期刊文献+
共找到1,823篇文章
< 1 2 92 >
每页显示 20 50 100
Cyberattack Ramifications, The Hidden Cost of a Security Breach
1
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity breaches Data breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
2
作者 Dominik Molitor Aditya Saharia +1 位作者 Viju Raghupathi Wullianallur Raghupathi 《Journal of Information Security》 2024年第2期168-195,共28页
Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This... Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents. 展开更多
关键词 Cyber Security Information Security Data breaches Descriptive Analytics PRIVACY Visualization Visual Analytics
下载PDF
United States Healthcare Data Breaches: Insights for NIST SP 800-66 Revision 2 from a Review of the NIST SP 800-66 Revision 1
3
作者 Mohammed Mohammed Raoof 《Journal of Information Security》 2024年第2期232-244,共13页
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati... Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches. 展开更多
关键词 SP 800-66 Revision 1 SP 800-66 Revision 2 HIPAA Compliance Security breaches Risk Management Framework (RMF) Internet of Things (IoT) Artificial Intelligence (AI)
下载PDF
The role of time preferences in contract breach:Evidence from Chinese poultry farmers participating in contract farming
4
作者 HOU Jing ZHOU Li +1 位作者 Jennifer IFFT YING Rui-yao 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2023年第2期623-641,共19页
Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from... Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from the perspective of time preferences.The empirical analysis is based on a household survey and economic field experiments of poultry households participating in contract farming conducted in Jiangsu Province,China.A discounted utility model and a maximum likelihood technique are applied to estimate farmers’time preferences and the effect of time preferences on contract breach in the production and sales phases are explored with a bivariate probit model.The results show that,on average,the poultry farmers in the sample are generally present biased and impatient regarding future utility.The regression results show that farmers with a higher preference for the present and a higher discount rate are more likely to breach contracts,and time preferences play a greater role in the production phase than in the sales phase.When considering heterogeneity,specific investments and transaction costs promote contract stability only for farmers with a low degree of impatience.Moreover,compared with large-scale farmers,small-scale farmers’contract breach decisions are more significantly affected by their time preferences.These results have implications for contract stability policies and other issues that are impacted by the linking of behavioral preferences to agricultural decisions. 展开更多
关键词 time preferences contract breach contract farming economic field experiments China
下载PDF
Modeling of breaching parameters for debris flow dams
5
作者 RUAN He-chun CHEN Hua-yong +8 位作者 CHEN Xiao-qing ZHAO Wan-yu CHEN Jian-gang WANG Tao JIANG Yao Wang Xi-an Li Xiang-ning LI Xiao YU Yun-han 《Journal of Mountain Science》 SCIE CSCD 2023年第10期2835-2851,共17页
The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal comp... The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal compositions.The basic breaching parameters such as flood peak discharge are vital indicators of risk assessment.In this study,we elucidated the failure process of the debris flow dam through the flume experiment,and built the calculation equation of the breaching parameters by selecting critical factors.The result shows that the overtopping failure process of the debris flow dam is capable of forming significantly retrogressive scarps,and the failure process