نتایج جستجو برای: breach flow

تعداد نتایج: 486434  

2001
Luis E. Marín E. C. Perry H. I. Essaid Birgit Steinich

A freshwater lens underlain by saltwater exists beneath the entire northern Yucatan karst plain, Mexico. Water levels recorded in this plain, during the period June 1987 April, 1989, were used to map the water table, identify inland hydrogeologic boundaries, and estimate the thickness of the freshwater lens using the Ghyben-Herzberg relation. The water table under most of northwestern Yucatan i...

Journal: :Frontiers in Earth Science 2023

Dam-break is a serious disaster resulting in severe damage to downstream communities. Therefore, analyzing the affected range and evolution process of dam-break floods advance valuable. However, difficulties challenges lie complexity breaking earth-rock dams, uncertainty floods, geographical variability. Given this, objective this study analyze characteristics flood evolution. The chooses Cheng...

Journal: :Water 2022

However rare, dam breach occurrences are recently reported and associated with significant damage to life property. The rupture of the structural wall generates severe flow rates that exceed spillway capacity consequently generating unprecedented flooding scenarios. present research aims assess influence statistical configuration on most relevant parameters predict maximum discharge (RMD). McBr...

Journal: :مطالعات حقوق خصوصی 0
سعید حبیبا دانشکده حقوق و علوم سیاسی، دانشگاه تهران عباس کاظمی نجف‎آبادی دانشگاه شهید بهشتی، دکترای حقوق

knowing of formation of a legal rule is an efficient way to recognizing and assessing of that rule. anticipatory breach doctrine became apparent in common law when the court in hochster versus de la tour case (1980), hold that a party could breach an executor contract prior to the performance date and injured party entitle to sue at once. before it, courts had made a negative answer to this mat...

2010
Alexandre Donzé

We describe Breach, a Matlab toolbox providing a coherent set of simulation-based techniques aimed at the analysis of deterministic models of hybrid dynamical systems. The primary feature of Breach is to facilitate the computation and the property investigation of large sets of trajectories. It relies on an efficient numerical solver of ordinary differential equations that can also provide info...

2016
Sara Barakat Bechara al Bouna Mohamed Nassar Christophe Guyeux

Data anonymization is gaining much attention these days as it provides the fundamental requirements to safely outsource datasets containing identifying information. While some techniques add noise to protect privacy others use generalization to hide the link between sensitive and non-sensitive information or separate the dataset into clusters to gain more utility. In the latter, often referred ...

Journal: :Datenschutz und Datensicherheit - DuD 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید