ERDC TN-EMRRP-SR-46 "Alternative Environmental Flow Management Schemes"

نویسنده

  • Kyle McKay
چکیده

OVERVIEW: As demand on fresh water increases, water and environmental managers must trade off potentially conflicting uses of this resource, one of which is the maintenance of aquatic ecosystem integrity (Baron et al. 2002, Postel and Richter 2003, Arthington et al. 2006). In some cases, the process of analyzing trade-offs can identify solutions where numerous outcomes benefit (i.e., win-win scenarios, King and Brown 2010). Although the importance of “environmental” or “instream” flows is widely acknowledged, challenges arise in specifically identifying the flow regime needed to obtain a desired ecological state (Richter et al. 1997). Historically, environmental objectives were treated as a constraint whereby a minimum flow level for a given river is identified and used to maintain low flow conditions for critical needs. Although this provides some benefit, a minimum flow approach only addresses a single portion of a river’s flow regime (low flows). This approach omits the magnitude, frequency, duration, timing, and rate of change of a river’s entire hydrograph and the ecological significance of those parameters both individually and in combination (Poff et al. 1997). This technical note reviews multiple techniques aimed at managing water for environmental and ecological objectives. Review of these techniques is followed by a brief discussion of key considerations in selecting an environmental flow management scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ERDC TN-EMRRP-ER-13, Addressing Risk and Uncertainty in Planning Ecological Restoration Projects

INTRODUCTION: Corps of Engineers planners have been required to consider risk and uncertainty since the Principles and Standards Act of 1972. The Actions for Change are increasing the Corps of Engineers’ reliance on risk-informed analysis and decision making. An informal review of the Corps’ experience with ecosystem restoration plans has shown few, if any, systematic efforts to address the oft...

متن کامل

ERDC TN-EMRRP-EBA-19 "Metric Selection for Ecosystem Restoration"

This technical note is designed to help ecosystem restoration planners and project managers identify the best metrics to evaluate and select the recommended restoration plan, monitor and assess progress toward achieving project objectives, and, if necessary, inform adaptive management decisions. Performance metrics, or measurable system components used to estimate and track the state of critica...

متن کامل

ERDC TN-EMRRP-ER-12, Use of Alternative Materials for Oyster Reef Construction

BACKGROUND: Oysters are filter-feeding bivalve molluscs that form cohesive reefs in estuarine and near-coastal waters. In addition to their economic value, oysters can exert a powerful influence on water quality, phytoplankton productivity, and nutrient cycling (Dame 1996; Ulanowicz and Tuttle 1992); they also affect current patterns, flow, and sedimentation rates (Lenihan 1999). Oyster reefs o...

متن کامل

ERDC TN-EMRRP-ER-21 "Russian Olive Biology, Invasion, and Ecological Impacts in Western North America"

INTRODUCTION: The United States Army Corp of Engineers (USACE) Ecosystem Management and Restoration Research Program (EMRRP) is supporting a nationwide effort to address the impact of invasive woody plant species on ecosystem restoration, and more specifically, to determine mechanisms to address the most regionally prevalent invasive species impacting restoration activities. The research effort...

متن کامل

Remote data integrity checking with server-side repair

Distributed storage systems store data redundantly at multiple servers that are geographically spread throughout the world. This basic approach would be sufficient in handling server failure due to natural faults, because when one server fails, data from healthy servers can be used to restore the desired redundancy level. However, in a setting where servers are untrusted and can behave maliciou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013