This article presents a review on the different methodologies that are used for tunnels excavations in hard rocks in present era. Growing needs for modern transportation and utility networks have increased the demand for a more extensive and elaborate use of underground space or through high mountains / hills. As a result, more projects have to be completed in various ground conditions and one of which is more challenging is to carry out excavation work in hard rocks. Significant technological advances have rendered these projects possible, but have also given rise to new challenges as many of these projects have to be completed in difficult conditions, with very strict environmental constraints, particularly in urban areas where the potential impact of tunneling on existing structures is a major concern. This paper addresses the main aspects of tunneling and underground works performed in hard rocks. A summary is presented of the more recent advances and widely adopted techniques in these regards.
Construction Of A Viaduct/Bridge: An OverviewSourav Goswami
The following project focuses on the viaduct and its various parts, describing their individual characteristics as well as the methods being used for its construction.
Construction Of A Viaduct/Bridge: An OverviewSourav Goswami
The following project focuses on the viaduct and its various parts, describing their individual characteristics as well as the methods being used for its construction.
Necessity/advantage of a tunnel, Classification of Tunnels,
Size and shape of a tunnel, Alignment of a Tunnel, Portals and Shafts,
Methods of Tunneling in Hard Rock and Soft ground, Mucking, Lighting
and Ventilation in tunnel, Dust control, Drainage of tunnels, Safety in
tunnel construction.
Trenchless construction. Trenchless construction includes such construction methods as tunneling, microtunneling (MTM), horizontal directional drilling (HDD) also known as directional boring, pipe ramming (PR), pipe jacking (PJ), moling, horizontal auger boring (HAB) and other methods for the installation of pipelines and cables below the ground with minimal excavation.
trenchless technology pdf
trenchless technology methods
trenchless pipe technologies
trenchless technology contractors
trenchless technology institute
trenchless technology center
trenchless technology conference
trenchless construction methods
interesting civil engineering topics
civil engineering topics for presentation
seminar topics pdf
best seminar topics for civil engineering
civil seminar topics ppt
civil engineering seminar topics 2019
seminar topics for mechanical engineers
mechanical engineering seminar topics 2018
Reasons and solution to cracks in buildings.
<div dir="ltr"><br>Reasons and solution to cracks in buildings.<br><blockquote style="margin: 1.5em 0pt;"></blockquote></div>
The most usual form of grouting method is referred to as permeation grouting, which in simple terms, involves filling open voids. Although all varieties of grouting contain some measure of permeation grouting, there are four distinctive approaches: permeation, compaction, fractural and jet grouting. Read below to learn more about each of the methods.
Necessity/advantage of a tunnel, Classification of Tunnels,
Size and shape of a tunnel, Alignment of a Tunnel, Portals and Shafts,
Methods of Tunneling in Hard Rock and Soft ground, Mucking, Lighting
and Ventilation in tunnel, Dust control, Drainage of tunnels, Safety in
tunnel construction.
Trenchless construction. Trenchless construction includes such construction methods as tunneling, microtunneling (MTM), horizontal directional drilling (HDD) also known as directional boring, pipe ramming (PR), pipe jacking (PJ), moling, horizontal auger boring (HAB) and other methods for the installation of pipelines and cables below the ground with minimal excavation.
trenchless technology pdf
trenchless technology methods
trenchless pipe technologies
trenchless technology contractors
trenchless technology institute
trenchless technology center
trenchless technology conference
trenchless construction methods
interesting civil engineering topics
civil engineering topics for presentation
seminar topics pdf
best seminar topics for civil engineering
civil seminar topics ppt
civil engineering seminar topics 2019
seminar topics for mechanical engineers
mechanical engineering seminar topics 2018
Reasons and solution to cracks in buildings.
<div dir="ltr"><br>Reasons and solution to cracks in buildings.<br><blockquote style="margin: 1.5em 0pt;"></blockquote></div>
The most usual form of grouting method is referred to as permeation grouting, which in simple terms, involves filling open voids. Although all varieties of grouting contain some measure of permeation grouting, there are four distinctive approaches: permeation, compaction, fractural and jet grouting. Read below to learn more about each of the methods.
Railway turnouts ,their types and maintenance of tracksNabaraj Poudel
This reports will just try to answer out specially two question regarding the types of left and right turnouts of railway tracks with their each components and other one is the maintenance of railway tracks with their requirements.
Challenges of Tunneling-- A Peep Into The Exciting World of TunnellingIEI GSC
By Shri Manoj Verman, President, Indian National Group of ISRM
President, International Commission on Hard Rock Excavation
Vice President, Indian Society of Engineering Geology
at 31st National Convention of Civil Engineering
organised by
Gujarat State Center, The Institution of Engineers (India)
at Ahmedabad
Presentation on The Use of automation in construction industryIEI GSC
Presented By Akshay Tejankar
at 31st National Convention of Civil Engineers organised by Gujarat State Center, The Institution of Engineers (India) at Ahmedabad
Tunnel Engineering: Introduction to tunneling
Size and shape of tunnel and suitability
Tunneling in hard rock, and soft material
Shield method
Safety measures
Ventilation, lighting and drainage of tunneling
Effect Of Water On Slope Stability And Investigation Of ΝΝw Drainage Techniqu...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Tunnel is an artificially constructed underground passage to by- pass obstacles safely without disturbing the over burden. This module explains about tunnels, their parts, types and importance.
Trenchless Technology is the the science science of installing, repairing and renewing underground pipes, ducts and cables using techniques which minimize or eliminate the need for excavation.
It is basically basically making a tunnel below the surface and installing service lines like water or gas pipes, pipes, electric or tele communication cables etc.,with out any disruption to the public .
Construction Time Analysis For Different Steps In Drill-And-Blast Method Of H...IJERA Editor
One of the most important factors influencing the decision whether and how a tunnel is to be built are the estimated time and costs of construction. This study is based on construction time analysis for different steps in drill-and-blast method of hydro power tunnel excavation in working phase of 6.256,00 meters of tunnels which have different diameters varying from 4,20 to 7,60. There are made 737 field measurements and it is seen that many of the machinery and workmanship productions rates per unit time are significantly lower, varying from 35% to 50%, of that defined in their technical specifications, measurements indicate that highest performance is reached in 7,60m diameter tunnel excavation. It is believed that these data will be helpful for planning and management process of tunnel construction projects, especially those planned to be built in Albania where labor market carries similar features.
Experimental study on effect of slot level on local scour around bridge piereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Experimental study on effect of slot level on local scour around bridge piereSAT Journals
Abstract Many bridges in the world every year for Failure to consider in the design of hydraulic elements are destroyed. During the spring floods of 1987, 17 bridges in New York and New England were damaged or destroyed by scour. In 1985, 73 bridges were destroyed by floods in Pennsylvania, Virginia, and West Virginia. In the present study investigate effect application a slot , height “D” , width” D/4”in a circular pier ,where “D” is diameter of bridge pier and the size of 6 centimeters under 3 different discharges (values 35 , 40 , 45 Liter per second) and 4 different location of slot in a flume ,length 14 meters ,height 60 and width 60 centimeters. The experimental results show when height of slot is below the stream bed as D, scour depth will be reduced about 20.34% to 39.73% in front of the pier and scour volume approximately 46.84% to 75.74% Keywords: Bridge pier, Slot, Scour, scour depth, scour volume
Similar to A Review Study on Methods of Tunneling in Hard Rocks (20)
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
Lately the concept of Internet of Things (IoT) is being more elaborated and devices and databases are proposed thereby to meet the need of an Internet of Things scenario. IoT is being considered to be an integral part of smart house where devices will be connected to each other and also react upon certain environmental input. This will eventually include the home refrigerator, air conditioner, lights, heater and such other home appliances. Therefore, we focus our research on the database part for such an IoT’ fridge which we called as smart Fridge. We describe the potentials achievable through a database for an IoT refrigerator to manage the refrigerator food and also aid the creation of a monthly budget of the house for a family. The paper aims at the data management issue based on a proposed design for an intelligent refrigerator leveraging the sensor technology and the wireless communication technology. The refrigerator which identifies products by reading the barcodes or RFID tags is proposed to order the required products by connecting to the Internet. Thus the goal of this paper is to minimize human interaction to maintain the daily life events.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel.
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
The Benefits and Techniques of Trenchless Pipe Repair.pdf
A Review Study on Methods of Tunneling in Hard Rocks
1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 8, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1551
A Review Study on Methods of Tunneling in Hard Rocks
Chirag J. Shah1
Hiren A. Rathod2
1
M. E. Student (Construction Management) 2
Assistant professor
1, 2
Civil Engineering Department
1, 2
S.N.P.I.T. & R.C, Umrakh, Bardoli, Gujarat, India.
