Searched for: author%3A%22Peeters%2C+P.%22
(1 - 8 of 8)
document
Koelewijn, André R. (author), Rikkert, S.J.H. (author), Peeters, P. (author), Depreiter, Davy (author), van Damme, Myron (author), Zomer, Wouter (author)
In regions with a temperate climate, a well-maintained grass sod on a clay layer is considered a reliable protection for dams and dikes. In the Living Lab Hedwige-Prosperpolder, on the left bank of the Scheldt river straddling the border between Belgium and the Netherlands, a series of 27 overflow tests with a purpose-built overflow generator...
journal article 2022
document
Peeters, P. (author), Heredia Gomez, M. (author), van Damme, M. (author), Visser, P.J. (author)
Within the frame work of the realisation of the ‘Sigmaplan’ for the river Schelde in Flanders (Belgium), a large-scale dike breaching experiment following overflow was held at Lillo (Antwerp) in 2012. The outcomes of the breach test serve to unveil the impact of a chosen breach growth model, to set application limits, to come up with guidelines...
conference paper 2016
document
van Damme, M. (author), Ponsioen, L.A. (author), Herrero Huerta, M. (author), Peeters, P (author)
As part of the SAFElevee project Delft University of Technology collabored with Flanders Hydraulics Research, and Infram B.V. in the preperation and execution of a full scale embankment breach experiment in November 2015. This breach experiment was performed on an 3.5m high embankment with a sand core and clay outer layer situated along the...
conference paper 2016
document
Zhao, G. (author), Visser, P.J. (author), Peeters, P. (author)
Embankment breaching is a composite process coupled by hydraulic processes and sediment transport processes. Erosion is the link in the interaction between breach flow and embankment material. Surface erosion starts in the initial breach phase and triggers the initial damage of the embankment. As the surface erosion develops completely, the...
report 2014
document
Peeters, P. (author), Van Hoestenberghe, T. (author), Vincke, L. (author), Visser, P.J. (author)
The use of breach models includes two tasks: predicting breach characteristics and estimating flow through the breach. Strengths and weaknesses as well as opportunities and threats of different simplified and detailed physically-based breach models are listed following theoretical and practical criteria. According to the theoretical criteria,...
conference paper 2011
document
Jeuken, M.C.J.L (author), Hordijk, D. (author), Ides, S. (author), Kuijper, C. (author), Peeters, P. (author), Sonneville, B. de (author), Vanlede, J. (author)
report 2007
document
Van Goeverden, K. (author), Peeters, P. (author)
journal article 2005
document
Baaijens, S. (author), Bruinsma, F. (author), Nijkamp, P. (author), Peeters, P. (author), Peters, P. (author), Rietveld, P. (author)
book 1997
Searched for: author%3A%22Peeters%2C+P.%22
(1 - 8 of 8)