Based on model tests of earthen dam breach due to piping failure, a numerical model was developed.A key difference from previous research is the assumption that the cross-section of the pipe channel is an arch, with a...Based on model tests of earthen dam breach due to piping failure, a numerical model was developed.A key difference from previous research is the assumption that the cross-section of the pipe channel is an arch, with a rectangle at the bottom and a semicircle at the top before the collapse of the pipe roof, rather than a rectangular or circular cross-section.A shear stress-based erosion rate formula was utilized, and the arched pipe tunnel was assumed to enlarge along its length and width until the overlying soil could no longer maintain stability.Orifice flow and open channel flow were adopted to calculate the breach flow discharge for pressure and free surface flows, respectively.The collapse of the pipe roof was determined by comparing the weight of the overlying soil and the cohesion of the soil on the two sidewalls of the pipe.After the collapse, overtopping failure dominated, and the limit equilibrium method was adopted to estimate the stability of the breach slope when the water flow overtopped.In addition, incomplete and base erosion, as well as one-and two-sided breaches were taken into account.The USDAARS-HERU model test P1, with detailed measured data, was used as a case study, and two artificially filled earthen dam failure cases were studied to verify the model.Feedback analysis demonstrates that the proposed model can provide satisfactory results for modeling the breach flow discharge and breach development process.Sensitivity analysis shows that the soil erodibility and initial piping position significantly affect the prediction of the breach flow discharge.Furthermore, a comparison with a well-known numerical model shows that the proposed model performs better than the NWS BREACH model.展开更多
Ethiopia has been booming with active construction of dams within the past few decades for different infrastructural needs, but has never experienced demolition or failure of dams in its history;hence little attention...Ethiopia has been booming with active construction of dams within the past few decades for different infrastructural needs, but has never experienced demolition or failure of dams in its history;hence little attention is being given to possible breach scenarios of dams and the resulting floodings. This paper makes analysis of the possible breach of kesem dam and the resulting flood inundation. In this study, the dam has been checked for both overtopping and piping failure modes using one dimensional river analysis model called HEC-RAS. Empirical equations were used to predict dam breach parameters of the two failure modes for use in this model. PMF inflow with a peak 9237.77 m3/s is used as an input to the reservoir to check if overtopping failure was possible. The spill way has proven to have adequate capacity for the flood due to the PMF. Therefore, breaching of the embankment was not possible. Piping failure was also simulated in HEC-RAS and the resulting breach due to piping failure, was analyzed and flood hydrograph was obtained at different cross sections along the river. These are flood hydrographs at 20 km, 40 km and 60 km at the downstream. The resulting flood plain was also mapped using HEC-GeoRas to show the extent of flooding.展开更多
Based on the large-scale model tests, a simplified dam breach model for homogeneous cohesive dam due to overtopping failure is put forward. The model considers headcut erosion as one of the key homogeneous cohesive da...Based on the large-scale model tests, a simplified dam breach model for homogeneous cohesive dam due to overtopping failure is put forward. The model considers headcut erosion as one of the key homogeneous cohesive dam breaching mechanisms and we calculate the time-averaged headcut migration rate using an energy-based empirical formula. A numerical method is adopted to determine the initial scour position at the downstream slope in terms of the water head and dam height, and the broad-crested weir equation is utilized to simulate the breach flow. The limit equilibrium method is used to analyze the stability of breach slope during the breach process. An iterative method is developed to simulate the coupling process of soil and water at each time step. The calculated results of three dam breach cases testify the reasonability of the model, and the sensitivity studies of soil erodibility show that sensitivity is dependent on each test case's soil conditions. In addition, three typical dam breach models, NWS BREACH, WinDAM B, and HR BREACH, are also chosen to compare with the proposed model. It is found that NWS BREACH may have large errors for cohesive dams, since it uses a noncohesive sediment transport model and does notconsider headcut erosion, WinDAM B and HR BREACH consider headcut erosion as the breaching mechanism and handle well homogeneous cohesive dam overtopping failure, but overall, the proposed model has the best performance.展开更多
