ESQD Formula - K Factor

ESQD Formula - K Factor

ESQD Formula For HC/D 1.1 mass detonating material, the blast effect is the primary hazard. Most distances required to protect structures from the effects of a shockwave/overpressure are based on the formula: D = KW1/3 D = distance in feet K = a factor depending upon the risk assumed or permitted. W1/3 = cube root of the NEW in pounds Math Refresher: 103 (ten cubed) = 10 X 10 X 10 = 1000 10001/3 (cube root of 1000) = 10 1 Blast Overpressure Permissible Exposures DA Pam 385-64, Table 8-1, Safe Separation Distances and Expected Severities (HC/D 1.1) Often times, the numerical K-factor is used interchangeably with the type of distance or level of protection it prescribes. Below is a list of permissible exposures stated in terms of psi, along with the corresponding K-factor and type of distance. D I S T A N C E Permissible

Exposure K-Factor Distance Type Protection (PSI) 27 6 Barricaded Above-Ground Magazine Distance 12 9 Barricaded Intraline Distance 8 11 Unbarricaded Magazine Distance 3.5 18 Unbarricaded Intraline Distance 2.3 24 Public Traffic Route Distance (100,000 lbs NEW and below) 1.7 30 Public Traffic Route Distance (over 250,000 lbs NEW) 1.2 40 Inhabited Building Distnace (100,000 lbs NEW and below) 0.9 50 Inhabited Building Distance (250,000 NEW and above) 2

Recently Viewed Presentations

  • Meta Consent Decree - Weebly

    Meta Consent Decree - Weebly

    Castaneda v. Pickard, 648F. 2d 989 (5th Cir. 1981)In Castaneda vs. Pickard, the U.S. Fifth Circuit Court of Appeals set forth a three-part test to determine whether a school district takes appropriate actions to overcome language barriers that confront language-minority...
  • China's Dynasties

    China's Dynasties

    The Chinese were defeated, and opium continued to destroy the fabric of Chinese society. Qing. As a result, China signed off on Unequal Treaties, declaring that England had the ability to set the price and quantity of trade items ......
  • Steganalysis with Streamwise Feature Selection Steven D. Baker

    Steganalysis with Streamwise Feature Selection Steven D. Baker

    Steganalysis with Streamwise Feature Selection Steven D. Baker University of Virginia [email protected] Steganography: An Example Motivation Catch bad people trying to communicate in secret Catch good people trying to communicate in secret?
  • Folie 1 - ETH

    Folie 1 - ETH

    Prof. Dr. Lars-Erik Cederman Eidgenössische Technische Hochschule Zürich Center for Comparative and International Studies (CIS) ... Hizbollah wird 1985 als Reaktion darauf gegründet 1983 sterben bei der Sprengung einer Kaserne der Marines 220 Amerikaner Osama bin Laden Gegen den Westen...
  • Smartphones as Practical and Secure Location Verification ...

    Smartphones as Practical and Secure Location Verification ...

    Signed-IMSI Security. Strategy a: Encrypt service key on adversary device. Start enrollment scheme on own device with target's UID. Must use custom SIM to spoof the IMSI . Custom SIM will not authenticate with network. Strategy b: Encrypt service key...
  • MEET THE TEAM Aims of the Student Partnership

    MEET THE TEAM Aims of the Student Partnership

    Looked like Uni websites - what we wanted to move away from - since myed, learn, blackboard all very confusing . Moved away - started using wix free software, easier to edit and add features, got a place to leave...
  • How to write a newspaper article

    How to write a newspaper article

    Kingdom of Far Away - Alexander T. Wolf is arrested for blowing down the houses of two brothers, Ham and Sausage Pig. A third brother, Bacon Pig, witnessed both incidences. Sunday evening Wolf went to borrow sugar from his neighbors,...
  • D-STAR Presentation - KK4IB

    D-STAR Presentation - KK4IB

    HXO D-Star Update 4-21-2012 ... D-Star Radio Products Icom D-STAR Controller & Repeaters Slide 18 Slide 19 Slide 20 Third Party Products DV Dongle Menu D-RATS Free Software D-RATS Message List D-RATS Chat Display D-RATS File Transfer D-RATS Map Display...