Académique Documents
Professionnel Documents
Culture Documents
by
JASPREET SAHNI
T H E REQUIREMENTS FOR T H E D E G R E E OF
M A S T E R OF SCIENCE
in
T H E F A C U L T Y OF G R A D U A T E STUDIES
(Department of Commerce)
T H E UNIVERSITY OF BRITISH C O L U M B I A
October 1996
-6 (2/88)
Abstract
r e l a b e l a l g o r i t h m p e r f o r m s b e t t e r t h a n o t h e r MF a l g o r i t h m s on
r e a l , r a t h e r t h a n randomly g e n e r a t e d d a t a (as i n t h e p a s t ) .
ii
Table of Contents
Abstract i i
Table of Contents i i
L i s t of Tables iv
L i s t of Figures V
Acknowledgement vi
Graph Theory- 8
L i n e a r programming 12
Network Flow 13
FKS c l o s u r e a l g o r i t h m 15
Johnson's Network f l o w 17
Push R e l a b e l 19
Heuristics 22
Various Heuristics 28
I l l u s t r a t i v e example 39
Chapter F i v e R e s u l t s and C o n c l u s i o n s 47
T a b l e s and F i g u r e s 55
References 70
iii
LIST OF TABLES
Solution Times
Total Times
FKS
Dinic
Push R e l a b e l (FIFO)
Heuristic
Push R e l a b e l (HL)
Heuristic
Expanded
iv
LIST OF FIGURES
S o l u t i o n time
S o l u t i o n time
T o t a l time
f o r w r i t i n g t h e network g e n e r a t o r code.
F i n a l l y , I thank my e n t i r e f a m i l y , e s p e c i a l l y my p a r e n t s and
vi
CHAPTER 1
Introduction
i n f o r m a t i o n f o r t h e e v a l u a t i o n o f t h e economic p o t e n t i a l o f
facilities.
A mine p l a n n i n g s i t u a t i o n r e q u i r e s d i f f e r e n t l e v e l s o f
e s t i m a t i o n o f the p i t l i m i t provides a s a t i s f a c t o r y b a s i s f o r
the i n i t i a l f e a s i b i l i t y e v a l u a t i o n o f a m i n i n g p r o j e c t . But
1
pit l i m i t s f o r i n t e r m e d i a t e range p l a n n i n g l e a d s t o b e t t e r
v e n t u r e r e q u i r e s t h a t the p i t l i m i t c a l c u l a t i o n be n o t h i n g
p r o v i d e s an o p t i m a l s o l u t i o n a t a low c o s t and i n an e a s i l y
understood manner.
to o t h e r maximum-flow a l g o r i t h m s on a c t u a l c l a s s o f graphs
2
special structure of an open p i t mine by developing
r e l a b e l r o u t i n e on t h i s c l a s s o f problems.
3
CHAPTER 2
Modelling
t h r e e d e n s i t y f u n c t i o n s d e f i n e d at each p o i n t (x,y,z) of a
t h r e e d i m e n s i o n a l r e g i o n c o n t a i n i n g the ore-body w i t h
c ( x , y , z ) : e x t r a c t i o n c o s t per u n i t volume
4
s i t u a t i o n s , there i s no simple a n a l y t i c a l r e p r e s e n t a t i o n f o r
times.
5
CHAPTER 3
Optimisation Techniques
(1) The grade and cost of mining each block i s known and
accurate.
(2) The cost o f mining each block does not depend on the
sequence of mining.
by removed b l o c k s .
of cash flows.
r e s t r i c t i o n s . A digraph G c o n s i s t s of a s e t of v e r t i c e s V(G)
6
the mining of block x r e q u i r e s the removal o f block y. The
(3) L i n e a r programming
(a) FKS
(b) Johnson
(c) Push-Relabel
(d) D i n i t z , Ford-Fulkerson, e t c .
such as F l o a t i n g Cone.
7
Graph Theory
v e r t e x and a r c s t o a l l o t h e r v e r t i c e s . Each s e t of v e r t i c e s
closure.
a t r u e 3-D optimal.
8
Two D i m e n s i o n a l Dynamic Programming
r e s t r i c t i o n s and i s thus i n f e a s i b l e .
r e s u l t i n g i n an i n f e a s i b l e s o l u t i o n .
9
Three Dimensional Dynamic Programming
two- d i m e n s i o n a l t e c h n i q u e .