The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal comp...The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal compositions.The basic breaching parameters such as flood peak discharge are vital indicators of risk assessment.In this study,we elucidated the failure process of the debris flow dam through the flume experiment,and built the calculation equation of the breaching parameters by selecting critical factors.The result shows that the overtopping failure process of the debris flow dam is capable of forming significantly retrogressive scarps,and the failure process experiences three stages,the formation of the retrogressive scarp,the erosion of the retrogressive scarp,and the decline of the retrogressive scarp.Five factors used for establishing the calculation equations for peak discharge(Qp),final width(Wb)of the breach,and duration(T)of the debris flow dam failure are dam height(h),reservoir capacity(V),the fine grain content(P0.075)of the soil,the nonuniformity coefficient(Cu)of the soil,and the upper limit grain size(D90)of the soil,respectively.In the three equations,the correlation coefficients between Qp,Wb,T and the five factors were 0.86,0.70,0.63,respectively.The equations still need to be modified and verified in actual cases.展开更多
Overtopping is one of the main reasons for the breaching of concrete-face sand-gravel dams(CFSGDs).In this study,a refined mathematical model was established based on the characteristics of the overtopping breaching o...Overtopping is one of the main reasons for the breaching of concrete-face sand-gravel dams(CFSGDs).In this study,a refined mathematical model was established based on the characteristics of the overtopping breaching of CFSGDs.The model characteristics were as follows:(1)Based on the Renormailzation Group(RNG)k-εturbulence theory and volume of fluid(VOF)method,the turbulent characteristics of the dam-break flow were simulated,and the erosion surface of the water and soil was tracked;(2)In consideration of the influence of the change in the sediment content on the dam-break flow,the dam material transport equation,which could reflect the characteristics of particle settlement and entrainment motion,was used to simulate the erosion process of the sand gravels;(3)Based on the bending moment balance method,a failure equation of the concrete face slab under dead weight and water load was established.The proposed model was verified through a case study on the failure of the Gouhou CFSGD.The results showed that the proposed model could well simulate the erosion mode of the special vortex flow of the CFSGD scouring the support body of the concrete face slab inward and reflect the mutual coupling relationship between the dam-break flow,sand gravels,and concrete face slabs.Compared with the measured values,the relative errors of the peak discharge,final breach average width,dam breaching duration,and maximum failure length of the face slab calculated using the proposed model were all less than 12%,thus verifying the rationality of the model.The proposed model was demonstrated to perform better and provide more detailed results than three selected parametric models and three simplified mathematical models.The study results can aid in establishing the risk level and devising early warning strategies for CFSGDs.展开更多
Granular debris plays a significant role in determining damming deposit characteristics. An indepth understanding of how variations in grain size distribution(GSD) and geometric configurations impact the behavior of g...Granular debris plays a significant role in determining damming deposit characteristics. An indepth understanding of how variations in grain size distribution(GSD) and geometric configurations impact the behavior of granular debris during the occurrence of granular debris is essential for precise assessment and effective mitigation of landslide hazards in mountainous terrains. This research aims to investigate the impact of GSD and geometric configurations on sliding and damming properties through laboratory experiments. The geometric configurations were categorized into three categories based on the spatial distribution of maximum volume: located at the front(Type Ⅰ), middle(Type Ⅱ), and rear(Type Ⅲ) of the granular debris. Our experimental findings highlight that the sliding and damming processes primarily depend on the interaction among the geometric configuration, grain size, and GSD in granular debris. Different sliding and damming mechanisms across various geometric configurations induce variability in motion parameters and deposition patterns. For Type Ⅰ configurations, the front debris functions as the critical and primary driving component, with energy dissipation primarily occurring through inter-grain interactions. In contrast, Type Ⅱ configurations feature the middle debris as the dominant driving component, experiencing hindrance from the front debris and propulsion from the rear, leading to complex alterations in sliding motion. Here, energy dissipation arises from a combination of inter-grain and grain-substrate interactions. Lastly, in Type Ⅲ configurations, both the middle and rear debris serve as the main driving components, with the rear sliding debris impeded by the front. In this case, energy dissipation predominantly results from grainsubstrate interaction. Moreover, we have quantitatively demonstrated that the inverse grading in damming deposits, where coarse grain moves upward and fine grain moves downward, is primarily caused by grain sorting due to collisions among the grains and between the grain and the base. The impact of grain on the horizontal channel further aids grain sorting and contributes to inverse grading. The proposed classification of three geometric configurations in our study enhances the understanding of damming properties from the view of mechanism, which provides valuable insights for related study about damming granular debris.展开更多
阐述数字幅度调制(Digital Amplitude Modulation,DAM)中波发射机模数(Analog to Digital,A/D)转换原理、A/D转换板主要组成部分及其作用,列举A/D转换板在实际运行中出现的常见故障案例,对常见故障给出分析和处理方法,为今后该板的故障...阐述数字幅度调制(Digital Amplitude Modulation,DAM)中波发射机模数(Analog to Digital,A/D)转换原理、A/D转换板主要组成部分及其作用,列举A/D转换板在实际运行中出现的常见故障案例,对常见故障给出分析和处理方法,为今后该板的故障分析和处理工作提供参考。展开更多
Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This...Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.展开更多
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati...Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.展开更多
This paper documents the emergency response to the breaches of the Baige Barrier Lake. The lake was successively formed by landslides that occurred on October 10 and November 3, 2018 at the provincial border between S...This paper documents the emergency response to the breaches of the Baige Barrier Lake. The lake was successively formed by landslides that occurred on October 10 and November 3, 2018 at the provincial border between Sichuan and Tibet in China. The barrier lake created by the "10.10" landslide breached on October 12 and triggered a flood with a peak discharge around 10000 m^3/s. The residual landslide barrier was enhanced by a second landslide on November 3, resulting in a higher barrier with larger flood potential. An overflow channel was excavated in the crest of the barrier to prompt the breach to be triggered at a lower water level. The second breach happened on November 12 with a measured peak discharge of 31000 m^3/s. Nearly 75000 people were evacuated before the two breaches. In order to prevent the downstream dams from possible over-topping, nearly 3.27×10~8 m^3 of the stored volume was released from the Liyuan reservoir 688 km downstream of Baige Barrier Lake. This paper presents the measured hydrographs and the back-analysis results for the "11.03" barrier lake. It is shown that the modern models of dam breach hydraulics can reasonably reproduce the barrier breach hydrographs;however, further studies are needed to define the key parameters which highly influence the calculated results. Knowledge acquired during the emergency response to the case can be shared with experts working on breaches of embankment dams and can be referenced to promote both the theory study and the engineering practice to mitigate the potential risks caused by this type of catastrophic events.展开更多
The main objective of the present study is to introduce new empirical equations for the determination of breach geometrical dimensions and peak outflow discharge(Q_(p)).Therefore,a historic failure database of 109 emb...The main objective of the present study is to introduce new empirical equations for the determination of breach geometrical dimensions and peak outflow discharge(Q_(p)).Therefore,a historic failure database of 109 embankments was collected and examined.The most important factors that affect the breach evolution,including grading size,hydraulic,and outflow characteristics are also studied.Some of the parameters used for the determination of Q_(p) and average breach width(Bave)have a significant effect on the erosion process,but they are less reflected in the technical literature.To study the behavior of noncohesive soils during overtopping,15 physical tests were performed at the laboratory,and the effects of interfering parameters were investigated.The experimental output hydrograph was used to simulate the hydrographs resulting from the failure of real dams,and recent artificial intelligence techniques along with linear and nonlinear regression models were employed.The area-time analysis of the laboratory hydrographs shows that the soil particle size and the characteristics of reservoir-basin significantly affect the rate of breach formation and outflow discharge.New relationships are introduced,based on the breach characteristics,by a combination of historical and experimental data,as well as case studies conducted on the hypothetical failure of 10 operational dams.The mathematical model is also used to simulate the process of breach evaluation.Based on statistical indices,comparison of the results,and sensitivity analysis,the developed equations can better express the susceptibility of materials to erosion and their application can minimize downstream vulnerabilities.展开更多
