期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Rockburst risk control and mitigation in deep mining
1
作者 Ming Cai 《Deep Resources Engineering》 2024年第2期46-67,共22页
It is important to understand and manage rockburst challenges in deep mining operations.This paper presents a systematic study of rockburst risk in underground mining,offering a detailed examination of influencing fac... It is important to understand and manage rockburst challenges in deep mining operations.This paper presents a systematic study of rockburst risk in underground mining,offering a detailed examination of influencing factors,risk assessment,and various control and mitigation methods.The complexities of rockburst phenomena are explained by examining factors that lead to the occurrence of rockbursts.A rockburst risk assessment using a bow-tie analysis is conducted,which provides insights into both risk evaluation and proactive control and mitigation systems.The core of the paper presents a comprehensive array of rockburst risk control and mitigation methods,which range from controls to reduce rockburst hazard,and excavation vulnerability,to controls and mitigations to reduce exposure.Strategic engineering control methods,including mine design and mining sequencing,are discussed.Tactical engineering control measures,such as ground pre-conditioning and rock support,are scrutinized,along with administrative controls like evacuation and re-entry protocols and the use of mechanized equipment.A multiple-line defense system is advocated for rockburst risk management to address the uncertainties involved in the process.Finally,emerging technologies and innovations as well as challenges are discussed,providing a roadmap for continued advancements in rockburst risk management in the future.This work serves as a valuable resource for mining professionals,researchers,and policymakers seeking a comprehensive understanding of rockburst risk management in deep mining. 展开更多
关键词 Rockburst risk Rockburst hazard Excavation vulnerability Exposure Rock support Risk control Risk mitigation
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部