期刊文献+
共找到73篇文章
< 1 2 4 >
每页显示 20 50 100
Modeling of breaching parameters for debris flow dams
1
作者 RUAN He-chun CHEN Hua-yong +8 位作者 CHEN Xiao-qing ZHAO Wan-yu CHEN Jian-gang WANG Tao JIANG Yao Wang Xi-an Li Xiang-ning LI Xiao YU Yun-han 《Journal of Mountain Science》 SCIE CSCD 2023年第10期2835-2851,共17页
The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal comp... The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal compositions.The basic breaching parameters such as flood peak discharge are vital indicators of risk assessment.In this study,we elucidated the failure process of the debris flow dam through the flume experiment,and built the calculation equation of the breaching parameters by selecting critical factors.The result shows that the overtopping failure process of the debris flow dam is capable of forming significantly retrogressive scarps,and the failure process experiences three stages,the formation of the retrogressive scarp,the erosion of the retrogressive scarp,and the decline of the retrogressive scarp.Five factors used for establishing the calculation equations for peak discharge(Qp),final width(Wb)of the breach,and duration(T)of the debris flow dam failure are dam height(h),reservoir capacity(V),the fine grain content(P0.075)of the soil,the nonuniformity coefficient(Cu)of the soil,and the upper limit grain size(D90)of the soil,respectively.In the three equations,the correlation coefficients between Qp,Wb,T and the five factors were 0.86,0.70,0.63,respectively.The equations still need to be modified and verified in actual cases. 展开更多
关键词 Debris flow dams Overtopping failure breaching g parameters Peak discharge Flume experiment
下载PDF
Empirical Research on Farmer's Breaching Behavior in Order Contract
2
作者 Guifang CHAO Mojing CHEN Xinxin DING 《Asian Agricultural Research》 2016年第12期43-47,共5页
In " leading enterprise + farmer" cooperation model,farmer's behavior of breaching contract exists generally. In this paper,from the angle of incomplete contract,the influencial factors of farmer breakin... In " leading enterprise + farmer" cooperation model,farmer's behavior of breaching contract exists generally. In this paper,from the angle of incomplete contract,the influencial factors of farmer breaking contract are analyzed. It is found that farmer sex,age,culture degree and farming period have obvious effects on the behavior of breaching contract. Under regulating effect of relationship quality,farmer assest specificity,exogenous uncertainty and endogenous uncertainty affect farmer's breaking behavior. That is,the higher the farmer assest specificity,the lower the farmer breaching tendency; higher exogenous uncertainty causes that farmer is easy to generate breaching behavior; higher endogenous uncertainty causes that farmer is also easy to take breaching behavior. 展开更多
关键词 Farmer breaching Relationship quality Assest specificity UNCERTAINTY
下载PDF
Experimental investigation on breaching of embankments 被引量:17
3
作者 ZHU YongHui VISSER P J +1 位作者 VRIJLING J K WANG GuangQian 《Science China(Technological Sciences)》 SCIE EI CAS 2011年第1期148-155,共8页
Breaching of embankments has recently drawn more and more attention due to its importance in the development of early warning systems for embankment failures,in the evacuation plans of people at risk,in the design met... Breaching of embankments has recently drawn more and more attention due to its importance in the development of early warning systems for embankment failures,in the evacuation plans of people at risk,in the design method of embankments based on a risk-approach,etc. The erosion process observed during embankment breaching tests in the laboratory and the analysis of the results are described in this paper. Five embankments,one constructed with pure sand,four with different sand-silt-clay mixtures were tested. The height of the embankments was 75 cm and the width at the crest was 60 cm. Examination of the data from these tests indicated that headcut erosion played an important role in the process of breach growth in the embankments made of cohesive soil mixtures. Flow shear erosion,fluidization of the headcut slope surface,undermining of the headcut due to impinging jet scour and discrete soil mechanical slope mass failure from the headcut were all observed during these tests. For the embankment constructed with pure sand,the breach erosion process was dominated by shear erosion,which led to a gradual and relatively uniform retreat of the downstream slope. The cohesive proportion in the sand-silt-clay mixtures strongly slowed down the erosion process. 展开更多