Abstract— This article presents a review on the different
methodologies that are used for tunnels excavations in hard
rocks in present era. Growing needs for modern
transportation and utility networks have increased the
demand for a more extensive and elaborate use of
underground space or through high mountains / hills. As a
result, more projects have to be completed in various ground
conditions and one of which is more challenging is to carry
out excavation work in hard rocks. Significant technological
advances have rendered these projects possible, but have
also given rise to new challenges as many of these projects
have to be completed in difficult conditions, with very strict
environmental constraints, particularly in urban areas where
the potential impact of tunneling on existing structures is a
major concern. This paper addresses the main aspects of
tunneling and underground works performed in hard rocks.
A summary is presented of the more recent advances and
widely adopted techniques in these regards.
Key words: Hard rock, Excavation, Tunnel Boring Machines
(TBM)
I. INTRODUCTION
Tunnel is an underground passage through a mountain,
beneath a city or under a waterway or tunnels are enclosed
roadways, railways, waterways, etc. with vehicle, trains,
ships, etc. access that is restricted to portals regardless of
type of structure or method of construction. Tunnels are
structures that can require special design considerations that
may include lighting, ventilation, fire protection systems,
and emergency egress capacity, as documented in design
standards or based on the owner’s determination.
Tunnelling can be define as ”the continuous
excavation of a hole through the earth’s crust”. The portion
where the work is carried out while its construction is called
the face (heading) and all efforts are made in advancing this
face as fast as possible till the end of tunnel is reached. The
man at the face are called heading crew. The heading crew
is supplied with fresh air, compressed air, water, explosives,
drills, mucking and hauling equipment, support and other
accessories. Tunnel excavation produces a re-distribution of
stresses in the rock and a tendency for closure of the void
produces a tendency counteracted by the tunnel support
shell.
Modern tunneling work is best regarded as the
repetition of a cycle comprising of number of operations and
each operation makes a contribution in the controlled
advance of a tunnel face. It is essential that tunnel works
should be organised on a scientific basis. Factors such as
size of the tunnel and the quality of rock will influence
details, but the basic order of progressing in all types of
tunnels (whether large or small or whether hard or soft), is
to:
Excavate
Dispose of the muck and
Line the excavated ground
II. WORLD WIDE SCENARIOS
Some of the examples of carrying out challenging work of
tunnel construction through hard rock are highlighted over
here. The 1036 m long Eupalinos water supply tunnel was
built in 530 BC on the Greek island of Samos. This is the
first known tunnel to have been built from two portals and
the two drives met with a very small error.
The oldest underground sections of the London
underground were built using the cut-and-cover method in
the 1860s, and opened in January 1863. What are now
the metropolitan, Hammersmith & city and circle lines were
the first to prove the success of a metro or subway system.
Thikri tunnel length 800 meters, shape of tunnel d-
shape, internal diameter 6.0 meter, longitudinal gradient is 1
in 2500, rock cover 14 metres to 44 metres [>3d as per IS
code], existing G.L. (at entrance) is 224.015, existing G.L.
(at exit) is 221.695, invert level (at entrance) 203.671, invert
level (at exit) 203.349, general geology hard rock strata with
RQD value > 75%, method used was drill blast method.
Veligonda tunnel length is about 19.2 km. The
TBM method of tunneling was used on the Veligonda
project. The bore diameter and segment diameters were 10.0
m and 9.2 m respectively. The whole of the Veligonda
tunnel geology has been given an expected RQD value of
between 61 and 75 which remains firmly within the Rock
class-II category.
Ghatkopar high level Tunnel, Mumbai was
constructed for the purpose of Sewage. Geology of soil was
Massive & Weathered Basalt. Length of tunnel was 2600 m
& its Diameter was 3065 mm. TBM method was used with
machine type Single Shield TBM. Support system used was
Segmental Lining.
III. PURPOSE & IMPORTANCE
Tunnels are the underground passages which are constructed
without distributing the ground surface. They may be
constructed through hills, below the ground, streams, etc.,
for various purposes which may be summarized as follows
along with its importance as compared to other means of
conveyance:
To provide passage for roads and railway tracks, access
to mines, conduits for water, etc.
Tunnels protect the railway track, highway, sewer line,
oil line, etc., from weathering effects such as rain, snow
and other elements.
Tunnels also protect them during war time from
destruction due to bombarding.
2. A Review Study on Methods of Tunnelling in Hard Rocks
(IJSRD/Vol. 1/Issue 8/2013/0007)
All rights reserved by www.ijsrd.com 1552
Tunnels have proved cheaper for crossing the mountain
or river than open cut or bridges.