10
optimum solution. A further disadvantage is that the 3-D
11
Linear Programming
12
Network Flow
13
Goldberg (1994). They implemented two v e r s i o n s o f push-
14
FKS Closure Algorithm
algorithm proceeds as f o l l o w s :
Step 1:
c a p ( i , j ) = i n f i n i t y . c a p ( j , i ) = 0.
Step 2:
set i t s predecessor l a b e l P ( i ) = 0.
Step 3:
7.
Step 4:
c a p ( i , j ) - = f l o w . sup(j)+=flow. cap(j)+=flow.
15
Step 5:
Step 6:
Step 7:
Step 8:
i and nodes l a b e l l e d a f t e r i to s t a y l i s t .
heuristic.
16
Johnson's Network Flow
follows:
Step 1:
Step 2:
Step 3:
network.
17
r e s t r i c t i n g negative blocks are shared by p o s i t i v e blocks.
expensive.
18
Push-Relabel
and t are the source and the sink and u i s the nonnegative
19
Cherkassky and Goldberg (1994) proceed as f o l l o w s :
Step 1:
Step 2:
Step 3:
to step 2.
Step 4:
to step 1.
the HL algorithm and always selects the node with the highest
20
l a b e l to discharge f i r s t . Cherkassky and Goldberg improve the
generators.
21
Heuristic Methods
Step 1:
Step 2:
i n s i d e the d e f i n e d cone.
Step 3:
22
CHAPTER 4
Our Implementation
23
generated by the DIMACS network generators. This t h e s i s
24
the same cone given by the .spp f i l e . The .spv f i l e gives us
as f o l l o w s :
Step 1:
Step 2:
Step 3:
Step 4:
layers.
Step 5:
Run through this linked list and add any new bottom
25
layers that are needed as i n d i c a t e d by the .spp f i l e to
s a t i s f y w a l l slope requirements.
Step 6:
Step 7:
by the h e u r i s t i c .
26
VARIOUS HEURISTICS
Class 1
MINIMUM l x
27
central blocks i n the upper layer to be i n the optimal
28
Network Nodes Heuristic Push-Rel Reduction
MAXIMUM Z
sample f o l l o w s :
MAXIMUM l x
29
flow from other nodes than the outer nodes. Therefore an
MAXIMUM Z - M I N I M U M l x
30
where the c o e f f i c i e n t s a and b give d i f f e r e n t weights to
follows f o r a = 2 and b = 1:
BOUNDED M I N I M U M l x
31
Network Nodes Heuristic Push-Rel Reduction
NO FLOWS I N K
CLASS 2
32
TOWARDS P O S I T I V E BLOCKS
TOWARDS N E G A T I V E BLOCKS
below:
33
TOWARDS V E R Y P O S I T I V E BLOCKS
TOWARDS V E R Y N E G A T I V E BLOCKS
34
ANALYSIS & CONCLUSION
(2) Minimum l x 8%
(4) Very p o s i t i v e 5%
(5) Maximum z 4%
(6) Maximum l t 1%
(7) Positive 0%
beforehand.
35
little ( i . e . .02 seconds at the most f o r a l l h e u r i s t i c s ) . The
r e l a b e l are s t r o n g l y s t a t i s t i c a l l y s i g n i f i c a n t . As mentioned
i n Chapter 5.
36
Illustrative example
-1 -1 -1
-1 -1 -1
10 -1 10
Layer 2
-1 -1 8
-1 -1 -1
-1 -1 8
Layer 3
-1 -1 -1
-1 -1 -1
-1 -1 -1
value i s s e t to M.
37
bottom[i] [j]
M M 2
M M M
1 M 1
slopes at d i f f e r e n t angles.
38
NX, NY, NB, XC, YC, NP, BX, BY, BH= 7 7 3 4 4 4 10 10
10
AZIMUTH = .0 90.0 180.0 270.0
DIP = 45.0 45.0 45.0 45.0
001:00000003000000
002:00030302030300
003:00030201020300
004:03020101010203
005:00030201020300
006:00030302030300
007:00000003000000
+ NX/2).
M M M M M M M
M M M M M M M
M M M M 2 M M
M M M M M M M
M M 1 M 1 M M
M M M M M M M
M M M M M M M
39
Next we construct a linked list of each non-M bottom
an updated new_bottom[i][j].
