Next Article in Journal
Effectiveness of Three Turbulence Modeling Approaches in a Crosswind–Sedan–Dune Computational Fluid Dynamics Framework
Previous Article in Journal
Numerical Analysis of a Self-Acting Gas Bearing Lubricated with a Low-Boiling-Point Medium Using an Advanced Model Based on the Finite Difference Methods and Universal Computational Fluid Dynamics Software
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Objective Real-Time Planning of Evacuation Routes for Underground Mine Fires

1
School of Resources and Safety Engineering, Central South University, Changsha 410083, China
2
State Key Laboratory for Fine Exploration and Intelligent Development of Coal Resources, China University of Mining and Technology, No. 1 University Road, Xuzhou 221116, China
3
Changsha DIMINE Co., Ltd., Changsha 410221, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(17), 7521; https://doi.org/10.3390/app14177521
Submission received: 26 July 2024 / Revised: 20 August 2024 / Accepted: 22 August 2024 / Published: 26 August 2024

Abstract

:
When a fire occurs underground, pre-existing emergency escape routes may become ineffective. Such scenarios necessitate the real-time planning of escape routes that consider evolving conditions and prioritize safety. This paper proposes a multi-objective real-time search method for emergency escape routes using dynamic programming to address these challenges. Firstly, this paper discusses how the evacuation of an underground mine fire caused by external factors depends on the fire monitoring system, personnel positioning system, and emergency evacuation system, as well as the modeling and solution methods of evacuation route planning. Then, based on fire smoke, CO, and temperature sensor data from the mine ventilation network structure and monitoring system, the possible smoke spread in the event of an underground fire was calculated. The objectives are to optimize both the shortest equivalent length of the path and the shortest time to walk through the smoke flow while ensuring that temporary escape time does not exceed the rated protection time of the self-rescuer. A mathematical model for emergency escape route planning is established under these conditions. A labeling algorithm based on dynamic programming is employed to find the Pareto optimal solution set of emergency evacuation routes that meet emergency requirements. Finally, two path evaluation indicators, namely “escape target priority” and “personnel temporary escape time”, are introduced to re-rank the solutions in the Pareto optimal set, thereby obtaining disaster evacuation routes with different priorities. Example verification shows that the algorithm can quickly solve the disaster evacuation routes that meet the actual disaster evacuation needs in complex networks. Example verification shows that the algorithm can quickly solve the emergency escape routes in complex networks that meet actual emergency escape needs.

1. Introduction

The mining industry is an important way for humans to obtain resources and is one of the most dangerous industrial sectors. For both coal mines and metallic non-metallic mines, underground mining is as important as open pit mining. The main accidents in underground mining include mine fires, poisoning and suffocation, explosions, mine inundation, collapse, roof falls, and rock collapse. Of these, mine fires, although not the most frequent, have a large impact area and on average cause a high number of casualties in a single incident. From 2008 to 2021, 29 fire accidents occurred in Chinese coal mines, killing 203 people [1]. In 2021, a fire accident occurred in the Listvyazhnaya coal mine in Siberia, Russia, due to a coal dust explosion, killing 51 people. The fires that occur more frequently in metallic non-metallic underground mines are exogenous fires caused by fires from manual welding operations or spontaneous combustion of cables. Exogenous fires in metal mines refer to fires formed by igniting underground combustibles under the action of external ignition sources. They also include exogenous fires induced by improper treatment of internal fires [2]. For example, improper electric welding operation, aging cables, spontaneous combustion of mining trucks, etc. The occurrence of external fires underground is sudden and develops rapidly. In addition to causing burns or heat illnesses, the high-temperature smoke flow generated by fires also causes a large amount of toxic and harmful gases such as carbon monoxide in the smoke flow to spread to the downwind side of the fire area through the ventilation system, reducing visibility and causing poisoning and suffocation. It also creates the risk of airflow disturbances in the ventilation system [3]. Therefore, when an exogenous fire occurs in an underground mine, it is particularly important to promptly detect and handle the fire and safely evacuate personnel. However, the current emergency response model necessitates extensive communication and feedback between underground workers, surface dispatch centers, and emergency rescue teams, which often leads to delayed responses and inefficient evacuations. Consequently, optimizing the use of underground monitoring systems and risk-avoidance infrastructure to enable automated evacuation route planning is of significant importance.
The successful evacuation of underground personnel in the event of a disaster must take into account the layout of the mine’s ventilation system, the exact location of the underground personnel, the location and type of underground fires, the protective capacity and layout of underground shelters, and the self-rescue capacity of personal protective equipment [4,5]. Underground personnel must be familiar with the layout of the mine ventilation system and know the common escape routes and safe exits. The location of the underground personnel should be determined by various sensors and transmitted to the emergency rescue control platform on the ground to help the rescue team on the ground carry out rescue and command. Through monitoring and active reporting, knowledge of the location of underground fires, the type of combustible materials, the development of the fire, and the assessment of the impact of high-temperature smoke streams, CO, and other toxic gases generated by the fire can help reduce and avoid the threat to the health and safety of underground fire [6]. Self-rescuers and refuges ensure the survival and mobility of personnel in the event of a fire, when they have to enter a fire-affected hazardous area, or when it is difficult for them to escape to the surface.
Currently, more and more countries have realized the importance of underground emergency evacuation systems and have put forward standards and requirements for the construction of underground emergency evacuation systems. For example, in 2010, China proposed to build six underground emergency evacuation systems, including monitoring and surveillance systems, emergency evacuation systems, compressed air self-rescue systems, water supply and rescue systems, personnel positioning systems, and communication systems, which greatly improved the emergency rescue capabilities when disasters occur in underground mines. What is more, the United States, Australia, South Africa, and other countries have also stipulated the relevant requirements for underground safety evacuation in the form of laws [7]. Underground safety systems make it possible to identify hazards at an early stage of a disaster and to quickly communicate with personnel and respond to the disaster. When a disaster cannot be controlled in time and personnel need to be evacuated from the well, the system provides guidance on evacuation information, ensures that current evacuation routes are feasible, and revises evacuation routes in real time in response to developments in the disaster. In addition, many researchers have studied different aspects of underground refuge systems, such as fire monitoring and identification methods, parameters of underground refuge chambers, and layout methods [8]. Zujing Zhang conducted a study on the dynamic coupled heat transfer characteristics between rock and air within refuge chambers under ventilated conditions [9]. Yong Li et al. investigated the physiological and psychological responses of individuals to high temperature, relative humidity, and carbon dioxide concentration within refuge chambers [10]. Katherine et al. proposed a pre-emptive training program aimed at helping miners acclimate to the environmental conditions of refuge chambers, thereby preparing them to cope with the physical and psychological stresses that may arise during an emergency [11]. While these studies have significantly contributed to the understanding of the safety of refuge facilities, human–environment interactions, and emergency preparedness training, there remains a lack of comprehensive research that integrates both the performance of refuge facilities and human responses into disaster management decision-making.
The current research on disaster avoidance route planning tends to focus on the simulation of disasters and route planning before the occurrence of a disaster, the auxiliary escape decision making in the event of a disaster is not fully considered, and the research on the multi-objective route planning problem, which takes into account the efficiency of the path and the safety factors, is not in-depth enough. Therefore, our proposed method utilizes real-time fire sensor data from underground during a disaster to assist in path planning, incorporating both safety and access efficiency. Drawing from the experience of actual projects, we have developed path selection criteria to determine the disaster avoidance routes that best align with the practical needs of evacuation and rescue operations.
Our approach is exemplified by applying it to a case study of an underground metal mine fire, where we generate a roadway accessibility network based on real-time sensor data. Based on the mathematical model of the resource-constrained shortest path, with the rated protection time of the self-rescuer as the constraint and with the shortest equivalent length of the roadway and the shortest time for personnel to walk in the smoke flow as the optimization goal, a mathematical model for escape route planning during mine fire was established. Then, the Pareto optimal solution set of the evacuation path from underground workers to the surface safety exit and the underground refuge chamber was solved based on the labeling algorithm of dynamic programming. The Pareto optimal solutions of all safety exits were re-ranked based on the safety exit priority and the time to escape from the dangerous area. An example verification was carried out in a metal mine. The results showed that the algorithm proposed in this paper can quickly obtain disaster avoidance routes that meet actual safety needs, thereby assisting and guiding emergency risk avoidance decisions in underground mines.
The rest of the paper is organized as follows. Section 2 introduces the related work on emergency escape systems and emergency escape route planning. Section 3 presents an algorithm for assigning equivalent lengths to underground roadways. Section 4 develops a mathematical model for evacuation routes and provides a solution algorithm along with a strategy for optimizing the solutions. Section 5 simulates disasters, solves evacuation paths, and discusses the obtained results. Finally, Section 6 draws a conclusion of the study.

