It studies the tables containing the groups’ means to compare and distinguish between the categorised and independent variables. It includes the tables containing the data of the participant groups and sub-groups of survey respondents.
It is also known as paired testing, where two people are assigned specific identities and qualifications to compare and study types of discrimination.
In historical research , an investigator collects, analyses the information to understand, describe, and explain the events that occurred in the past. Researchers try to find out what happened exactly during a certain period of time as accurately and as closely as possible. It does not allow any manipulation or control of variables.
1. | 2. Methods of Analysing Data |
---|---|
Researchers use multiple theories to explain specific phenomena, situations, and types of behavior. It takes a long to go through the textual data. Coding is a way of tagging the data and organising it into a sequence of symbols, numbers, and letters to highlight the relevant points. Quantitative data is used to validate interpretations of historical events or incidents. |
Quantitative research is associated with numerical data or data that can be measured. It is used to study a large group of population. The information is gathered by performing statistical, mathematical, or computational techniques.
Quantitative research isn’t simply based on statistical analysis or quantitative techniques but rather uses a certain approach to theory to address research hypotheses or research questions, establish an appropriate research methodology, and draw findings & conclusions .
Some most commonly employed quantitative research strategies include data-driven dissertations, theory-driven studies, and reflection-driven research. Regardless of the chosen approach, there are some common quantitative research features as listed below.
1. | 2. Methods of Analysing Data |
---|---|
It is a method of collecting, analysing, and interpreting ample data to discover underlying patterns and details. Statistics are used in every field to make better decisions. The correlational analysis is carried out to discover the interrelationship between the two or more aspects of a situation. It distributes values around some central value, such an average. Example: the distance separating the highest from the lowest value. It counts the maximum and a minimum number of responses to a question or the occurrence of a specific phenomenon. It determines the nature of social problems, such as ethnic or gender discrimination. It explains the relationship between one dependent binary variable and one or more independent variables. This parametric technique is used while comparing two populations or samples. |
We hear you.
At ResearchProspect, our expert writers can help you with your quantitative dissertation whether you are a sports science student, medical or biological science, education or business, psychology, social sciences, engineering, project management, or any other science-based degree. We guarantee 100% commitment, 100% Plagiarism-free work, 100% Confidentiality and 100% Satisfaction
It is a type of scientific research where a researcher collects evidence to seek answers to a question . It is associated with studying human behaviour from an informative perspective. It aims at obtaining in-depth details of the problem.
As the term suggests, qualitative research is based on qualitative research methods, including participants’ observations, focus groups, and unstructured interviews.
Qualitative research is very different in nature when compared to quantitative research. It takes an established path towards the research process , how research questions are set up, how existing theories are built upon, what research methods are employed, and how the findings are unveiled to the readers.
You may adopt conventional methods, including phenomenological research, narrative-based research, grounded theory research, ethnographies , case studies , and auto-ethnographies.
Again, regardless of the chosen approach to qualitative research, your dissertation will have unique key features as listed below.
Now that you know the unique differences between quantitative and qualitative research methods, you may want to learn a bit about primary and secondary research methods.
Here is an article that will help you distinguish between primary and secondary research and decide whether you need to use quantitative and/or qualitative primary research methods in your dissertation.
Alternatively, you can base your dissertation on secondary research, which is descriptive and explanatory in essence.
Action research
Action research aims at finding an immediate solution to a problem. The researchers can also act as the participants of the research. It is used in the educational field.
A case study includes data collection from multiple sources over time. It is widely used in social sciences to study the underlying information, organisation, community, or event. It does not provide any solution to the problem. Researchers cannot act as the participants of the research.
Ethnography
In this type of research, the researcher examines the people in their natural environment. Ethnographers spend time with people to study people and their culture closely. They can consult the literature before conducting the study.
1. | 2. Methods of Analysing Data |
---|---|
with open-ended questions | It is a method of studying and retrieving meaningful information from documents. It aims at identifying patterns of themes in the collected information, such as face-to-face interviews, texts, and transcripts. , field observations, and interviews. It is a study of how language is used in texts and contexts. |
When you combine quantitative and qualitative methods of research, the resulting approach becomes mixed methods of research.
Over the last few decades, much of the research in academia has been conducted using mixed methods because of the greater legitimacy this particular technique has gained for several reasons including the feeling that combining the two types of research can provide holistic and more dependable results.
