1 | | The Flow Patterns and Geophone Characteristics of Debris Flows at Houyenshan, Miaoli, Taiwan |
|
2 | | Landslide Stabilizing Pile Behavior Modeling under Seismic Loading |
|
3 | | Establishment of a 3D On-site Model of Landslide Dam Using UAV Images 46(2):088-095Ming-Der Yang* Wei-Ting Chen Kai-Siang Huang* Corresponding Author. E-mail : mdyang@nchu.edu.tw Show preview | PDF( 3.33MB ) | Establishment of a 3D On-site Model of Landslide Dam Using UAV Images | Close | Ming-Der Yang* Wei-Ting Chen Kai-Siang Huang | AbstractLandslide and debris flows due to heavy rains or earthquakes may block river flow and create landslide dams. This research applied unmanned aerial vehicles (UAVs) and Image based model (IBM) for aerial
surveying and a 3D model reconstruction. This research acquired a few specific distances between recognizable
ground points. Those distances were used to find out a suitable scale between the real world and the 3D reconstruction model. The error of one-scale transformation is 1.4963m, and the errors of two-scales transformation on XY and Z dimensions are 0.8760m and 0.2563m, respectively. The Dimensionless Blockage Index (DBI) value of this landslide dam is 5.13 by field surveying and 5.12 by 3D reconstruction model after two-scales transformation, which all show the landslide dam in an unstable situation.
Key Words : UAV, IBM, 3D model, Dimensionless Blockage Index. | Department of Civil Engineering, National Chung Hsing University, Taichung, Taiwan. * Corresponding Author. E-mail : mdyang@nchu.edu.tw | Received: 2014/10/27 Revised: 2014/11/19 Accepted: 2015/05/22
|
|
|
|
|
4 | | A Study of the Numerical Simulation of Debris Flow Hazard Combined with Micro-Photography Interpretation |
|
5 | | Hydro-Mechanical Properties of Sliding Zone Soil in Huangtupo Landslide, Three Gorges Reservoir Area |
|
6 | | Characterization of Recession Behavior in River Basins in Southern Taiwan using the Long-Term Low Flow of Statistical Streamflow Data |
|
7 | | Establishing Hill Tribe Disaster Environmental Indicators and Application Security Assessment |
|