experiences three stages,the formation of the retrogressive scarp,the erosion of the retrogressive scarp,and the decline of the retrogressive scarp.Five factors used for establishing the calculation equations for peak discharge(Qp),final width(Wb)of the breach,and duration(T)of the debris flow dam failure are dam height(h),reservoir capacity(V),the fine grain content(P0.075)of the soil,the nonuniformity coefficient(Cu)of the soil,and the upper limit grain size(D90)of the soil,respectively.In the three equations,the correlation coefficients between Qp,Wb,T and the five factors were 0.86,0.70,0.63,respectively.The equations still need to be modified and verified in actual cases. 展开更多
关键词 Debris flow dams Overtopping failure breaching g parameters Peak discharge Flume experiment
下载PDF
Considerations for Restriction on the Right of Rescission in Case of Obviously Minor Breaches
6
作者 Xu Wei Chen Haoran 《Contemporary Social Sciences》 2023年第3期85-98,共14页
Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract... Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract law.The Minutes of the Ninth Work Conference of the Courts Nationwide on Civil and Commercial Trial(the Minutes of the Ninth Work Conference)stipulates that whether a contract shall be rescinded depends on whether a breach is obviously minor and affects the fulfillment of the contract purposes expected by the non-breaching party.In juridical practice,however,there are no clear criteria to define what constitutes obviously minor breaches,and the factors considered in such cases are often inadequate to allow for a fully considered decision.By analyzing Article 55 of the Judicial Interpretation of the General Provisions of Contracts of the Civil Code of the People’s Republic of China(Draft for Comments)and reviewing the previous juridical practices,we present our conclusions regarding the conditions and factors that should be considered when restricting the right of rescission in cases of obviously minor breaches with a view to unifying the judicial judgment criteria by differentiating the type of breaches. 展开更多
关键词 obviously minor breaches right of rescission considerations
下载PDF
Identification of the Breach of Short-Term Rental Regulations in Irish Rent Pressure Zones
7
作者 Guowen Liu Inmaculada Arnedillo-Sánchez Zhenshuo Chen 《Journal of Computer and Communications》 2023年第2期8-19,共12页
The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regul... The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regulating rentals in Rent Pressure Zones with the highest and rising rents is becoming a tricky issue. In this paper, we develop a breach identifier to check short-term rentals located in Rent Pressure Zones with potential breaches only using publicly available data from Airbnb (an online marketplace focused on short-term home-stays) and Irish government websites. First, we use a Residual Neural Network to filter out outdoor landscape photos that negatively impact identifying whether an owner has multiple rentals in a Rent Pressure Zone. Second, a Siamese Neural Network is used to compare the similarity of indoor photos to determine if multiple rental posts correspond to the same residence. Next, we use the Haversine algorithm to locate short-term rentals within a circle centered on the coordinate of a permit. Short-term rentals with a permit will not be restricted. Finally, we improve the occupancy estimation model combined with sentiment analysis, which may provide higher accuracy. 展开更多
关键词 Housing Crisis Short-Term Rental Irish Rent Pressure Zone Image Recognition breach Identification
下载PDF
基于NWS BREACH的唐家山堰塞坝泄流过程模拟 被引量:1
8
作者 刘若星 钟启明 霍家平 《人民长江》 北大核心 2016年第3期88-92,共5页
NWS BREACH模型是目前国内外模拟土石坝或堰塞坝漫顶及管涌破坏最常用的数学模型。基于唐家山堰塞坝的实测资料,建立了唐家山堰塞坝漫顶泄流过程数学模型,并通过现场监测得到的流量过程和库水位变化资料验证了所建立模型的合理性。对模... NWS BREACH模型是目前国内外模拟土石坝或堰塞坝漫顶及管涌破坏最常用的数学模型。基于唐家山堰塞坝的实测资料,建立了唐家山堰塞坝漫顶泄流过程数学模型,并通过现场监测得到的流量过程和库水位变化资料验证了所建立模型的合理性。对模型中的重要参数进行了敏感性分析,研究了坝料平均粒径、冲蚀率、下游坝坡坡比3个参数对模型计算结果的影响,表明坝料冲蚀率和下游坝坡坡比对泄流过程影响显著。研究成果对堰塞坝除险和洪水风险评估具有指导意义。 展开更多
关键词 NWS breach模型 唐家山堰塞坝 泄流模拟 敏感性分析
下载PDF
基于GeoDam-BREACH与Graham法的溃坝生命损失估算 被引量:4
9
作者 傅志敏 杜汶桐 +1 位作者 孟颖 王志刚 《水利水运工程学报》 CSCD 北大核心 2019年第2期93-98,共6页
应用GeoDam-BREACH工具包模拟了超标准洪水状况下小井沟水库下游的溃坝洪水演进过程,得到水库溃坝下游淹没范围与淹没区水深分布,然后采用Graham法对溃坝导致的生命损失风险进行分析。分析结果表明,小井沟水库发生漫顶破坏时,溃坝洪水... 应用GeoDam-BREACH工具包模拟了超标准洪水状况下小井沟水库下游的溃坝洪水演进过程,得到水库溃坝下游淹没范围与淹没区水深分布,然后采用Graham法对溃坝导致的生命损失风险进行分析。分析结果表明,小井沟水库发生漫顶破坏时,溃坝洪水对下游产生严重影响,下游村镇有受淹风险;下游溃坝淹没区域的风险人口死亡率较高,并且随着警报时间的减小而增大,从而得出警报时间和风险人口对溃坝洪水严重性的理解程度是生命损失的重要影响因素、应当加强水库大坝的日常巡查工作和预警系统的结论。研究成果为小井沟水库的防洪调度和应急预案编制提供了有效支持,对于同类水库的防洪和安全管理亦具有参考价值。 展开更多
关键词 溃坝 生命损失估算 GeoDam-breach Graham法 小井沟水库
下载PDF
改良Breach法治疗腋臭8例 被引量:7
10
作者 韩承新 《武警医学》 CAS 2000年第1期22-22,共1页
关键词 腋臭 改良breach 外科手术 治疗
下载PDF
BREACH模型与MIKE21模型在溃坝风险中的耦合分析 被引量:11
11
作者 杨德玮 盛金保 +1 位作者 彭雪辉 何佳卓 《水利水运工程学报》 CSCD 北大核心 2016年第6期23-28,共6页
BREACH模型常用来模拟水库大坝漫顶及管涌溃坝模式并获取溃口流量与时间关系,MIKE21模型常用来模拟湖泊、河口、海湾等二维水动力学并获取洪泛区内洪水风险信息要素,两大模型耦合分析在保障水库大坝安全运行及风险管理方面发挥了积极作... BREACH模型常用来模拟水库大坝漫顶及管涌溃坝模式并获取溃口流量与时间关系,MIKE21模型常用来模拟湖泊、河口、海湾等二维水动力学并获取洪泛区内洪水风险信息要素,两大模型耦合分析在保障水库大坝安全运行及风险管理方面发挥了积极作用。以BREACH模型模拟溃口流量动态数据过程与溃口演变尺寸为基础,通过Arc GIS预处理地形文件、工程建筑物参数与水文数据,构建MIKE21二维水动力学模型并计算网格差值空间,利用Flow Model模块生成溃坝洪水模拟文件,采用判别溃口流量差值是否满足精度要求的迭代法来耦合两大模型,最终结合所要分析水库大坝的工程概况,计算不同风险情况下的水库大坝溃坝洪水淹没水深与范围,进而模拟溃坝洪水演进过程。该方法已成功应用于郑州常庄水库风险分析,结果表明,该方法能客观反映溃坝洪水行洪情况,使用方便,为水库大坝运行管理与应急处置提供了一定的技术支持。 展开更多
关键词 breach模型 MIKE21模型 溃坝风险 耦合分析
下载PDF
Frequent Breaches in Irrigation Canals in Sindh Pakistan
12
作者 Riaz Bhanbhro Nadhir Al-Ansari Sven Knutsson 《Journal of Water Resource and Protection》 2014年第4期214-223,共10页
Every year, a number of breach failures occur in Irrigation Canals in Sindh. Those failures cause displacement of thousands of people, destruction of properties, land, and damage to costly crops that worth millions Ru... Every year, a number of breach failures occur in Irrigation Canals in Sindh. Those failures cause displacement of thousands of people, destruction of properties, land, and damage to costly crops that worth millions Rupees. In addition to that, breach failures also can cause water shortages when the failure occurs during the peak demand period. There are various causes of embankment failures which include overtopping, internal erosion, structural defects and piping. State of art for breach failures is presented in this paper and suggestions for prediction of breaches in context to canals in Sindh are discussed. Seepage and slope stability analyses are recommended for a long-term breach predictions. 展开更多
关键词 Canal breaches Embankment Failures Long Term breach Prediction Irrigation System Sindh
下载PDF
Breach模型与River2D模型在土石坝溃坝中的耦合分析 被引量:6
13
作者 周清勇 傅琼华 《吉林水利》 2015年第1期15-18,共4页
Breach是一个用于对土石坝进行溃坝分析以获取时间和流量关系的模型,River2D是一个用于模拟下游洪泛区内溃坝洪水演进以获取全要素风险信息的模型。两个模型的耦合分析在保护水库的安全及管理水库的运行方面有着预防的作用。
关键词 breach River2D 土石坝溃坝 耦合
下载PDF
Numerical modeling of earthen dam breach due to piping failure 被引量:6
14
作者 Sheng-shui Chen Qi-ming Zhong Guang-ze Shen 《Water Science and Engineering》 EI CAS CSCD 2019年第3期169-178,共10页
Based on model tests of earthen dam breach due to piping failure, a numerical model was developed.A key difference from previous research is the assumption that the cross-section of the pipe channel is an arch, with a... Based on model tests of earthen dam breach due to piping failure, a numerical model was developed.A key difference from previous research is the assumption that the cross-section of the pipe channel is an arch, with a rectangle at the bottom and a semicircle at the top before the collapse of the pipe roof, rather than a rectangular or circular cross-section.A shear stress-based erosion rate formula was utilized, and the arched pipe tunnel was assumed to enlarge along its length and width until the overlying soil could no longer maintain stability.Orifice flow and open channel flow were adopted to calculate the breach flow discharge for pressure and free surface flows, respectively.The collapse of the pipe roof was determined by comparing the weight of the overlying soil and the cohesion of the soil on the two sidewalls of the pipe.After the collapse, overtopping failure dominated, and the limit equilibrium method was adopted to estimate the stability of the breach slope when the water flow overtopped.In addition, incomplete and base erosion, as well as one-and two-sided breaches were taken into account.The USDAARS-HERU model test P1, with detailed measured data, was used as a case study, and two artificially filled earthen dam failure cases were studied to verify the model.Feedback analysis demonstrates that the proposed model can provide satisfactory results for modeling the breach flow discharge and breach development process.Sensitivity analysis shows that the soil erodibility and initial piping position significantly affect the prediction of the breach flow discharge.Furthermore, a comparison with a well-known numerical model shows that the proposed model performs better than the NWS BREACH model. 展开更多
关键词 Earthen DAM PIPING FAILURE OVERTOPPING FAILURE breach flow NUMERICAL modeling Sensitivity analysis
下载PDF
Dike Breach Risks of Different Flood Conditions in the Lower Yellow River 被引量:1
15
作者 Xia Fuqiang Wu Shaohong +2 位作者 Yang Qinye Kang Xiangwu Ma Xin 《Chinese Journal of Population,Resources and Environment》 2010年第1期18-27,共10页
Based on the analysis of hanging rivers' actuality in the lower Yellow River and researches related to the evaluation of dike breach risks,it is put forward that the influencing factors of dike beach risks in the ... Based on the analysis of hanging rivers' actuality in the lower Yellow River and researches related to the evaluation of dike breach risks,it is put forward that the influencing factors of dike beach risks in the lower Yellow River should involve four aspects,the flow and sediment movement,the regional crustal stability,the variation of river regime and the stability of river dikes.With this,the evaluation indexes system of dike breach risks is established,and with the support of geographic information systems technology,the model of multi-hierarchical fuzzy comprehensive judgment is applied to estimate the dike beach risks of the hanging rivers in the lower Yellow River under different flood conditions.The evaluation results of dike breach risks show the following distributing regularities of dike breach risks in the lower Yellow River:(1) Dike breach risks increase with the increase of the flood.(2) Dike breach risks decrease with the changes of river patterns along the channel.(3) There are great risks of dike breach in the wandering reaches,and it is relatively higher in the south bank than in the north in wandering reaches.(4) There is a higher dike breach risk in the north bank than in the south in winding reaches.Simultaneously,the evaluation results manifest that the evaluation indexes system established from the flow and sediment movement,the regional crustal stability,the variation of river regime and the stability of river dikes can represent the actual situation of the lower Yellow River more comprehensively.The application of multihierarchical fuzzy comprehensive judgment can preferably resolve the problem of hanging river dike breach,which has numerous influencing factors and complicated functionary mechanisms.The applications of geographic information systems technology with powerful spatial analysis functions make dike beach risks quantificationally displayed in different spatial positions,and reflect the differences of dike beach risks in different spatial positions of the channel in the lower Yellow River. 展开更多
关键词 the lower Yellow River influencing factors dike breach risk evaluation indexes system multi-hierarchical fuzzy comprehensive judgment
下载PDF
Dam Breach Analysis Using HEC-RAS and HEC-GeoRAS: The Case of Kesem Kebena Dam 被引量:1
16
作者 Abimael Leoul Nebiyou Kassahun 《Open Journal of Modern Hydrology》 2019年第4期113-142,共30页
Ethiopia has been booming with active construction of dams within the past few decades for different infrastructural needs, but has never experienced demolition or failure of dams in its history;hence little attention... Ethiopia has been booming with active construction of dams within the past few decades for different infrastructural needs, but has never experienced demolition or failure of dams in its history;hence little attention is being given to possible breach scenarios of dams and the resulting floodings. This paper makes analysis of the possible breach of kesem dam and the resulting flood inundation. In this study, the dam has been checked for both overtopping and piping failure modes using one dimensional river analysis model called HEC-RAS. Empirical equations were used to predict dam breach parameters of the two failure modes for use in this model. PMF inflow with a peak 9237.77 m3/s is used as an input to the reservoir to check if overtopping failure was possible. The spill way has proven to have adequate capacity for the flood due to the PMF. Therefore, breaching of the embankment was not possible. Piping failure was also simulated in HEC-RAS and the resulting breach due to piping failure, was analyzed and flood hydrograph was obtained at different cross sections along the river. These are flood hydrographs at 20 km, 40 km and 60 km at the downstream. The resulting flood plain was also mapped using HEC-GeoRas to show the extent of flooding. 展开更多
关键词 DAM breach ANALYSIS FLOOD MAPPING HEC-RAS HEC-GeoRAS
下载PDF
冰湖溃坝洪水对满拉水库影响分析及BREACH模型的应用 被引量:4
17
作者 张帜 刘明 《水道港口》 1994年第2期10-15,20,共7页
西藏“一江两河”开发工作中,年楚河满拉水利枢纽上游冰湖较多,本文采用遥感资料等手段,对流域内冰湖进行了普查,并根据以往冰湖溃决调查成果分析了冰湖溃决的可能性,认为白湖有溃决可能,采用率定后的美国天气局土坝缺口侵蚀模型(BREA ... 西藏“一江两河”开发工作中,年楚河满拉水利枢纽上游冰湖较多,本文采用遥感资料等手段,对流域内冰湖进行了普查,并根据以往冰湖溃决调查成果分析了冰湖溃决的可能性,认为白湖有溃决可能,采用率定后的美国天气局土坝缺口侵蚀模型(BREA CH)对白湖溃坝洪水进行估算,满足了设计需要。 展开更多
关键词 冰湖溃坝 洪水 满拉水库 影响 breach模型 冰川终碛湖 土坝缺口侵蚀模型 冰碛物 终碛垅
全文增补中
基于DL Breach模型的尾矿库溃坝影响数值分析 被引量:1
18
作者 宁伟 李瑜 +1 位作者 吴蒙蒙 杨超 《现代矿业》 CAS 2022年第10期234-238,243,共6页
尾矿库溃坝事故危险性大,尚缺乏有效的溃坝沙流预测机制。基于DL Breach模型,提出一种尾矿库溃坝沙流的计算方法,依据尾矿下泄沙流的性质,结合尾矿库溃坝的工程经验及规范,建立溃坝沙流运动模型,计算溃坝过程中的主要影响参数,分析下泄... 尾矿库溃坝事故危险性大,尚缺乏有效的溃坝沙流预测机制。基于DL Breach模型,提出一种尾矿库溃坝沙流的计算方法,依据尾矿下泄沙流的性质,结合尾矿库溃坝的工程经验及规范,建立溃坝沙流运动模型,计算溃坝过程中的主要影响参数,分析下泄沙流的淹没范围、淹没深度的演变规律。结果表明,溃坝下泄沙流的堆积深度总体上先增大后减小,下泄沙流在钻天道沟谷内淹没深度较大,淤积较多,最大堆积深度达2.48 m;随着与初期坝的距离逐渐变大,下游的3#桥处的最大淹没深度不超过1 m,整体安全风险可控。利用该模型进行尾矿库溃坝数值模拟,可以预测尾矿坝溃决可能引起的灾害,对尾矿库的安全运行具有指导意义。 展开更多
关键词 尾矿库溃坝 DL breach模型 泄砂流量 淹没范围 淹没深度
下载PDF
基于BREACH模型的某水库土坝溃坝分析研究 被引量:3
19
作者 刘凤茹 赵昱豪 詹达美 《人民珠江》 2021年第5期86-92,共7页
雨洪频发易使土坝溃决,可能带来严重失事后果,因此有必要开展坝溃及其影响分析。基于BREACH模型,对某水库土坝进行溃坝分析研究。结果表明,在管涌溃坝模式下,随着洪水量级的增大,最大溃决流量、最终溃口宽度和累计下泄流量增大;在相同... 雨洪频发易使土坝溃决,可能带来严重失事后果,因此有必要开展坝溃及其影响分析。基于BREACH模型,对某水库土坝进行溃坝分析研究。结果表明,在管涌溃坝模式下,随着洪水量级的增大,最大溃决流量、最终溃口宽度和累计下泄流量增大;在相同洪水量级条件下,漫顶溃坝的最大溃决流量和最终溃口平均宽度均较大,相对危险性更大;在给定方案中,地震突发情况相对于其他方案较为安全。最后,累计下泄流量与初始库容及入库洪量之和相等,验证了模型计算的合理性。 展开更多
关键词 breach模型 逐步溃决 土坝 管涌溃坝 漫顶溃坝
下载PDF
土坝失事洪水演算模型—BREACH模型 被引量:3
20
作者 Fread,DL 刘晓伟 《水文科技情报》 1991年第4期48-50,共3页
关键词 土坝 洪水 计算 breach模型
下载PDF
上一页 1 2 92 下一页 到第
使用帮助 返回顶部