The Tangjiashan Quake Lake is the largest quake lake triggered by the 5.12 Wenchuan Earthquake that happened on May 12,2008 in China,posing high risk of catastrophic flash flood hazards to downstream human life and pr...The Tangjiashan Quake Lake is the largest quake lake triggered by the 5.12 Wenchuan Earthquake that happened on May 12,2008 in China,posing high risk of catastrophic flash flood hazards to downstream human life and properties.A physics-based numerical simulation approach is proposed for real-time prediction of dam breach development of the Tangjiashan Quake Lake in the case of emergency treatment.Bed erosion and lateral development of the dam breach are represented through accounting for the underlying physics including selective sediment transport and gravitational collapse.Conceptualized breach erosion model that involves few parameters enables quick calibration based on the monitored hydrological data in emergency analysis where fully geotechnical information about the barrier dam is not available.The process of dam breach development is found to be nonlinear in cascades due to the combined effects of headcutting and bank collapse.The agreement between the simulation results and the observed data shows the applicability of the present approach for emergency analysis of quake lakes.Limitations will arise in the situation where the soil composition of barrier dam is significantly inhomogeneous.Incorporation of circular arc failure for cohesive soil and lateral seepage in bank slope will also enhance its applicability to complex situations.展开更多
In the context of an impending dam failure, quick evaluation of dam breach flood is necessary. Previous studies provided an approach to calculate the dam breach hydrograph using an Excel spreadsheet based on the impro...In the context of an impending dam failure, quick evaluation of dam breach flood is necessary. Previous studies provided an approach to calculate the dam breach hydrograph using an Excel spreadsheet based on the improved soil erosion model and numerical algorithm. However, calculation of the breach lateral enlargement requires the modeling of the successive collapse of the breach banks. It is time-consuming with special training, which is difficult to provide during an emergency. This study proposes that the lateral enlargement process can be modeled using a hyperbolic relationship with sufficient accuracy. Consequently, field engineers can perform the dam breach analysis along with the sensitive study for a target case within 1 h in an Excel spreadsheet which is self-tutorial. This paper presents this easy and quick approach based on only fifteen input parameters that can be determined based on the experience. This approach can also be used for the preliminary study when a dam safety planning work is undertaken.展开更多
基金supported by the National Key Research and Development Program of China(Grant No.2017YFC0404805)the National Natural Science Foundation of China(Grants No.51779153 and 51539006)+1 种基金the Central Public-interest Scientific Institution Basal Research Fund(Grant No.Y717012)the Natural Science Foundation of Jiangsu Province(Grant No.BK20161121)
文摘Based on model tests of earthen dam breach due to piping failure, a numerical model was developed.A key difference from previous research is the assumption that the cross-section of the pipe channel is an arch, with a rectangle at the bottom and a semicircle at the top before the collapse of the pipe roof, rather than a rectangular or circular cross-section.A shear stress-based erosion rate formula was utilized, and the arched pipe tunnel was assumed to enlarge along its length and width until the overlying soil could no longer maintain stability.Orifice flow and open channel flow were adopted to calculate the breach flow discharge for pressure and free surface flows, respectively.The collapse of the pipe roof was determined by comparing the weight of the overlying soil and the cohesion of the soil on the two sidewalls of the pipe.After the collapse, overtopping failure dominated, and the limit equilibrium method was adopted to estimate the stability of the breach slope when the water flow overtopped.In addition, incomplete and base erosion, as well as one-and two-sided breaches were taken into account.The USDAARS-HERU model test P1, with detailed measured data, was used as a case study, and two artificially filled earthen dam failure cases were studied to verify the model.Feedback analysis demonstrates that the proposed model can provide satisfactory results for modeling the breach flow discharge and breach development process.Sensitivity analysis shows that the soil erodibility and initial piping position significantly affect the prediction of the breach flow discharge.Furthermore, a comparison with a well-known numerical model shows that the proposed model performs better than the NWS BREACH model.