Here is what mixed methods of research involve:
Note: However, this method has one prominent limitation, which is, as previously mentioned, combining qualitative and quantitative research can be difficult because they both are different in terms of design and approach. In many ways, they are contrasting styles of research, and so care must be exercised when basing your dissertation on mixed methods of research.
When choosing a research method for your own dissertation, it would make sense to carefully think about your research topic , research questions , and research objectives to make an intelligent decision in terms of the philosophy of research design .
Dissertations based on mixed methods of research can be the hardest to tackle even for PhD students.
Our writers have years of experience in writing flawless and to the point mixed methods-based dissertations to be confident that the dissertation they write for you will be according to the technical requirements and the formatting guidelines.
Read our guarantees to learn more about how you can improve your grades with our dissertation services.
Please Find Below an Example of Research Methods Section in a Dissertation or Thesis.
Diversity management became prominent in the late twentieth century, with foundations in America. Historically homogeneous or nondiverse nations, such as Finland, have not yet experienced the issues associated with rising cultural and ethnic diversity in the workforce. Regardless of the environment, workforce diversity garners greater attention and is characterised by its expanding relevance due to globalised and international companies, global and national worker mobility, demographic shifts, or enhancing productivity.
As a result, challenges of diversity management have been handled through legal, financial, and moral pressures (Hayes et al., 2020). The evolving structure of the working population in terms of language, ethnic background, maturity level, faith, or ethnocultural history is said to pose a challenge to human resource management (HRM) in utilising diversity: the understanding, abilities, and expertise prospects of the entire workforce to deal with possible developments.
The European approach to diversity management is regarded as growing. However, it is found to emphasise the relationship to business and lack competence in diversity management problems. Mass immigration concentrates variety, sometimes treated as cultural minority issues, implying the normalisation of anti-discrimination actions (Yadav and Lenka, 2020).
These causes, in turn, have provided the basis of comprehensive diversity research, which has generated different theories, frameworks, concepts, and guidelines from interdisciplinary viewpoints, such as industrial and organisational psychology and behaviour (OB), cultural studies, anthropology, migration, economics, postcolonialism, and so on. And in the form of international, social and cultural, organisational, group, and individual scale diversity analysis. This dissertation focuses on diversity concerns from impression management, specifically from HRM as an executive-level phenomenon (Seliverstova, 2021).
As conceptual frameworks, organisational structures concentrating on the production of diversity and social psychology, notably social identity theory with diverse ‘identities’ of persons or intergroup connections, are primarily employed. The study’s primary goal in the workplace is to discover inequities or examine the effects of diversity on workplace outcomes.
Individual study interests include behaviours, emotions, intelligence, intercultural skills or competencies, while group research interests include group dynamics, intergroup interactions, effectiveness, and cooperation or collaboration. Organisational studies address themes such as workforce composition, workplace equality, and diversity challenges and how they may be managed accordingly. Domestic diversity, omitting national distinctions, or global diversity, about diverse country cultures, might be studied further (AYDIN and ÖZEREN, 2018).
Diversity is a context-dependent, particular, comparative, complicated, plural phrase or idea with varying interpretations in different organisations and cultures and no unified definition. As a result, in addition to many internal and external elements, diversity may be managed, individuals taught, and organisations have grown in various ways. This dissertation considers diversity in an organisational environment as a construct of ‘differences’ to be handled (Cummings, 2018).
Various management systems have grown in stages, bringing diverse diversity management concepts. Equality/equal opportunities (EO) legislation and diversity management are the two conventional approaches and primary streams with differing theoretical foundations for managing and dealing with workforce diversity challenges (DM).
These approaches relate to whether diversity is handled by increasing sameness by legal pressures or by voluntarily respecting people’s differences, which shows an organisation’s responsiveness and proactivity toward managing diversity. But most of the literature in this area has avoided the impression management theories (Coad and Guenther, 2014). Therefore, this study will add a new dimension in this area by introducing impression management analysis.
This research aims to analyse the impact of organisational structure on human resources diversification from the viewpoint of impression managerial theory. It has the following objectives:
This research will answer the following questions:
The organisational structure significantly impacts the recruitment of diverse human resources.
According to Staniec and Zakrzewska-Bielawska (2010), considering strategy-oriented activities and organisational components are the critical foundation in the organisational structure required to align structure strategy. Each company’s internal organisation is somewhat distinctive, resulting from various corporate initiatives and historical conditions.
Furthermore, each design is based on essential success elements and vital tasks inherent in the firm plan. This article offers empirical research on unique organisational structure elements in Polish firms in the context of concentration and diversification tactics. And companies that adopted concentration techniques mainly used functional organisational structures.
Tasks were primarily classified and categorised based on functions and phases of the technical process, with coordination based on hierarchy. Jobs were also highly centralised and formalised. Organisational structures of an active type were also prevalent in many firms. Only a handful of the evaluated organisations possessed flexible contemporary divisional or matrix structures appropriate to differentiation. However, it appears that even such organisations should adjust their organisational solutions to perform successfully in an immensely complex and chaotic environment.
Similarly, according to Yang and Konrad (2011), diversity management techniques are the institutionalised methods created and applied by organisations to manage diversity among all organisational shareholders. They examined the existing research on the causes and significance of diversity management approaches.
They construct a research model indicating many potential routes for future study using institutional and resource-based theories. They also offer prospective avenues for study on diversity management techniques to further the two theoretical viewpoints. The findings indicate that research on diverse management practises might provide perceptions into the two ideologies. Diversity management provides a method for reconciling the agency vs structure issue for institutional concept.
Furthermore, diversity management is a suitable framework for studying how institutional pressures are translated into organisational action and the relationship between complying with institutional mandates and attaining high performance. Research on diversity management raises the importance of environmental normative elements in resource-based reasoning.
It allows for exploring essential resource sources and the co-evolution of diversity resources and management capacities, potentially developing dynamic resource-based theory. Furthermore, a review of the existing research on diversity management practices reveals that research in this field has nearly entirely concentrated on employee-related activities.
However, in establishing the idea of diversity management practises, we included the practises that companies put in place to manage diversity across all stakeholder groups on purpose. Management techniques for engaging with consumers, dealers, supervisors, board directors, and community members are critical for meeting institutional theory’s social and normative commitments.
Moreover, according to Sippola (2014), this research looks at diversity management from the standpoint of HRM. The study aims to discover the effects of expanding workforce diversity on HRM inside firms. This goal will be accomplished through four papers examining diversity management’s impacts on HRM from various viewpoints and mostly in longitudinal contexts.
The purpose of the first article, as a pilot survey, is to determine the reasons, advantages, and problems of rising cultural diversity and the consequences for HRM to get a preliminary grasp of the issue in the specific setting. According to the report, diversity is vital for productivity but is not often emphasised in HRM strategy.
The key areas that were changed were acquisition, development, and growth. The second article examines how different diversity management paradigms recognised in businesses affect HRM. It offers an experimentally verified typology that explains reactive or proactive strategic and operational level HRM activities in light of four alternative diversity management perspectives.
The third essay will examine how a ‘working culture bridge group’ strategy fosters and enhances workplace diversity. The research looks into how development goals are defined, what training and development techniques are used, and the consequences and causal factors when an analysis measures the training and development approach.
The primary goal of article four is to establish which components of diversity management design are globally integrated into multinational corporations (MNCs) and which integrating (delivery) methods are employed to facilitate it. Another goal is to identify the institutional problems faced by the Finnish national diversity setting during the integration process.
The findings show that the example organisation achieved more excellent global uniformity at the level of diversification concept through effective use of multiple frameworks but was forced to rely on a more multinational approach to implementing diversification policies and procedures. The difficulties faced emphasised the distinctiveness of Finland’s cognitive and normative institutional setting for diversity.
Furthermore, according to Guillaume et al. (2017), to compensate for the dual-edged character of demographic workplace diversity impacts on social inclusion, competence, and well-being-related factors, research has shifted away from straightforward main effect methods and begun to investigate factors that moderate these effects.
While there is no shortage of primary research on the circumstances that lead to favourable or poor results, it is unknown which contextual elements make it work. Using the Classification framework as a theoretical lens, they examine variables that moderate the impacts of workplace diversity on social integration, performance, and well-being outcomes, emphasising characteristics that organisations and managers can influence.
They suggest future study directions and end with practical applications. They concluded that faultlines, cross-categorisation, and status variations across demographic groupings highlight variety. Cross-categorisation has been proven to reduce intergroup prejudice while promoting social inclusion, competence, and well-being. Whether faultlines and subgroup status inequalities promote negative or good intergroup interactions and hinder social integration, performance, and well-being depends on whether situational factors encourage negative or positive intergroup connections. The impacts were not mitigated by team size or diversity type.
