Thursday, January 2, 2020

Different Types Of Protection Systems - 727 Words

These protection systems either helps in capturing the rocks or to control their trajectory once it has fallen down, they are of following types : Rigid barriers Flexible barriers Attenuator system Catch areas Rock sheds Rigid barriers: These barriers are constructed to either contain or deflect the rockfall as these structures are so stiff that they can easily withstand the kinetic energy impacted by the falling boulder with very less or no deformation. So they are mainly constructed near the disaster place. Catch areas: These are used to stop the capture falling rocks before they cause risk to the structure. They are usually constructed along the transportation routes. Flexible barrier : These barriers are the lightweight barriers†¦show more content†¦Design ( flexible barrier) : The design approach for the flexible barrier is the most developed part of all the rock fall protection system as it involves the design approach ( MEL SEL), corrosion protection of the fence, downward deflection of the fence, sizing of the fence. These all aspects helps to get a better design of the fences which can withstand very harsh and aggressive environment. MEL (Maximum energy level): This energy level fence is used at the site where the occurrence of the rockfall is very low so after the impact with the fence ie. when a boulder hits the fences there is a need for the repair or the replacement of the fence as the barrier have to catch a boulder with a maximum energy level of 100% and the residual height after the impacts shows the quality of the barrier. SEL (Service energy level): This is the type of the fences in which the barrier has to catch the two impacts of the boulder with â…“ of the MEL energy being damaged. These type of fences are used where the occurrence of the rockfall is more. After the first impact of the boulder, the residual height should be greater than 70% so that the fence can take the second impact which is just to catch the boulder. Flexible barrier size selection : The selection of the size basically depends uponShow MoreRelatedVirtual Electrical Panel For Ultra Modern Buildings And Industries Essay1130 Words   |  5 Pageselectrical protection are becoming more complex and costly also. As the rate of different equipments used in modern building and industries are getting costlier. So very efficient and low cost electrical panel system is required which can give continuous monitoring and measurement of power and also it can protect the whole electrical system. As LabVIEW being worlds number one virtual programming software, this type of electrical panel can be designed which will not only show different parametersRead MoreThe Evolution Of Microgrids And Different Other Components1642 Words   |  7 Pagessince over 1.3 billion people cannot access electricity. Microgrids are one of the new technologies developed to solve this problem and support emerging economies and sustainable development. This paper describes the evolution of microgrids and different other components. Index Terms — Econmomy, Grid, Smart Grid, Microgrid, Reliable. I. INTRODUCTION The new technologies to generate electricity at the distribution level called distributed energy resources such as solar photovoltaics and wind turbineRead MoreProtection Of Extra High Voltage Transmission Line Using Distance Protection1325 Words   |  6 PagesProtection of Extra High Voltage Transmission Line Using Distance Protection Introduction: Distance protection is the most widely used to protect transmission lines. The fundamental principle of distance relaying is based on the local measurement of voltages and currents, where the relay responds to the impedance between the relay terminal and the fault location [1]. There are many types of distance relay characteristic such as mho, reactance, admittance, quadrilateral polarized-mhoRead MorePrinciples Of Business Document Production And Information Management990 Words   |  4 PagesUnit 03: Principles of Business Document production and Information Management 1.1 Describe different types of business documents that may be produced and format to be followed for each? The description of different types of business documents produced and their format to be followed are as follows: †¢ Business Letters: These letters include formal /informal information, addresses of the sender and recipient, date, salutation and complimentary close. †¢ Emails: Emails are formatted as recipient/sRead MoreIntrusion Prevention System797 Words   |  4 PagesIntrusion Prevention System (IPS) is a proactive protection technology that provides security at the network level. It’s the first line of defense against malware. An organization can not protect their network with just a firewall. Additional protection is needed to avoid potential risks and attacks. An Intrusion Prevention System adds the extra layer of protection by examining all network traffic that is allowed through the firewall. Previously Intrusion Prevention Systems simply protected operatingRead MoreChild Protective Services1477 Words   |  6 PagesCHILD PROTECTIVE SERVICES REFORM 1 INTRODUCTION Child Protective Services (CPS) is a complex system of assessments, investigations, and conclusions. CPS is the central agency in each communities child abuse and neglect service system. It is responsible for ensuring that preventative, investigative, and treatment services are available to children and families endangered by child abuse and neglect. As a result, CPS workers must perform a variety of functions when responding to situations of childRead MoreProcedure : How To Use Refresh PC ( System Restore )782 Words   |  4 PagesWindows logo and R keys at the same time, type Sysdm.cpl in the box, press enter key to open System Properties. Then switch to the System Protection tab, check the protection status of your system drive. If the protection status is on, click on the create button. You can then enter the description for the restore point and click Create. If the protection is off, select your system drive, click on the Configure button, check the option â€Å"Turn on system protection†, and then click apply button. ThenRead MoreDatabase Protection System For The Security Of The Database And Web Application1401 Words   |  6 Pagesincreasing. As attacks are increasing there is no security for the network related data bases. We need urgently a database protection system against the attacks in order keep the data securely. This paper reviews about the SQL attacks, database protection system which is used between the database and web application. There are different protective measures for the different users to provide effective security of the database. Introduction: Since the rapid increase of use of Internet, computer networkRead MoreAssesment 3rai Hr1 Essay1131 Words   |  5 Pagesorganisations need to collect HR data, identifying at least 2 types of data to be collected and explain how each supports HR. You should also describe 2 methods of storing records and the benefits of each. Give an explanation of 2 essential items of UK legislation relating to the recording, storing and accessibility of HR data. This report explains why Human Resources Departments collects data, the different types of data collected and the different methods they use to both collect and store data. TheRead MoreChallenges Faced By Computer Network Security1501 Words   |  7 Pagesthreats facing computer network security include: hackers, computer virus and denial of service attack. Safety factors of the network are mainly: resources sharing, data communication, computer virus and TCP/IP protocol security flaws. A safety network system should include at least three kinds of measures: legal measures, technical measures and review and management measures. The paper analyzes the main threat facing computer network security, discusses network security technology and advances some effective

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.