithm was constructed and evaluated on five DIMACS instances (Dsjc250.5, Dsjc500.1, flat300_28_0, r250.5 and le450_25c). By comparing persistent and reset pheromone strategies across DPSO, GA, SA, and TS, the superior accuracy of the improved DPSO was confirmed.
(2)
A composite fitness function tailored to the MDPSO multi-team rescue scenario was formulated, and four heuristic optimisers (ACO, FA, GWO, and WOA) were employed to tune the MDPSO hyperparameters. The FA-driven optimisation and the fitness-function design were demonstrated to be effective in refining MDPSO performance.
(3)
In a mine-fire smoke scenario, the MDPSO-based multi-team rescue routes were computed, and a force-directed + BFS network-layout method was applied to optimise node positioning. Three trap nodes (15, 19 and 21) were selected, and the results indicated that deploying three rescue teams yielded the fastest underground evacuation.
The work presented herein provides an algorithmic foundation for the coordinated rescue of multiple teams in underground mining emergencies and contributes technical support for intelligent mine-rescue systems. Moreover, the network-layout optimisation approach may serve as a novel method for the visualisation of large-scale graph datasets. In the future, based on the existing work, methods for updating time steps and the equivalent length of roadways in discrete roadway situations will be added. These methods will be combined with the underground fire situation and sensor data for a more in-depth analysis of dynamic rescue plans, providing certain support for the intelligent construction of mines.

Author Contributions

Conceptualization, Q.Z. and Z.Q.; methodology, P.D.; software, Z.Q.; validation, Q.Z., P.D. and Z.Y.; formal analysis, Q.Z.; investigation, P.D.; resources, Z.Q.; data curation, Z.Y.; writing—original draft preparation, Q.Z.; writing—review and editing, Z.Q.; visualisation, P.D.; supervision, Z.Y.; project administration, Q.Z.; funding acquisition, Z.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant number 52174204 and 51974233 and “The APC was funded by Q.Z.”.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data are not publicly available due to commercial confidentiality, as they contain information that could compromise the privacy of research participants.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Lu, G.; Shi, W. Dynamic Route Planning for Emergency Escape in Coal Mines Using a Dijkstra-ACO Hybrid Algorithm. J. Mine Autom. 2024, 50, 147–151. [Google Scholar] [CrossRef]
  2. Bi, L.; Liu, Y.; Zhong, D.; Wen, L. Multi-Objective Real-Time Planning of Evacuation Routes for Underground Mine Fires. Appl. Sci. 2024, 14, 7521. [Google Scholar] [CrossRef]
  3. Li, W.; Wang, Y.; Ye, Z.; Liu, Y.A.; Wang, L. Development of a Mixed Reality Assisted Escape System for Underground Mine- Based on the Mine Water-Inrush Accident Background. Tunn. Undergr. Space Technol. 2024, 143, 105471. [Google Scholar] [CrossRef]
  4. Zhu, Y.; Zhang, G.; Chu, R.; Xiao, H.; Yang, Y.; Wu, X. Research on Escape Route Planning Analysis in Forest Fire Scenes Based on the Improved A* Algorithm. Ecol. Indic. 2024, 166, 112355. [Google Scholar] [CrossRef]
  5. Hao, H.; Jiang, S.; Wang, K.; Wu, Z.; Xi, X. Numerical Simulation of Smoke Spread Characteristics and Emergency Escape at Different Scales under the Interaction of Ventilation and Thermal Driving Force in Mine with Complex Ventilation Network. J. Therm. Anal. Calorim. 2024, 149, 4603–4625. [Google Scholar] [CrossRef]
  6. Xiao, M.; Du, C.; Wang, Y.; Wang, J.; Chang, B. Research on Smoke Diffusion and Evacuation Routes of Mine Fires with Complex Roadway Networks. Case Stud. Therm. Eng. 2025, 66, 105696. [Google Scholar] [CrossRef]
  7. Lotero, S.; Androulakis, V.; Khaniani, H.; Hassanalian, M.; Shao, S.; Roghanchi, P. Optimizing Fire Emergency Evacuation Routes in Underground Coal Mines: A Lightweight Network Flow Approach. Tunn. Undergr. Space Technol. 2024, 146, 105637. [Google Scholar] [CrossRef]
  8. Yan, Z.; Qin, Z.; Fan, J.; Huang, Y.; Wang, Y.; Zhang, J.; Zhang, L.; Cao, Y. Research on the Intelligent Planning of Mine Fire Evacuation Routes Based on a Multifactor Coupling Analysis. Fire 2024, 7, 34. [Google Scholar] [CrossRef]
  9. Lu, G.; Zhao, G.; Yu, L. Mine Escape Path Planning Algorithm Based on Simulation Model Technology. In 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City; Atiquzzaman, M., Yen, N., Xu, Z., Eds.; Springer: Singapore, 2022; pp. 151–160. [Google Scholar]
  10. Zhang, X.; Yang, C.; Gu, Z.; Tang, C.; Zhu, Z.; Zhang, Y.; Qian, J.; Li, X. Obstacle Avoidance for Trackless Rubber-Tired Vehicle Based on Risk-Grid Particle Swarm Optimization in Confined Space of Deep Well. IEEE Trans. Veh. Technol. 2023, 72, 11291–11303. [Google Scholar] [CrossRef]
  11. Zhang, C.; Yang, X.; Zhou, R.; Guo, Z. A Path Planning Method Based on Improved A* and Fuzzy Control DWA of Underground Mine Vehicles. Appl. Sci. 2024, 14, 3103. [Google Scholar] [CrossRef]
  12. Wang, Q.; Liu, H.; Gao, K.; Zhang, L. Improved Multi-Agent Reinforcement Learning for Path Planning-Based Crowd Simulation. IEEE Access 2019, 7, 73841–73855. [Google Scholar] [CrossRef]
  13. Queralta, J.P.; Taipalmaa, J.; Can Pullinen, B.; Sarker, V.K.; Nguyen Gia, T.; Tenhunen, H.; Gabbouj, M.; Raitoharju, J.; Westerlund, T. Collaborative Multi-Robot Search and Rescue: Planning, Coordination, Perception, and Active Vision. IEEE Access 2020, 8, 191617–191643. [Google Scholar] [CrossRef]
  14. Berger, J.; Lo, N. An Innovative Multi-Agent Search-and-Rescue Path Planning Approach. Comput. Oper. Res. 2015, 53, 24–31. [Google Scholar] [CrossRef]
  15. Nie, R.; Wang, Z. Research on the Dynamic Model of Emergency Rescue Resource-Allocation Systems for Mine-Fire Accidents, Taking Liquid CO2 Transportation as an Example. Sustainability 2024, 16, 2341. [Google Scholar] [CrossRef]
  16. Wang, W.; Cui, X.; Qi, Y.; Xue, K.; Liu, J.; Zuo, C. Research on the Evaluation Model of Emergency Rescue Capability of Coal Mine Water Penetration Accident. Sci. Rep. 2025, 15, 6462. [Google Scholar] [CrossRef]
  17. Gyawu, E.A.; Baker, D.A.; Awuah-Offei, K. An Assessment of Interventions to Improve Underground Coal Miners’ Ability to Self-Escape Using Human-Centered Design Methods. Min. Metall. Explor. 2024, 41, 2231–2243. [Google Scholar] [CrossRef]
  18. Onifade, M. Towards an Emergency Preparedness for Self-Rescue from Underground Coal Mines. Process Saf. Environ. Prot. 2021, 149, 946–957. [Google Scholar] [CrossRef]
  19. Wen, H.; Liu, S.; Zheng, X.; Cai, G.; Zhou, B.; Ding, W.; Ma, Y. The Digital Twins for Mine Site Rescue Environment: Application Framework and Key Technologies. Process Saf. Environ. Prot. 2024, 186, 176–188. [Google Scholar] [CrossRef]
  20. Lei, K.; Qiu, D.; Zhang, S.; Wang, Z.; Jin, Y. Coal Mine Fire Emergency Rescue Capability Assessment and Emergency Disposal Research. Sustainability 2023, 15, 8501. [Google Scholar] [CrossRef]
  21. Zhong, W.; Zhang, J.; Chen, W. A Novel Discrete Particle Swarm Optimization to Solve Traveling Salesman Problem. In Proceedings of the 2007 IEEE Congress on Evolutionary Computation, Singapore, 25–28 September 2007; pp. 3283–3287. [Google Scholar]
  22. Fister, I.; Fister, I., Jr.; Yang, X.S.; Brest, J. A Comprehensive Review of Firefly Algorithms. Swarm Evol. Comput. 2013, 13, 34–46. [Google Scholar] [CrossRef]
  23. Zhong, F.; Xue, M.; Zhang, J.; Zhang, F.; Ban, R.; Deussen, O.; Wang, Y. Force-Directed Graph Layouts Revisited: A New Force Based on the T-Distribution. IEEE Trans. Vis. Comput. Graph. 2024, 30, 3650–3663. [Google Scholar] [CrossRef] [PubMed]
  24. Burkhardt, P. Optimal Algebraic Breadth-First Search for Sparse Graphs. ACM Trans. Knowl. Discov. Data 2021, 15, 77:1–77:19. [Google Scholar] [CrossRef]
  25. Lambora, A.; Gupta, K.; Chopra, K. Genetic Algorithm—A Literature Review. In Proceedings of the 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), Faridabad, India, 14–16 February 2019; pp. 380–384. [Google Scholar]
  26. Glover, F. Tabu Search: A Tutorial. Interfaces 1990, 20, 74–94. [Google Scholar] [CrossRef]
  27. Bertsimas, D.; Tsitsiklis, J. Simulated Annealing. Stat. Sci. 1993, 8, 10–15. [Google Scholar] [CrossRef]
  28. Strąk, Ł.; Skinderowicz, R.; Boryczka, U. Adjustability of a Discrete Particle Swarm Optimization for the Dynamic TSP. Soft Comput. 2018, 22, 7633–7648. [Google Scholar] [CrossRef]
  29. Zhu, Z.; Zhang, Y.; Wang, S.; Zhao, B. Effect of Plasma-Activated Water on the Settling Characteristics of Ultrafine Kaolinite. Process Saf. Environ. Prot. 2024, 192, 613–620. [Google Scholar] [CrossRef]
  30. Wang, Y.; Huang, T. Data Visualization Optimization Method of Force-Directed Algorithms. Electron. Des. Eng. 2022, 30, 95–98. [Google Scholar] [CrossRef]
  31. Yang, X.-S. Firefly Algorithms for Multimodal Optimization. In Stochastic Algorithms: Foundations and Applications; Watanabe, O., Zeugmann, T., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 169–178. [Google Scholar]
Figure 1. The overall model framework of the FA-MDPSO multi-rescue-team rescue route planning and the force-directed layout + BFS approach network diagram optimization method.
Figure 1. The overall model framework of the FA-MDPSO multi-rescue-team rescue route planning and the force-directed layout + BFS approach network diagram optimization method.
Fire 08 00188 g001
Figure 2. Boxplots of absolute path-finding errors for the four algorithms, under both pheromone-update and non-pheromone-update conditions. (a) Absolute-error boxplot results for DSJC250.5; (b) Absolute-error boxplot results for DSJC500.1; (c) Absolute-error boxplot results for r250.5; (d) Absolute-error boxplot results for flat300_28_0; (e) Absolute-error boxplot results for le450_25c.
Figure 2. Boxplots of absolute path-finding errors for the four algorithms, under both pheromone-update and non-pheromone-update conditions. (a) Absolute-error boxplot results for DSJC250.5; (b) Absolute-error boxplot results for DSJC500.1; (c) Absolute-error boxplot results for r250.5; (d) Absolute-error boxplot results for flat300_28_0; (e) Absolute-error boxplot results for le450_25c.
Fire 08 00188 g002
Figure 3. Heatmaps of absolute path-finding errors for the four algorithms, under both pheromone-update and non-pheromone-update conditions. (a) Absolute-error heatmap results for DSJC250.5; (b) Absolute-error boxplot results for DSJC500.1; (c) Absolute-error heatmap results for r250.5; (d) Absolute-error heatmap results for flat300_280; (e) Absolute-error heatmap results for le450_25c.
Figure 3. Heatmaps of absolute path-finding errors for the four algorithms, under both pheromone-update and non-pheromone-update conditions. (a) Absolute-error heatmap results for DSJC250.5; (b) Absolute-error boxplot results for DSJC500.1; (c) Absolute-error heatmap results for r250.5; (d) Absolute-error heatmap results for flat300_280; (e) Absolute-error heatmap results for le450_25c.
Fire 08 00188 g003
Figure 4. The diagram displaying the equivalent length and topological structure of mine roadways under the spread state of fire.
Figure 4. The diagram displaying the equivalent length and topological structure of mine roadways under the spread state of fire.
Fire 08 00188 g004
Figure 5. Comparison of node-layout methods.
Figure 5. Comparison of node-layout methods.
Fire 08 00188 g005
Figure 6. Optimised fitness-curve comparison for MDPSO.
Figure 6. Optimised fitness-curve comparison for MDPSO.
Fire 08 00188 g006
Figure 7. Heat-line chart of the FA-based parameter-tuning process for MDPSO.
Figure 7. Heat-line chart of the FA-based parameter-tuning process for MDPSO.
Fire 08 00188 g007
Figure 8. Pearson correlation coefficient matrix analysis of the optimisation results for the four algorithms.
Figure 8. Pearson correlation coefficient matrix analysis of the optimisation results for the four algorithms.
Fire 08 00188 g008
Figure 9. Scatter-matrix plot of the Firefly Algorithm (FA) parameters.
Figure 9. Scatter-matrix plot of the Firefly Algorithm (FA) parameters.
Fire 08 00188 g009
Figure 10. Multi-team rescue-route planning result diagram.
Figure 10. Multi-team rescue-route planning result diagram.
Fire 08 00188 g010
Figure 11. Node-importance analysis results.
Figure 11. Node-importance analysis results.
Fire 08 00188 g011
Table 1. Parameter settings for the force-directed layout.
Table 1. Parameter settings for the force-directed layout.
Parametersabpk_repk_attrdampdtmaxIterminEnergy
Value1501500.530000.050.851.020001 × 10−6
Table 2. Optimisation-algorithm parameter settings.
Table 2. Optimisation-algorithm parameter settings.
AlgorithmParametersDefault ValueDescription
ACOnumAnts20Number of ants
q00.9Greediness threshold
FAnumFireflies30Firefly population size
beta01Initial attractiveness constant
gamma1Light absorption coefficient
alpha00.2Initial randomization factor
GWOnumWolves30Grey wolf population size
a_max2Initial value of coefficient a
WOAnumWhales30Whale population size
a_max2Initial value of parameter a in encircling prey
b1Spiral update constant
Table 3. Results of rescue routes for multiple rescue-team configurations.
Table 3. Results of rescue routes for multiple rescue-team configurations.
Number of TeamsGroup RoutesEquivalent Path Length
Group 11→3→5→6→13→14→15→14→13→6→19→6→13→14→17→18→
21→18→17→14→13→6→5→3→1
72,242.02
Group 21→3→5→6→13→14→15→14→13→6→19→6→5→3→160,639.78
1→3→5→6→13→14→17→18→21→18→17→14→13→6→5→3→166,294.86
Group 31→3→5→6→13→14→15→14→13→6→5→3→156,357.02
1→3→5→6→19→6→5→3→158,975.38
1→3→5→6→13→14→17→18→21→18→17→14→13→6→5→3→166,294.86
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zheng, Q.; Ding, P.; Qin, Z.; Yan, Z. An Investigation into the Rescue-Path Planning Algorithm for Multiple Mine Rescue Teams Based on FA-MDPSO and an Improved Force-Directed Layout. Fire 2025, 8, 188. https://doi.org/10.3390/fire8050188

AMA Style

Zheng Q, Ding P, Qin Z, Yan Z. An Investigation into the Rescue-Path Planning Algorithm for Multiple Mine Rescue Teams Based on FA-MDPSO and an Improved Force-Directed Layout. Fire. 2025; 8(5):188. https://doi.org/10.3390/fire8050188

Chicago/Turabian Style

Zheng, Qiangyu, Peijiang Ding, Zhixin Qin, and Zhenguo Yan. 2025. "An Investigation into the Rescue-Path Planning Algorithm for Multiple Mine Rescue Teams Based on FA-MDPSO and an Improved Force-Directed Layout" Fire 8, no. 5: 188. https://doi.org/10.3390/fire8050188

APA Style

Zheng, Q., Ding, P., Qin, Z., & Yan, Z. (2025). An Investigation into the Rescue-Path Planning Algorithm for Multiple Mine Rescue Teams Based on FA-MDPSO and an Improved Force-Directed Layout. Fire, 8(5), 188. https://doi.org/10.3390/fire8050188

Article Metrics

Back to TopTop