نتایج جستجو برای: breach flow
تعداد نتایج: 486434 فیلتر نتایج به سال:
A freshwater lens underlain by saltwater exists beneath the entire northern Yucatan karst plain, Mexico. Water levels recorded in this plain, during the period June 1987 April, 1989, were used to map the water table, identify inland hydrogeologic boundaries, and estimate the thickness of the freshwater lens using the Ghyben-Herzberg relation. The water table under most of northwestern Yucatan i...
Dam-break is a serious disaster resulting in severe damage to downstream communities. Therefore, analyzing the affected range and evolution process of dam-break floods advance valuable. However, difficulties challenges lie complexity breaking earth-rock dams, uncertainty floods, geographical variability. Given this, objective this study analyze characteristics flood evolution. The chooses Cheng...
However rare, dam breach occurrences are recently reported and associated with significant damage to life property. The rupture of the structural wall generates severe flow rates that exceed spillway capacity consequently generating unprecedented flooding scenarios. present research aims assess influence statistical configuration on most relevant parameters predict maximum discharge (RMD). McBr...
knowing of formation of a legal rule is an efficient way to recognizing and assessing of that rule. anticipatory breach doctrine became apparent in common law when the court in hochster versus de la tour case (1980), hold that a party could breach an executor contract prior to the performance date and injured party entitle to sue at once. before it, courts had made a negative answer to this mat...
We describe Breach, a Matlab toolbox providing a coherent set of simulation-based techniques aimed at the analysis of deterministic models of hybrid dynamical systems. The primary feature of Breach is to facilitate the computation and the property investigation of large sets of trajectories. It relies on an efficient numerical solver of ordinary differential equations that can also provide info...
Data anonymization is gaining much attention these days as it provides the fundamental requirements to safely outsource datasets containing identifying information. While some techniques add noise to protect privacy others use generalization to hide the link between sensitive and non-sensitive information or separate the dataset into clusters to gain more utility. In the latter, often referred ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید