You can register on this site as a Company User or an Independent user.
Company Registration:
1.To register your company with your basic company details.
User Registration:
2.To register as company user or individual user.
a)For registering as company user you must have Company Code.
b)Individual User registration you do not require any Company Code.
13 Jul 2016
POSTED BY - MineExcellence
Introduction
Presently mining industry is experiencing challenging times. With commodity prices off their peaks, with social and environmental concerns mining companies are under intense cost pressure as demand for raw materials varies, it has become rather difficult to meet economic goals in operating mines. Mines are looking to save on operating and maintenance costs and extend asset life, while at the same time complying with stringent regulatory and safety requirements. Some hope is raised with the vision of an “intelligent mine” or “smart mine” which is very alluring and holds out the promise to environmentalists, investors, and the general public that mining can be invisible, safe, profitable, and have zero impact (Leslile,2013). This is distant future, meanwhile several technologies are available and being used in mines for entire mining cycle from exploration to mining and processing.
The applications of information technology are really industry-specific, enterprise-class software solutions focused on using information technology to support the business processes of mining and make them more efficient and effective. The massive amounts of data augment the reality of the physical mine, plant, and equipment. Technology can be used to optimize operational efficiency, increase asset availability and utilization, improve safety and environmental integrity, and maximize return on investment. For investors and owner-operators, intelligent/smart mining has the potential to capture the 1 percent or 2 percent marginal gain that helps contribute to profitability (Leslile,2013).
For a mine in operation, an endless stream of data in the form of performance and condition data from sensors and monitoring devices on fixed and mobile assets through networks, servers, and services. This “big data” can be processed and analyzed to spot trends, help predict events, and formulate reliability strategies as early as the design stage (e.g., reliability-centered design). “Intelligent mining” implies that massive amounts of data augment the reality of the physical mine, plant, and equipment. This embedded intelligence can be used to optimize operational efficiency, increase asset availability and utilization, improve safety and environmental integrity, and maximize return on investment.
In recent years there is growing convergence of consumerization and industrialization. The application of “consumer” technologies that we use every day on our iPhones and Android devices, such as cameras, motion sensors, and positioning in an industrial context, are making it easier to collect data on site by using innovative hand held units allowing field data to be captured and automatically down loaded when the unit is docked, eliminating human error during data transfer (Akella, et al, 2008). Overlaying the digital world on the physical world and connecting them accurately through intelligent positioning results in “intelligent infrastructure,” which is safer and more sustainable.
More and more major businesses and industries are being run on software and delivered as online services, and software will continue to disrupt many more industries in the future. The “Industrial Internet” and the “Internet of Things” have established a foothold in the mining and metals industry. Information modeling, asset performance management, and asset lifecycle information management are three key activities that are enabling information mobility and helping to advance mine engineering. Three megatrends in IT comes: The first is the application of consumer technologies in an industrial context and not only smart phones and iPads but sensors, cameras, monitoring and positioning devices are producing ‘immersive’ experiences. Second is the layering of the digital world on top of the physical world. Infrastructure assets have instruments with sensors and combing them with 3D models so we have a complete digital representation of the physical asset. And the third one is the Big Data; the massive amount of data that stream 24/7 from these sensors and monitoring devices ( )This “data” can be processed and analyzed to spot trends, help predict events, and formulate reliability strategies as early as the design stage.
In 2011, Rio Tinto also announced that it would double its fleet of Komatsu driverless haul trucks in its iron operations in Western Australia. Information and communications technology can be applied to the entire value chain and lifecycle of mining and mineral extraction. Rio Tinto’s Pilbara iron ore mining, transport and shipping activities are already generating 2.4 terabytes of data a minute (Leslile,2013).
The information has to be accurate and it has to be the right information; secondly, it needs to be easy access and thirdly that information that comes back needs to be fast with people trying to get information that are in the field, and the reason that came back from those studies was that 40% of engineering time is spent locating and validating engineering information. Information has to be in a standardized way obtained from different sources.
Overlaying the physical world with the digital or virtual world enables us to model and simulate our assets, giving us the ability to effectively design, build, and ultimately optimize the performance and reliability of our assets throughout the lifecycle. The digital asset, often a 3D model, is created initially during the engineering and construction phase and is handed over to the owner-operator before the mine goes into operation. Combined with geospatial or geographic information systems, the operator has a complete digital representation of the physical world, which forms the foundation for risk and performance management, as well as compliance and regulatory reporting. Laser scanning and positioning technology can be used to create point clouds information models consisting of millions of data points – that enable the visualization and representation of the “as-operated” reality. Maintaining an information model of the mining operation allows owner operators to demonstrate their compliance with regulations and optimize the performance of their assets.
Environmental Management
Kumba Iron Ore, has environmental monitoring system. Kumba Iron Ore developed an integrated environmental monitoring data management system for the Kolomela Mine in Postmasburg, South Africa. The system saves time by providing a one-stop shop for environmental monitoring data, such as water, dust, noise and biodiversity. An innovative hand held unit allows field data to be captured and automatically down loaded when the unit is docked, eliminating human error during data transfer. It allows sharing real time rehabilitation information dynamically with the environmental department (Idele,2013).
Petra Diamonds’ Finsch Mine in Lime Acres Northern Cape used mapping software as the source for GIS-related features implemented to share geospatial and attribute data with other departments in the mining operation. GIS will link and maintain the spatial data and information which is scattered in various databases (Idele,2013).
Remote Monitoring Solutions
The recent upgrades to the mobile phone network coverage and speed, combined with the internet backbone available, and even the satellite data communications infrastructure available today are creating an extensive and reliable communications infrastructure that is ideal for applications in mining. These technologies are providing a platform for the complete re-engineering of many business models in the Mining Industry.
Where water is discharged into multiple public waterways, regulations require the ongoing monitoring of water quality and flow-rate, and the regular reporting of this data to the authorities. This responsibility should fall outside of the production environment. Data should be secure and available for regular, but infrequent reporting, but abnormal events should be reported immediately to prevent pollution and possible fines from authorities.
The use of web-based remote monitoring provides a very convenient method of providing this data directly to the compliance office, without requiring large capital expenditure and access to internal technical resources. By providing a single web-enabled Data Access Point at each outflow location, data can be collected and provided in real-time to the compliance office. In addition, email and SMS alerts can be configured to provide immediate notification if water quality limits are breached (Celine,2013).
Drilling and Blasting
Information technology can be used in every step of drilling and blasting operations. Based on customized blast design tools for any operation blast design, charging and execution can be planned. The design can incorporate environmental restrictions and result goals. After holes are drilled then measurements regarding burden, spacing, hole depth need to be made either by using GPS or be measured manually. There would always be difference between designed hole location and inclination and actual holes drilled. After actual drilling and blasting parameters are available then predictive tools may be used for fragmentation, vibrations, flyrock and dust. Information can be used for simulation of firing sequence and for checking any unfired holes. If drilled blast is likely to exceed respective limits then charging, initiation timing and sequence can be changed to keep adverse environmental impacts within defined limits.
Drilling and blasting data management system ensures information storage, but also acts as an intelligent system as an aid for blast design, prediction of impacts and analysis. Data is obtained from blast hole face profiling tool, vibration prediction tool, and direct data link to a database incorporating all the major manufacturers products and an interface allowing the user to add new product ranges and create custom products. Misfire and accident details can be recorded (Bhandari,2011).
If data is continuously recorded then large number of data becomes available, the system can up-date scaled distance relationship, based on location variations and ultimately provide the blasting engineer with an interactive means to assist with planning of future blasts.
There is often difference in designed actual drilled data can be used for predicting environmental impact of blasting and if the environmental limits for vibration and flyrock imposed by regulatory authorities or by management exceed then explosive charge distribution and initiation timing and sequence can be changed so that limits are not exceeded.
A comprehensive blasting analysis and reporting software VIBRATION PREDICTOR meets the needs of both operators and regulators. It supports and improves compliance with blasting related planning conditions, and contributes to improved blast performance and blast design. Key features include:
Regular updating of predictions using ongoing site data, providing minimum instantaneous charge (MICs) to the operator that ensure compliance with vibration level restrictions by design rather than by accident. The system’s advanced analysis also allows blasting on individual benches or areas to be assessed and the financial and environmental risks and benefits of changes to be evaluated rapidly and reliably, optimising costs and maximising efficiency.
Analysis by wave front reinforcement predictor softwarehas been found that many blast design and initiation cause substantial increases in both air and ground vibration from both surface and underground blasting operations. Simple alterations to firing patterns can prevent wave front reinforcement and be used to control vibration levels in many situations. By change of delay timing or sequence reinforcement can be avoided thus lowering of maximum vibration levels. This tool allows blast to be designed to reduce exceedance of vibrations both for airblast and for ground vibrations (Richards, 1995).
Inputs to flyrock prediction software are charge mass, burden or stemming height, and a site constant that lies within a general range that can be tightened by site calibration. The output is the distance that rock will be thrown, and this ‘design your own flyrock’ quantification can be used to establish both safe clearance distances, and the critical range of burdens and stemming heights where the situation changes rapidly from safe to hazardous.
Conclusion
The use of new technologies in the connected world is inevitable, as it provides the best-in-class means today of communicating with thousands of points securely and cost effectively. Information and communications technology can be applied to the entire value chain and lifecycle of mining and mineral extraction.
References:
This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.
What personal information do we collect from the people that visit our blog, website or app?