2. Related Works

Externally caused fires in underground mines are a highly random disaster. The cause of the fire is often factors such as improper operation or aging of cables. In addition, the smoke and toxic gases such as CO generated by underground fires will spread rapidly along the mine ventilation system, causing greater disasters. Therefore, in order to achieve effective emergency evacuation when an external fire occurs in an underground mine, it is necessary to plan an emergency plan and formulate an evacuation route in advance on the premise of accurately grasping the development of the disaster and the distribution of underground personnel. In order to ensure the planning of a safe and reliable evacuation route, it is necessary to rely on a reliable monitoring system, underground personnel positioning system, and emergency evacuation system.

2.1. Fire Monitoring System

A monitoring and control system is a software and hardware system with information collection and processing as well as sound and light alarms that can monitor the concentration of poisonous and harmful gases, wind speed, wind pressure, temperature, smoke, fan starting and stopping status, ground pressure, and other objects in underground mines. In coal mines, a monitoring and control system is one of the effective measures to prevent and control mine gas, mine fire, rock burst, and other serious accidents [12]. The current monitoring methods for exogenous fires in mines can be mainly classified into temperature monitoring, indicator gas monitoring, and image recognition methods based on visual features. Fire temperature monitoring mainly includes the use of temperature sensors such as RTDs, thermocouples, and infrared thermometers. Indicator gas monitoring mainly refers to the use of gas sensors to monitor CO, CO2, HCL, and other electrical equipment and tape pyrolysis combustion of a variety of iconic gases. Visible light and infrared video image detection methods are also widely used because of their large monitoring range and fast response speed [13]. WANG et al. proposed using a deep learning algorithm to predict the heat release rate of transient fires based on fire scene images, providing an alternative method for fire heat release rate measurement [14]. Li et al. designed an autonomous patrol firefighting robot based on SLAM, infrared thermal imager, and YOLOv4 deep learning algorithm. This robot can perform autonomous inspections and execute firefighting actions in indoor spaces, thereby reducing the probability of fire occurrence [15].

2.2. Underground Personnel Positioning System

When various underground disasters occur, underground personnel positioning and communication are the key to timely understanding the development of underground disasters and implementing rescue efficiently. Especially when disasters such as fires and floods occur, the reliability of traditional wired communication methods is not high, so it is necessary to use stable and reliable wireless communication methods to locate underground personnel [16]. Underground personnel positioning is an indoor positioning technology. Due to factors such as signal scattering caused by the complex indoor environment, indoor positioning requires higher accuracy than outdoor positioning technology [17]. Traditional GPS, manual reporting, IEEE802.11b-based, and IP-based wireless video positioning methods have shortcomings such as being unsuitable for underground confined spaces and low accuracy [18]. The literature [19] demonstrates that high-accuracy indoor positioning is achievable in large realistic environments, using wearable sensors without the need for beacons, with performance evaluated through empirical testing across various competition tracks, yielding accuracy scores between 0.90 m and 11.70 m. The Ultra-Wide Band (UWB) refers to signals with a relative bandwidth greater than or equal to 0.20 or a bandwidth greater than or equal to 500 MHz. UWB technology offers high positioning accuracy in 2D and 3D, lightweight positioning tags, and the ability to track multiple objects simultaneously in 3D space. The use of UWB technology to locate underground personnel in real time is the basis for accurate disaster route planning.

2.3. Emergency Refuge System

According to the Regulations for Construction of Emergency Refuge System in Metal and Non-metallic Underground Mines, the emergency refuge system refers to the emergency escape routes, emergency refuge facilities, and equipment and measures to provide protection for the underground personnel to avoid danger in the event of an accident in the underground mine [20]. In order to improve the emergency response capacity of mines and safeguard the safety of underground workers, metal and non-metal underground mines should build a perfect emergency refuge system. Emergency refuge facilities (ERAs) are spaces that can be used to keep people safe in the event of a fire, collapse, or other disaster and include permanent refuge chambers and a mobile refuge chamber. A number of studies have been carried out on the temperature, humidity, and air quality of underground refuges, as well as their protection capabilities [21,22,23]. In addition, many researchers have investigated the location of underground refuge chambers. For example, Shao Zhixuan et al. used a tree network-based algorithm to select the optimal location for underground refuge chambers [24]. Zhang et al. used Fluent to establish the diffusion of CO gas when a fire broke out in a coal mine belt roadway and established a speed model for the escape of people in the roadway, thereby determining the layout position of the escape cabin in the roadway [25].
The self-rescuer is an isolated oxygen generator carried by personnel entering the well to prevent poisoning and suffocation [26]. Mines should be equipped with self-rescuers with a rated protection time of not less than 30 min for downhole personnel, and 10 per cent of the total number of people entering the well should be equipped with spare self-rescuers. Underground personnel should be proficient in wearing the self-rescuer, when disaster occurs, they can quickly wear the self-rescuer to escape.

