Abstract

The shield tunnel of the Kunming subway crosses beneath the Kun-Shi Railway. Due to the high requirements of railway track for settlement control, this article proposes the following technical measures for controlling the settlement based on the analysis of risks arising from the shield crossing railway: (1) Reinforcing the stratum of the region crossed by the shield in advance to achieve high stability; (2) Using a reinforced segment for the shield tunnel and increasing reserved grouting holes for construction; (3) Reasonably configuring resources, optimizing construction parameters, strengthening monitoring and information management during the shield crossing. In strict accordance with the construction plan, the shield successfully and safely crossed beneath the Kun-Shi Railway; this provides experience that can be used in similar projects in the future.

Highlights

  • Common tunneling methods include: open-cut method, cover and cut method, spray anchor subsurface excavation method and shield method

  • Shield construction does not affect ground traffic and underground pipelines, so the shield method is often used for subway tunnel excavation [1–6]

  • The shield tunneling method was used for tunnel excavation in Kunming Rail Transit Line 3, which needed to cross beneath the running Kun-Shi Railway during the construction process

Read more

Summary

Introduction

Common tunneling methods include: open-cut method, cover and cut (top-down) method, spray anchor subsurface excavation method and shield method. The shield tunneling method was used for tunnel excavation in Kunming Rail Transit Line 3, which needed to cross beneath the running Kun-Shi Railway during the construction process. The Kun-Shi Railway was one of the first railway lines built in China, and it has greatly contributed. Kun-Shi Railway was one of the first railway lines built in China, and it has greatly contributed to the research of the development of China’s railways. It is classified as a Grade I Cultural Relic in toYtuhnenraenseparrocvhinocfet.hTehdereevfoelroep, tmheenratiolwf aCyhtirnaac’kssrwaielwrearyesq.uIitreisdctloasbseifiperodteacstaedGdruadriengI CthuelctuonrasltrRuecltiiconin Youfnsnhainelpdrocrvoinsscien.gT, hgerreeaftolyrei,ntchreearsaiinlwgatyhetrdaicfkfiscuwletyreorfecqounirsetrdutcotiobne.pIrnotaedcdteitdiodnu, rriinsgkstheexicsotinnsgtriunctthioen ocfosnhsietrludcctiroonssoinf gsh, igerledactlryosisnicnrgeainsicnlugdtehde: d(1if)fiLcaurlgtye uofplcioftnasntrducsteitotlne.mInenatdodfigtiroonu,nrdisskusrefaxcisetirnesguilntinthge coinnsutnruevcteinonsuobfgsrhaideledwcrhoicshsincaguisnecdlutdraefdfi:c(a1c)cLidaregnetsu; p(2li)fItmanpdacsteottfltermaiennrtuonfngirnoguonndtshuerafancneurleasrutlutinnngeli;n u(n3e)vHeinghsu-rbisgkragdroeuwnhdicmhocnaituosreindgt;r(a4f)fiUc paclicfitdaenndtss;e(t2tl)eImmepnatcotfogfrtoruanindrsuunrfnaicnegcoanustehdebaynninutlearrrutupntinonel; (3o)fHshigiehl-dritsukngnreoluinngd. TThhisisaartritcicleleinintrtroodduucceesstthheekkeeyyccoonnssttrruuccttiioonn tteecchhnnoollooggyy ooff sshhiieelldd ccrroossssiinnggrraaiillwwaayybbaasseeddoonntthhee susuccecsessfsuful lcocnosntsrutrcutciotinonofoafsahieslhdieclrdoscsrionsgsifnogr tfhoer Kthuen-KShuinR-SahiliwRaayiltwo apyrotvoidperaovreidfeereancreffeorrenrecleevfaonrt enreglienveaenrtinegngpirnaecetricineg. practice

PPrroojjeecctt OOvveerrvviieeww
Analysis of the Technical Difficulties
Reinforcement Measures
Reinforcement Scheme
Reinforcement Region
Tracing Grouting
Measurements for Shield Construction
Monitoring Frequency
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.