Blasting method controlling damage of damage rings of tunnel

A technology for controlling blasting and tunneling, applied in blasting and other directions, can solve problems such as reducing the service life of tunnels

Active Publication Date: 2012-07-25
ZHUOLIWEI BEIJING TECH
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such a large tunnel damage circle damage gr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blasting method controlling damage of damage rings of tunnel
  • Blasting method controlling damage of damage rings of tunnel
  • Blasting method controlling damage of damage rings of tunnel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] see figure 1 As shown, the tunnel damage zone damage control blasting method in this embodiment includes steps:

[0022] S10. Arranging blast holes on the excavation face according to the pre-design, and opening blast holes according to the pre-designed blast hole depth and direction, wherein the blast hole types include cut holes, auxiliary holes located on the periphery of the cut holes, Peripheral holes located on the periphery of the auxiliary hole and on the excavation contour line, and bottom holes located on the bottom edge of the tunnel.

[0023] see figure 2 As shown, the area where each cut hole is located forms a cut hole area A, similarly, the area where each auxiliary hole is located forms the auxiliary hole area B, and the area where each peripheral hole is located forms a peripheral hole area D; The area forms the bottom hole area E; the definitions of the cut hole area, the auxiliary hole area, the peripheral hole area and the bottom hole area in the ...

Embodiment 2

[0032] The blasting method for damage control of the tunnel damage circle in this embodiment includes steps:

[0033] S21. Create a blasthole on the excavation face according to the pre-design, wherein the type of blasthole includes a cutout hole, an auxiliary hole located on the periphery of the cutout hole, and an auxiliary hole located on the periphery of the auxiliary hole and on the excavation contour line Perimeter holes, and bottom holes at the bottom edge of the tunnel.

[0034] When opening peripheral holes, peripheral hole angle control technology or rock drills or blasthole angle controllers that can control the blasthole angle of peripheral holes can be used to ensure that there is no overbreak or underbreak.

[0035] S22. Load explosives and electronic detonators into the blast hole according to the pre-designed charge amount.

[0036] S23. Connect the electronic detonators to a network, and detonate the blast holes according to a predetermined detonation sequenc...

Embodiment 3

[0043] The blasting method for damage control of the tunnel damage circle in this embodiment includes steps:

[0044] S30. Arranging blast holes on the excavation face according to the pre-design, and opening blast holes according to the pre-designed blast hole depth and direction, wherein the blast hole types include cut holes, auxiliary holes located on the periphery of the cut holes, The caving hole is located on the periphery of the auxiliary hole, the peripheral hole is located on the periphery of the caving hole and on the excavation contour line, and the bottom hole is located on the bottom edge of the tunnel.

[0045] see image 3 As shown, among them, the region where each of the above-mentioned collapse holes is located forms the region C of the collapse hole.

[0046] S31. Load explosives and an electronic detonator into the blast hole according to the pre-designed charge amount.

[0047] S32. Connect the electronic detonators to a network, and detonate the blast ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

PropertyMeasurementUnit
Densityaaaaaaaaaa
Densityaaaaaaaaaa
Login to view more

Abstract

The invention discloses a blasting method controlling damage of damage rings of a tunnel, which relates to the field of tunnel engineering and is invented for reducing damage to tunnel damage rings. The method includes: drilling blast holes on a driving face according to predesign; and filling the blast holes with explosive and electronic detonators according to the pre-designed explosive quantity; and networking the electronic detonators, and allowing the blast holes to blast according to a preset blasting sequence; wherein the inter-hole differential blasting time interval of easers is 100-300ms, both the inter-hole differential blasting time interval of auxiliary holes and the inter-hole differentia blasting time interval of bottom holes are 10-30ms, and the inter-hole differential blasting time interval of peripheral holes is 0.1-3ms; or the peripheral holes in different groups are subjected to inter-group differential interval blasting after the peripheral holes are grouped, the peripheral holes are in groups of 4-8 holes, and the inter-group differential blasting time interval of the grouped peripheral holes is 3-6ms. The blasting method is applicable to blasting in tunnel engineering.

Description

technical field [0001] The invention relates to the field of tunnel engineering, in particular to a blasting method for damage control of tunnel damage circles. Background technique [0002] Tunnel damage circle damage refers to the damage to the surrounding rock outside the excavation contour of the tunnel, forming cracks in the surrounding rock. Once the cracks are formed, they will never recover, and the rock stress will change. The damage is mainly from blasting construction. [0003] Affected by blasting technology, engineering blasting in my country has caused great damage to tunnel damage circles. Common nonel detonators are mostly used in the blasting of tunnel projects. Due to the influence of detonator accuracy and section classification, the number of blast holes in one blast is large, resulting in overlapping holes and increasing the damage to surrounding rock. According to the data, the damage depth of the tunnel damage zone by the current blasting technology ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): F42D1/00F42D3/04
Inventor 薛世忠杨年华王海亮
Owner ZHUOLIWEI BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products