Font Size: a A A

Dangerous Source Recognition And Safety Assessment Of Rock Blasting Under The Complex Environment

Posted on:2013-01-17Degree:MasterType:Thesis
Country:ChinaCandidate:X ZhangFull Text:PDF
GTID:2232330392954308Subject:Mining engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of blasting technology, blasting is applied in the fieldsof mining, building demolition and reef explosion field gradually, especially it isapplied to the demolition blasting of structure and rock blasting widely, which makesthe safety problem of demolition project is increasingly serious. This paper focuses onanalyzing the dangerous and harmful factors in the demolition project under complexenvironment and putting forward prevention measures relevantly. On this basis, thepaper establishing the safety evaluation model of rock blasting work under complexenvironment.Firstly, this paper introduces construction technological process of blasting, andthen introduces how to determine the main technical parameter according to thecharacteristics and project case of blasting under complex environment. Combiningwith the theory of safety system engineering, the paper identifies the dangerous andharmful factors of rock blasting under the complex environment and finds out thesources of dangers, and puts forward effective preventive measures. Secondly, based onthe identified hazardous and the accident-causing theory, this paper distinguishes thepotential hazards and harmful factors into four facts, blasting environment, blastingdesign project, construction process and security management. Using AHP, whichcombines qualitative analysis method and quantitative analysis method together, thepaper builds a rock blasting process security model of complex environments anddetermines each factor’s importance degree. Using fishbone analysis method, the paperdraws fishbone diagram to represent the importance degree. According to fishbonediagram we can make effective preventive measures aiming at influence factors of eachlevel.Lastly, using fuzzy comprehensive evaluation method, the paper builds evaluationmathematical model, and applies the evaluation method into engineering casessuccessfully. While determining the most available membership function, the paper usestrapezoid distribution and half-trapezoid distribution to establish evaluation matrix.Using expert evaluation method, paper calculates the corresponding membership grades,and then gets evaluation matrix. The weight is determined by the sorting of eachfactor’s relative importance comparing with the highest level (general target). By thefuzzy calculations of weighted average model and the of maximum membershipprinciple, paper gets the security level of the project.
Keywords/Search Tags:complex environment, dangerous source recognition, analytic hiera-rchy process, fuzzy comprehensive evaluation
PDF Full Text Request
Related items