Numerical simulation of dyke breach process using MPS method

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This study describes a numerical simulation method for dyke breach process due to overflow based on Moving Particle Semi-implicit (MPS) method. The MPS method was developed for incompressible flow with free surface. In the MPS, fluids and geomaterials to be analyzed are represented by particles, and the governing equations describing the mechanical behavior are discretized by particle interaction models. Since MPS method does not need grids, it can be applied to large deformation behavior such as dyke breach process. The MPS method was extended by adding a simple erosion model for simulating breach process of dyke due to overflow. The simulation results for breach process of the dyke by the MPS method were compared with the corresponding observation data to verify the applicability of the MPS method presented in this study.

Original languageEnglish
Title of host publicationProceedings of the 24th International Ocean and Polar Engineering Conference, ISOPE Busan
PublisherInternational Society of Offshore and Polar Engineers
Pages693-696
Number of pages4
ISBN (Print)9781880653913
Publication statusPublished - Jan 1 2014
Event24th International Ocean and Polar Engineering Conference, ISOPE 2014 Busan - Busan, Korea, Republic of
Duration: Jun 15 2014Jun 20 2014

Publication series

NameProceedings of the International Offshore and Polar Engineering Conference
ISSN (Print)1098-6189
ISSN (Electronic)1555-1792

Other

Other24th International Ocean and Polar Engineering Conference, ISOPE 2014 Busan
Country/TerritoryKorea, Republic of
CityBusan
Period6/15/146/20/14

Keywords

  • Contingent valuation method
  • Ecosystem
  • Environment
  • Infrastructure construction
  • Life cycle cost

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Ocean Engineering
  • Mechanical Engineering

Fingerprint

Dive into the research topics of 'Numerical simulation of dyke breach process using MPS method'. Together they form a unique fingerprint.

Cite this