关键词 EMBANKMENTS breaching EXPERIMENTS headcut EROSION
原文传递
Numerical three-dimensional modeling of earthen dam piping failure
4
作者 Zhengang Wang 《Water Science and Engineering》 EI CAS CSCD 2024年第1期72-82,共11页
A physically-based numerical three-dimensional earthen dam piping failure model is developed for homogeneous and zoned soil dams.This model is an erosion model,coupled with force/moment equilibrium analyses.Orifice fl... A physically-based numerical three-dimensional earthen dam piping failure model is developed for homogeneous and zoned soil dams.This model is an erosion model,coupled with force/moment equilibrium analyses.Orifice flow and two-dimensional(2D)shallow water equations(SWE)are solved to simulate dam break flows at different breaching stages.Erosion rates of different soils with different construction compaction efforts are calculated using corresponding erosion formulae.The dam's real shape,soil properties,and surrounding area are programmed.Large outer 2D-SWE grids are used to control upstream and downstream hydraulic conditions and control the boundary conditions of orifice flow,and inner 2D-SWE flow is used to scour soil and perform force/moment equilibrium analyses.This model is validated using the European Commission IMPACT(Investigation of Extreme Flood Processes and Uncertainty)Test#5 in Norway,Teton Dam failure in Idaho,USA,and Quail Creek Dike failure in Utah,USA.All calculated peak outflows are within 10%errors of observed values.Simulation results show that,for a V-shaped dam like Teton Dam,a piping breach location at the abutment tends to result in a smaller peak breach outflow than the piping breach location at the dam's center;and if Teton Dam had broken from its center for internal erosion,a peak outflow of 117851 m'/s,which is 81%larger than the peak outflow of 65120 m3/s released from its right abutment,would have been released from Teton Dam.A lower piping inlet elevation tends to cause a faster/earlier piping breach than a higher piping inlet elevation. 展开更多
关键词 3D dam breach model 2D shallow water equations 3D slope stability analysis Piping failure Teton Dam Quail Creek Dike
下载PDF
A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality
5
作者 Anna Sheri George Jomin George Judy Jenkins 《E-Health Telecommunication Systems and Networks》 2024年第3期23-44,共22页
Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selec... Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selecting eighty-eight articles published over the past fifteen years. The study assessed data gathering and storage practices, regulatory adherence, legal structures, consent procedures, user education, and strategies to mitigate risks. Results: The findings reveal significant advancements in technologies designed to safeguard privacy and facilitate the widespread use of mHealth apps. However, persistent ethical issues related to privacy remain largely unchanged despite these technological strides. 展开更多
关键词 Mobile Devices Patient Privacy Confidentiality Breaches Data Security Data Protection Regulatory Compliance User Consent Data Encryption Third-Party Integration User Awareness
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
6
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information Security Cloud Infrastructure Offerings Cloud Migration Security Measures Data Breaches Cloud Service Providers CYBERSECURITY Cloud Security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud Security Tools
下载PDF
A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework
7
作者 Binita Saha Zahid Anwar 《Journal of Information Security》 2024年第1期24-39,共16页
Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, ... Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, however, entrepreneurs are often unprepared for cybersecurity needs—and the policymakers, industry, and nonprofit groups that support them also face technological and knowledge constraints in keeping up with their needs. To improve the ability of entrepreneurship research to understand, identify, and ultimately help address cybersecurity challenges, we conduct a literature review on the state of cybersecurity. The research highlights the necessity for additional investigation to aid small businesses in securing their confidential data and client information from cyber threats, thereby preventing the potential shutdown of the business. 展开更多
关键词 ENTREPRENEURSHIP CYBERSECURITY Small and Medium Businesses Data Breach HACKING Security
下载PDF
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
8
作者 Dominik Molitor Aditya Saharia +1 位作者 Viju Raghupathi Wullianallur Raghupathi 《Journal of Information Security》 2024年第2期168-195,共28页
Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This... Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents. 展开更多
关键词 Cyber Security Information Security Data Breaches Descriptive Analytics PRIVACY Visualization Visual Analytics
下载PDF
MIKE软件技术在水库溃坝洪水数值模拟中的应用研究
9
作者 管静 《水利科技与经济》 2024年第2期109-114,共6页
当前,水库大坝受到超频率的洪水以及强震破坏,而容易导致溃决风险。针对水库大坝溃决相关问题,融合BREACH和MIKE21构建耦合模型,并用于溃坝洪水数值模拟试验。结果表明,7种方案最大下泄流量为方案1的18.39×10^(4) m^(3)/s;方案1洪... 当前,水库大坝受到超频率的洪水以及强震破坏,而容易导致溃决风险。针对水库大坝溃决相关问题,融合BREACH和MIKE21构建耦合模型,并用于溃坝洪水数值模拟试验。结果表明,7种方案最大下泄流量为方案1的18.39×10^(4) m^(3)/s;方案1洪峰向地点C汇入点的洪水最大流量比邢台坝址下降约44%。方案1的溃坝洪水水位始终最高,A地最高为306m。综合来看,耦合模型在水库溃坝洪水数值模拟中具备有效性,在实际的水库防洪避险中具备实用性。 展开更多
关键词 MIKE21 溃坝洪水 BREACH模型 溃口流量
下载PDF
Cyberattack Ramifications, The Hidden Cost of a Security Breach
10
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity Breaches Data Breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
United States Healthcare Data Breaches: Insights for NIST SP 800-66 Revision 2 from a Review of the NIST SP 800-66 Revision 1
11
作者 Mohammed Mohammed Raoof 《Journal of Information Security》 2024年第2期232-244,共13页
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati... Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches. 展开更多
关键词 SP 800-66 Revision 1 SP 800-66 Revision 2 HIPAA Compliance Security Breaches Risk Management Framework (RMF) Internet of Things (IoT) Artificial Intelligence (AI)
下载PDF
Overtopping breaching of cohesive homogeneous earth dam with different cohesive strength 被引量:35
12
作者 ZHANG JianYun LI Yun +2 位作者 XUAN GuoXiang WANG XiaoGang LI Jun 《Science China(Technological Sciences)》 SCIE EI CAS 2009年第10期3024-3029,共6页
In consideration of the range of clay content of Chinese earth dams, the world's highest prototype tests have been made to research on the effects of cohesive strength of filling of cohesive homogeneous earth dam ... In consideration of the range of clay content of Chinese earth dams, the world's highest prototype tests have been made to research on the effects of cohesive strength of filling of cohesive homogeneous earth dam on breach formation. Three breach mechanisms were presented, they were the source-tracing erosion of dam body with the form of "multilevel headcut", "two-helix flow" erosion of dam crest and collapse of breach sidewalls due to instability. It can be concluded that the cohesive strength of filling of earth dam has great effect on breach formation. When the cohesive strength is bigger, the breach process becomes slower, and the peak outflow and the final width and depth of breach become smaller. The main character of the breach formation is head cutting and dumping collapse. When the cohesive strength is smaller, the breach process becomes faster, and the peak outflow, the final width and depth of breach become bigger. The main character of the breach formation is single level head cutting and shearing collapse. 展开更多
关键词 EARTH DAM breach mechanism headcut two-helix FLOW
原文传递
The role of time preferences in contract breach:Evidence from Chinese poultry farmers participating in contract farming 被引量:1
13
作者 HOU Jing ZHOU Li +1 位作者 Jennifer IFFT YING Rui-yao 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2023年第2期623-641,共19页
Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from... Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from the perspective of time preferences.The empirical analysis is based on a household survey and economic field experiments of poultry households participating in contract farming conducted in Jiangsu Province,China.A discounted utility model and a maximum likelihood technique are applied to estimate farmers’time preferences and the effect of time preferences on contract breach in the production and sales phases are explored with a bivariate probit model.The results show that,on average,the poultry farmers in the sample are generally present biased and impatient regarding future utility.The regression results show that farmers with a higher preference for the present and a higher discount rate are more likely to breach contracts,and time preferences play a greater role in the production phase than in the sales phase.When considering heterogeneity,specific investments and transaction costs promote contract stability only for farmers with a low degree of impatience.Moreover,compared with large-scale farmers,small-scale farmers’contract breach decisions are more significantly affected by their time preferences.These results have implications for contract stability policies and other issues that are impacted by the linking of behavioral preferences to agricultural decisions. 展开更多
关键词 time preferences contract breach contract farming economic field experiments China
下载PDF
Considerations for Restriction on the Right of Rescission in Case of Obviously Minor Breaches
14
作者 Xu Wei Chen Haoran 《Contemporary Social Sciences》 2023年第3期85-98,共14页
Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract... Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract law.The Minutes of the Ninth Work Conference of the Courts Nationwide on Civil and Commercial Trial(the Minutes of the Ninth Work Conference)stipulates that whether a contract shall be rescinded depends on whether a breach is obviously minor and affects the fulfillment of the contract purposes expected by the non-breaching party.In juridical practice,however,there are no clear criteria to define what constitutes obviously minor breaches,and the factors considered in such cases are often inadequate to allow for a fully considered decision.By analyzing Article 55 of the Judicial Interpretation of the General Provisions of Contracts of the Civil Code of the People’s Republic of China(Draft for Comments)and reviewing the previous juridical practices,we present our conclusions regarding the conditions and factors that should be considered when restricting the right of rescission in cases of obviously minor breaches with a view to unifying the judicial judgment criteria by differentiating the type of breaches. 展开更多
关键词 obviously minor breaches right of rescission considerations
下载PDF
Cybersecurity and Artificial Intelligence Dispute Resolution: From Contention to Synergy
15
作者 Paul J.Morrow 《International Relations and Diplomacy》 2023年第5期195-203,共9页
This paper explores the dimensions of resolving disputes in cybersecurity and uses the Federal Arbitration Statute and the Courts to bind the parties to their contracts.The paper explores artificial intelligence and t... This paper explores the dimensions of resolving disputes in cybersecurity and uses the Federal Arbitration Statute and the Courts to bind the parties to their contracts.The paper explores artificial intelligence and the nuances of legal issues that potentially could arise and applies dispute resolution modalities to help businesses become more productive as opposed to being mired down in litigation,creating an efficient path forward.Reading this paper is worth your time because:(1)you will learn how to use the court system to achieve good results in cybersecurity and artificial intelligence disputes applying the Federal Arbitration Statute;(2)you will become more efficient many times over;(3)with so many disputes and so little time,and inflation having increased the cost of doing business,we can ill afford to waste money.Finding solutions that have the full authority of the courts,without going through litigation,is essential to profitability.The need is great to stop fighting and start mending.The method prescribed in this paper solves problems with the support of a court judgment without the entanglement and the expense of litigation. 展开更多
关键词 CYBERSECURITY data breaches corporate policy social media cyber management
下载PDF
Identification of the Breach of Short-Term Rental Regulations in Irish Rent Pressure Zones
16
作者 Guowen Liu Inmaculada Arnedillo-Sánchez Zhenshuo Chen 《Journal of Computer and Communications》 2023年第2期8-19,共12页
The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regul... The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regulating rentals in Rent Pressure Zones with the highest and rising rents is becoming a tricky issue. In this paper, we develop a breach identifier to check short-term rentals located in Rent Pressure Zones with potential breaches only using publicly available data from Airbnb (an online marketplace focused on short-term home-stays) and Irish government websites. First, we use a Residual Neural Network to filter out outdoor landscape photos that negatively impact identifying whether an owner has multiple rentals in a Rent Pressure Zone. Second, a Siamese Neural Network is used to compare the similarity of indoor photos to determine if multiple rental posts correspond to the same residence. Next, we use the Haversine algorithm to locate short-term rentals within a circle centered on the coordinate of a permit. Short-term rentals with a permit will not be restricted. Finally, we improve the occupancy estimation model combined with sentiment analysis, which may provide higher accuracy. 展开更多
关键词 Housing Crisis Short-Term Rental Irish Rent Pressure Zone Image Recognition Breach Identification
下载PDF
Understanding the Importance of Effective Third-Party Risk Management on Data Governance
17
作者 Marios E.Menexiadis Michail Ch.Xanthopoulos 《Management Studies》 2023年第6期307-311,共5页
With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaboratio... With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaborations offer numerous benefits,they also introduce a range of risks that organizations must carefully mitigate.If the obligation to meet the regulatory requirements is added to the equation,mitigating the third-party risk related to data governance,becomes one of the biggest challenges. 展开更多
关键词 third-party risk data governance data breach internal control system risk mitigation
下载PDF
Modeling Cyber Loss Severity Using a Spliced Regression Distribution with Mixture Components
18
作者 Meng Sun 《Open Journal of Statistics》 2023年第4期425-452,共28页
Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the... Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the whole range of the losses using a standard loss distribution. We tackle this modeling problem by proposing a three-component spliced regression model that can simultaneously model zeros, moderate and large losses and consider heterogeneous effects in mixture components. To apply our proposed model to Privacy Right Clearinghouse (PRC) data breach chronology, we segment geographical groups using unsupervised cluster analysis, and utilize a covariate-dependent probability to model zero losses, finite mixture distributions for moderate body and an extreme value distribution for large losses capturing the heavy-tailed nature of the loss data. Parameters and coefficients are estimated using the Expectation-Maximization (EM) algorithm. Combining with our frequency model (generalized linear mixed model) for data breaches, aggregate loss distributions are investigated and applications on cyber insurance pricing and risk management are discussed. 展开更多
关键词 Cyber Risk Data Breach Spliced Regression Model Finite Mixture Distribu-tion Cluster Analysis Expectation-Maximization Algorithm Extreme Value Theory
下载PDF
两种溃坝模型在唐家山堰塞湖溃决模拟中的对比 被引量:19
19
作者 李相南 陈祖煜 《水利水电科技进展》 CSCD 北大核心 2017年第2期20-26,共7页
基于唐家山堰塞坝溃决的实测数据,使用BREACH模型及中国水科院DB-IWHR模型,对唐家山堰塞坝溃决过程进行了反演分析,并对两种模型进行参数敏感性分析。研究结果表明:使用针对唐家山的参数,两种模型均可较好地反演唐家山溃决洪水的过程,BR... 基于唐家山堰塞坝溃决的实测数据,使用BREACH模型及中国水科院DB-IWHR模型,对唐家山堰塞坝溃决过程进行了反演分析,并对两种模型进行参数敏感性分析。研究结果表明:使用针对唐家山的参数,两种模型均可较好地反演唐家山溃决洪水的过程,BREACH模型的下游坡比和孔隙率是对结果影响比较敏感的输入参数;DB-IWHR模型在冲刷参数和下游水深计算两方面做了改善,较好地解决了这一问题;DB-IWHR提供了一个Excel格式的计算软件,数值分析稳定性好,使用简洁客观,可供类似堰塞湖应急处置时参考。 展开更多
关键词 堰塞湖 BREACH模型 DB-IWHR模型 溃坝洪水分析 唐家山
下载PDF
基于NWS BREACH的唐家山堰塞坝泄流过程模拟 被引量:1
20
作者 刘若星 钟启明 霍家平 《人民长江》 北大核心 2016年第3期88-92,共5页
NWS BREACH模型是目前国内外模拟土石坝或堰塞坝漫顶及管涌破坏最常用的数学模型。基于唐家山堰塞坝的实测资料,建立了唐家山堰塞坝漫顶泄流过程数学模型,并通过现场监测得到的流量过程和库水位变化资料验证了所建立模型的合理性。对模... NWS BREACH模型是目前国内外模拟土石坝或堰塞坝漫顶及管涌破坏最常用的数学模型。基于唐家山堰塞坝的实测资料,建立了唐家山堰塞坝漫顶泄流过程数学模型,并通过现场监测得到的流量过程和库水位变化资料验证了所建立模型的合理性。对模型中的重要参数进行了敏感性分析,研究了坝料平均粒径、冲蚀率、下游坝坡坡比3个参数对模型计算结果的影响,表明坝料冲蚀率和下游坝坡坡比对泄流过程影响显著。研究成果对堰塞坝除险和洪水风险评估具有指导意义。 展开更多
关键词 NWS BREACH模型 唐家山堰塞坝 泄流模拟 敏感性分析
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部