SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
mtmy 1
CONTROLLED BLASTING
In tunneling, road and railroad cuts, it is of the utmost
importance that he remaining rock is of high quality in order to
avoid rockfall, rockslides and excessive maintenance work.
Line drilling
Line drilling is the earliest controlled blasting method used.
The purpose of line drilling is to create a plane of weakness by
drilling closely spaced, small diameter holes along the
perimeter of the excavation to which the blast can break.
Line drill holes are usually not over 75 mm in diameter and the
spacing is 2 to 4 times the diameter of the hole.
The hole depth should not be more than 12 m, since deviation
in longer holes may produce adverse results.
These holes are not charged.
mtmy 2
Figure 1: Line drilling.
Presplitting
This is the most successful and widely adopted controlled
blasting method and creates a plane of shear on the desired
line of break, exposing the half barrel of the blasthole after
excavation (figure 2).
mtmy 3
Figure 2: A presplit highwall.
The holes are usually 50 mm to 100 mm in diameter in civil
engineering applications whereas larger diameter holes
(sometimes more than 300 mm in diameter) are proving to be
successful in surface mining operations.
The spacing between holes varies between ten to twenty times
the hole diameter.
The presplit shots transmit compressive shock waves, which, at
their point of meeting between the boles, create a zone of
tension, which fractures and shears the rock. This method has
limited application in underground work.
mtmy 4
Figure 3: Stress conditions in presplitting.
Figure 4: Decoupled charges for presplitting.
mtmy 5
Perimeter blasting
This type of blasting is generally used for underground
blasting. However in surface blasting the same technique is
known as ‘smooth blasting’.
In underground operations the perimeter holes of the backs
(roof) of headings and tunnels are drilled along the design
profile parallel to the direction of the excacation.
Generally the spacing between the final lines of holes is less
than 1.5 times the burden
Figure 5: Crack zone from blasting with
conventional explosives.
Figure 6: Crack zone from perimeter
blsting with Gurit 17X 500 mm (small
diameter light explosives with low VOD)
mtmy 6
Figure 7: Perimeter blasting arrangement
In surface mining the decoupled perimeter holes are drilled on
a closer pattern than the production blastholes. These holes
are detonated last, in order to maximise the relief of burden.
This reduces overbreak.
Unlike normal blasting underground, the spacing S between
holes in the same row for surface excavation is less than the
burden. The usual relation is S = 0.8B.
mtmy 7
Figure 8: Principle of smooth blasting in surface excavation.
Cushion blasting
Cushion blasting is applicable in surface mining where the
object is to trim the excess material from the final high wall to
improve stability.
A single row of holes is drilled along the perimeter of the
excavation. The size of the drillholes varies between 50 mm to
164 mm.
mtmy 8
Cushion blastholes are charged with small, well disributed
charges in completely stemmed holes, which are fired after the
main blast is excavated.
The charges are fired with no delay, or minimum delay
between boles.
Figure 9: Cushion blasting

Contenu connexe

Tendances

Explosives, Theory Of Breakage And Blasting Operations
Explosives, Theory Of Breakage And Blasting OperationsExplosives, Theory Of Breakage And Blasting Operations
Explosives, Theory Of Breakage And Blasting Operationspartha sharma
 
Underground metal mining methods
Underground metal mining methodsUnderground metal mining methods
Underground metal mining methodsSafdar Ali
 
Optimization of Blasting Parameters in open cast mines
Optimization of Blasting Parameters in open cast minesOptimization of Blasting Parameters in open cast mines
Optimization of Blasting Parameters in open cast minesAnurag Jha
 
Blast hole drill
Blast hole drillBlast hole drill
Blast hole drillpavan kumar
 
Longwall mining (Multisling mining - Horizontal slicing) NIT ROURKELA
Longwall mining (Multisling mining - Horizontal slicing) NIT ROURKELALongwall mining (Multisling mining - Horizontal slicing) NIT ROURKELA
Longwall mining (Multisling mining - Horizontal slicing) NIT ROURKELAIndrajeetKumar110
 
