Comparing overflow and wave-overtopping induced breach initiation mechanisms in an embankment breach experiment
نویسندگان
چکیده
منابع مشابه
Fuzzy algorithm for estimating average breach widths of embankment dams
Dam breach width significantly influences peak breach outflow, inundation levels, and flood arrival time, but uncertainties inherent in the prediction of its value for embankment dams make its accurate estimation a challenging task in dam risk assessments. The key focus of this paper is to provide a fuzzy logic (FL) model for estimating the average breach width of embankment dams as an alternat...
متن کاملEmbankment overtopping protection systems
For the last decades, the design floods of numerous embankment reservoirs were re-evaluated, and the revised spillway outflows are typically larger than those used in the original designs. As a result, a number of overtopping protection systems were developed for embankments and earthfill dams, with applications encompassing river dykes, coastal barriers for storm surge and tsunami protections....
متن کاملPalm breach
form ended with the last ice age in Europe, it persisted until very recently in Australia, although examples of twentieth century work are rare and may have been influenced by outsiders. Incredibly, this latest find comprises a continuous historical record from 15,000 years ago to 50 years ago. Thus it is that, alongside ancient depictions of classic rock art images such as human hand outlines,...
متن کاملExperimental Study of Breaching of an Earthen Dam using a Fuse Plug Model
Failure of dams due to overtopping is among the most frequent forms of embankment failures. Owing to massive and wide spread damage to structures and loss of lives associated with a dam failure, the subject has drawn the attention of scientists. The study also becomes essential for damage assessment and for development of early warning system of people downstream of the embankment. The rate of ...
متن کاملStyle Breach Detection: An Unsupervised Detection Model
This paper deals with the sub-task of PAN 2017 Author Identification, which is to detect style breaches for unknown number of authors within a single document in English. The presented model is an unsupervised approach that will detect style breaches and mark text boundaries on the basis of different stylistic features. This model will use some classical stylistic features like POS analysis and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: E3S Web of Conferences
سال: 2016
ISSN: 2267-1242
DOI: 10.1051/e3sconf/20160703004