文摘Ethiopia has been booming with active construction of dams within the past few decades for different infrastructural needs, but has never experienced demolition or failure of dams in its history;hence little attention is being given to possible breach scenarios of dams and the resulting floodings. This paper makes analysis of the possible breach of kesem dam and the resulting flood inundation. In this study, the dam has been checked for both overtopping and piping failure modes using one dimensional river analysis model called HEC-RAS. Empirical equations were used to predict dam breach parameters of the two failure modes for use in this model. PMF inflow with a peak 9237.77 m3/s is used as an input to the reservoir to check if overtopping failure was possible. The spill way has proven to have adequate capacity for the flood due to the PMF. Therefore, breaching of the embankment was not possible. Piping failure was also simulated in HEC-RAS and the resulting breach due to piping failure, was analyzed and flood hydrograph was obtained at different cross sections along the river. These are flood hydrographs at 20 km, 40 km and 60 km at the downstream. The resulting flood plain was also mapped using HEC-GeoRas to show the extent of flooding.
基金Natural Science Foundation of China(Grant No.51379129,51539006,51509164)
文摘Based on the large-scale model tests, a simplified dam breach model for homogeneous cohesive dam due to overtopping failure is put forward. The model considers headcut erosion as one of the key homogeneous cohesive dam breaching mechanisms and we calculate the time-averaged headcut migration rate using an energy-based empirical formula. A numerical method is adopted to determine the initial scour position at the downstream slope in terms of the water head and dam height, and the broad-crested weir equation is utilized to simulate the breach flow. The limit equilibrium method is used to analyze the stability of breach slope during the breach process. An iterative method is developed to simulate the coupling process of soil and water at each time step. The calculated results of three dam breach cases testify the reasonability of the model, and the sensitivity studies of soil erodibility show that sensitivity is dependent on each test case's soil conditions. In addition, three typical dam breach models, NWS BREACH, WinDAM B, and HR BREACH, are also chosen to compare with the proposed model. It is found that NWS BREACH may have large errors for cohesive dams, since it uses a noncohesive sediment transport model and does notconsider headcut erosion, WinDAM B and HR BREACH consider headcut erosion as the breaching mechanism and handle well homogeneous cohesive dam overtopping failure, but overall, the proposed model has the best performance.
基金supported by the National Natural Science Foundation of China(Grant Nos.U20A20112,U19A2049)Second Tibetan Plateau Scientific Expedition and Research Program(STEP)(Grant No.2019QZKK0904)CAS Light of West China Program。
文摘The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal compositions.The basic breaching parameters such as flood peak discharge are vital indicators of risk assessment.In this study,we elucidated the failure process of the debris flow dam through the flume experiment,and built the calculation equation of the breaching parameters by selecting critical factors.The result shows that the overtopping failure process of the debris flow dam is capable of forming significantly retrogressive scarps,and the failure process experiences three stages,the formation of the retrogressive scarp,the erosion of the retrogressive scarp,and the decline of the retrogressive scarp.Five factors used for establishing the calculation equations for peak discharge(Qp),final width(Wb)of the breach,and duration(T)of the debris flow dam failure are dam height(h),reservoir capacity(V),the fine grain content(P0.075)of the soil,the nonuniformity coefficient(Cu)of the soil,and the upper limit grain size(D90)of the soil,respectively.In the three equations,the correlation coefficients between Qp,Wb,T and the five factors were 0.86,0.70,0.63,respectively.The equations still need to be modified and verified in actual cases.
