1. Introduction
Work safety in non-coal mining areas has remained grim in recent years, and the trend of considerable casualties and frequent major accidents has not been fundamentally curbed. For instance, in 2017, there were 407 production safety accidents and 484 deaths in non-coal mine areas in China [
1]. In January 2021, an explosion at the Qixia gold mine in Shandong province killed 11 people and caused an economic loss of more than
$9.86 million [
2].
Explosions are a common occurrence in non-coal mines. The causes of non-coal mine explosion accidents mainly include liquid fire, gas fire, electrical fire, vessel explosion, and gunpowder explosion. Many organizations are involved in non-coal mine areas, and the relationships between these organizations are complicated. It causes significant losses to the enterprise once an accident occurs. Therefore, a fast and accurate decision-making process can effectively reduce casualties and property losses. To address the above issue, numerous scholars have studied mine accidents using risk analysis methods, such as Bayesian networks (BNs) [
3,
4,
5,
6,
7,
8], Petri Net (PN) [
9], Directed acyclic graph (DAG) [
10], Markov process (MP) [
11], causal inference [
12,
13], etc. Li et al. [
14] analyzed the characteristics of the influencing factors of coal mine roof accidents and established the assessment model of coal mine roof accidents by using the DEMATEL-ANP method. Singh et al. [
15] developed a real-time surveillance helmet to provide early-warning intelligence for human resources working underground. Ma et al. [
16] proposed a design method of vertical shaft blasting scheme based on the integration of knowledge base and artificial intelligence to improve the efficiency of decision-making. Bilim et al. [
17] analyzed work-related accidents between 2014 and 2019 in underground hard coal mines in Turkey using logistic regression analysis. Islam et al. [
18] addressed unobserved heterogeneity using mixing distributions and attempted to provide insight into the potential sample-selection problem by considering data before and during the COVID-19 pandemic. Zhang et al. [
19] identified the representative risk factors of gas explosions and determined the interrelationship among these risk factors to highlight weak links and develop countermeasures. Li et al. [
20] proposed an effective method combining text mining, association rule mining, and Bayesian network to identify coal mine safety risk factors effectively. Li et al. [
21] presented an explosion rescue risk assessment methodology for emergency decision support by integrating a general regression neural network (GRNN) with computational fluid dynamics (CFD) modeling to allow better-informed rescue decision-making. Kraszewska et al. [
22] presented forecasting models using exponential smoothing for Polish coal mining safety accidents. Qiu et al. [
23] produced a detailed landslide and fissure inventory in a coal mining area in Shaanxi Province based on the interpretation of multitemporal satellite images and unmanned aerial vehicle (UAV) surveys. Mueller [
24] combined more than three decades of data on coal-mining activity and county-level mortality rates to quantify the association between surface coal production and mortality risk and highlighted inequities in this relationship across demographic groups. Rehman [
25] evaluated the effect of emergency alerts and human decision-making in emergencies on underground miners’ emergency evacuation decisions. Zerizghi et al. [
26] applied a network environmental analysis to quantify risks between ecological communities based on control allocation and human health risk models to calculate human health exposure risks from heavy soil metals around Greenside coal mining in South Africa. Palka et al. [
27] took into account the significant impact of methane hazard on the mining process, the article discusses its impact on the safety and efficiency of this process.
The above-mentioned works on the decision-making process of mine explosion accidents are beneficial but have some limitations, which are summarized as follows:
The risk factors identification methods of mine explosion accidents mainly include safety checking lists, Delphi’s technique, interviewing, brainstorming, the comprehensive fuzzy evaluation method [
4], and text mining [
20]. However, these approaches are unable to gather influence factors from the perspective of system design and safety constraints.
In most studies, the probabilities of the index system are determined in two ways: Assessed by historical case data and the Delphi method. The former method has accurate results but it is always hard to collect data, while the latter method is efficient in assessment but usually has violent subjectivity.
