You can register on this site as a Company User or an Independent user.
Company Registration:
1.To register your company with your basic company details.
User Registration:
2.To register as company user or individual user.
a)For registering as company user you must have Company Code.
b)Individual User registration you do not require any Company Code.
12 Jul 2016
POSTED BY - MineExcellence
1. INTRODUCTION
Drilling and blasting is made up of groups of tasks, which are performed to produce broken rock with specific fragmentation and muck pile shape & displacement while ensuring that safety, statutory requirements and/or environmental compliance are met. Data collection: pre-blast, during the blast and post-blast is critical to the blasting process, for blast design, for prediction of impacts, for taking corrective steps at execution stage and for further analysis for planning purposes. In the mines and quarries, data is mostly kept in the paper based system. It is often difficult to collect or review historical blasting data. Sometime data collected on paper is transferred back into an electronic system. The manual method of blasting data storage and file management takes time and resource for providing critical information for making decisions. However, blast information data collection and analysis has generally not benefited from recent technology. The review and analysis of past data can improve blast design, blast execution and help in the achievement of desired blasting outcomes and downstream productivity, and process improvement by adjustment of drilling and blasting parameters.
Generally blasting data related information is poorly managed with disjointed and unrelated information technology systems managing parts of blasting data. Data is often moved from one system to another, sometimes manually. Data is obtained from blast face profiling tool, vibration, flyrock, fragmentation prediction tools, and incorporating explosives and accessories used. A data management software ensures information storage, but also acts as an intelligent system to aid blasting operations. Based on the database and its search and analysis capabilities, the system can provide opportunities for taking corrective steps by changing explosive charge distribution, initiation timing and sequence for controlling fragmentation size, vibration and flyrock. Modular software may use information to create specific hole by hole, explosives loading and create load sheets according to geotechnical zone characteristics and results required.
2. BLASTING DATA
An important component to the management of any process is the measurement of key parameters, which in turn are used to monitor, control and provide the feedback necessary to improve the process. Any “optimization” (or improvement) of blasting should not only look at the blast itself, but also to all consequences of blasting results. These considerations lead to overall-integrated concept. It is obvious that such approach does not only provide data for blasting improvement, but will be helpful for investigation of all other operations as well.
Several commercial database systems for mining and blasting are available for storing and analyzing data. However, blasting related data base systems have not found to be popular at the mine level by Indian mining and blasting organizations.
Advantage of using information technology data management are systematic storage of data, retrieval of data over a long time period, analysis of data for improving efficiencies, automated reports, view and analysis at distant location if desired. In general separate reports have to be prepared/ submitted to different regulatory authorities, to management and also for own requirement of mine operators. This paper discusses how data collection and analysis can provide a better understanding of the blasting operation, as well as additional control and improved outcomes. . Further, difficulty is that imported software need to be customized according to Indian practices and also updating the database. Further, while using similar explosives and initiating systems execution in different countries is not similar. Database is foundation for optimization of blasting and overall operation.
2. DATA MANAGEMENT
Although strictly speaking data-management refers to management of measured data. Besides measured data related to geotechnical and blasting parameters, explosives and accessories used, a large number of measurements during and after blast are carried out:
A blasting operation data management system, not only ensures information storage, but also acts as an intelligent system as an aid for blast design, prediction of impacts and analysis can be integrated with the organizations information system. Database is foundation for optimization of blasting and overall mining, tunneling or quarrying operation. Based on the database and its search and analysis capabilities, the system provides opportunities for getting dynamic drilling and blasting parameters, vibration constants and predictions, flyrock predictions, fragmentation size predictions. This helps in adjustment of drilling and blasting parameters based on optimized results. Data is obtained from blast hole face profiling tool, vibration prediction tool and direct data link to a database incorporating all the major manufacturers products and an interface allowing the user to add new product ranges and create custom products.
3. CASE STUDY
Aditya limestone open pit mine belongs to Aditya Birla group. It is designed to produce limestone 6.6 for cement plant, situated around 2 km from away. The ore to overburden ratio is 1:0.33. Thus, total rock handling is around 9 million tonnes per annum. Presently, there are two working pits. This mine has been able store blast related data from the beginning of limestone open pit mine in 1965 till date has helped a mine in improving drill factor from 45 tons/m to 75 tons, breakage of limestone from 6.5 tons/kg to 14 tons/kg thus reducing costs by 50% while improving crusher productivity from 764 tons per hour to 932 tons per hour and controlling vibration, flyrock and dust. Data collection and adoption of many scientific techniques such as Indian indigenous air gap, indigenous stem plug, indigenous rock plug techniques and tools have also helped the mine in achieving the above stated results.
Working pits have been developed with working benches of 9.0 m. height. At present, the work is going on in three benches. Adjacent benches are connected with ramps. Removal ofoverburden (OB) soil, which is very thin in nature, is done by scrapping with dozer. The scrapped out OB is lifted with the help of shovel and dumper combination and is disposed off in waste dump yard. Drilling is done with the help of ROC L6 and IBH-10 drill machines of 100mm-115mm diameter. A set of maximum 25 holes is blasted as and when required. Excavation and loading operations are carried out by hydraulic excavators. At a time two excavators are used for this operation. Transportation of limestone from working face to crusher hopper is carried out in 35/60 tonner dumpers. At a time, 6 dumpers are deployed for operation. Each excavator is normally given 3 dumpers for loading. Before crushing, the limestone from crusher hopper is passed through grizzly screen for screening out intrusive clay. The clay free limestone is crushed to required size and transported to stockpile located inside plant through belt conveyor.
By keeping records mines have been able to reduce costs and improve blasting operations. On the one hand continual scientific innovations at Aditya Cement have been adopted.
Mine used to keep blasting related data initially in hand written format (Figure 2) and thereafter have been maintaining records in Excel sheet format (Figure 3). In 2011 Aditya mines obtained a software Blast Information Management System (Bhandari and Bhandari, 2006).
3.1 Blast Information Management System (BIMS) provides information to meet the strategicand operational needs for planning, controlling and decision-making for optimizing mining operations (Bhandari and Bhandari, 2006). BIMS provides methods to store, manage, document and retrieve drill and blast related information The system stores blast details, blast parameters, blast pattern, face profile, explosive consumption, charging details, costs, weather information, pre-blast survey, post-blast evaluation data, fragmentation information, photograph(s), videos, accidents, misfires, flyrock, vibration record and information for vibration analysis (Figure 4). Video and photographic records (Figure 5) also provide opportunity to analyze displacement and flyrock, back break/over break records to be maintained and analyzed. These also indicate face movement and hole by hole behavior.
Integration with other software such as that used for vibration monitoring and analysis, fragmentation analysis etc. can be carried out so as to provide simplified management system.
3.2 Reporting and Searching
Many central and state agencies, concerned with Explosives Security, Mines Safety and the Environmental Protection (DEP), are increasing their expectations for strict accounting of inventory and blast documentation. Blasting company executives and managers are now facing the possibility of incarceration, fines and suspended operations if their documentation is not in order. The database can be tailored according products and practices, to customer requirements and can be maintained.
This database has also searching options using which the user can look for the records of blasts as per his defined criteria. Currently, the software uses the following criteria for the search option: between dates, by performance of explosives or initiating system, by vibration limits, by fragmentation size, by location of blasting zone or accident etc.
Calculation of costs related to blasting, drilling cost, explosives cost, acce ssories cost, and manpower cost all as separate entity, so that each & every step of the mining activity could be optimized by using this information. A report can also be generated of annual re turn to IBM.
Many records have to be maint ained for statutory requirement. Mine has to provide returns to regulatory authorities PESO, In dian Bureau of Mines, Director General of Mines regarding consumption of explosives quarterly, monthly and yearly. Besides management also want end of the month reports. The data base application is password protected thus restricti ng the use of the software and no unauthorized access to the data is possible. However, further improvement is needed for managing the data collection method and further transfer to managem ent.
All of these challenges mandate a new way of doing things. Fortunately, we are living in a connected world. One way is to use smart phone or other devices for collecting data and transferring to mine system. A data2Desk system is useful method.
4. Data2Desk
Data2Desktop is an end-to-end technology framework packaged as a simple data service tomonitor remote data points. In the mine there are large numbers of faces spread over a large geographic area where blasts are carried out. This requires the application of a new creed of technology overlaying the traditional systems, that are capable of reaching further to acquire more data, and sending it directly to those in the organization that require it, all in real time. This new set of business imperatives is now putting pressure on management to monitor more and more data in real time, and distribute this to more people in the organization, also in real time.
The recent upgrades to the mobile phone network coverage and speed, combined with the internet backbone available, and even the satellite data communications infrastructure available today are creating an extensive and reliable communications infrastructure that is ideal for these applications. An attempt has been made of the opportunities that these technologies can have in the blasting operations, and what the potential benefits can be. Data2Desktop is an end-to-end technology framework packaged as a simple data service to monitor remote data points, log the data securely on servers and present the data on demand or by exception to authorized users.
Data2Desktop can use most communications means including mobile phone and satellite networks to send data from remote locations to the Data2Desktop servers, where the data is
CONCLUSIONS
Drilling and explosives suppliers are always looking to improve their products, while new technologies and techniques are emerging. Never the less they do offer the potential to improve the process and therefore worth exploring. To demonstrate that an improvement has been achieved there needs to be a comprehensive measurement system, which is capable of setting baseline, and then tracking the changes made to the process. If we can demonstrate a reduction, an improvement in the product the customer receives or a lowering of the cost of producing the product then which out ways the cost of change then improvement is worthwhile. This
information stored and analyzed helps in better control and optimization of mining operations. Data base helps to quickly respond to information and remain successful in today’s competitive
market place.The use of new technologies in the connected world is inevitable, as it provides the best-in-class means today of communicating with thousands of points securely and cost effectively. Working alongside traditional methods, the new imperatives of the connected world can be achieved without the large capital outlays that were the hallmark of the previous technology projects. With end-to-end services like Data2Desktop, there is need to implement this technology. Taking advantage of this infrastructure to accomplish the additional management tasks of remote asset management as a compliment to your existing BIMS system can lead to fast implementations with surprisingly low capital outlay and running costs.
ACKNOWLEDGEMENT
We wish to gratefully acknowledge the support from Resource Technology. We also thank Kamal Paliwal supporting us in providing data. Dr. Sushil Bhandari and team at Earthand other colleagues: Aditya Cement for
REFERENCES
stored in your own separate database. Data on these servers can be accessed by authorized users from any web browser.
This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.
What personal information do we collect from the people that visit our blog, website or app?
When registering on our site, as appropriate, you may be asked to enter your name, email address, phone number or other details to help you with your experience.
Accessing and Updating Your Personal Information
You may update Your Personal Information via MineExcellence Account at this Website. If You should become aware that Your Personal Information with MineExcellence is not complete and accurate, You shall promptly update Your Personal Information via MineExcellence Account.
How do we protect visitor information?
We use vulnerability scanning and/or scanning to PCI standards.
We also use Malware Scanning.
And we use an SSL certificate as well to protect your content from third party.
Do we use 'cookies'?
We do not use cookies for tracking purposes.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser's Help menu to learn the correct way to modify your cookies.
Third Party Disclosure
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information.
Third party links
We do not include or offer third party products or services on our website.
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under 13, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation's consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.
We do not specifically market to children under 13.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
Information Security
We work hard to protect MineExcellence and our users from unauthorized access to or unauthorized alteration, disclosure or destruction of information we hold. In particular:
We encrypt many of our services using SSL.
We review our information collection, storage and processing practices, including physical security measures, to guard against unauthorized access to systems.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify the users via email within 7 business days.
We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only those individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.
CAN SPAM Act
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to be in accordance with CANSPAM we agree to the following:
If at any time you would like to unsubscribe, you can email us at and we will promptly remove you from ALLcorrespondence.
Your Rights
In accordance with the applicable law, MineExcellence will provide You with access to Your Personal Information and, as appropriate, the right to intervene in respect of Your Personal Information. You may also be entitled to object to the processing of Your Personal Information by MineExcellence or to request the deletion of Your Personal Information.
Questions About this Privacy Policy; Changes to this Privacy Policy
If You have any questions about this Privacy Policy, please send Your inquiry to "email address", or to the applicable MineExcellence office identified in the "Contact Us" section of the Website.
MineExcellence reserves the right to change this Privacy Policy at any time by posting notice of the changes on the Website.
1. Registration and Subscription
When you register, you are registering or subscribing as a company, company user, or individual user of MineExcellence. Company user will register with specific company code. Access to registered user content and subscription areas are via your [email address or username and password].
We allow you access to the registered user content and subscription areas of the website on the basis that:
(i) Your email address and password are personal to you and may not be used by anyone else to access MineExcellence.
(ii) You will not do anything which would assist anyone who is not a registered user to gain access to or sell any content contained in the registered content or subscriber areas of MineExcellence.
(iii) You do not maliciously create additional registered user or subscription accounts for the purpose of abusing the functionality of the website, or other users; nor do you seek to pass yourself off as another user.
(iv) You comply with these terms and conditions.
If, for any reason, we believe that you have not complied with these requirements, we may, at our discretion, cancel your access to the registered user and subscription areas of MineExcellence immediately and without giving you any advance notice.
2. Termination of Registration and Subscription
If we wish to bring the agreement to an end, we will do so by emailing you at the address you have registered stating that the agreement has terminated. The agreement will terminate and your email address and password will become invalid on MineExcellence immediately.
You can also terminate this agreement and your account at any time by emailing your notice to us at but your information may remain stored in archive on our servers even after the deletion or the termination of your account.
3. Use of Material Appearing on MineExcellence
For the purposes of these terms of service, "material" means material including, without limitation, text, video, graphics, photographs and audio material, published on the MineExcellence website, whether copyright of MineExcellence or a third party.
You may download and print extracts from the material and make copies of these for your own personal and non-commercial use only. You must not reproduce any part of MineExcellence or the material or transmit it to or store it in any other website or disseminate any part of the material in any other form, unless we have indicated that you may do so.
We may be prepared to allow you to distribute or reproduce other parts of MineExcellence or the material in certain circumstances. Please email us if you wish to apply for permission to do so.
4. Disclaimer of Liability
To the extent permitted at law, we do not accept any responsibility for any statement in the material. You must not rely on any statement we have published on MineExcellence without first taking specialist professional advice. Nothing in the material is provided for any specific purpose or at the request of any particular person.
For the avoidance of confusion, we will not be liable for any loss caused as a result of your doing, or not doing, anything as a result of viewing, reading or listening to the material or any part of it.
We do not warrant that MineExcellence or any of its contents is virus free. You must take your own precautions in this respect as we accept no responsibility for any infection by virus or other contamination or by anything which has destructive properties.
6. Data Protection
Please see our privacy policy for details of how personal data may be stored and processed.
7. Variations
These terms may be varied from time to time. Please ensure that you review these terms and conditions regularly as you will be deemed to have accepted a variation if you continue to use the website after it has been posted.
8. Force Majeure
Although we will do our best to provide constant, uninterrupted access to MineExcellence, we do not guarantee this. We accept no responsibility or liability for any interruption or delay.