The difference between 3 rock drilling methods — Rotary ...

Author: Polly

Jun. 17, 2024

81

0

0

The difference between 3 rock drilling methods — Rotary ...

The difference between 3 rock drilling methods &#; Rotary drilling, DTH drilling, and Top Hammer drill

The difference between 3 rock drilling methods — Rotary ...

The difference between 3 rock drilling methods &#; Rotary drilling, DTH drilling, and Top Hammer drill

Bonmach Q.D

·

Follow

4 min read

·

Feb 28,

--

Original from Stella-Blog of BONMACH

Drilling and blasting is an important section during mining production. Let&#;s talk about the three methods of rock drilling &#; Rotary drilling, DTH (down the hole) drilling and Top hammer drilling. These three ways are suitable for different mining operations, and the wrong choice will cause huge loss.

First of all, we have to explain the working principles of them.

Rotary drilling

In rotary drilling, the rig provides enough shaft pressure and rotary torque. The bit drills and rotates on the rock at the same time, which exerts both static and dynamic impact pressure on the rock. The bits rotate and grind continuously in the bottom of the hole to make the rock to fracture. Compressed air under a certain pressure and flow rate are sprayed from the nozzle through the inner of the drill pipe, to make the slag continuously blown from the bottom of the hole along the annular space between the drill pipe and the whole wall to the outside.

Down the hole (DTH) drilling

Down-the-hole drilling is to drive the hammer which behind the drill bit by compressed air via the drill pipe. The piston strikes the bit directly, while the hammer external cylinder gives straight and stable guidance of the drill bit. This makes the impact of energy is not lost in joints and allowing for much deeper percussion drilling.

Furthermore, the impact force acts on the rock at the bottom of the hole, which is more efficient, and straighter than other methods of the drilling operation.

And DTH is more suitable for the big hole of hard rock drilling, special for rock hardness over 200Mpa. However, for the rock below 200 MPa, it will not only energy waste, but also in low drilling efficiency, and serious wear to the drill bit. It&#;s because while the piston of the hammer strike, the soft rock cannot absorb the impact completely, which seriously lower the efficiency of drilling and slagging.

Top Hammer DrillTop Hammer Drilling

The percussive force of the top hammer drilling produced by the piston of the pump in the hydraulic drilling rig, it is transmitted to the drill bit via shank adaptor and drill pipe, This is the difference between DTH drilling. Meanwhile, the percussion system drives the drilling system rotation. When the stress wave reaches the drill bit, the energy is transmitted to the rock in the form of bit penetration. The combination of these functions enables drilling holes into the hard rock, and the air compressor only performs dust removal and slagging in top hammer drilling.

The combination of these functions enables drilling holes into the hard rock, and the air compressor only performs dust removal and slagging in top hammer drilling.

Impact energy multiplied by impact frequency together creates the percussive output of the drifter. However, usually, top hammer drilling used for hole diameter maximum 127mm, and hole depth less than 20M, which in high efficiency.

Conclusion

Characteristics of three rock drilling methods and comparison for adapted to hole size, depth, rock adaptation, slag flushing media, efficiency, and straightness.

Rotary Drilling

&#;Mainly suitable for large holes (coal, limestone) usually diameter larger than 200 mm.
&#;Drilling depths up to several thousand meters or even tens kilometers.
&#;Adapted to soft and medium hard rock.
&#;The slag flushing medium can be compressed air, air foam, mud, etc.
&#;Inefficient for hard rock drilling.
&#;Drilling straightness is lower than the down the hole (DTH) drilling type.

Down the hole (DTH) drilling

&#;The most suitable hole diameter is 100&#;254 mm, in special applications can be up to 2M And the minimum can be around 50 mm as well.
&#;Theoretically drilling depth is limited by back pressure only (can be up to several kilometers).
&#;Adapt to hard rock and rock formation conditions (compared to top hammer).
&#;Mainly use pressurized air for slag flushing, and sometimes air foam for special application.
&#;Highly efficient in hard rock drilling (compared to the rotary drilling).
&#;Drilling straightness is best in these three methods.

Top hammer

&#;The most suitable for hole diameter between 25&#;127 mm.
&#;Generally, the hole depth is less than 25 meters.
&#;Adapt to a stable and uniform hard rock.
&#;The slag flushing medium is compressed air or water.
&#;High efficiency in shallow holes drilling, the deeper the lower efficiency.
&#;Most easily to skew in these three drilling methods.

Read more

Top hammer drilling | PPT

Null Bangalore | Pentesters Approach to AWS IAM

Divyanshu

 

#Abstract: - Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices. - Gain actionable insights into AWS IAM policies and roles, using hands on approach. #Prerequisites: - Basic understanding of AWS services and architecture - Familiarity with cloud security concepts - Experience using the AWS Management Console or AWS CLI. - For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/) # Scenario Covered: - Basics of IAM in AWS - Implementing IAM Policies with Least Privilege to Manage S3 Bucket - Objective: Create an S3 bucket with least privilege IAM policy and validate access. - Steps: - Create S3 bucket. - Attach least privilege policy to IAM user. - Validate access. - Exploiting IAM PassRole Misconfiguration -Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources. - Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access. - Steps: - Allow user to pass IAM role to EC2. - Exploit misconfiguration for unauthorized access. - Access sensitive resources. - Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role - An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role. - Objective: Show how overly permissive IAM roles can lead to privilege escalation. - Steps: - Create role with administrative privileges. - Allow user to assume the role. - Perform administrative actions. - Differentiation between PassRole vs AssumeRole Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)

Explore more:
Electric vs Non-Electric Mini Excavators: Making the Right ...
What Sets Electric Telescopic Boom Lifts Apart?
Introduction of Metal Corrugated Culvert
Safety First: Best Practices for Operating Electric Telescopic Boom Lifts
Top Benefits of Using Plastic Culvert Piping
CX130E LR Long Reach Excavator | CASE EU

Bonmach Q.D

·

Follow

4 min read

·

Feb 28,

--

Original from Stella-Blog of BONMACH

Drilling and blasting is an important section during mining production. Let&#;s talk about the three methods of rock drilling &#; Rotary drilling, DTH (down the hole) drilling and Top hammer drilling. These three ways are suitable for different mining operations, and the wrong choice will cause huge loss.

