Simulation of inundation disasters by tsunami via underground drainage channel network

Tomoyuki Takabatake, Takahide Honda, Yukinobu Oda, Kazunori Ito

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

This paper studies about inundation disasters via drainage channels induced by tsunami, which may occur even if high seawalls protect land areas from tsunami. Since the inundation may cause massive damage to electrical facilities and lead to losses of evacuation routes, it is important to consider the countermeasures for industrial facilities. An 1-D pipe network flow model, which is generally used for a surging analysis, was improved to evaluate the amount of overflow from pits of a channel network. It was found that the improved 1-D simulation model could reproduce the almost same results as a 3-D simulation model.

Original languageEnglish
Title of host publicationProceedings of the 24th International Ocean and Polar Engineering Conference, ISOPE Busan
PublisherInternational Society of Offshore and Polar Engineers
Pages17-24
Number of pages8
ISBN (Print)9781880653913
Publication statusPublished - 2014 Jan 1
Externally publishedYes
Event24th International Ocean and Polar Engineering Conference, ISOPE 2014 Busan - Busan, Korea, Republic of
Duration: 2014 Jun 152014 Jun 20

Publication series

NameProceedings of the International Offshore and Polar Engineering Conference
ISSN (Print)1098-6189
ISSN (Electronic)1555-1792

Other

Other24th International Ocean and Polar Engineering Conference, ISOPE 2014 Busan
Country/TerritoryKorea, Republic of
CityBusan
Period14/6/1514/6/20

Keywords

  • BCP
  • Drainage channel
  • Inundation
  • Pipe network
  • Tsunami
  • Water intake channel
  • Water outfall channel

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Ocean Engineering
  • Mechanical Engineering

Fingerprint

Dive into the research topics of 'Simulation of inundation disasters by tsunami via underground drainage channel network'. Together they form a unique fingerprint.

Cite this