- document
-
Peeters, P. (author), Van Hoestenberghe, T. (author), Vincke, L. (author), Visser, P.J. (author)The use of breach models includes two tasks: predicting breach characteristics and estimating flow through the breach. Strengths and weaknesses as well as opportunities and threats of different simplified and detailed physically-based breach models are listed following theoretical and practical criteria. According to the theoretical criteria,...conference paper 2011
- document
-
Peeters, P. (author), Heredia Gomez, M. (author), van Damme, M. (author), Visser, P.J. (author)Within the frame work of the realisation of the ‘Sigmaplan’ for the river Schelde in Flanders (Belgium), a large-scale dike breaching experiment following overflow was held at Lillo (Antwerp) in 2012. The outcomes of the breach test serve to unveil the impact of a chosen breach growth model, to set application limits, to come up with guidelines...conference paper 2016