2.4. Optimal Emergency Escape Route Planning

Many disaster evacuation scholars have studied the problem of underground disaster evacuation route planning. One of the most mainstream research methods is to use optimization ideas to model it as a shortest path problem or a maximum flow problem. Nguyen DUY HUY et al. used VentSim software to simulate the mine ventilation system of a coal mine and used the software to predict the escape route [27]. Lotero et al. simulated an exogenous fire under a room-and-pillar coal mine based on VentSim software and used a lightweight network flow algorithm to compute the lowest-exposure as well as the shortest-path avoidance routes under the disaster [4]. Xiuli Shi et al. proposed a bi-objective optimization model with minimum rescue time and minimum hazard level for selecting emergency routes in underground mine fires [28]. In 2023, Salmi reviewed the problem of underground mine fires and emergency evacuation, and pointed out two research routes for this problem: the optimization method based on graph theory and the risk assessment method based on multi-agent modeling and computational fluid dynamics [29]. In more complexity multi-objective optimization problems, Man-Fai Leung et al. proposed a collaborative neurodynamic approach, utilizing neural networks and particle swarm optimization to achieve both Pareto optimality and solution diversity, outperforming other leading algorithms on benchmark datasets [30]. However, due to the cost requirements of underground sensor placement, fire sensors are often not placed in each and every roadway underground. Therefore, the above studies are simulated in software, and path planning is performed by calculating the weights of each roadway in the ventilation network based on the simulated data. Using software simulation, especially CFD simulation, firstly, the type of combustible materials and the location of the fire need to be known in detail for modeling, and it is often not possible to measure and obtain real data when the disaster occurs. Secondly, underground fires develop rapidly, and CFD simulation requires a certain amount of calculation time, which is difficult to meet the needs of emergency rescue.

3. Sensor-Based Network Weight Update Methodology

3.1. Calculation of the Equivalent Length of a Roadway

When a disaster occurs underground, the planning of the evacuation route should not only consider the length of the roadway, but also the conventional properties that affect the traffic efficiency, such as the roadway type, slope, width, and other structures that affect traffic. It should also consider whether there is smoke flow in the roadway and the smoke flow’s concentration, temperature, visibility and other properties during the disaster period. In order to comprehensively measure the impact of these parameters on the difficulty of roadway, the ratio of the roadway speed when affected by a certain factor to the roadway speed when not affected by a certain factor is used to define the roadway difficulty coefficient of a certain factor [31]. The formula is as follows:
k a t t r = v a t t r v n o r m
where k a t r r is the travel difficulty coefficient affected by a certain factor. v n o r m is the speed when it is not affected by a certain factor. v a t t r is the speed of traffic affected by a certain factor.
The equivalent length of a roadway is used to measure the efficiency of a roadway under the influence of all factors. The main factors affecting the efficiency of the roadway are combined and converted into the accessibility coefficient and the equivalent length of the roadway is obtained by multiplying the actual length by the accessibility coefficient and adding the sum of the equivalent lengths of the local obstacles inside the roadway. The equivalent length of the roadway ( i , j ) from node i to node j is expressed as w i j , then the equivalent length of the roadway is given by,
w i j = k h k w k g k v k s l i j + m = 1 n l m
where k h is the travel difficulty coefficient of the roadway height. k w is the travel difficulty coefficient of the roadway width. k g is the travel difficulty coefficient of the roadway slope. k v is the travel difficulty coefficient of the wind speed in the roadway. k s is the visibility difficulty coefficient of the roadway. l i j is the actual length of the roadway, m. n is the number of obstacles in the roadway from i to j . l m is the equivalent length value of the obstacle in the roadway from i to j , m.

3.2. Network Weight Update Algorithm

When a fire occurs underground, as the fire smoke spreads, the passability and efficiency of the downwind side of the roadway decreases as the smoke stream encroaches. In this case, the weights on the edges of the graph increase with the concentration of the smoke stream in the roadway or decrease as the smoke stream is expelled. The roadway network is represented as a directed graph G = ( V , E ) , where V denotes the set of all points in the graph and E denotes the set of all pairs of points in the graph, i.e., the set of edges. For any edge ( i , j ) E , there is an equivalent length w i j . The path is a finite set of nodes, denoted by P, then P = v 0 , v 1 , , v p . For any road P , the sum of equivalent lengths is denoted as W .
Equivalent length is a measure of roadway passability. Parameters related to roadway passability during catastrophic periods are mainly obtained in real time through real-time monitoring by underground monitoring and surveillance systems, in addition to reporting by underground personnel. The monitoring and control system monitors various toxic and hazardous gases underground through sensors such as carbon monoxide, nitrogen dioxide, and smoke. The arrangement of sensors is the key to disaster monitoring, and the arrangement method is based on the type of mine and the characteristics of the disaster. Coal mines mainly arrange carbon monoxide sensors to monitor fire in the return-airway and the downwind side of the belt conveyor, the observation point of spontaneous combustion, and the firewall of the closed fire zone [32]. In addition to carbon monoxide and smoke sensors on the downwind side of the belt conveyor, metal mines are encouraged to arrange carbon monoxide or nitrogen dioxide sensors for blasting smoke in the middle of production, in the sectional inlet and return airways, and in the return airway of the excavation roadway.
However, due to cost considerations, it is impossible to deploy sensors in every roadway downhole, so the smoke flow arrival times of all sensor downstream nodes are derived based on Dijkstra’s algorithm, and a network of roadway passability is generated. The specific implementation of the algorithm is shown in Figure 1.
The specific steps of the algorithm are described as follows:
Step 1: Obtain the position of all sensors and initialize them to the non-alarm state. Add all sensors to the non-alarm set and initialize the roadway network weights;
Step 2: Determine whether to interrupt sensor monitoring. If not, refresh the sensor data and execute the next step; if yes, jump to step 7.
Step 3: Determine whether there is a sensor alarm, if yes, execute the next step; if no, jump to step 2;
Step 4: Move the alarming sensor out of the non-alarm set and add it to the alarm set;
Step 5: Use the Dijkstra algorithm to traverse the downstream nodes of each alarm sensor and calculate the arrival time of the downstream node smoke flow. If the node is downstream of multiple alarm sensors, take the first arrival time of the smoke flow;
Step 6: Recalculate the equivalent length of the roadway and output the network weight, jump to step 2;
Step 7: Complete the time-varying network weight solution.

