281 research outputs found

    Towards safer mining: the role of modelling software to find missing persons after a mine collapse

    Get PDF
    Purpose. The purpose of the study is to apply science and technology to determine the most likely location of a container in which three miners were trapped after the Lily mine disaster. Following the collapse of the Crown Pillar at Lily Mine in South Africa on the 5th of February 2016, there was a national outcry to find the three miners who were trapped in a surface container lamp room that disappeared in the sinkhole that formed during the surface col-lapse. Methods. At a visit to Lily Mine on the 9th of March, the Witwatersrand Mining Institute suggested a two-way strategy going forward to find the container in which the miners are trapped and buried. The first approach, which is the subject of this paper, is to test temporal 3D modeling software technology to locate the container, and second, to use scientific measurement and testing technologies. The overall methodology used was to first, request academia and research entities within the University to supply the WMI with ideas, which ideas list was compiled as responses came in. These were scrutinized and literature gathered for a conceptual study on which these ideas are likely to work. The software screening and preliminary testing of such software are discussed in this article. Findings. The findings are that software modeling is likely to locate the present position of the container, but accurate data and a combination of different advanced software packages will be required, but at tremendous cost. Originality. This paper presents original work on how software technology can be used to locate missing miners. Practical implications. The two approaches were not likely to recover the miners alive because of the considerable time interval, but will alert the rescue team and mine workers when they come in close proximity to them.Мета. Визначення можливого місця локалізації лампового приміщення контейнера, в якому опинилися три шахтаря після аварії на шахті Лілі (Барбертон, Мпумаланга) методом комп’ютерного моделювання. Після обвалення стельового цілика на шахті Лілі 5 лютого 2016 року почалася національна кампанія з порятунку трьох шахтарів, які залишилися у ламповому приміщенні поверхневого транспортного контейнера, що провалився в утворену після вибуху воронку. Методика. Співробітниками Гірничого Інституту (Уітуотерс) запропонована двостадійна стратегія пошуку контейнера, в якому існує ймовірність знаходження шахтарів. В рамках першого підходу (який розглядається у даній статті) для виявлення контейнера здійснювалось випробування комп’ютерної технології 3D-моделювання в часі. Другий підхід передбачав технологію проведення наукового вимірювання та експерименту. В цілому, методологія включала, насамперед, підключення викладацького та наукового складу університету до вирішення проблеми шляхом комплексної генерації ідей, які були об’єднані в загальний список, вивчені із залученням відповідних літературних джерел, і найбільш реалістичні ідеї були виділені із загального переліку. Дана стаття розглядає результати комп’ютерної експертизи цих ідей та перевірки надійності відповідного програмного забезпечення. Результати. Для зручності моделювання процес обвалення був розділений на три окремі фази: руйнування воронки, руйнування західного схилу та небезпека ковзання на південних схилах. Ідентифіковано програмні технології, які можуть імітувати рух контейнера у перших двох фазах обвалення. В результаті моделювання у програмному забезпеченні ParaView виявлено місце розташування даного контейнера. Виконано аналіз південного схилу за допомогою ArcGIS і складені карти небезпеки схилу для району, а також підземні карти порятунку з маршрутами евакуації. Встановлено, що комп’ютерне моделювання може визначити місцезнаходження контейнера, але для цього потрібні точні вихідні дані й комплекс дорогих високоефективних програмних пакетів. Наукова новизна. Вперше застосовано комплекс комп’ютерних технологій та програмного забезпечення для пошуку зниклих шахтарів після аварійних ситуацій у підземному просторі шахт. Практична значимість. При застосуванні двостадійної стратегії пошуку шахтарів, що опинилися під завалом порід, команда рятувальників отримає сигнал про наближення до їх місцезнаходження.Цель. Определение возможного места локализации лампового помещения контейнера, в котором оказались три шахтера после аварии на шахте Лили (Барбертон, Мпумаланга) методом компьютерного моделирования. После обрушения потолочного целика на шахте Лили 5 февраля 2016 года началась национальная кампания по спасению трех шахтеров, оставшихся в ламповом помещении поверхностного транспортного контейнера, который провалился в воронку, образовавшуюся после взрыва. Методика. Сотрудниками Горного Института (Уитуотерс) предложена двухстадийная стратегия поиска контейнера, в котором существует вероятность нахождения шахтеров. В рамках первого подхода (который рассматривается в данной статье) для обнаружения контейнера производилось испытание компьютерной технологии 3D-моделирования во времени. Второй подход предполагал технологию проведения научного измерения и эксперимента. В целом, методология включала, прежде всего, подключение преподавательского и научного состава университета к решению проблемы путем комплексной генерации идей, которые были объединены в общий список, изучены с привлечением соответствующих литературных источников, и наиболее реалистичные идеи были выделены из общего списка. Настоящая статья рассматривает результаты компьютерной экспертизы данных идей и проверки надежности соответствующего программного обеспечения. Результаты. Для удобства моделирования процесс обрушения был разделен на три отдельные фазы: разрушение воронки, разрушение западного склона и опасность скольжения на южных склонах. Идентифицированы программные технологии, которые могут имитировать движение контейнера в первых двух фазах обрушения. В результате моделирования в программном обеспечении ParaView выявлено местоположение данного контейнера. Выполнен анализа южного склона с помощью ArcGIS и составлены карты опасности склона для района, а также подземные карты спасения с маршрутами эвакуации. Установлено, что компьютерное моделирование может определить местонахождение контейнера, но для этого нужны точные исходные данные и комплекс дорогостоящих высокоэффективных программных пакетов. Научная новизна. Впервые применен комплекс компьютерных технологий и программного обеспечения для поиска пропавших шахтеров после аварийных ситуаций в подземном пространстве шахт. Практическая значимость. При применении двухстадийной стратегии поиска шахтеров, оказавшихся под завалом пород, команда горноспасателей получит сигнал о приближении к их местонахождению.The results of the article were obtained without the support of any of the projects or funding

    MoleNet: An Underground Sensor Network for Soil Monitoring

    Get PDF
    With the increasing digitalization worldwide, the demand of information also increases in all areas. MoleNet is a low-power sensing platform which is easy to assemble and use. It offers several options to monitor, for example, the soil moisture and temperature and visualize the data. Several researchers from different countriesare currently working and improving MoleNet for different applications. This demoshows the main application of MoleNet: Monitoring soil conditions in a remote area,transmitting the data and visualizing the current status

    Role of Machine Learning, Deep Learning and WSN in Disaster Management: A Review and Proposed Architecture

    Get PDF
    Disasters are occurrences that have the potential to adversely affect a community via casualties, ecological damage, or monetary losses. Due to its distinctive geoclimatic characteristics, India has always been susceptible to natural calamities. Disaster Management is the management of disaster prevention, readiness, response, and recovery tasks in a systematic manner. This paper reviews various types of disasters and their management approaches implemented by researchers using Wireless Sensor Networks (WSNs) and machine learning techniques. It also compares and contrasts various prediction algorithms and uses the optimal algorithm on multiple flood prediction datasets. After understanding the drawbacks of existing datasets, authors have developed a new dataset for Mumbai, Maharashtra consisting of various attributes for flood prediction. The performance of the optimal algorithm on the dataset is seen by the training, validation and testing accuracy of 100%, 98.57% and 77.59% respectively

    Underground Mining Monitoring and Communication Systems based on ZigBee and GIS

    Get PDF
    ZigBee as a wireless sensor network (WSN) was developed for underground mine monitoring and communication systems. The radio wave attenuations between ZigBee nodes were investigated to measure underground communication distances. Various sensor node arrangements of ZigBee topologies were evaluated. A system integration of a WSN-assisted GIS for underground mining monitoring and communication from a surface office was proposed. The controllable and uncontrollable parameters of underground environments were assessed to establish a reliable ZigBee network

    SMART SENSOR AND TRACKING SYSTEM FOR UNDERGROUND MINING

    Get PDF
    The thesis predominantly discusses a smart sensor and tracking system for under- ground mining, as developed by the author. The tracking system is developed by two steps, the rst of which involves nding an e cient way to measure the distance, and the second of which involves localizing the positions of each miner in real-time. For the rst step, a Received Signal Strength Indicator (RSSI) is used to measure the distance between two points by indicating the amount of energy lost during the transmission. Due to environmental and human factors, errors exist when using RSSI to measure distance. Three methods are taken to reduce the error: Gaussian distribution, statistical average and preset points. It can be observed that the average error between actual distance and measured distance is only 0.1145 meters using the proposed model. In regards to the localization, the "3-point localization method" is considered rst. With the proposed method, the result of the localization is improved by 0.6 meters, as compared to the "2-point localization method". The transmission method for the project is then discussed. After comparing sev- eral transmission protocols in the market, ZigBee was chosen for the signal trans- mission. With the Zigbee protocol, up to 65000 nodes can be connected, which are suitable for many miners using the system at the same time. The power supply for the ZigBee protocol is only 1mW for each unit, thus potentially saving a great amount of energy during the transmission. To render the tracking system more powerful, two smart sensors are installed: an MQ-2 sensor and a temperature sensor. The MQ-2 sensor is used to detect the harmful gas and smoke. In the event that the sensor's detected value is beyond the threshold, it will provide a warning for the supervisor on the ground

    Non-Gaussian Hybrid Transfer Functions: Memorizing Mine Survivability Calculations

    Get PDF
    Hybrid algorithms and models have received significant interest in recent years and are increasingly used to solve real-world problems. Different from existing methods in radial basis transfer function construction, this study proposes a novel nonlinear-weight hybrid algorithm involving the non-Gaussian type radial basis transfer functions. The speed and simplicity of the non-Gaussian type with the accuracy and simplicity of radial basis function are used to produce fast and accurate on-the-fly model for survivability of emergency mine rescue operations, that is, the survivability under all conditions is precalculated and used to train the neural network. The proposed hybrid uses genetic algorithm as a learning method which performs parameter optimization within an integrated analytic framework, to improve network efficiency. Finally, the network parameters including mean iteration, standard variation, standard deviation, convergent time, and optimized error are evaluated using the mean squared error. The results demonstrate that the hybrid model is able to reduce the computation complexity, increase the robustness and optimize its parameters. This novel hybrid model shows outstanding performance and is competitive over other existing models

    A Technology review of smart sensors with wireless networks for applications in hazardous work environments

    Get PDF
    Workers in hazardous environments such as mining are constantly exposed to the health and safety hazards of dynamic and unpredictable conditions. One approach to enable them to manage these hazards is to provide them with situational awareness: real-time data (environmental, physiological, and physical location data) obtained from wireless, wearable, smart sensor technologies deployed at the work area. The scope of this approach is limited to managing the hazards of the immediate work area for prevention purposes; it does not include technologies needed after a disaster. Three critical technologies emerge and converge to support this technical approach: smart-wearable sensors, wireless sensor networks, and low-power embedded computing. The major focus of this report is on smart sensors and wireless sensor networks. Wireless networks form the infrastructure to support the realization of situational awareness; therefore, there is a significant focus on wireless networks. Lastly, the "Future Research" section pulls together the three critical technologies by proposing applications that are relevant to mining. The applications are injured miner (person-down) detection; a wireless, wearable remote viewer; and an ultrawide band smart environment that enables localization and tracking of humans and resources. The smart environment could provide location data, physiological data, and communications (video, photos, graphical images, audio, and text messages)

    Internet of Things for Sustainable Mining

    Get PDF
    The sustainable mining Internet of Things deals with the applications of IoT technology to the coupled needs of sustainable recovery of metals and a healthy environment for a thriving planet. In this chapter, the IoT architecture and technology is presented to support development of a digital mining platform emphasizing the exploration of rock–fluid–environment interactions to develop extraction methods with maximum economic benefit, while maintaining and preserving both water quantity and quality, soil, and, ultimately, human health. New perspectives are provided for IoT applications in developing new mineral resources, improved management of tailings, monitoring and mitigating contamination from mining. Moreover, tools to assess the environmental and social impacts of mining including the demands on dwindling freshwater resources. The cutting-edge technologies that could be leveraged to develop the state-of-the-art sustainable mining IoT paradigm are also discussed

    The Integration of a Coal Mine Emergency Communication Network into Pre-Mine Planning and Development

    Get PDF
    Regulations, such as the MINER Act of 2006, require the installation of redundant and secondary communication systems to assure that contact can be established with coal miners who may become trapped underground as a result of an event such as a fire, explosion, or inundation. For half a century, the orientation towards underground communications has been that more complex systems better serve the coal miner. However, if the goal is to provide for a reliable means of establishing communication between the surface and trapped miners underground, then the technology employed should be simple, reliable, and cost-effective. Coal mines spend hundreds of thousands of dollars on exploratory drillholes to characterize reserves, sometimes decades ahead of mine development. During the pre-planning phases, certain exploratory drillholes could be located and then outfitted with a simple communication link which would remain compatible even with the continuing evolution of communication systems. These links, whose locations would be accurately recorded, would be exposed by continuous miners during mine development thereby allowing an underground phone to be connected to a surface station in the event of an emergency. A latent network of these communication links could be installed for less than {dollar}500 each, without affecting drilling and grouting operations, and could be designed to be compatible with several communication systems as well as meeting MSHA and State requirements. This thesis examines appropriate methods and materials for incorporating an embedded communication link during pre-mine exploration drilling and addresses significant factors affecting its implementation. A design based on the research is presented

    Missouri S&T Magazine Spring 2006

    Get PDF
    https://scholarsmine.mst.edu/alumni-magazine/1045/thumbnail.jp
    corecore