When registering on our site, as appropriate, you may be asked to enter your name, email address, phone number or other details to help you with your experience.
Accessing and Updating Your Personal Information
You may update Your Personal Information via MineExcellence Account at this Website. If You should become aware that Your Personal Information with MineExcellence is not complete and accurate, You shall promptly update Your Personal Information via MineExcellence Account.
How do we protect visitor information?
We use vulnerability scanning and/or scanning to PCI standards.
We also use Malware Scanning.
And we use an SSL certificate as well to protect your content from third party.
Do we use 'cookies'?
We do not use cookies for tracking purposes.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser's Help menu to learn the correct way to modify your cookies.
Third Party Disclosure
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information.
Third party links
We do not include or offer third party products or services on our website.
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under 13, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation's consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.
We do not specifically market to children under 13.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
Information Security
We work hard to protect MineExcellence and our users from unauthorized access to or unauthorized alteration, disclosure or destruction of information we hold. In particular:
We encrypt many of our services using SSL.
We review our information collection, storage and processing practices, including physical security measures, to guard against unauthorized access to systems.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify the users via email within 7 business days.
We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only those individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.
CAN SPAM Act
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to be in accordance with CANSPAM we agree to the following:
If at any time you would like to unsubscribe, you can email us at and we will promptly remove you from ALLcorrespondence.
Your Rights
In accordance with the applicable law, MineExcellence will provide You with access to Your Personal Information and, as appropriate, the right to intervene in respect of Your Personal Information. You may also be entitled to object to the processing of Your Personal Information by MineExcellence or to request the deletion of Your Personal Information.
Questions About this Privacy Policy; Changes to this Privacy Policy
If You have any questions about this Privacy Policy, please send Your inquiry to "email address", or to the applicable MineExcellence office identified in the "Contact Us" section of the Website.
MineExcellence reserves the right to change this Privacy Policy at any time by posting notice of the changes on the Website.
1. Registration and Subscription
When you register, you are registering or subscribing as a company, company user, or individual user of MineExcellence. Company user will register with specific company code. Access to registered user content and subscription areas are via your [email address or username and password].
We allow you access to the registered user content and subscription areas of the website on the basis that:
(i) Your email address and password are personal to you and may not be used by anyone else to access MineExcellence.
(ii) You will not do anything which would assist anyone who is not a registered user to gain access to or sell any content contained in the registered content or subscriber areas of MineExcellence.
(iii) You do not maliciously create additional registered user or subscription accounts for the purpose of abusing the functionality of the website, or other users; nor do you seek to pass yourself off as another user.
(iv) You comply with these terms and conditions.
If, for any reason, we believe that you have not complied with these requirements, we may, at our discretion, cancel your access to the registered user and subscription areas of MineExcellence immediately and without giving you any advance notice.
2. Termination of Registration and Subscription
If we wish to bring the agreement to an end, we will do so by emailing you at the address you have registered stating that the agreement has terminated. The agreement will terminate and your email address and password will become invalid on MineExcellence immediately.
You can also terminate this agreement and your account at any time by emailing your notice to us at but your information may remain stored in archive on our servers even after the deletion or the termination of your account.
3. Use of Material Appearing on MineExcellence
For the purposes of these terms of service, "material" means material including, without limitation, text, video, graphics, photographs and audio material, published on the MineExcellence website, whether copyright of MineExcellence or a third party.
You may download and print extracts from the material and make copies of these for your own personal and non-commercial use only. You must not reproduce any part of MineExcellence or the material or transmit it to or store it in any other website or disseminate any part of the material in any other form, unless we have indicated that you may do so.
We may be prepared to allow you to distribute or reproduce other parts of MineExcellence or the material in certain circumstances. Please email us if you wish to apply for permission to do so.
4. Disclaimer of Liability
To the extent permitted at law, we do not accept any responsibility for any statement in the material. You must not rely on any statement we have published on MineExcellence without first taking specialist professional advice. Nothing in the material is provided for any specific purpose or at the request of any particular person.
For the avoidance of confusion, we will not be liable for any loss caused as a result of your doing, or not doing, anything as a result of viewing, reading or listening to the material or any part of it.
We do not warrant that MineExcellence or any of its contents is virus free. You must take your own precautions in this respect as we accept no responsibility for any infection by virus or other contamination or by anything which has destructive properties.
6. Data Protection
Please see our privacy policy for details of how personal data may be stored and processed.
7. Variations
These terms may be varied from time to time. Please ensure that you review these terms and conditions regularly as you will be deemed to have accepted a variation if you continue to use the website after it has been posted.
8. Force Majeure
Although we will do our best to provide constant, uninterrupted access to MineExcellence, we do not guarantee this. We accept no responsibility or liability for any interruption or delay.