4. Mathematical Models and Algorithms for Emergency Escape Routes

4.1. Shortest Path Problem with Resource with Constraints

The shortest path problem with resource with constraints (SPPRC) is a variant of the shortest path problem [33]. The problem intends to find a path from a network that goes from an origin to an end point and satisfies a set of constraints based on a set of resources, where resources refer to traveling time, cost, etc. For any path in the graph, from the start point i of one of the edges to the end point j of this edge, resource extension functions (REFs) should be satisfied for any kind of resource on the edge. Resource extension functions are generally defined as
f i j ( T i ) = T i + t i j
where T i is the resource vector on node. t i j is the resource weight on directed edge < i , j > . f i j ( T i ) is the new resource vector starting from the resource vector T i on point i , extending to point through the directed edge < i , j > .
For any path P = ( v 0 , v 1 , , v p ) in the graph, define the resource vector T p [ a v p , b v p ] at the end point of p the path, where a v p , b v p are the lower and upper limits of the resource at that point. Define Γ ( P ) as the set of all feasible resource vectors at the end point v p of path P = ( v 0 , v 1 , , v p ) . Then, the resource-constrained shortest path problem can be expressed as follows: in a path P , if the resource vector at its end point p satisfies the upper and lower limits and for all points other than the end point i = 0 , , p 1 on the path, there exists a resource vector that satisfies the resource upper and lower limits on each point, that is T i [ a v i , a v i + 1 ] ; and so that for all i = 0 , , p 1 , f v i , v i + 1 ( T i ) T i + 1 holds true and the path P is resource feasible. The classic SPPRC can be expressed as
Γ ( P ) = { T p [ a v p , b v p ] : T i [ a v i , b v i ] , f v i , v i + 1 ( T i ) T i + 1 , i = 0 , , p 1 }
where i = 0 , , p 1 is the node other than the end point and T i [ a v i , b v i ] is the resource vector on node i that meets the upper and lower limit constraints. f v i , v i + 1 ( T i ) T i + 1 is the constraint that the resource vector extending from node i to node j is less than or equal to the resource vector at node j , ensuring that the resource consumption in the current extension direction of the path is minimal.

4.2. Mathematical Model of Emergency Escape Routes

When searching for an underground escape route, feasible exits include the main and secondary shaft exits and in times of emergency, the return air shafts can also be used as an escape route. When the situation is serious and it is not possible to reach the surface exits in time, the underground personnel should enter the refuge in time to escape and wait for rescue. In the event of a disaster, the first step is to wear a self-rescuer. According to the regulations, self-rescuers should be rated for a minimum of 30 min, and when two self-rescuers cannot be relied upon to reach the surface, an emergency refuge system, such as a removable refuge, or a temporary or permanent refuge should be installed underground.
In general, the downhole shortest emergency escape route problem considering downhole avoidance facilities can be described as follows: for a network G = N , E , N is the set of nodes, and E is the set of edges. N = n , E = e . Using i and j to represent any pair of nodes, the directed edge from i to j is denoted as i , j . The equivalent weight of the directed edge i , j is denoted as w i j and the time of passage is denoted as t i j . w i j and t i j are both non-negative real numbers. For any path P from the start to the end, the sum of the equivalent lengths of the path is W , and the total time spent traveling through the smoke stream is T . The logic variable x i j represents whether the directed edge ( i , j ) is on the path from the personnel position to the goal position, taking 1 if it is and 0 if it is not. At most, each node passes through once. The shortest path that satisfies the requirements that the time in the smoke flow from the start of escape does not exceed the rated protection time of the self-rescuer must be found, and the escape path is relatively short and has the shortest escape time in the smoke flow.
To sum up, the mathematical model of the underground emergency escape route considering the underground emergency facilities can be described as follows,
min W = i = 1 n j = 1 n x i j w i j   min T = i = 1 n j = 1 n y i j x i j t i j   s . t . j x i j j x j i = { 1 if i = 0 1 if   i = D   i N 0 otherwise   j x i j 1 i N   ( i , j ) x i j t ( i , j ) T ( i , j ) E   x i j { 0 , 1 } ( i , j ) E   y i j { 0 , 1 } ( i , j ) E