基金supported by the National Science Fund for Distinguished Young Scholars(Grant No.52125904)the National Natural Science Foundation of China(Grant No.51979224)the Program 2022TD-01 for Shaanxi Provincial Innovative Research Team(Grant No.2022TD-01)。
文摘Overtopping is one of the main reasons for the breaching of concrete-face sand-gravel dams(CFSGDs).In this study,a refined mathematical model was established based on the characteristics of the overtopping breaching of CFSGDs.The model characteristics were as follows:(1)Based on the Renormailzation Group(RNG)k-εturbulence theory and volume of fluid(VOF)method,the turbulent characteristics of the dam-break flow were simulated,and the erosion surface of the water and soil was tracked;(2)In consideration of the influence of the change in the sediment content on the dam-break flow,the dam material transport equation,which could reflect the characteristics of particle settlement and entrainment motion,was used to simulate the erosion process of the sand gravels;(3)Based on the bending moment balance method,a failure equation of the concrete face slab under dead weight and water load was established.The proposed model was verified through a case study on the failure of the Gouhou CFSGD.The results showed that the proposed model could well simulate the erosion mode of the special vortex flow of the CFSGD scouring the support body of the concrete face slab inward and reflect the mutual coupling relationship between the dam-break flow,sand gravels,and concrete face slabs.Compared with the measured values,the relative errors of the peak discharge,final breach average width,dam breaching duration,and maximum failure length of the face slab calculated using the proposed model were all less than 12%,thus verifying the rationality of the model.The proposed model was demonstrated to perform better and provide more detailed results than three selected parametric models and three simplified mathematical models.The study results can aid in establishing the risk level and devising early warning strategies for CFSGDs.
基金support of the National Natural Science Foundation of China(U20A20111,42107189).
文摘Granular debris plays a significant role in determining damming deposit characteristics. An indepth understanding of how variations in grain size distribution(GSD) and geometric configurations impact the behavior of granular debris during the occurrence of granular debris is essential for precise assessment and effective mitigation of landslide hazards in mountainous terrains. This research aims to investigate the impact of GSD and geometric configurations on sliding and damming properties through laboratory experiments. The geometric configurations were categorized into three categories based on the spatial distribution of maximum volume: located at the front(Type Ⅰ), middle(Type Ⅱ), and rear(Type Ⅲ) of the granular debris. Our experimental findings highlight that the sliding and damming processes primarily depend on the interaction among the geometric configuration, grain size, and GSD in granular debris. Different sliding and damming mechanisms across various geometric configurations induce variability in motion parameters and deposition patterns. For Type Ⅰ configurations, the front debris functions as the critical and primary driving component, with energy dissipation primarily occurring through inter-grain interactions. In contrast, Type Ⅱ configurations feature the middle debris as the dominant driving component, experiencing hindrance from the front debris and propulsion from the rear, leading to complex alterations in sliding motion. Here, energy dissipation arises from a combination of inter-grain and grain-substrate interactions. Lastly, in Type Ⅲ configurations, both the middle and rear debris serve as the main driving components, with the rear sliding debris impeded by the front. In this case, energy dissipation predominantly results from grainsubstrate interaction. Moreover, we have quantitatively demonstrated that the inverse grading in damming deposits, where coarse grain moves upward and fine grain moves downward, is primarily caused by grain sorting due to collisions among the grains and between the grain and the base. The impact of grain on the horizontal channel further aids grain sorting and contributes to inverse grading. The proposed classification of three geometric configurations in our study enhances the understanding of damming properties from the view of mechanism, which provides valuable insights for related study about damming granular debris.
文摘阐述数字幅度调制(Digital Amplitude Modulation,DAM)中波发射机模数(Analog to Digital,A/D)转换原理、A/D转换板主要组成部分及其作用,列举A/D转换板在实际运行中出现的常见故障案例,对常见故障给出分析和处理方法,为今后该板的故障分析和处理工作提供参考。
文摘Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.
文摘Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.
基金supported by the National Key R&D Program of China(Grant No. 2018YFC1508600)。
文摘This paper documents the emergency response to the breaches of the Baige Barrier Lake. The lake was successively formed by landslides that occurred on October 10 and November 3, 2018 at the provincial border between Sichuan and Tibet in China. The barrier lake created by the "10.10" landslide breached on October 12 and triggered a flood with a peak discharge around 10000 m^3/s. The residual landslide barrier was enhanced by a second landslide on November 3, resulting in a higher barrier with larger flood potential. An overflow channel was excavated in the crest of the barrier to prompt the breach to be triggered at a lower water level. The second breach happened on November 12 with a measured peak discharge of 31000 m^3/s. Nearly 75000 people were evacuated before the two breaches. In order to prevent the downstream dams from possible over-topping, nearly 3.27×10~8 m^3 of the stored volume was released from the Liyuan reservoir 688 km downstream of Baige Barrier Lake. This paper presents the measured hydrographs and the back-analysis results for the "11.03" barrier lake. It is shown that the modern models of dam breach hydraulics can reasonably reproduce the barrier breach hydrographs;however, further studies are needed to define the key parameters which highly influence the calculated results. Knowledge acquired during the emergency response to the case can be shared with experts working on breaches of embankment dams and can be referenced to promote both the theory study and the engineering practice to mitigate the potential risks caused by this type of catastrophic events.