First of all, we have to explain the working principles of them.

The company is the world’s best How Much Does a Bulldozer Weight supplier. We are your one-stop shop for all needs. Our staff are highly-specialized and will help you find the product you need.

Rotary drilling

In rotary drilling, the rig provides enough shaft pressure and rotary torque. The bit drills and rotates on the rock at the same time, which exerts both static and dynamic impact pressure on the rock. The bits rotate and grind continuously in the bottom of the hole to make the rock to fracture. Compressed air under a certain pressure and flow rate are sprayed from the nozzle through the inner of the drill pipe, to make the slag continuously blown from the bottom of the hole along the annular space between the drill pipe and the whole wall to the outside.

Down the hole (DTH) drilling

Down-the-hole drilling is to drive the hammer which behind the drill bit by compressed air via the drill pipe. The piston strikes the bit directly, while the hammer external cylinder gives straight and stable guidance of the drill bit. This makes the impact of energy is not lost in joints and allowing for much deeper percussion drilling.

Furthermore, the impact force acts on the rock at the bottom of the hole, which is more efficient, and straighter than other methods of the drilling operation.

And DTH is more suitable for the big hole of hard rock drilling, special for rock hardness over 200Mpa. However, for the rock below 200 MPa, it will not only energy waste, but also in low drilling efficiency, and serious wear to the drill bit. It&#;s because while the piston of the hammer strike, the soft rock cannot absorb the impact completely, which seriously lower the efficiency of drilling and slagging.

Top Hammer Drilling

The percussive force of the top hammer drilling produced by the piston of the pump in the hydraulic drilling rig, it is transmitted to the drill bit via shank adaptor and drill pipe, This is the difference between DTH drilling. Meanwhile, the percussion system drives the drilling system rotation. When the stress wave reaches the drill bit, the energy is transmitted to the rock in the form of bit penetration. The combination of these functions enables drilling holes into the hard rock, and the air compressor only performs dust removal and slagging in top hammer drilling.

The combination of these functions enables drilling holes into the hard rock, and the air compressor only performs dust removal and slagging in top hammer drilling.

Impact energy multiplied by impact frequency together creates the percussive output of the drifter. However, usually, top hammer drilling used for hole diameter maximum 127mm, and hole depth less than 20M, which in high efficiency.

Conclusion

Characteristics of three rock drilling methods and comparison for adapted to hole size, depth, rock adaptation, slag flushing media, efficiency, and straightness.

Rotary Drilling

&#;Mainly suitable for large holes (coal, limestone) usually diameter larger than 200 mm.
&#;Drilling depths up to several thousand meters or even tens kilometers.
&#;Adapted to soft and medium hard rock.
&#;The slag flushing medium can be compressed air, air foam, mud, etc.
&#;Inefficient for hard rock drilling.
&#;Drilling straightness is lower than the down the hole (DTH) drilling type.

Down the hole (DTH) drilling

&#;The most suitable hole diameter is 100&#;254 mm, in special applications can be up to 2M And the minimum can be around 50 mm as well.
&#;Theoretically drilling depth is limited by back pressure only (can be up to several kilometers).
&#;Adapt to hard rock and rock formation conditions (compared to top hammer).
&#;Mainly use pressurized air for slag flushing, and sometimes air foam for special application.
&#;Highly efficient in hard rock drilling (compared to the rotary drilling).
&#;Drilling straightness is best in these three methods.

Top hammer

&#;The most suitable for hole diameter between 25&#;127 mm.
&#;Generally, the hole depth is less than 25 meters.
&#;Adapt to a stable and uniform hard rock.
&#;The slag flushing medium is compressed air or water.
&#;High efficiency in shallow holes drilling, the deeper the lower efficiency.
&#;Most easily to skew in these three drilling methods.

Read more

Top hammer drilling | PPT

Null Bangalore | Pentesters Approach to AWS IAM

Divyanshu

 

#Abstract: - Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices. - Gain actionable insights into AWS IAM policies and roles, using hands on approach. #Prerequisites: - Basic understanding of AWS services and architecture - Familiarity with cloud security concepts - Experience using the AWS Management Console or AWS CLI. - For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/) # Scenario Covered: - Basics of IAM in AWS - Implementing IAM Policies with Least Privilege to Manage S3 Bucket - Objective: Create an S3 bucket with least privilege IAM policy and validate access. - Steps: - Create S3 bucket. - Attach least privilege policy to IAM user. - Validate access. - Exploiting IAM PassRole Misconfiguration -Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources. - Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access. - Steps: - Allow user to pass IAM role to EC2. - Exploit misconfiguration for unauthorized access. - Access sensitive resources. - Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role - An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role. - Objective: Show how overly permissive IAM roles can lead to privilege escalation. - Steps: - Create role with administrative privileges. - Allow user to assume the role. - Perform administrative actions. - Differentiation between PassRole vs AssumeRole Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)

Contact us to discuss your requirements of Bulldozer Usage. Our experienced sales team can help you identify the options that best suit your needs.

Comments

Please Join Us to post.

0

0/2000

Guest Posts

If you are interested in sending in a Guest Blogger Submission,welcome to write for us.

Your Name: (required)

Your Email: (required)

Subject:

Your Message: (required)

0/2000