4.3. Labeling Algorithm Based on Dynamic Programming

A general algorithm for solving constrained shortest circuits is the labeling algorithm based on dynamic programming [34]. The algorithm degenerates into Dijkstra’s algorithm when there is only one type of weight on the edges of the network and only one objective function for the shortest path model. The labels in this algorithm refer to the data structure that stores the paths as well as the distances of the paths and the traveling time in the smoke stream. The algorithm starts from the starting point and gradually searches for feasible paths and records them in the labels. The same node will generate different labels when it is reached through different paths. The REFs are used to generate and determine whether the labels are legal and construct the solution set space of feasible paths; the dominance function is used to determine the dominant relationship between the labels on the same node. If a label is dominated, it means that the path represented by the label is not the shortest path or cannot constitute the shortest path to the end point. Then, in order to speed up the solution, the label should be discarded. A reasonable dominance function is the key to accelerating the algorithm solution.
Label data structure:
struct Label{
  Vector<int> Path;//Path
  int Equal_Distance;//Equivalent length
  int Time_in_smoke;//Time spent walking in the smoke
  int Time_escape_smoke_area;//Time to leave the smoke area
}
Resource Expansion Function(REFs): The Resource Expansion Function specifies the change in each resource (path length, cost, etc.) from the start point to the end point on each edge. It provides a lower bound on the resource value at the end point based on the start point to resource value. For any resource r , the resource consumption at the node i is T i , and the weight of that resource on the edge < i , j > is t i j ; hence, the resource consumption at the node is j
f i j r ( T i ) = T i r + t i j r
where f i j r T i is the resource consumption of resource r based on the resource consumption at node i expanded along edges < i , j > .
Dominance function: The two attributes of the path equivalent length and the travel time in the smoke flow in this problem are represented by the vector < W , T > . Since the two resource attributes in this problem are non-negative, the resource expansion function is non-decreasing. Therefore, for labels L 1 = < W 1 , T 1 > and labels L 2 = < W 2 , T 2 > , if W 1 W 2 and T 1 T 2 , then label L 1 is dominated by label L 2 . All non-dominated labels on a node form a Pareto optimal set [35].
A constrained shortest path example based on two resources is shown in Figure 2. Starting from the starting point S, there are two labels, s-2-1 and s-1 at node 1, and the resource vectors are (1,2) and (2,1), respectively, and there is no dominance relationship; at node 2, there are two labels, s-1-2 and s-2, and the resource vectors are (2.5,2) and (0.5,1), respectively, and the former is dominated by the latter. Therefore, the path s-1-2 is abandoned and no longer expanded. Finally, at node t, there are three labels, s-2-t, s-2-1-t, and s-1-t, and the resource vectors are (3,3), (4,2), and (5,1), respectively, and there is no dominant relationship between them. Therefore, all three paths are Pareto optimal solutions.
The algorithm flow of the constrained shortest path model emergency route planning problem is shown in Figure 3.
The specific steps are as follows.
Step 1: Firstly, read the roadway and mine ventilation network information to construct the escape and emergency escape information network G ; obtain the personnel position s as well as the escape target d ; define the set of unprocessed labels as U = { ( s ) } , containing only one path; and define the set of labels that have been processed as P = { } , which is initialized to be the empty set.
Step 2: Determine whether the set U is empty. If yes, the procedure ends and outputs all labels on the target node d . If not, take out the labels L t on v of the node from the set U .
Step 3: Determine whether the label L t is dominated by other labels on node i . If yes, delete the label L t and go back to step (2) and if no, perform the next step.
Step 4: Iterate to judge and delete all labels on node i that are dominated by label L t . Add the label L t to the set P . Compute the new labels from node i to all adjacent nodes and determine whether the REFs is satisfied. If yes, proceed to the next step. If no, remove the new label L i and go back to step 3.
Step 5: Add the new label L i to the set U .

4.4. Path Optimization Strategy

The above algorithm yields a Pareto optimal set, in which any path is not dominant in terms of the two attributes of equivalent length and time spent walking in the smoke relative to other paths. In order to achieve real-time path-assisted decision making, it is also necessary to consider parameters such as the choice of disaster escape exits and the time to escape the disaster area. The target of the escape exit is to prioritize surface exits such as the auxiliary shaft and the main shaft. When no solution can be found for all surface exits, the refuge chamber is used as the escape exit.
In addition, in order to ensure that the underground personnel escape from the potentially affected area as soon as possible, not only should the route with the least time of exposure to the disaster be chosen but also the route with the fastest access to the roadway that is not attacked by the smoke flow should be chosen. Taking a feasible solution of an emergency escape route < v 0 , v 1 , v n > as an example, if all the edges after the path reaches node i are safe edges, the time to reach point i is defined as a temporary escape time. For paths arriving at the same end point, the path with shorter temporary de-risking time is taken as the better path. The path optimization strategy is shown in Figure 4.

5. Case Studies

5.1. Experimental Model of Ventilation System

The iVent 3D Mine Ventilation System is a mine ventilation system software with functions such as ventilation network drawing, 3D visualization, ventilation network solution, ventilation facility control, etc. It can design mine ventilation systems and help ventilation engineers dynamically maintain ventilation systems during mine production [36].
The ventilation network of an iron ore mine is modeled as an example. The ventilation network graph of this mine has 494 nodes and 660 edges. The ventilation method is forced ventilation, with air entering through the west shaft and returning through the east return shaft as well as the main and auxiliary shafts. Workers can escape to the surface through the main and secondary shafts, inclined shafts, and the intake shaft. All draw raises, return air shafts, etc., are made impassable. One refuge is located at Level −330 and one at Level −175. These chambers will allow workers to escape to the surface if they are unable to do so. The mine ventilation system for the mine is shown in Figure 5 and Figure 6:

5.2. Simulation Result and Discussion

It is assumed that the location of an underground evacuee is in a roadway at the lowest elevation of the underground mine, Level −245. CO and smoke sensors are mainly located in the inlet and return airways of each production section and sub-section, as well as in the return air outlets of forced ventilation roadways.
Assume that a fire occurs in the −110 horizontal transport roadway at the bottom of the west wind shaft underground due to the aging of electromechanical equipment, and the smoke spreads along the ventilation system. The time sequence of the underground sensors alarming in sequence since the fire occurred is shown in Table 1. The range of the underground contaminated by smoke obtained by the algorithm search is shown in Figure 7. As shown in the table, the earliest smoke sensors located in the inlet airway detected the fire 11 s after its ignition. If no effective control measures, such as air reversing, are implemented or if these measures fail, all underground sensors will gradually trigger alarms over the course of approximately 1771 s. This indicates that carbon monoxide and smoke from the fire will spread to all underground locations.
Based on the attributes such as smoke diffusion time generated by sensor data, the passability network of the underground roadways is assigned; then, the location of the underground personnel is taken as the starting point and the four surface safety exits of the main shaft, auxiliary shaft, inclined shaft, and air intake shaft and the two underground refuge chambers are used as escape targets. The route-finding process is constrained by the self-rescuer-rated protection time of 30 min according to the safety regulations. The equivalent length of the route and the hazardous time attribute are used as the path dominance attributes to obtain the routes for underground personnel to reach each escape location. Based on the dynamic programming labeling algorithm, the optimal route that meets the rated protection time of the self-rescuer and has a shorter equivalent length and travel time in the smoke stream is found. By prioritizing escape targets and escaping from the danger zone as early as possible, feasible evacuation routes are sorted. In addition, to investigate the effect of response time on route planning, we explored feasible avoidance routes for the same personnel location after 12 s, 300 s, and 1200 s of the disaster, respectively. The path visualization results are shown in Figure 8; the path sorting results are shown in Table 2:
If the evacuation command is issued immediately after the sensor alarm (12 s), a total of five feasible avoidance routes can be obtained at this point. In this case, a total of five paths were obtained. The escape targets of Paths 1, 2, and 3 are the main and second shafts and the east return air shaft, respectively, and they are surface exits, so they are prioritized over the routes with the refuge chamber as the target; because the fire occurred in the −110 horizontal transport roadway under the west wind shaft, most of the paths with the west wind shaft as the escape target are in the smoke flow, and the algorithm cannot find a feasible solution that meets the rated protection time of the self-rescuer. Among all feasible solutions, Path 1 and Path 2 do not go through the smoke stream and have the highest security, but the equivalent length is relatively long. Path 3 has to walk in the smoke for about 681 s and it takes about 825 s to completely escape the smoke invasion area, so paths 1 and 2 should be given priority; when a path leading to a safe exit on the surface is available, the refuge chamber is generally not used as an escape target; on the contrary, when the disaster situation is out of control, that is, all surface exits cannot be solved and only the route with the refuge chamber as the target point has a feasible solution, the refuge chamber should be used as the escape target.
Delays in evacuation can lead to a reduction in the number of possible routes and a deterioration in the safety of those routes. Evacuating immediately at the first sensor alarm, at 12 s, allows escape to all surface exits and refuge chambers. By evacuating at 300 s, all routes are affected by the smoke flow for a longer period of time and the route to the main shaft becomes impassable. At 1200 s, it is no longer safe to evacuate to the surface area and the only option is to go to the nearest refuge and wait for help.
Since the resource vector in the label data structure of this algorithm is less than the equivalent length, the walking time in the smoke flow increases, which contains only two elements, and it is easy to form a dominant relationship between any two labels. Therefore, for any escape target, only one feasible path with the shortest length, the shortest walking time in the smoke flow, and meeting the rated protection time of the self-rescuer is obtained. We also compared planning algorithms with the classical disaster avoidance route and the results show that in scenarios with a small range of disaster impacts, the results of the present method are basically the same as those of the classical methods; in scenarios with severe disaster development and long distances between the avoidance starting point and the target point, the present algorithm has the potential to obtain multiple better solutions. Compared to traditional models, our approach integrates two critical safety indices: path length and path safety. In the event of a large-scale underground disaster, this method assesses the safety of available exits and plans feasible evacuation routes. Ultimately, it prioritizes these routes based on the safety indices, guiding underground personnel in making informed and rational decisions to evacuate.