The use of tunnel under a river bed is often economical
and convenient than providing a bridge over the river.
The cost of maintenance of a tunnel is lesser as
compared to a bridge or a heavy open cut.
In most congested urban areas, underground railway or
highway is the best alternative to provide the means of
transportation. Also in soft ground it seems to be cheaper
than open cut due to possibility of a large numbers of slips.
Tunnels reduce the length of railway line in a circuitous
route to reach the other side of the hill. In busy and
congested cities due to scarcity of load, tunnels are used for
providing underground system, which provide rapid and un-
obstructed transportation.
IV. METHODS OF TUNNELLING
GENERALA.
Tunnelling in hard rock is safe, easy and the cost of
maintenance of tunnel is also very less. Many of the primary
rocks which are categorized under the hard rocks are
granite, feldspar, basalt, et. all.
Various methods used for the excavation purpose
in such types of rocks are:
Full face method.
Heading and bench method.
Drift method.
Pilot tunnel method.
Drill & Blast method.
Hard TBM method.
Cut-Cover method.
Immersed tube method.
Some of the above listed techniques are conventional and
not covered under the scope of this paper; only few of the
techniques which are predominantly adopted worldwide and
have its importance in excavation through hard rocks as
compared to other are prescribed here with its brief
introduction, procedure, merits and demerits.
Drill & Blast Method of TunnellingB.
Modern Drill and Blast excavation for civil projects consists
the basic approach of:
To drill a pattern of small holes,
Load them with explosives,
Then detonate those explosives
Fig.1: Drill & Blast Method
Hence, creating an opening in the rock. The blasted and
broken rock (muck) is then removed and the rock surface is
supported so that the whole process can be repeated as many
times as necessary to advance the desired opening in the
rock.
Procedure:
1) Drilling
The drilling should be ensuring minimum overbreak and use
of least amount of explosive per unit volume of excavation.
Holes are drilled by using pneumatically operated rock drills
in conjunction with pneumatic pushers or drifters mounted
on column bars or drill carriages as may be found suitable.
The size of drill bits used should be such that the diameter
of the hole will be about 6 mm greater than the diameter of
explosive cartridge to be inserted.
2) Blasting
a) Explosives:
Blasting explosives are divided into two classes: high
explosives and low explosives. Gelignites, Gelatines and
Dynamites are the examples of high explosives, whereas,
Black powder is low explosive. Most commonly, high
explosives are used for tunnelling operations. The strength
of these explosive is expressed as a percentage of strength of
the blasting gelatine which is the most powerful commercial
explosive. The following explosive are used in tunnelling:
Blasting gelatine used for blasting very hard and tough
rocks. This is fully water proof and can also be used in
wet locations.
Special gelatine 9% to 40% is selected to suit the rock
requirements.
Ammonia dynamite is available in strength from 15% to
60% used for soft rock.
Semi-gelatine is bulkier than other varieties and come
in 45% to 60% strength.
b) Detonators:
There are primarily two types of detonators namely, Lead
azide aluminium detonator and electric detonators. Lead
azide aluminium detonators are used in conjunction with
safety fuses and give efficient detonation with all types of
blasting explosives. The electric detonators are suitable for
singles or simultaneous firing in series or parallel.
c) Detonating Fuse:
It contains a high explosive core with a water proof
covering. It is used for shooting a large number of holes in
one blast. It is denoted by the use of one or two blasting
caps securely attached alongside it.
d) Primer:
It is the cartridge containing the detonator. The primer is
supplied with the explosive and is attached with the
explosive. It is denoted by Prima cord, which is a high
explosive use.
e) Circuit Testers:
To test an electric detonator, it should be placed inside an
iron pot or tube to guard against accidental explosion.
3) Loading & Stemming
Loading means charging the drill holes. Before loading,
each hole is blown out with a high pressure air jet to remove
loose cuttings and water. Then, primer cartridge is gently
placed into drill hole next to the bottom. A full cartridge is
inserted first, tamped well into bottom, then the primer is
inserted with the end containing detonator pointing towards
3. A Review Study on Methods of Tunnelling in Hard Rocks
(IJSRD/Vol. 1/Issue 8/2013/0007)
All rights reserved by www.ijsrd.com 1553
the bottom of drill hole. Both the primer and next placed
cartridge are tamped lightly with a wooden rod. When the
tamping material is being inserted, the leading wires or
safety fuse should be held to one side, to facilitate the action
of the tamping rod and prevent damage to fuse.