文摘The main objective of the present study is to introduce new empirical equations for the determination of breach geometrical dimensions and peak outflow discharge(Q_(p)).Therefore,a historic failure database of 109 embankments was collected and examined.The most important factors that affect the breach evolution,including grading size,hydraulic,and outflow characteristics are also studied.Some of the parameters used for the determination of Q_(p) and average breach width(Bave)have a significant effect on the erosion process,but they are less reflected in the technical literature.To study the behavior of noncohesive soils during overtopping,15 physical tests were performed at the laboratory,and the effects of interfering parameters were investigated.The experimental output hydrograph was used to simulate the hydrographs resulting from the failure of real dams,and recent artificial intelligence techniques along with linear and nonlinear regression models were employed.The area-time analysis of the laboratory hydrographs shows that the soil particle size and the characteristics of reservoir-basin significantly affect the rate of breach formation and outflow discharge.New relationships are introduced,based on the breach characteristics,by a combination of historical and experimental data,as well as case studies conducted on the hypothetical failure of 10 operational dams.The mathematical model is also used to simulate the process of breach evaluation.Based on statistical indices,comparison of the results,and sensitivity analysis,the developed equations can better express the susceptibility of materials to erosion and their application can minimize downstream vulnerabilities.
基金Supported by the National Basic Research Program of China ("973") (Grant No.2007CB714100)the National Natural Science Foundation of China (Grant No.50849003)
文摘The Tangjiashan Quake Lake is the largest quake lake triggered by the 5.12 Wenchuan Earthquake that happened on May 12,2008 in China,posing high risk of catastrophic flash flood hazards to downstream human life and properties.A physics-based numerical simulation approach is proposed for real-time prediction of dam breach development of the Tangjiashan Quake Lake in the case of emergency treatment.Bed erosion and lateral development of the dam breach are represented through accounting for the underlying physics including selective sediment transport and gravitational collapse.Conceptualized breach erosion model that involves few parameters enables quick calibration based on the monitored hydrological data in emergency analysis where fully geotechnical information about the barrier dam is not available.The process of dam breach development is found to be nonlinear in cascades due to the combined effects of headcutting and bank collapse.The agreement between the simulation results and the observed data shows the applicability of the present approach for emergency analysis of quake lakes.Limitations will arise in the situation where the soil composition of barrier dam is significantly inhomogeneous.Incorporation of circular arc failure for cohesive soil and lateral seepage in bank slope will also enhance its applicability to complex situations.
基金supported by the National Natural Science Foundation of China(Grant No.41731289)the Foundation of State Key Laboratory of Simulation and Regulation of Water Cycle in River Basin(Grant No.2016ZY08)the Consultation and Evaluation Project of the Chinese Academy of Sciences(Grant No.2018-Z02-A-008)
文摘In the context of an impending dam failure, quick evaluation of dam breach flood is necessary. Previous studies provided an approach to calculate the dam breach hydrograph using an Excel spreadsheet based on the improved soil erosion model and numerical algorithm. However, calculation of the breach lateral enlargement requires the modeling of the successive collapse of the breach banks. It is time-consuming with special training, which is difficult to provide during an emergency. This study proposes that the lateral enlargement process can be modeled using a hyperbolic relationship with sufficient accuracy. Consequently, field engineers can perform the dam breach analysis along with the sensitive study for a target case within 1 h in an Excel spreadsheet which is self-tutorial. This paper presents this easy and quick approach based on only fifteen input parameters that can be determined based on the experience. This approach can also be used for the preliminary study when a dam safety planning work is undertaken.