The fuzzy comprehensive assessment method, gray relation analysis method, rough sets, and neural networks are often used to assess system risk. These methods of evaluating system risk depend on expert experience and sample size.
To avoid the problems of the decision-making process of mine explosion accidents mentioned above, we used the STAMP model to establish an index system from the perspective of system design and safety constraints. The initial probability of indexes is obtained by the ROC approach so that experts are only subjected to minimal cognitive bias and have strong robustness. After obtaining the index system and initial probability, Poset decision-making theory only needs a few samples to obtain the risk level and vulnerable nodes of the system.
This study aims to address the research gaps inherent in the previous research, which are summarized as follows:
The existing research has not clarified the clustering relation and hierarchy relation of non-coal mine explosion accidents.
An imbalance exists in the evaluation index system. How to identify non-coal mines risk factors without experience in related cases? For example, the fuzzy comprehensive evaluation method is more subjective, and the support vector machine method is more objective.
The specific weight value must be used in calculations in the evaluation process. The analytic hierarchy process relies on the subjective judgment of experts, and the efficiency of the data mining method is low.
We established a risk analysis model using multiple factors according to the Poset decision-making theory to avoid the problems mentioned above and obtain accurate and reasonable risk identification results. STAMP model divided the system into physical level, basic level, control level, and supervision level, and effectively identified risk factors from the perspective of system design and safety constraints. We fully considered the index’s importance and information and obtained the initial probability of the index from the ordinal scale information of the event by ROC method. Finally, Poset decision-making theory was used to identify system risks. The method was applied to non-coal mine exploration accident case studies, the accuracy and rationality of the method were verified by cluster analysis, which provided a new way for non-coal mine exploration accident risk assessment.
Our main contributions to this paper are:
The adoption of the approach we proposed in this article clarified the clustering relation and hierarchy relation of non-coal mine explosion accidents. Through this, several insightful cluster diagrams were produced. In the clustering relation of various events, the influence relation of “blasters without licenses” is the most complex.
We applied the STAMP model to supplement the Poset decision-making theory. The influential factors of accidents are selected. Not only are all the potential causes and their sub-causes that play a role in the accidents’ occurrences considered, but the critical causes are also prioritized for further analysis. The calculation results showed that “blasters without licenses” (11.56) was the highest in the approximate value of the average rank of each incident, followed by “without safety supervisors” (11.14) “disordered management of explosives” (11.14), and “negligence of land and resources department” (1.3) was the lowest.
We adopted the ROC method initially developed in multi-criteria decision analysis (MCDA) for eliciting criteria weight, which turns ordinal judgments into ratio-scale information [
28,
29,
30]. This type of elicitation only requires experts to rank events according to their likelihood, providing a fast and nonnumerical elicitation process. Probabilities are subsequently approximated from the ranking by an algorithm based on the maximum entropy principle. By embedding the initial probability of indexes into the evaluation method by the ROC method, we can obtain the initial probability of events fast.
The remainder of the paper is as follows.
Section 2 delineates the proposed research methods.
Section 3 illustrates the application. A detailed discussion of the findings is provided in
Section 4. Concluding remarks, limitations, and future works are presented in
Section 5.
2. Research Methods
To achieve the research objective, the model based on Poset decision-making theory was used to assess the risk of non-coal mine explosion accidents, as illustrated in
Figure 1, in two stages. As the first stage, all potential causes and sub-causes leading to accidents in non-coal mines were compiled through the STAMP model. Then, based on the ROC method calculation, the initial probability of the events was obtained. Following this, using the Poset decision-making theory, the cluster interrelationships among those retained critical causes were explored by producing several insightful Hasse diagrams. Finally, the risk of essential causes was analyzed to validate the results attained.
2.1. STAMP Model
System-Theoretic Accident Modeling and Process is the mainstream paradigm of accident models [
31]. STAMP considers the accident an emergent phenomenon caused by the possible degradation of system performance or complex interaction among components [
32].
Three basic constructs underlie STAMP: Safety constraints, hierarchical safety control structures, and process models.
Figure 2 shows the modeling process of hierarchical safety control structures.
Figure 3 shows the structure of the process model. This model emphasizes the role of safety constraints and regards safety as a control problem that implements constraints [
31]. STAMP aims to identify control and feedback loops that enhance safe operation and then determine why the imposed constraints are invalid or violated.
Accidents in STAMP result from a complex process involving a violation of safety constraints on the system and system component behavior. Using the STAMP causality model, if there is an accident, one or more of the following must have occurred [
31]:
2.2. ROC Method
ROC is a method to obtain probability derivation based on numerical ordering. We can receive criteria weights by the ROC method, which turns ordinal judgments into ratio-scale information [
30,
33]. This type of elicitation only requires experts to rank events according to their likelihood, providing a fast and nonnumerical elicitation process. Probabilities are subsequently approximated from the ranking by an algorithm based on the principle of maximum entropy [
34].
ROC can be used to elicit the probabilities for four different types of events: Mutually exclusive binary events, the probability density function of one variable, stochastically independent binary events, and low-probability binary events [
35].
2.2.1. Mutually Exclusive Binary Events
An equivalent calculation of each probability individually is given by Equation (1).
2.2.2. The Probability Density Function of One Variable
For events with the probability density function of one variable, the algorithm is the same as the mutually exclusive binary events, and there is no procedural difference.
2.2.3. Stochastically Independent Binary Events
In the case that the events given by experts are stochastically independent binary events, we can thus assign probabilities for the events by Equation (2):
2.2.4. Low-Probability Binary Events
The probability of low probability binary events is derived by modifying the methods of (1) and (3).
Φi is calculated by Equation (3):
Equation (4) should be employed in the case of stochastically independent events.
The
Φi and
p can be mapped into each other by a positive multiplicative transformation. If a likelihood ratio between events
i and
j is denoted
bij, then:
It follows that Equation (5):
In the case of mutually exclusive events, we take advantage of the fact that the sum of all event probabilities must be equal to 1 −
P0, shown in Equation (6):
Equation (7) should be employed in the case of stochastically independent events.
2.3. Poset Decision-Making Theory
The Poset decision-making theory is defined as letting R be a binary relation on set A if R satisfies:
- (1)
Reflexivity: For any x ∈ A, there is xRx,
- (2)
Antisymmetry: For any x, y ∈ A, if xRy and yRx, then x = y,
- (3)
Transitivity: For any x, y, z ∈ A, if xRy and yRz, then xRz.
Then R is called the partial order relation on A. Usually, “” indicates the partial order relationship. The set A, together with its partial order relation “”, is called A partially ordered set, denoted by (A, ). For the original matrix, we use the entropy method to rank the index weights of each column, shown in Equations (8)–(11).
The proportion of the
i-th sample value in the
j-th index:
Entropy value of
j-th index (column):
Difference coefficient of
j-th index (column):
The weight of the
j-th index (column):
For the decision-making problem with
n schemes and
m index, a simple implicit weighting method was proposed. That is, the weight rank of each index satisfies
ω11 >
ω12 >
… >
ω1m under this condition, the scheme decision problem with weight information is expressed in matrix form, shown in Equation (12):
where
X is the evaluation matrix.
If the data of the
x row in matrix
D are greater than the data of the
y row, it can be concluded that
PS(x) >
PS(y). That is, the former is superior to the latter in the corresponding scheme of
x and
y. It can obtain a comparison relation matrix. Shown in Equation (13):
The Hasse matrix is obtained from the comparison relation matrix, and the Hasse diagram is drawn from the Hasse matrix. Hasse diagram is a simple, intuitive tool to deal with finite Poset, a mathematical diagram to represent finite Poset. The full path and clustering relationship between events can be clearly understood through the Hasse diagram. We can use the transformation formula between the comparison matrix and the Hasse matrix, shown in Equation (14).
A represents the original matrix;
I represents the identify matrix;
B represents the multiply matrix;
R represents the reachable matrix;
S represents the skeleton matrix;
HS represents the Hasse matrix.
