Registration Info

Participation from R2 Community

Join the R2 Portal to view this content.

Basics

  • Est. # of Attendees
  • Event Categories
    Webcast | Webinar
  • Event Type
    In Person
  • Relevant Agencies
    CIA, Dept of Justice, Dept of State, DOD & Military, Federal Government, Intelligence Agencies, Judicial Branch Agencies, NSA
  • Topics
    Law Enforcement, Public Safety, Technology
  •  Learn More
  • Est. Min. Exhibitor Cost
  • Est. Min. Attendee Cost

Description

This course will survey dam breach analysis methods currently in use. Difference in methodology, analysis steps, assumptions and results will be described. Specifically, the course will cover hydrologic routing, 1D hydraulic routing, and 2D hydraulic routing. Features of popular software will be summarized, and future advances will be highlighted.

What are the five takeaways/learning objectives attendees will receive from this course:

  • What methods of dam breach modeling have been used in the past?
  • What current methods of dam breach modeling are currently being used?
  • What are the differences in data and analysis requirements in the current dam breach analysis methods?
  • What are the differences in results in the current dam breach analysis methods?
  • What future advances can we expect?

Who Attends

Exhibitor Contact Info

Actions

Please let us know if you are interested in this event