2020
DOI: 10.1360/sst-2019-0297
|View full text |Cite
|
Sign up to set email alerts
|

Back analysis of the breach flood of the “11.03” Baige barrier lake at the Upper Jinsha River

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…For breach development, the simulation was run to calculate the volumetric bed change using time steps of 0.2 s. The volume change can then be converted to bed change and width change along the breach cross‐section, which involves the sediment collapse/mass failure of breach side slopes (Figure S1 in Supporting Information S1). Since there are already sufficient field surveys, laboratory experiments, and numerical simulations on this dam breach (e.g., Chen et al., 2020; Zhong et al., 2020), the key input parameters used to simulate the dam breach are well documented and are listed in Table S2 in Supporting Information S1. For the less well‐constrained input parameters such as porosity and adaption coefficient, while changes in these parameters affect the temporal evolution of discharge and sediment transport, the peak sediment transport always preceded peak in measured discharge by hours (Figure S2 in Supporting Information S1).…”
Section: Methodsmentioning
confidence: 99%
“…For breach development, the simulation was run to calculate the volumetric bed change using time steps of 0.2 s. The volume change can then be converted to bed change and width change along the breach cross‐section, which involves the sediment collapse/mass failure of breach side slopes (Figure S1 in Supporting Information S1). Since there are already sufficient field surveys, laboratory experiments, and numerical simulations on this dam breach (e.g., Chen et al., 2020; Zhong et al., 2020), the key input parameters used to simulate the dam breach are well documented and are listed in Table S2 in Supporting Information S1. For the less well‐constrained input parameters such as porosity and adaption coefficient, while changes in these parameters affect the temporal evolution of discharge and sediment transport, the peak sediment transport always preceded peak in measured discharge by hours (Figure S2 in Supporting Information S1).…”
Section: Methodsmentioning
confidence: 99%