Explosives and blasting in underground coal mining
Explosives and blasting in underground coal mining Explosives and blasting in underground coal mining
Explosives and blasting in underground coal mining Volvo Group
 
Metal Mines Blasting
Metal Mines BlastingMetal Mines Blasting
Metal Mines Blastingpartha sharma
 
Drilling and blasting
Drilling and blastingDrilling and blasting
Drilling and blastingParth Desani
 
Techniques of Controlled Blasting
Techniques of Controlled BlastingTechniques of Controlled Blasting
Techniques of Controlled Blastingpartha sharma
 
Mine Opening and Development
Mine Opening and DevelopmentMine Opening and Development
Mine Opening and DevelopmentAnurag Jha
 
Secondary Blasting Standard Operating Procedure
Secondary Blasting Standard Operating ProcedureSecondary Blasting Standard Operating Procedure
Secondary Blasting Standard Operating ProcedureCollins Sikanyika
 
Firing patterns and its effect on muckpile shape parameters and fragmentation...
Firing patterns and its effect on muckpile shape parameters and fragmentation...Firing patterns and its effect on muckpile shape parameters and fragmentation...
Firing patterns and its effect on muckpile shape parameters and fragmentation...eSAT Journals
 

Tendances (20)

Explosives, Theory Of Breakage And Blasting Operations
Explosives, Theory Of Breakage And Blasting OperationsExplosives, Theory Of Breakage And Blasting Operations
Explosives, Theory Of Breakage And Blasting Operations
 
Underground metal mining methods
Underground metal mining methodsUnderground metal mining methods
Underground metal mining methods
 
Optimization of Blasting Parameters in open cast mines
Optimization of Blasting Parameters in open cast minesOptimization of Blasting Parameters in open cast mines
Optimization of Blasting Parameters in open cast mines
 
Blasting
BlastingBlasting
Blasting
 
Blast hole drill
Blast hole drillBlast hole drill
Blast hole drill
 
Longwall mining (Multisling mining - Horizontal slicing) NIT ROURKELA
Longwall mining (Multisling mining - Horizontal slicing) NIT ROURKELALongwall mining (Multisling mining - Horizontal slicing) NIT ROURKELA
Longwall mining (Multisling mining - Horizontal slicing) NIT ROURKELA
 
Explosives and blasting in underground coal mining
Explosives and blasting in underground coal mining Explosives and blasting in underground coal mining
Explosives and blasting in underground coal mining
 
Metal Mines Blasting
Metal Mines BlastingMetal Mines Blasting
Metal Mines Blasting
 
Mechanics of blasting
Mechanics of blasting Mechanics of blasting
Mechanics of blasting
 
Advanced Drilling & Blasting
Advanced Drilling & Blasting Advanced Drilling & Blasting
Advanced Drilling & Blasting
 
Basics of drilling 4
Basics of drilling 4Basics of drilling 4
Basics of drilling 4
 
Drilling and blasting
Drilling and blastingDrilling and blasting
Drilling and blasting
 
Basic blasting
Basic  blastingBasic  blasting
Basic blasting
 
Techniques of Controlled Blasting
Techniques of Controlled BlastingTechniques of Controlled Blasting
Techniques of Controlled Blasting
 
UG Explosives and Blasting
UG Explosives and BlastingUG Explosives and Blasting
UG Explosives and Blasting
 
Mine fan
Mine fanMine fan
Mine fan
 
Mine Opening and Development
Mine Opening and DevelopmentMine Opening and Development
Mine Opening and Development
 
Secondary Blasting Standard Operating Procedure
Secondary Blasting Standard Operating ProcedureSecondary Blasting Standard Operating Procedure
Secondary Blasting Standard Operating Procedure
 
Caving Underground Mining Methods (longwall, Sublevel caving, & Block caving)
Caving Underground Mining Methods (longwall, Sublevel caving, &  Block caving)Caving Underground Mining Methods (longwall, Sublevel caving, &  Block caving)
Caving Underground Mining Methods (longwall, Sublevel caving, & Block caving)
 
Firing patterns and its effect on muckpile shape parameters and fragmentation...
Firing patterns and its effect on muckpile shape parameters and fragmentation...Firing patterns and its effect on muckpile shape parameters and fragmentation...
Firing patterns and its effect on muckpile shape parameters and fragmentation...
 