40
new b o t t o m [ i ] [ j ]
M M M M M M M
M M M M 3 M M
M M 3 3 2 3 M
M 3 2 3 2 3 M
3 2 1 2 1 3 3
M 3 2 3 2 3 M
M M 3 M 3 M M
41
36
31 32 34, 35
33
24 26, 27 29, 30
25 28
10 12, 15, 17, 20, 22, 23
11 14, 16 19, 21
18
13
3 5 6 8 9
4 7
1 2
42
We now input information form the .spv f i l e which looks
like this
For example, from the spp f i l e above the entry i n (4,4) has
43
the l i n k e d l i s t of array element b [ l ] with l x distance 1 i . e .
with.
routines.
44
CHAPTER 5
Results
issues:
t h i s c l a s s of graphs.
45
networks generated through d i f f e r e n t .spp and .spv files
Cherkassky (1990).
Cherkassky.
and Cherkassky.
46
perform t h e i r t e s t s on randomly generated data from the f i r s t
47
followed by FIFO push relabel and then Dinic's. Our
three networks (A45, B45, and C60) are shown with the t -
48
C60 FIFO
practice.
49
FKS 1.58
Dinic 1.82
PR(Q) 1.54
PR(Q)+H 1.53
PR(H) 1.51
PR(H)+H 1.50 ,
r e l a b e l r o u t i n e performs i n p r a c t i c e on a c t u a l data.
Total time
routines.
50
just reading the network and a very l i t t l e time i s spent
the overhead of source and sink arcs. That i s the FKS closure
extra a r c s .
routine.
Bounding
mine are 95,680 while the reduced number of blocks range from
51
reduce the problem s i z e by bounding the problem u s i n g a three
Sharpe.
from sab02 are about the l a r g e s t models that can run on our
Conclusion
52
relabel i s better than Dinic's and FKS both i n terms of
The r e s u l t s a l s o i l l u s t r a t e that a s i g n i f i c a n t p o r t i o n
research should aim on reducing the read time and not the
which has such low read time since i t deals with j u s t the
which does not need to create source and sink arcs which
53
relabel and also push r e l a b e l plus heuristic this belief
excessive.
54
Table 1 (Solution time in sees)
55
Table 2 (Total time in sees)
56
Table 3 (FKS)
Time v e r s u s N o d e s (Sab02)
450 - p s r 5 = = ,, , i - ^ —
370 -| , , i i , 1 , , , !|
18000 19000 20000 21000 22000 23000 24000 25000 26000 27000 28000
Nodes
57
Table 4 (Dinic)
160
0 -| 1 1 = H 1 1
18000 20000 22000 24000 26000 28000
Nodes
58
Table 5 (Push relabel(FIFO))
T i m e v e r s u s N o d e s (Sab02)
120 -i
Nodes
59
Table6(Heuristic(FIF0))
0 -| 1 , , i 1
18000 20000 22000 24000 26000 28000
Nodes
60
Table 7 (Push relabel(HL))
T i m e v e r s u s N o d e s (Sab02)
120
0 -I 1 , 1—1
18000 20000 22000 24000 • 26000 28000
Nodes
61
Table 8 (Heuristic(HL))
Time v e r s u s N o d e s (Sab02)
120 -
62
Table 9 (Expanded)
FIFO
Network Nodes Push-Rel Push-Rel Expanded Expanded
Solution Total Solution Total
a60 2813 0.55 2.93 3.98 22.13
a55 3065 1.03 5.43 11.93 73.87
b60 3200 0.77 3.88 8.03 44.68
b55 3430 1.32 6 14.65 84.2
a50 3509 1.52 7.45 7.77 79.43
c60 3663 1.23 5.12 11.92 66.38
b50 3781 1.97 8.62 19.62 109.65
c55 3838 1.33 6.35 17.08 115.17
c50 4097 1.78 8.5 memory memory
a45 4120 0.98 3.85 7.28 35.47
b45 4277 1.12 4.43 9.47 48.02
c45 4455 1.43 5.55 13.62 68
Highest Label
Network Nodes Push-Rel Push-Rel Expanded Expanded
Solution Total Solution Total
a60 2813 0.42 2.82 2.98 26.45
a55 3065 0.72 5.32 8.27 70.02
b60 3200 0.65 3.67 5.45 42.53
b55 3430 0.65 5.67 9.53 78
a50 3509 1.22 7.2 9.58 80.77
c60 3663 0.93 5.05 7.68 61.8
b50 3781 1.33 8.07 12.02 102.45
c55 3838 1.15 6.22 11.07 88.13
c50 4097 1.38 9 memory memory
a45 4120 0.98 3.73 4.75 33.55
b45 4277 1.27 4.48 6.25 44.35
c45 4455 1.11 5.51 8.45 62.43
63
Figure 1 (Solution time)
—•—FKS
—{§— Dinic
— * — Push-Relabel(FIFO)
—X—Heuristic
25
20
•FKS
15 - Dinic
Push-Relabe(FIFO)
I 10 -X— Heuristic
0 4-
2700 3200 3700 4200 4700
Nodes
••—FKS
«• 300 •—Dinic
| 250
- i s — Push-Relabel(FIFO)
"| 200
Heuristic
150
100
50
0
18000 20000 22000 24000 26000 28000
Nodes
64
Figure 2 (Solution time no F K S )
•Dinic
-Push-Relabel(FIFO)
-Heuristic
•Dinic
-Push-Relabel(FIFO)
Heuristic
Nodes
65
Figure 3 (Solution time)
25
20
15 -k -•—Dinic
-»-FKS
~* Series3
10
- H — Heuristic I
^ ^ S B
450
400
350
17 300 -•—FKS
o
250 - • — Dinic
~V 200 ~ i t — Push-Relabel(HL) |
H 150 -X—Heuristic
66
Figure 4 (Solution time no FKS)
(A
O • Dinic
-Push-Relabel(HL)
a
E •Heuristic
-Dinic
-Push-Relabel(HL)
-Heuristic
67
Figure 5 (Total time)
25
20 -b- -•—FKS
15 -f§— Dinic
™ir- - Push-Relabel(HL)
1 10
- X — Heuristic
-•—FKS
-*—Dinic
- A — Push-Relabel(HL) |
-H—Heuristic
68
Log(Sol. time) vs Log(No.Nodes)
Dinitz
•Seriesl
o
(/}
at
o
Log Nodes
FKS
-Seriesl
Log Nodes
Push-Relabel
2.8
2.3
1.8
1.3 -Seriesl
o
in 0.8
ui
o
0.3
-0.2
3.4 3.6 3.8 4 4.2 4.4 4.6
Log Nodes
69
REFERENCES AND BIBLIOGRAPHY
1. Caccetta, L. And L. M . Giannini (1985), On bounding techniques for the open pit
limit problem, Proceedings of the Australasian Institute of Mining and Metallurgy
290, 87-89.
2. Caccetta, L. and L. M . Giannini (1986), Optimisation techniques for the open pit
limit problem, Proceedings of the Australasian Institute of Mining and Metallurgy 291,
57-63.
6. Chen, T., 1976," 3D Pit Design with variable wall slope capabilities, "14th
Applications of Computers in the mineral Industries Symposium, R. V . Ramani, ed.,
AIME, New York.
8. Faaland, B., Kim. K. and Schmitt. T., 1990, A new algorithm for computing the
maximal closure of a graph, Management Science, Vol. 36, No.3.
9. Johnson, T.B., 1973, " A Comparative Study of Methods for determining Ultimate
Open-Pit Mining Limits," 11th Applications of Computers in the Mineral Industries
Symposium, University of Arizona, Tucson, A Z .
10. Johnson, T.B., 1968, " Optimum Open-Pit Mine Production Scheduling, "Operations
Research Centre, University of California, Berkeley, 120 pp.
11. Johnson, T.B., and Sharp, W. R., 1971, A Three-Dimensional Dynamic Programming
Method for Optimal Open Pit Design, U S B M Report of Investigations 7553.
12. Kim, Y . C . , 1978. "Ultimate Pit Limit Design Methodologies using Computer Models-
The State of the Art," Mining Engineering, October 1978, pp. 1454-1459.
70
13. Kim, Y . C . , Cai, W., and Meyer, W.L., Comparison of microcomputer-based optimum
pit limit design algorithms, "Society of Mining Engineers.
15. Lemieux, Marc, 1979, "Moving Cone Optimising Algorithm", Computer Methods for
the 80's in the Mineral Industry, ed. A. Weiss, Port City Press, Baltimore, M D , pp.
329-345.
17. Lipkewich, M.P., Borgman, L., 1969, "Two-and-Three Dimensional Pit Design
Optimisation Techniques", A Decade of Digital Computing in the Minerals Industry,
ed. A. Weiss, S M E of ATME, New York, pp. 505-523.
18. Picard, J., 1976, Maximal Closure of a Graph and applications to combinatorial
problems. Management Science, Vol. 22, No. 11.
71