6. Conclusions

This study investigates the planning of emergency escape routes for underground personnel in the event of an exogenous fire in an underground mine. It considers real-time disaster development, personnel location, the protective capacity of self-rescuers, and the location of underground refuge chambers. Using alarm sensor data and Dijkstra’s algorithm, we predicted the arrival time of smoke flow at each underground location. We then established a bi-objective optimization model that aims to minimize both the shortest equivalent length of the emergency escape route and the time that personnel are affected by smoke flow, thereby ensuring the efficiency and safety of the escape routes. A dynamic programming-based labeling algorithm is employed to solve the model, facilitating the identification of optimal routes across all emergency escape options. This is achieved through the inclusion of two labeled elements in the model and the application of a stricter dominance rule. For multiple feasible emergency escape routes that consist of various exits and Pareto-optimal sets for the same exit, a path preference strategy is implemented. This strategy prioritizes surface exits and minimizes temporary escape time in accordance with safety requirements. Ultimately, the route with the shortest path length and highest safety is selected from all feasible options. This approach avoids the influence of decision makers’ risk preferences, which can occur with traditional weighting methods.
However, the prediction of fire development in this study is based on the premise that the fire development is in a stable stage and there is no airflow reversal in the ventilation system. How to integrate all the sensor data from underground to predict the trend of the disaster and the change in the ventilation system will be the key point to be solved in the future. Moreover, the reliability of sensor data, which this study assumes to be consistently accurate, presents another limitation. In real-world scenarios, sensor failures, inaccuracies, or delays in data transmission could significantly impact the model’s effectiveness. Future work should address these issues by incorporating sensor reliability factors into the model, as well as developing strategies to mitigate the effects of potential data inaccuracies. In our future work, we will investigate how to predict fire development and changes in the state of the ventilation system based on sensor data at the time of the fire and to provide a more accurate assessment of the risk at various locations underground during a fire. We hope that our work will provide a new perspective to other scholars in the area of evacuation of people from exogenous fires in underground mines.

Author Contributions

Conceptualization, L.B.; methodology, L.B. and D.Z.; software, L.B.; validation, L.B., Y.L. and D.Z.; formal analysis, L.B., Y.L., D.Z. and L.W.; investigation, L.B., Y.L., D.Z. and L.W.; resources, L.B. and D.Z.; data curation, L.B.; writing—original draft preparation, L.B. and Y.L.; writing—review and editing, L.B., Y.L., D.Z. and L.W.; visualization, L.B., Y.L. and L.W.; supervision, D.Z.; project administration, L.B.; funding acquisition, L.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Program of China, grant number 2023YFC2907305, and the State Key Laboratory for Fine Exploration and Intelligent Development of Coal Resources, CUMT, grant number SKLCRSM24KF003.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article; further inquiries can be directed to the corresponding author.

Acknowledgments

We also thank the reviewers for their comments and suggestions to improve the quality of the paper.