The remaining portion of the drill hole is filled with
an inert material and tightly tamped by wooden rod. Soft
rolled plugs of clay, damp mixture of sand and clay or a
rubber plug with a wooden core may be used as inert
material.
4) Firing
a) Firing by Safety Fuse:
After charging or loading the holes, personnel and
everything liable to injury must be placed to a safe distance.
When necessary, the blast may be covered with rope
blasting mats or a heavily weighted blanket of scrub. Special
fuse-lighter should be used for ignition.
b) Firing by Electricity:
Before attempting to connect up an electric circuit, it should
be ensured that the main cables are intact and that the
exploder is working correctly and capable of supplying
sufficient current to fire the number of charges in the circuit.
No naked wire should be left touching the ground. Also, the
exploder is not connected to the firing circuit until all men
have left the danger area and signal to fire has been given.
5) Inspection & Handling Misfire
After completion of firing, the site is examined by the
foreman before he gives the all-clear signal. If a misfire has
occurred, no person shall approach the site for one hour if
safety fuse was used or 15 minute, if electrically fired.
Misfires may occur due to improper primers, use of non-
water resistance explosive in wet condition or improper
loading.
Immediately after the smoke is cleared away from
a blast, inspection is carried out by a competent and
experienced tunnel foreman. All loose rock is removed
carefully by barring to ensure that the access to the face is
safe.
Merits:
Potential environmental impacts in terms of noise, dust
and visual on sensitive receives are significantly
reduced and are restricted to those located near the
tunnel portal;
Compared with the cut-and-cover approach, quantity of
C&D materials generated would be much reduced;
Compared with the cut-and-cover approach, disturbance
to local traffic and associated environmental impacts
would be much reduced;
Blasting would significantly reduce the duration of
vibration, though the vibration level would be higher
compared with bored tunnelling;
Demerits:
Potential hazard associated with establishment of a
temporary magazine site for overnight storage of
explosives shall be addressed through avoiding
populated areas in the site selection process.
There is a high risk of over breaking the tunnel profile
and damaging the surrounding rock
High levels of noise and vibration make this unsuitable
for an urban area.
Cut Cover Method of TunnellingC.
Cut and cover tunneling is a common and well-proven
technique for constructing shallow tunnels. The method can
accommodate changes in tunnel width and non-uniform
shapes. Cut and cover is a simple method of construction for
shallow tunnels where a trench is excavated and roofed over
with an overhead support system strong enough to carry the
load of what is to be built above the tunnel.
Fig. 2: Cut Cover Method
Procedure:
1) Excavation and support
The initial “cut” is undertaken to facilitate the tunnel
construction. This uses similar technology to road cuttings.
Prior to excavation, buried utilities and services crossing the
route have to be protected, temporarily raised or
permanently diverted to avoid the tunnel alignment where
possible. For gravity sewers this may involve pump
installation. The cut is constructed in a number of ways,
depending on the support requirements of the ground. In
hard rock this may be vertical walls supported by rock bolts
and sprayed concrete, in soft rocks and soils stable slopes
may be created by constructing benches. If surface space is
restricted, or the disturbance caused by construction needs to
be minimized, then retaining walls can be used to stabilise
the excavation. These may be permanent, incorporated into
the final structure or temporary and removed or abandoned
after the tunnel structure has been completed.
2) Tunnel fabrication
Once a stable open cut has been constructed, the tunnel
structure is fabricated in the trench. This structure is
generally constructed from reinforced concrete using large
tunnel forms. As considerable materials and excavated fill
storage is required this operation requires a significant work
site.
3) Reinstatement
After construction, fill is used to reinstate the ground
surface. Where possible this fill may be reserved material
from the trench excavation. Additional fill may be required
to assist with compaction and drainage, or if the trench
material is unsuitable. Reinstatement may be to the original
topography and land use. In some cases this offers the
opportunity to improve surface conditions, such as utility
and drainage improvements or local road upgrades.
Demerits:
More dust and noise impact may arise, though these can
be mitigated through implementation of sufficient
control measures;
4. A Review Study on Methods of Tunnelling in Hard Rocks
(IJSRD/Vol. 1/Issue 8/2013/0007)
All rights reserved by www.ijsrd.com 1554
Temporary decks are often installed before bulk
excavation to minimise the associated environment
impacts;
Larger quantity of C&D materials would be generated
from the excavation works, requiring proper handling
and disposal.
