|Appears in Collections:||Management, Work and Organisation Conference Papers and Proceedings|
|Peer Review Status:||Refereed|
Khorami, M Tayebi
|Title:||Prediction of the penetration rate of tbm using adaptive neuro fuzzy inference system (ANFIS)|
|Citation:||Oraee K, Khorami MT & Hosseini N (2012) Prediction of the penetration rate of tbm using adaptive neuro fuzzy inference system (ANFIS). In: 2012 SME Annual Meeting & Exhibit 2012 (SME 2012): From Mine to Market, Now It's Global. 2012 SME Annual Meeting & Exhibit 2012 (SME 2012): From the Mine to the Market, Now It's Global, Seattle, WA, USA, 19.02.2012-22.02.2012. Littleton, CO, USA: Society for Mining, Metallurgy & Exploration, pp. 297-302. http://toc.proceedings.com/15118webtoc.pdf|
|Conference Name:||2012 SME Annual Meeting & Exhibit 2012 (SME 2012): From the Mine to the Market, Now It's Global|
|Conference Dates:||2012-02-19 - 2012-02-22|
|Conference Location:||Seattle, WA, USA|
|Abstract:||Rate of penetration of Tunnel Boring Machines (TBM) has a significant role in the planning, measurement of productivity and performance of any tunneling project. In this paper, the application of Adaptive Neuro Fuzzy Inference System (ANFIS) in prediction of TBM penetration rate is evaluated. For this purpose, a database including Rock Quality Designation (RQD), Uni-axial Compressive Strength (UCS) of the rock, the Distance between Planes of Weakness (DPW) in the rock mass, and empirical data regarding rate of penetration of TBM from several tunneling projects are collected. The Rate of Penetration is then estimated by using ANFIS. These results are then compared with measured TBM penetration rates (actual data). It is concluded that ANFIS can be applied successfully for such purpose and result in high accuracy for prediction for the rate of penetration of TBM. The method provided in this paper can assist the mining engineer to estimate the performance of tunneling accurately.|
|Status:||VoR - Version of Record|
|Rights:||The publisher has not responded to our queries therefore this work cannot be made publicly available in this Repository. Please use the Request a Copy feature at the foot of the Repository record to request a copy directly from the author. You can only request a copy if you wish to use this work for your own research or private study.|
|12-062.pdf||Fulltext - Published Version||208.02 kB||Adobe PDF||Under Embargo until 2999-12-20 Request a copy|
Note: If any of the files in this item are currently embargoed, you can request a copy directly from the author by clicking the padlock icon above. However, this facility is dependent on the depositor still being contactable at their original email address.
This item is protected by original copyright
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved https://creativecommons.org/publicdomain/zero/1.0/
If you believe that any material held in STORRE infringes copyright, please contact email@example.com providing details and we will remove the Work from public display in STORRE and investigate your claim.