scholarly journals Risk assessment of flooded equipment revitalization on opencast coal mine Tamnava-West Field

2021 ◽  
pp. 240-240
Author(s):  
Natalija Pavlovic ◽  
Dragan Ignjatovic ◽  
Stevan Djenadic ◽  
Tomislav Subaranovic ◽  
Ivica Jakovljevic

Unprecedented floods in 2014 caused huge consequences on Serbian lignite opencast mines, such as halt of coal production and damages of the mining equipment. Three equipment revitalization options were urgently assessed to continue with coal production on opencast mine Tamnava-West Field. This paper compares the economic risks of the three investment options for lignite mine Tamnava-West Field mining equipment revitalization, based on this experience and probable risk of a repeated event. The results of the detailed quantitative risk analysis should verify the urgent decision and ranked with a multiple-criteria decision analysis.

Author(s):  
Devi Pratami

A project always has risks that can lead to project failure. In the project, a risk analysis is required to provide an evaluation for the project to proceed as planned. In the event of inadequate planning and ineffective control, it will result in irregularities identified as a risk to the project. This study aims to analyze the qualitative risk on Fiber Optic Installaion project in Sukabumi, West Java, Indonesia. In addition, risk assessment is undertaken on project implementation. Assessment of risk using the impact and probability to measure the impact of risk occurrence. The impacts are more detailed by classified by time impact, cost impact, quality impact, safety and security impact, proximity. The result is there are 36 risk that may occur and mostly risks are associaated by quality and safety&security impact.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2018 ◽  
Vol 180 ◽  
pp. 05006
Author(s):  
Zofia Wróbel

The valuation of the risk of losses makes easy the correct estimation of resulted threats as a result of atmospheric discharges and harms connected to them. Qualifying the need of lightning protection use for the object, we ought to take into account the risk R for the object and for the public services devices. In every case of examining risks we ought to fulfill: the identification of components RX forming the risk, counting the identified components of the risk RX, the entire risk R, identify the tolerated risk RT and compare the risk R with the tolerated value RT. As a result of such analysis we can come to a decision about the use of protection resources. In the report was realized the risk analysis of devices damages for a chosen object - the signal box with installed station - relaying devices of the railway traffic controlling with a computer adjustable control panel. From the realized analysis results that DEHN Risk Tool is a useful tool for the risk analysis of lightning losses in buildings, making possible the improvement of the calculations process, especially in the range of the choice of proper protection resources.


2017 ◽  
pp. 523-528 ◽  
Author(s):  
L. Moretti ◽  
G. Cantisani ◽  
P. Di Mascio ◽  
S. Nichele ◽  
S. Caro

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Haijun Wang ◽  
Yingjie Liu ◽  
Yuesong Tang ◽  
Hao Gong ◽  
Guoliang Xu

The capabilities of mining equipment and technology in China have been improving rapidly in recent years. Correspondingly, in the western part of the country, the mining heights of longwall faces in shallow-buried coal seams have shown an increasing trend, resulting in enhanced mining efficiency. However, the problems associated with the possible failure of the coal wall then increase and remain a serious difficulty, restricting safe and efficient mining operations. In the present study, the 12401 longwall face of the Shangwan Coal Mine, Inner Mongolia, China, with a mining height of 8.8 m, is taken as an example to study the mechanisms underlying failure phenomena of coal walls and their control methods. Our results show that the failure region inward of the longwall face is small in shallow-buried coal seams, and the damage degree of the exposed coal wall is low. The medium and higher sections of the coal wall display a dynamic failure mode, while the broken coal blocks, given their initial speed, threaten the safety of coal miners. A mechanical model was developed, from which the conditions for tensile failure and structural instability are deduced. Horizontal displacement in the lower part of the coal wall is small, where no tensile stress emerges. On the other hand, in the intermediate and higher parts of the coal wall, horizontal displacement is relatively large. In addition, tensile stress increases first with increasing distance from the floor and then decreases to zero. Experiments using physical models representing different mining heights have been carried out and showed that the horizontal displacement increases from 6 to 12 mm and load-bearing capacity decreases from 20 to 7.9 kN when the coal wall increases in height from 3 to 9 m. Furthermore, failure depth and failure height show an increasing trend. It is therefore proposed that a large initial support force, large maximum support force, large support stiffness, and large support height of a coal wall-protecting guard are required for the improved stability of high coal walls, which operate well in the Shangwan coal mine.


Geologos ◽  
2020 ◽  
Vol 26 (1) ◽  
pp. 25-37 ◽  
Author(s):  
Lilianna Chomiak

AbstractThe present article focuses predominantly on sandy deposits that occur within the Middle Miocene lignite seam at the Tomisławice opencast mine, owned by the Konin Lignite Mine. As a result of mining activity, these siliciclastics were available for direct observation in 2015–2016. They are situated between two lignite benches over a distance of ~500 m in the lower part and ~200 m in the higher part of the exploitation levels. The maximum thickness of these sandy sediments, of a lenticular structure in a S–N cross section, is up to 1.8 m. With the exception of a thin lignite intercalation, these siliciclastics comprise mainly by fine-grained and well-sorted sands, and only their basal and top layers are enriched with silt particles and organic matter. Based on a detailed analysis of the sediments studied (i.e., their architecture and textural-structural features), I present a discussion of their genesis and then propose a model of their formation. These siliciclastics most likely formed during at least two flood events in the overbank area of a Middle Miocene meandering or anastomosing river. Following breaching of the natural river levee, the sandy particles (derived mainly from the main river channel and levees) were deposited on the mire (backswamp) surface in the form of crevasse splays. After each flooding event, vegetation developed on the top of these siliciclastics; hence, two crevasse-splay bodies (here referred to as the older and younger) came into existence. As a result, the first Mid-Polish lignite seam at the Tomisławice opencast mine is currently divided in two by relatively thick siliciclastics, which prevents a significant portion of this seam from being used for industrial purposes.


Sign in / Sign up

Export Citation Format

Share Document