En vedette

How to export auto cad coordinate for blast software design and blast design ...
How to export auto cad coordinate for blast software design and blast design ...How to export auto cad coordinate for blast software design and blast design ...
How to export auto cad coordinate for blast software design and blast design ...Saksarid Changtham
 
Flyrocks mitigation
Flyrocks mitigationFlyrocks mitigation
Flyrocks mitigationGAGAN GUPTA
 
Openpit Design Fundas
Openpit Design FundasOpenpit Design Fundas
Openpit Design FundasVR M
 
Basics of openpit mining
Basics of openpit miningBasics of openpit mining
Basics of openpit miningSATYANARAYANA I
 
Excavation of Tunnels
Excavation of TunnelsExcavation of Tunnels
Excavation of Tunnelspartha sharma
 
Drilling in mining
Drilling in miningDrilling in mining
Drilling in miningEder Reyes
 
New burn cut blast design in drives enhances drilling blasting efficiency wit...
New burn cut blast design in drives enhances drilling blasting efficiency wit...New burn cut blast design in drives enhances drilling blasting efficiency wit...
New burn cut blast design in drives enhances drilling blasting efficiency wit...partha sharma
 

En vedette (13)

How to export auto cad coordinate for blast software design and blast design ...
How to export auto cad coordinate for blast software design and blast design ...How to export auto cad coordinate for blast software design and blast design ...
How to export auto cad coordinate for blast software design and blast design ...
 
Flyrocks mitigation
Flyrocks mitigationFlyrocks mitigation
Flyrocks mitigation
 
tunneling & its effects
tunneling & its effectstunneling & its effects
tunneling & its effects
 
Problem in bored pile
Problem in bored pileProblem in bored pile
Problem in bored pile
 
Openpit Design Fundas
Openpit Design FundasOpenpit Design Fundas
Openpit Design Fundas
 
Basics of openpit mining
Basics of openpit miningBasics of openpit mining
Basics of openpit mining
 
BASIC OF BLAST DESIGN I
BASIC OF BLAST DESIGN IBASIC OF BLAST DESIGN I
BASIC OF BLAST DESIGN I
 
Diseno mallas-perforacion-y-voladura-subterranea
Diseno mallas-perforacion-y-voladura-subterraneaDiseno mallas-perforacion-y-voladura-subterranea
Diseno mallas-perforacion-y-voladura-subterranea
 
Surface mining planning and design of open pit mining
Surface mining planning and design of open pit miningSurface mining planning and design of open pit mining
Surface mining planning and design of open pit mining
 
05 chapter 3_rock_excavation_methods
05 chapter 3_rock_excavation_methods05 chapter 3_rock_excavation_methods
05 chapter 3_rock_excavation_methods
 
Excavation of Tunnels
Excavation of TunnelsExcavation of Tunnels
Excavation of Tunnels
 
Drilling in mining
Drilling in miningDrilling in mining
Drilling in mining
 
New burn cut blast design in drives enhances drilling blasting efficiency wit...
New burn cut blast design in drives enhances drilling blasting efficiency wit...New burn cut blast design in drives enhances drilling blasting efficiency wit...
New burn cut blast design in drives enhances drilling blasting efficiency wit...
 

Similaire à K controlled blasting

Techniquescontrolledblasting 091217003405-phpapp01
Techniquescontrolledblasting 091217003405-phpapp01Techniquescontrolledblasting 091217003405-phpapp01
Techniquescontrolledblasting 091217003405-phpapp01Lahmeyer International, UAE
 
Controlled Blasting_082055.pdf
Controlled Blasting_082055.pdfControlled Blasting_082055.pdf
Controlled Blasting_082055.pdfmaxwellantwi255
 
Elemdsadrface Misdad
Elemdsadrface MisdadElemdsadrface Misdad
Elemdsadrface MisdadTomson24
 
Q922+de2+l06 v1
Q922+de2+l06 v1Q922+de2+l06 v1
Q922+de2+l06 v1AFATous
 
Ch 6 reaming, boring, broaching
Ch 6 reaming, boring, broachingCh 6 reaming, boring, broaching
Ch 6 reaming, boring, broachingNandan Choudhary
 
Q921 de2 lec6 uc v1
Q921 de2 lec6 uc v1Q921 de2 lec6 uc v1
Q921 de2 lec6 uc v1AFATous
 
Q921 de2 lec6 uc v1
Q921 de2 lec6 uc v1Q921 de2 lec6 uc v1
Q921 de2 lec6 uc v1AFATous
 
ConstTech_Unit 4.4.pdf
ConstTech_Unit 4.4.pdfConstTech_Unit 4.4.pdf
ConstTech_Unit 4.4.pdfSwapnilGorade1
 
Grouting Technology - Guntur Chapter.ppt
Grouting Technology - Guntur Chapter.pptGrouting Technology - Guntur Chapter.ppt
Grouting Technology - Guntur Chapter.pptDhananjayShah9
 
Deburr small-intersecting-holes
Deburr small-intersecting-holesDeburr small-intersecting-holes
Deburr small-intersecting-holesDave Davidson
 
Criteria for selection of Board and pillar for multiple seams
Criteria for selection of Board and pillar for multiple seamsCriteria for selection of Board and pillar for multiple seams
Criteria for selection of Board and pillar for multiple seamsAsim kumar Satapathy
 
construction procedure of DMC piling
construction procedure of DMC pilingconstruction procedure of DMC piling
construction procedure of DMC pilingNikhil Kumar
 
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holesMicrostructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holeseSAT Publishing House
 
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holesMicrostructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holeseSAT Publishing House
 

Similaire à K controlled blasting (20)

Techniquescontrolledblasting 091217003405-phpapp01
Techniquescontrolledblasting 091217003405-phpapp01Techniquescontrolledblasting 091217003405-phpapp01
Techniquescontrolledblasting 091217003405-phpapp01
 
Controlled Blasting_082055.pdf
Controlled Blasting_082055.pdfControlled Blasting_082055.pdf
Controlled Blasting_082055.pdf
 
Casing design
Casing designCasing design
Casing design
 
Elemdsadrface Misdad
Elemdsadrface MisdadElemdsadrface Misdad
Elemdsadrface Misdad
 
Blast Design-2.pdf
Blast Design-2.pdfBlast Design-2.pdf
Blast Design-2.pdf
 
Q922+de2+l06 v1
Q922+de2+l06 v1Q922+de2+l06 v1
Q922+de2+l06 v1
 
Ch 6 reaming, boring, broaching
Ch 6 reaming, boring, broachingCh 6 reaming, boring, broaching
Ch 6 reaming, boring, broaching
 
Structureal Cracks
Structureal CracksStructureal Cracks
Structureal Cracks
 
Q921 de2 lec6 uc v1
Q921 de2 lec6 uc v1Q921 de2 lec6 uc v1
Q921 de2 lec6 uc v1
 
Q921 de2 lec6 uc v1
Q921 de2 lec6 uc v1Q921 de2 lec6 uc v1
Q921 de2 lec6 uc v1
 
3 tunnel
3 tunnel3 tunnel
3 tunnel
 
ConstTech_Unit 4.4.pdf
ConstTech_Unit 4.4.pdfConstTech_Unit 4.4.pdf
ConstTech_Unit 4.4.pdf
 
Grouting Technology - Guntur Chapter.ppt
Grouting Technology - Guntur Chapter.pptGrouting Technology - Guntur Chapter.ppt
Grouting Technology - Guntur Chapter.ppt
 
Deburr small-intersecting-holes
Deburr small-intersecting-holesDeburr small-intersecting-holes
Deburr small-intersecting-holes
 
Drilling
DrillingDrilling
Drilling
 
Criteria for selection of Board and pillar for multiple seams
Criteria for selection of Board and pillar for multiple seamsCriteria for selection of Board and pillar for multiple seams
Criteria for selection of Board and pillar for multiple seams
 
cracks.pptx
cracks.pptxcracks.pptx
cracks.pptx
 
construction procedure of DMC piling
construction procedure of DMC pilingconstruction procedure of DMC piling
construction procedure of DMC piling
 
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holesMicrostructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
 
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holesMicrostructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

K controlled blasting

  • 1. mtmy 1 CONTROLLED BLASTING In tunneling, road and railroad cuts, it is of the utmost importance that he remaining rock is of high quality in order to avoid rockfall, rockslides and excessive maintenance work. Line drilling Line drilling is the earliest controlled blasting method used. The purpose of line drilling is to create a plane of weakness by drilling closely spaced, small diameter holes along the perimeter of the excavation to which the blast can break. Line drill holes are usually not over 75 mm in diameter and the spacing is 2 to 4 times the diameter of the hole. The hole depth should not be more than 12 m, since deviation in longer holes may produce adverse results. These holes are not charged.
  • 2. mtmy 2 Figure 1: Line drilling. Presplitting This is the most successful and widely adopted controlled blasting method and creates a plane of shear on the desired line of break, exposing the half barrel of the blasthole after excavation (figure 2).
  • 3. mtmy 3 Figure 2: A presplit highwall. The holes are usually 50 mm to 100 mm in diameter in civil engineering applications whereas larger diameter holes (sometimes more than 300 mm in diameter) are proving to be successful in surface mining operations. The spacing between holes varies between ten to twenty times the hole diameter. The presplit shots transmit compressive shock waves, which, at their point of meeting between the boles, create a zone of tension, which fractures and shears the rock. This method has limited application in underground work.
  • 4. mtmy 4 Figure 3: Stress conditions in presplitting. Figure 4: Decoupled charges for presplitting.
  • 5. mtmy 5 Perimeter blasting This type of blasting is generally used for underground blasting. However in surface blasting the same technique is known as ‘smooth blasting’. In underground operations the perimeter holes of the backs (roof) of headings and tunnels are drilled along the design profile parallel to the direction of the excacation. Generally the spacing between the final lines of holes is less than 1.5 times the burden Figure 5: Crack zone from blasting with conventional explosives. Figure 6: Crack zone from perimeter blsting with Gurit 17X 500 mm (small diameter light explosives with low VOD)
  • 6. mtmy 6 Figure 7: Perimeter blasting arrangement In surface mining the decoupled perimeter holes are drilled on a closer pattern than the production blastholes. These holes are detonated last, in order to maximise the relief of burden. This reduces overbreak. Unlike normal blasting underground, the spacing S between holes in the same row for surface excavation is less than the burden. The usual relation is S = 0.8B.
  • 7. mtmy 7 Figure 8: Principle of smooth blasting in surface excavation. Cushion blasting Cushion blasting is applicable in surface mining where the object is to trim the excess material from the final high wall to improve stability. A single row of holes is drilled along the perimeter of the excavation. The size of the drillholes varies between 50 mm to 164 mm.
  • 8. mtmy 8 Cushion blastholes are charged with small, well disributed charges in completely stemmed holes, which are fired after the main blast is excavated. The charges are fired with no delay, or minimum delay between boles. Figure 9: Cushion blasting