Conflicts of Interest

Author Lin Bi and Deyun Zhong were employed by the company Changsha DIMINE Co. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Zhang, X.; Dong, Y.; Xu, D. Law analysis and prediction research of coal mine accidents in China from 2008 to 2021. Min. Saf. Environ. Prot. 2023, 50, 136–140+146. [Google Scholar] [CrossRef]
  2. Song, Z.; Kuenzer, C. Coal Fires in China over the Last Decade: A Comprehensive Review. Int. J. Coal Geol. 2014, 133, 72–99. [Google Scholar] [CrossRef]
  3. Banerjee, S.C. Prevention and Combating Mine Fires; CRC Press: London, UK, 2021; ISBN 978-1-00-321122-8. [Google Scholar]
  4. Lotero, S.; Androulakis, V.; Khaniani, H.; Hassanalian, M.; Shao, S.; Roghanchi, P. Optimizing Fire Emergency Evacuation Routes in Underground Coal Mines: A Lightweight Network Flow Approach. Tunn. Undergr. Space Technol. 2024, 146, 105637. [Google Scholar] [CrossRef]
  5. Wang, J.; Xiao, J.; Xue, Y.; Wen, L.; Shi, D. Optimization of Airflow Distribution in Mine Ventilation Networks Using the Modified Sooty Tern Optimization Algorithm. Min. Metall. Explor. 2024, 41, 239–257. [Google Scholar] [CrossRef]
  6. Wang, J.; Xue, Y.; Xiao, J.; Shi, D. Diffusion Characteristics of Airflow and CO in the Dead-End Tunnel with Different Ventilation Parameters after Tunneling Blasting. ACS Omega 2023, 8, 36269–36283. [Google Scholar] [CrossRef]
  7. Halim, A.E.; Brune, J.F. Do Refuge Chambers Represent a Good Strategy to Manage Emergencies in Underground Coal Mines? Min. Metall. Explor. 2019, 36, 1191–1199. [Google Scholar] [CrossRef]
  8. Yuan, L.; Thomas, R.A.; Zhou, L. Characterization of a Mine Fire Using Atmospheric Monitoring System Sensor Data. Min. Eng. 2017, 69, 57–62. [Google Scholar] [CrossRef]
  9. Zhang, Z.; Wu, H.; Wang, K.; Day, R.; Yuan, Y. Thermal Performance of a Mine Refuge Chamber with Human Body Heat Sources under Ventilation. Appl. Therm. Eng. 2019, 162, 114243. [Google Scholar] [CrossRef]
  10. Li, Y.; Yuan, Y.; Li, C.; Han, X.; Zhang, X. Human Responses to High Air Temperature, Relative Humidity and Carbon Dioxide Concentration in Underground Refuge Chamber. Build. Environ. 2018, 131, 53–62. [Google Scholar] [CrossRef]
  11. Margolis, K.A.; Westerman, C.Y.K.; Kowalski-Trakofler, K.M. Underground Mine Refuge Chamber Expectations Training: Program Development and Evaluation. Saf. Sci. 2011, 49, 522–530. [Google Scholar] [CrossRef]
  12. Reddy, N.S.; Saketh, M.S.; Dhar, S. Review of Sensor Technology for Mine Safety Monitoring Systems: A Holistic Approach. In Proceedings of the 2016 IEEE First International Conference on Control, Measurement and Instrumentation (CMI), Kolkata, India, 8–10 January 2016; pp. 429–434. [Google Scholar]
  13. Deng, J.; Li, X.; Wang, K. Research progress and prospect of mine fire intelligent monitoring and early warning technology in recent 20 years. Coal Sci. Technol. 2024, 52, 154–177. [Google Scholar] [CrossRef]
  14. Wang, Z.; Zhang, T.; Huang, X. Predicting Real-Time Fire Heat Release Rate by Flame Images and Deep Learning. Proc. Combust. Inst. 2023, 39, 4115–4123. [Google Scholar] [CrossRef]
  15. Li, S.; Yun, J.; Feng, C.; Gao, Y.; Yang, J.; Sun, G.; Zhang, D. An Indoor Autonomous Inspection and Firefighting Robot Based on SLAM and Flame Image Recognition. Fire 2023, 6, 93. [Google Scholar] [CrossRef]
  16. Jiang, S.; Skibniewski, M.J.; Yuan, Y.; Sun, C.; Lu, Y. Ultra-Wide Band Applications in Industry: A Critical Review. J. Civ. Eng. Manag. 2011, 17, 437–444. [Google Scholar] [CrossRef]
  17. Alarifi, A.; Al-Salman, A.; Alsaleh, M.; Alnafessah, A.; Al-Hadhrami, S.; Al-Ammar, M.A.; Al-Khalifa, H.S. Ultra Wideband Indoor Positioning Technologies: Analysis and Recent Advances. Sensors 2016, 16, 707. [Google Scholar] [CrossRef]
  18. Chehri, A.; Fortier, P.; Tardif, P.M. UWB-Based Sensor Networks for Localization in Mining Environments. Ad Hoc Netw. 2009, 7, 987–1000. [Google Scholar] [CrossRef]
  19. Renaudin, V.; Ortiz, M.; Perul, J.; Torres-Sospedra, J.; Jiménez, A.R.; Pérez-Navarro, A.; Martín Mendoza-Silva, G.; Seco, F.; Landau, Y.; Marbel, R.; et al. Evaluating Indoor Positioning Systems in a Shopping Mall: The Lessons Learned From the IPIN 2018 Competition. IEEE Access 2019, 7, 148594–148628. [Google Scholar] [CrossRef]
  20. Ou, S.; Jin, L.; Li, S.; Wang, S.; Li, Y.; Huang, Z. Study on External Protective System of Waterproofing Refuge Chamber in Guilaizhuang Gold Mine. In Proceedings of the 3rd International Symposium on Mine Safety Science and Engineering, Montreal, QC, Canada, 13–19 August 2016; pp. 236–242. [Google Scholar]
  21. Zhang, Z.; Jin, T.; Wu, H.; Day, R.; Gao, X.; Wang, K.; Mao, R. Experimental Investigation on Environmental Control of a 50-Person Mine Refuge Chamber. Build. Environ. 2022, 210, 108667. [Google Scholar] [CrossRef]
  22. Zhang, Z.; Guo, W.; Gao, X.; Wu, H.; Mao, R. Investigation on Temperature Control Based on Cooled Mine Compressed Air for Mine Refuge Chamber with High-Temperature Surrounding Rock. Int. J. Therm. Sci. 2023, 187, 108201. [Google Scholar] [CrossRef]
  23. Guo, W.; Zhang, Z.; Wu, H.; Ge, L.; Liang, X.; Mao, R. Experimental Study on Cooling and Dehumidification Performance of an Ice Storage Air Conditioner Used in Underground Refuge Chamber. Int. Commun. Heat Mass Transf. 2023, 146, 106930. [Google Scholar] [CrossRef]
  24. Shao, Z.; Yang, Y.C.; Kumral, M. Optimal Refuge Chamber Position in Underground Mines Based on Tree Network. Int. J. Inj. Control. Saf. Promot. 2023, 30, 294–309. [Google Scholar] [CrossRef] [PubMed]
  25. Shengzhu, Z.; Zongzhi, W.; Rui, Z.; Jianning, K. Dynamic Numerical Simulation of Coal Mine Fire for Escape Capsule Installation. Saf. Sci. 2012, 50, 600–606. [Google Scholar] [CrossRef]