The events are analyzed by clustering after the Hasse diagram is obtained. If the partial order satisfies the accuracy, the calculation is stopped, if not, the approximate value of the averaged rank is calculated. Bruggemann et al. [
36] proposed a simple concept of applying the upper set and lower set, that is, preset the Poset (
A,
), for
,
is called the lower set of
x on (
A,
),
is called the upper set of
x on (
A,
),
is the comparable set of
x on (
A,
). Then the approximate calculation formula of the averaged rank is Equation (15):
m represents the number of elements;
|A−x| represents the number of elements of set |A−x|;
|A+x| represents the number of elements of set |A+x|.
4. Discussion
The most critical event in non-coal mine explosion accidents is “Blasters without licenses and illegal operation”, obtained through Poset clustering analysis and hierarchical ranking. In most of the 10 cases studied, the immediate cause of the explosions was blaster violations. A few were caused by the failure of the safety supervisor’s function. In the actual production process, although the safety importance of blasting workers has been repeatedly mentioned, explosion accidents still happen. Most studies focus on the exploration of the direct causes and physical causes of accidents but seldom pay attention to the control causes, supervisory causes, and corresponding mental model flaws of explosion accidents. In the ten cases investigated in this paper, the controller failure of “blasters” is among the top three causes of explosion accidents. This further emphasizes the importance of blasters carrying out their safety constraints (shown in
Figure 6).
The blaster without licenses and illegal operation (IE1) is the most significant event at the basic level. The blaster’s improper operation often leads to unintended consequences, shown in
Figure 7.
The confusion about the safety management system of non-coal mine companies (E5) is the most critical event at the control level. Non-coal mine companies must strictly check the qualifications of blasters, safety supervisors, and blaster companies. Nevertheless, it is often far from ideal because of problems such as confusion about the safety management system and corruption (shown in
Figure 8).
The vulnerability of emergency management departments and public security departments is the weakest event at the supervision level (shown in
Figure 9). It conforms to reality, while indicating that land and resources departments play a vital role in the case of an explosion caused by illegal mining. Therefore, the risk event we must first identify is the mining qualification of a non-coal mine company. Finally, there is a depressing finding that information communication among government departments on non-coal mine risk investigation needs to be improved.
5. Conclusions
Ten experts with at least five years of mining experience were invited to form a panel based on the analysis of non-coal mine explosion accidents. The STAMP model is used to select the events related to explosive accidents, most of which are related to risk management and system vulnerability. The initial probability of events can be obtained by the probability elicitation method of events ranking results. Poset decision-making theory can identify risk factors effectively. The results show that the risk assessment model based on Poset decision-making theory can effectively analyze the cluster relationship of non-coal mine explosion accidents and evaluate the vulnerability nodes of the system. This study contributes to the field in several ways:
First, significant causes and sub-causes playing critical roles in controlling the impact of non-coal mine explosion accidents are identified. The STAMP model can identify risk factors from the perspective of system design and safety constraints and dig the vulnerable nodes of control level and supervision level in a deeper level.
Second, data on non-coal mine explosion accidents are difficult to obtain because of their instantaneity and complexity. The events probability under insufficient data can be obtained by the ROC method in this study. When unrecognized events or new events occur in the system, the ROC algorithm can re-order the events and update the initial probability of the events at any time. This algorithm can greatly improve the decision efficiency of risk assessment.
Finally, several insightful Hasse diagrams are generated by Poset decision-making theory to determine complex cluster relationships among causes, and the vulnerability nodes of the system are determined by approximations of average rank. This method can guide safety decision-makers to pay particular attention to the most influential causes by allocating a significant part of resources, improving the overall reliability of the system from the level of system design, and providing a new idea for risk assessment and decision-making.
Despite the contributions of the study, some limitations need to be acknowledged. The probabilities derived from rank-order judgments seem too artificial, according to ROC. This might indeed be the case. Our future work may use the random forest to optimize the rank-order process.