Hard TBM Method of TunnellingD.
In hard rock, either shielded or open-type TBMs can be
used. All types of hard rock TBMs excavate rock using disc
cutters mounted in the cutter head. The disc cutters create
compressive stress fractures in the rock, causing it to chip
away from the rock in front of the machine, called the tunnel
face. The excavated rock, known as muck, is transferred
through openings in the cutter head to a belt conveyor,
where it runs through the machine to a system of conveyors
or muck cars for removal from the tunnel.
Procedure:
1) Excavation Advance:
The cutting head is rotated against the ground to commence
cutting
Thrust is applied by the rams or side gripper pads in the
drive section to assist cutting and maintain face pressure
Cutting and advance continues until enough space is
created in the tail shield to construct the next lining ring
the gap between the ground and the previous lining ring
is grouted as it leaves the tail shield.
Fig. 3: Excavation Advance
Fig. 4: Lining erection
2) Lining erection:
The thrust rams are withdrawn into the drive section
leaving clear space for the erection of the lining
Each segment forming the lining is maneuvered into
position and bolted together to form a completed lining
ring the thrust rams are then reengaged to commence
the next excavation cycle
Merits:
Potential environmental impacts in terms of noise, dust
and visual on sensitive receives are significantly
reduced and are restricted to those located near the
launching and retrieval shafts;
Compared with the cut-and-cover approach, disturbance
to local traffic and associated environmental impacts
would be much reduced;
Compared with the cut-and-cover approach, quantity of
C&D materials generated would be much reduced
Demerits:
The major disadvantage is the upfront capital cost.
TBMs are expensive to construct, difficult to transport,
require significant backup systems and power.
Their applicability is limited to long tunnels where the
high rates of advance and tunnel quality can offset their
high capital cost.
V. CONCLUSION
Referring to the various literatures mentioned below and the
contents mentioned above in the paper the importance of
tunneling can be clearly understood as compared to other
means of conveyance such as bridges, open cuts, etc. i.e.
through tunnels we can get many benefits such as low
maintenance cost, no need for acquiring the land & it can be
used in any type of area such as in congested cities. Also
referring to many recent methodologies in tunnels we found
that most suitable method was the method using TBM.
Though it is very costlier than all other methods, but it also
has many advantages compared to others like it is easier in
operation, very fast, can be used in any ground conditions
depending on cutterhead with little modifications, perfection
of work, safety etc.
ACKNOWLEDGMENT
The authors are thankfully acknowledge to Mr. J. N. Patel,
Chairman Vidyabharti Trust, Mr. K. N. Patel, Hon.
Secretary, Vidyabharti Trust, Dr. H. R. Patel, Director, Dr.
J. A. Shah, Principal, S.N.P.I.T. & R.C., Umrakh, Bardoli,
Gujarat, India for their motivational & infrastructural
supports to carry out this research, Dr. Neeraj D. Sharma,
HOD Civil Department, SNPIT & RC, Umrakh.
REFERENCES
[1] Doctoral thesis at NTNU , Hard Rock Tunnelling
[2] “Fracturing Excavation Method for Hard Rock
Tunnelling” By: Fon Drill & FASE Method.
[3] “Tunnelling in Rocks – Present Technology & Future
Challenges” By: ZHAO Jian, Inaugural lecture, May
2007.
[4] S. Seetharaman “Tunnel & Airport Engineering”
Umesh Publication.
[5] Tunnel wikipedia.
[6] Tunnel Boring Machine (TBM) in action in Kuala
Lumpur & Robbins Hard Rock Disc Cutters,
youtube.com.
[7] IS: 5878 ( Part 111) – 1972: Underground Excavation
Soft Strata.
[8] “Construction safety in hard rock tunnelling” By: Dr.
Zhou Yingxin Programme Manager (Underground
5. A Review Study on Methods of Tunnelling in Hard Rocks
(IJSRD/Vol. 1/Issue 8/2013/0007)
All rights reserved by www.ijsrd.com 1555
Technology & Rock Engineering), Defence Science &
Technology Agency.
[9] “Tunnelling in Rocks – Present Technology & Future
Challenges” By: ZHAO Jian, Inaugural lecture, May
2007.
[10]Engineering Survey System for TBM (Tunnel Boring
Machine) Tunnel Construction, By: Andrew Hung
Shing Lee, Hong Kong.
[11]“Tunnel Boring Machines”, IMIA Working Group
Paper WGP 60 (09) Tunnel Boring Machines.