|Appears in Collections:||Management, Work and Organisation Conference Papers and Proceedings|
|Peer Review Status:||Refereed|
Basiri, Mohammad Houssain
Sajidan, M H
|Title:||Risk Assessment in Block Cave Mining|
|Citation:||Oraee K, Basiri MH, Sajidan MH & Hayati M (2011) Risk Assessment in Block Cave Mining In: SME Annual Meeting & Exhibit and CMA 113th National Western Mining Conference 2011. 2011 SME Annual Meeting & Exhibit and CMA 113th National Western Mining Conference "Shaping a Strong Future Through Mining", Dearborn, MI, 27.02.2011-02.03.2011. Dearborn, MI: Society for Mining, Metallurgy & Exploration, pp. 331-335.|
|Conference Name:||2011 SME Annual Meeting & Exhibit and CMA 113th National Western Mining Conference "Shaping a Strong Future Through Mining"|
|Conference Dates:||2011-02-27 - 2011-03-02|
|Conference Location:||Denver, Colorado, USA|
|Abstract:||Mining Ventures are considered as high risk projects and therefore managing the risks is inevitable. Risk assessment is an important part of the complex process of risk management, hence applying appropriated and practical methods for ranking the risks associated with projects, can help to perform a better risk management. In this research the applicability of using Techniques for Order Preference by Similarity to Ideal Solution (TOPSIS) method for risk ranking in an underground mine, extracting by block caving method, was studied. Via this method, the risk associated with reserve estimation ranked as the first while in conventional method (P-I Matrix method) located in the sixteenth. Also there were significant differences in ranks of the other risks. Considering the more criteria, with different weights, in comparison with conventional methods, the results comprised from TOPSIS method are more reliable. By implementing this method risks are ranked better and more realistic and consequently then will be managed more efficient.|
|Status:||VoR - Version of Record|
|Rights:||The publisher has not yet responded to our queries therefore this work cannot be made publicly available in this Repository. Please use the Request a Copy feature at the foot of the Repository record to request a copy directly from the author; you can only request a copy if you wish to use this work for your own research or private study.|
|11-057.pdf||Fulltext - Published Version||119.84 kB||Adobe PDF||Under Embargo until 2999-12-01 Request a copy|
Note: If any of the files in this item are currently embargoed, you can request a copy directly from the author by clicking the padlock icon above. However, this facility is dependent on the depositor still being contactable at their original email address.
This item is protected by original copyright
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
If you believe that any material held in STORRE infringes copyright, please contact email@example.com providing details and we will remove the Work from public display in STORRE and investigate your claim.