  26. Johnson, A.T.; Scott, W.H.; Koh, F.C.; Phelps, S.J.; Francis, E.B.; Lopresti, E. How Far Can One Walk Wearing a Self-Contained Self Rescuer? J. Occup. Environ. Hyg. 2007, 4, 49–53. [Google Scholar] [CrossRef]
  27. Huy, N.D.; Khai, N.C.; Thinh, N.V.; Quang, N.V.; Chien, N.M.; Duy, N.K. Simulating and Predicting Escape Routes for Ventilation Network of Duong Huy Coal Company Using Ventsim DESIGN Software. Inz. Miner. 2022, 2, 151–157. [Google Scholar] [CrossRef]
  28. Shi, X.; Gai, W.; Xu, K. Bi-Objective Rescue Path Selection Optimization for Mine Fires Based on Quantitative Risk Assessment. Saf. Sci. 2022, 146, 105492. [Google Scholar] [CrossRef]
  29. Salami, O.B.; Xu, G.; Kumar, A.R.; Pushparaj, R.I. Underground Mining Fire Hazards and the Optimization of Emergency Evacuation Strategies (EES): The Issues, Existing Methodology and Limitations, and Way Forward. Process Saf. Environ. Prot. 2023, 177, 617–634. [Google Scholar] [CrossRef]
  30. Leung, M.-F.; Wang, J. A Collaborative Neurodynamic Approach to Multiobjective Optimization. IEEE Trans. Neural Netw. Learn. Syst. 2018, 29, 5738–5748. [Google Scholar] [CrossRef]
  31. Jinzhang, J.; Fengxiao, W. Study on Emergency Escape Route Planning under Fire Accidents in the Burtai Coal Mine. Sci. Rep. 2022, 12, 13074. [Google Scholar] [CrossRef]
  32. Bhattacharjee, S.; Roy, P.; Ghosh, S.; Misra, S.; Obaidat, M.S. Wireless Sensor Network-Based Fire Detection, Alarming, Monitoring and Prevention System for Bord-and-Pillar Coal Mines. J. Syst. Softw. 2012, 85, 571–581. [Google Scholar] [CrossRef]
  33. Irnich, S.; Desaulniers, G. Shortest Path Problems with Resource Constraints. In Column Generation; Springer: Boston, MA, USA, 2006; pp. 33–65. ISBN 978-0-387-25485-2. [Google Scholar]
  34. Touati Moungla, N.; Létocart, L.; Nagih, A. An Improving Dynamic Programming Algorithm to Solve the Shortest Path Problem with Time Windows. Electron. Notes Discret. Math. 2010, 36, 931–938. [Google Scholar] [CrossRef]
  35. Gunantara, N. A Review of Multi-Objective Optimization: Methods and Its Applications. Cogent Eng. 2018, 5, 1502242. [Google Scholar] [CrossRef]
  36. Zhong, D.; Wang, L.; Wang, J.; Jia, M. An Efficient Mine Ventilation Solution Method Based on Minimum Independent Closed Loops. Energies 2020, 13, 5862. [Google Scholar] [CrossRef]
Figure 1. Emergency escape network weighting algorithm.
Figure 1. Emergency escape network weighting algorithm.
Applsci 14 07521 g001
Figure 2. Case of the shortest path problem with constraints on two resources.
Figure 2. Case of the shortest path problem with constraints on two resources.
Applsci 14 07521 g002
Figure 3. The flow chart of the RCSPP algorithm.
Figure 3. The flow chart of the RCSPP algorithm.
Applsci 14 07521 g003
Figure 4. Path optimization strategy.
Figure 4. Path optimization strategy.
Applsci 14 07521 g004
Figure 5. A mine ventilation network of an iron ore mine.
Figure 5. A mine ventilation network of an iron ore mine.
Applsci 14 07521 g005
Figure 6. Three-dimensional mine ventilation diagram of an iron ore mine.
Figure 6. Three-dimensional mine ventilation diagram of an iron ore mine.
Applsci 14 07521 g006
Figure 7. Smoke diffusion pollution range of underground fire.
Figure 7. Smoke diffusion pollution range of underground fire.
Applsci 14 07521 g007
Figure 8. Evacuation routes to different destinations. (a) Route to the main shaft. (b) Route to the auxiliary shaft. (c) Route to the incline shaft. (d) Route to the chamber refuge1. (e) Route to the chamber refuge2.
Figure 8. Evacuation routes to different destinations. (a) Route to the main shaft. (b) Route to the auxiliary shaft. (c) Route to the incline shaft. (d) Route to the chamber refuge1. (e) Route to the chamber refuge2.
Applsci 14 07521 g008
Table 1. Sensor alarm time and sequence.
Table 1. Sensor alarm time and sequence.
Sensor Serial NumberAlarm Time/sSensor Serial NumberAlarm Time/s
21119847
3307868
1523351042
20288121222
1631411266
8346131283
9496181324
6621141442
11818171771
4846
Table 2. Ranked results of evacuation routes.
Table 2. Ranked results of evacuation routes.
Respond TimePrioritiesTargetsPathsTemporary
Escape Time/s
Equal
Distance/m
Time in Smoke/s
12 s1Main shaft[446, 472, 467, 466, 385, 409, 422, 421, 419, 43, 442]-18110
2Second shaft[446, 472, 467, 466, 385, 409, 422, 421, 419, 376, 430, 414, 382, 381, 32, 441]-19910
3Inclined shaft[446, 405, 445, 27, 26, 28, 25, 24, 35, 444]8251657681
4−245 level refuge[446, refuge2]-1870
5−230 level refuge[446, 472, 467, 466, 385, refuge 1]-8390
300 s1Second shaft[446, 472, 467, 466, 385, 409, 422, 421, 389, 416, 415, 414, 382, 381, 32, 441]9272395379
2Inclined shaft[446, 405, 445, 27, 26, 28, 25, 24, 35, 444]12761902954
3−245 level refuge[446, refuge2]424187424
4−230 level refuge[446, 472, 467, 466, 385, ‘chamber1’]9271180379
12001−245 level refuge[446, ‘chamber2’]13241871324
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Bi, L.; Liu, Y.; Zhong, D.; Wen, L. Multi-Objective Real-Time Planning of Evacuation Routes for Underground Mine Fires. Appl. Sci. 2024, 14, 7521. https://doi.org/10.3390/app14177521

AMA Style

Bi L, Liu Y, Zhong D, Wen L. Multi-Objective Real-Time Planning of Evacuation Routes for Underground Mine Fires. Applied Sciences. 2024; 14(17):7521. https://doi.org/10.3390/app14177521

Chicago/Turabian Style

Bi, Lin, Yulong Liu, Deyun Zhong, and Lixue Wen. 2024. "Multi-Objective Real-Time Planning of Evacuation Routes for Underground Mine Fires" Applied Sciences 14, no. 17: 7521. https://doi.org/10.3390/app14177521

APA Style

Bi, L., Liu, Y., Zhong, D., & Wen, L. (2024). Multi-Objective Real-Time Planning of Evacuation Routes for Underground Mine Fires. Applied Sciences, 14(17), 7521. https://doi.org/10.3390/app14177521

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop