Research on Detection and Safety Analysis of Unfavorable Geological Bodies Based on OCTEM-PHA

被引:2
|
作者
Zhu, Tao [1 ]
Hu, Jianhua [2 ]
Wen, Guanping [1 ]
Zhou, Tan [1 ]
机构
[1] Cent South Univ, Sch Resources & Safety Engn, Changsha 410083, Peoples R China
[2] Fuzhou Univ, Zijin Sch Gelolgy & Min, Fuzhou 350108, Peoples R China
基金
中国国家自然科学基金;
关键词
advance prediction of unfavorable geological bodies; geological remote sensing; OCTEM detection; inversion maps; profiles; PHA method; HAZARD ANALYSIS; ELECTROMAGNETIC METHOD; INRUSH HAZARDS; TREE ANALYSIS; TRANSIENT;
D O I
10.3390/rs15153888
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The caving method and mining disturbance may cause geological issues. The advance prediction of unfavorable geological bodies should be conducted to ensure product safety in the underground mine. In this study, we proposed the OCTEM-PHA analysis process and analyzed the Tongkeng Mine in Guangxi. Further, we conducted opposing-coil transient electromagnetic method (OCTEM) detection on four detection lines in T5-1 stope at mine level 386 by using portable geological remote sensing equipment and created inversion maps. Plot profiles and coupling were analyzed with inversion maps to explore the five types of risk factors presented in the mine. The preliminary hazard analysis (PHA) method was used for five types of risk factors to predict the accident consequence and develop safety countermeasures. The results indicate the following: (1) the OCTEM-PHA safety analysis process for unfavorable geological bodies is realistic and feasible. (2) OCTEM shows an excellent response to both high- and low-resistance anomalies in practical engineering applications. The coupling analysis of profiles and inversion maps helps visually analyze the area of apparent resistivity anomalies. (3) The studied mine did not show overhanging formed by the overlying rock layer and large loose void areas. However, the crumbling mining area should be further optimized for balanced mining, the treatment of groundwater and surface water should be improved, and the comparative analysis with the follow-up detection results should be increased.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] Research on Safety Helmet Detection Method Based on Convolutional Neural Network
    Li Qiong
    Peng Fulun
    Ru Zhibing
    Yu Shuai
    Zhao Qinglin
    Shang Qiongjun
    Cao Yue
    Liu Jie
    SIXTH SYMPOSIUM ON NOVEL OPTOELECTRONIC DETECTION TECHNOLOGY AND APPLICATIONS, 2020, 11455
  • [22] Application Research of Rail Transit Safety Protection Based on Laser Detection
    Wang Zhifei
    ADVANCED LASER MANUFACTURING TECHNOLOGY, 2016, 10153
  • [23] Research on evaluation of safety literacy based on social network analysis
    Li, Xiangchun
    Li, Qin
    Long, Yuzhen
    Li, Zhongbei
    Liu, Rong
    Zhu, Yunlong
    PROCESS SAFETY PROGRESS, 2020, 39 (01)
  • [24] Detection and analysis of the safety profile of talazoparib based on FAERS database
    Tang, Mufei
    Liu, Peiyan
    Du, Linzhe
    Li, Yuanyuan
    Chen, Jinjin
    Li, Yang
    EXPERT OPINION ON DRUG SAFETY, 2024,
  • [25] Safety analysis of autonomous vehicles based on target detection error
    Rong, Donglei
    Jin, Sheng
    Liu, Bokun
    Yao, Wenbin
    IET INTELLIGENT TRANSPORT SYSTEMS, 2024, 18 (05) : 932 - 948
  • [26] Anomaly Detection Based on Information Granulation and Principal Component Analysis for Geological Drilling Process
    Huang, Cheng
    Du, Sheng
    Fan, Haipeng
    Wu, Min
    Cao, Weihua
    2024 43RD CHINESE CONTROL CONFERENCE, CCC 2024, 2024, : 2750 - 2755
  • [27] Research of Singular Signal Detection Based on Wavelet Analysis
    Zhang Xiaochun
    Hu Caiwen
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [28] Research of Intrusion Detection based on Principal Components Analysis
    Chen Bo
    Ma Wu
    ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 1, PROCEEDINGS, 2009, : 116 - 119
  • [29] The Research of Intrusion Detection Model Based on Clustering Analysis
    Li Bo
    Jiang Dong-Dong
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 24 - 27
  • [30] Malware Detection Techniques and Research Based on Image Analysis
    Li, Chenyu
    Wang, Yanan
    Quan, Wen
    Liang, Xuanhao
    2024 5TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATION, ICCEA 2024, 2024, : 41 - 46