Comparing overflow and wave-overtopping induced breach initiation mechanisms in an embankment breach experiment

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy algorithm for estimating average breach widths of embankment dams

Dam breach width significantly influences peak breach outflow, inundation levels, and flood arrival time, but uncertainties inherent in the prediction of its value for embankment dams make its accurate estimation a challenging task in dam risk assessments. The key focus of this paper is to provide a fuzzy logic (FL) model for estimating the average breach width of embankment dams as an alternat...

متن کامل

Embankment overtopping protection systems

For the last decades, the design floods of numerous embankment reservoirs were re-evaluated, and the revised spillway outflows are typically larger than those used in the original designs. As a result, a number of overtopping protection systems were developed for embankments and earthfill dams, with applications encompassing river dykes, coastal barriers for storm surge and tsunami protections....

متن کامل

Palm breach

form ended with the last ice age in Europe, it persisted until very recently in Australia, although examples of twentieth century work are rare and may have been influenced by outsiders. Incredibly, this latest find comprises a continuous historical record from 15,000 years ago to 50 years ago. Thus it is that, alongside ancient depictions of classic rock art images such as human hand outlines,...

متن کامل

Experimental Study of Breaching of an Earthen Dam using a Fuse Plug Model

Failure of dams due to overtopping is among the most frequent forms of embankment failures. Owing to massive and wide spread damage to structures and loss of lives associated with a dam failure, the subject has drawn the attention of scientists. The study also becomes essential for damage assessment and for development of early warning system of people downstream of the embankment. The rate of ...

متن کامل

Style Breach Detection: An Unsupervised Detection Model

This paper deals with the sub-task of PAN 2017 Author Identification, which is to detect style breaches for unknown number of authors within a single document in English. The presented model is an unsupervised approach that will detect style breaches and mark text boundaries on the basis of different stylistic features. This model will use some classical stylistic features like POS analysis and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: E3S Web of Conferences

سال: 2016

ISSN: 2267-1242

DOI: 10.1051/e3sconf/20160703004