Furthermore, our data demonstrate that task characteristics are essential for workgroup diversity. Any demographic diversity in workgroups can promote creativity, but only when combined with task-relevant expertise improves the performance of teams undertaking complicated tasks. The type of team and the industrial context do not appear to play an effect. It is unclear if these findings apply to relational demography and organisational diversity impacts. There is some evidence that, under some settings, relational demography may increase creativity, and, as previously said, demographic variety may help firms function in growth-oriented strategy contexts.
Likewise, according to Ali, Tawfeq, and Dler (2020), diversity management refers to organisational strategies that strive to increase the integration of people from diverse backgrounds into the framework of corporate goals. Organisations should develop productive ways to implement diversity management (DM) policies to establish a creative enterprise that can enhance their operations, goods, and services.
Furthermore, human resource management HRM is a clever tool for any firm to manage resources within the company. As a result, this article explores the link between DM, HR policies, and workers’ creative work-related behaviours in firms in Kurdistan’s Fayoum city. According to the questionnaire, two hypotheses were tested: the influence of HRM on diversity management, HRM on innovation, and the impact of diversity management on innovation.
The first premise is that workplace diversity changes the nature of working relationships, how supervisors and managers connect, and how workers respond to one another. It also addresses human resource functions such as record-keeping, training, recruiting, and employee competence needs. The last premise on the influence of diversity management on innovation is that workplace diversity assists a business in hiring a diverse range of personnel.
In other words, a vibrant population need individuals of varied personalities. Workplace diversity refers to a company’s workforce consisting of employees of various genders, ages, faiths, races, ethnicities, cultural backgrounds, religions, dialects, training, capabilities, etc. According to the study’s findings, human resource management strategies have a substantial influence on diversity management.
Second, diversity management was found to have a considerable impact on creativity. Finally, human resource management techniques influenced innovation significantly. Based on the findings, it was discovered that diversity management had a more significant influence on creation than human resource management.
Lastly, according to Li et al. (2021), the universal trend of rising workplace age diversity has increased the study focus on the organisational effects of age-diverse workforces. Prior research has mainly concentrated on the statistical association between age diversity and organisational success rather than experimentally examining the probable processes behind this relationship.
They argue that age diversity influences organisational performance through human and social capital using an intellectual capital paradigm. Moreover, they investigate workplace functional diversity and age-inclusive management as two confounding factors affecting the benefits of age diversity on physical and human capital.
Their hypotheses were evaluated using data from the Association for Human Resource Management’s major manager-reported workplace survey. Age diversity was favourably linked with organisational performance via the mediation of higher human and social capital. Furthermore, functional diversity and age-inclusive management exacerbated the favourable benefits of age variety on human and social capital. Their study gives insight into how age-diverse workforces might generate value by nurturing knowledge-based organisational resources.
Although there is a vast body of research in diversity in the human resource management area, many researchers explored various dimensions. But no study explicitly discovers the impact of organisational culture on human resource diversification. Moreover, no researchers examined the scope of impression management in this context.
Therefore, this research will fill this considerable literature gap by finding the direct impact of organisational structure on human resource diversification. Secondly, by introducing a new dimension of impression management theory. It will open new avenues for research in this area, and it will help HR managers to formulate better policies for a more inclusive organisational structure.
It will be mixed quantitative and qualitative research based on the secondary data collected through different research journals and case studies of various companies. Firstly, the quantitative analysis will be conducted through a regression analysis to show the organisational structure’s impact on human resource diversification.
The dummy variable will be used to show organisational structure, and diversification will be captured through the ethnic backgrounds of the employees. Moreover, different variables will be added to the model, such as competency, social inclusion, etc. It will fulfil the objective of identifying various factors which affect the management decision to recruit diverse human resources. Secondly, a systematic review of the literature will be conducted for qualitative analysis to add the impression management dimension to the research. Google Scholar, JSTOR, Scopus, etc., will be used to search keywords such as human resource diversity, impression management, and organisation structure.
Although research offers a comprehensive empirical analysis on the relationship under consideration due to lack of resources, the study is limited to secondary data. It would be better if the research would’ve been conducted on the primary data collected through the organisations. That would’ve captured the actual views of the working professionals. It would’ve increased the validity of the research.
Ali, M., Tawfeq, A., & Dler, S. (2020). Relationship between Diversity Management and Human Resource Management: Their Effects on Employee Innovation in the Organizations. Black Sea Journal of Management and Marketing, 1 (2), 36-44.
AYDIN, E., & ÖZEREN, E. (2018). Rethinking workforce diversity research through critical perspectives: emerging patterns and research agenda. Business & Management Studies: An International Journal, 6 (3), 650-670.
Coad, A., & Guenther, C. (2014). Processes of firm growth and diversification: theory and evidence. Small Business Economics, 43 (4), 857-871.
Cummings, V. (2018). Economic Diversification and Empowerment of Local Human Resources: Could Singapore Be a Model for the GCC Countries?. In. Economic Diversification in the Gulf Region, II , 241-260.
Guillaume, Y., Dawson, J., Otaye‐Ebede, L., Woods, S., & West, M. (2017). Harnessing demographic differences in organizations: What moderates the effects of workplace diversity? Journal of Organizational Behavior, 38 (2), 276-303.
Hayes, T., Oltman, K., Kaylor, L., & Belgudri, A. (2020). How leaders can become more committed to diversity management. Consulting Psychology Journal: Practice and Research, 72 (4), 247.
Li, Y., Gong, Y., Burmeister, A., Wang, M., Alterman, V., Alonso, A., & Robinson, S. (2021). Leveraging age diversity for organizational performance: An intellectual capital perspective. Journal of Applied Psychology, 106 (1), 71.
Seliverstova, Y. (2021). Workforce diversity management: a systematic literature review. Strategic Management, 26 (2), 3-11.
Sippola, A. (2014). Essays on human resource management perspectives on diversity management. Vaasan yliopisto.
Staniec, I., & Zakrzewska-Bielawska, A. (2010). Organizational structure in the view of single business concentration and diversification strategies—empirical study results. Recent advances in management, marketing, finances. WSEAS Press, Penang, Malaysia .
Yadav, S., & Lenka, U. (2020). Diversity management: a systematic review. Equality, Diversity and Inclusion: An International Journal .
Yang, Y., & Konrad, A. (2011). Understanding diversity management practices: Implications of institutional theory and resource-based theory. Group & Organization Management, 36 (1), 6-38.
What is the difference between research methodology and research methods.
Research methodology helps you conduct your research in the right direction, validates the results of your research and makes sure that the study you are conducting answers the set research questions.
Research methods are the techniques and procedures used for conducting research. Choosing the right research method for your writing is an important aspect of the research process.
The types of research methods include:
Quantitative research is associated with numerical data or data that can be measured. It is used to study a large group of population. The information is gathered by performing statistical, mathematical, or computational techniques.
It is a type of scientific research where a researcher collects evidence to seek answers to a question . It is associated with studying human behavior from an informative perspective. It aims at obtaining in-depth details of the problem.
Mixed methods of research involve:
In correlational research, a researcher measures the relationship between two or more variables or sets of scores without having control over the variables.
You can transcribe an interview by converting a conversation into a written format including question-answer recording sessions between two or more people.
Baffled by the concept of reliability and validity? Reliability refers to the consistency of measurement. Validity refers to the accuracy of measurement.
USEFUL LINKS
LEARNING RESOURCES
COMPANY DETAILS
[email protected]
We may have qualitative, quantitative, and mixed methods in dissertations. This blog will elaborate on quantitative dissertations, qualitative dissertations, and mixed methods dissertations by addressing their similarities and differences.
We may have qualitative, quantitative, and mixed methods in dissertations. Therefore, this blog will elaborate on quantitative dissertations, qualitative dissertations, and mixed methods dissertations by addressing their similarities and differences.
Using the word quantitative does not mean that the dissertation must have quantitative research methods or statistical analysis techniques. Quantitative research deals with addressing research questions, hypotheses, or both. This research type relates to establishing a research strategy, concluding results, and making inferences. Classic investigations involve replication-based studies, theory-driven research, and data-driven dissertations. Nonetheless, many core characteristics pertain to quantitative dissertations regardless of the particular route you adopt on a quantitative dissertation.
They build on or test theories. These may include adopting an original or comprehensive approach with replication or modification.
They address quantitative research questions and test research hypotheses by rejecting or failure to reject the null hypothesis.
Positivist or post-positivist research paradigms affect them heavily.
They can have descriptive, experimental, quasi-experimental, or relationship-based research designs.
They resort to utilizing probability sampling techniques, generalizing from the sample to a broader population. In contrast, they may have to apply non-probability sampling techniques.
Research methods produce quantitative data (e.g., data sets, laboratory-based methods, questionnaires/surveys, structured interviews, and structured observation).
They depend on statistical analysis techniques while examining the data collected, irrespective of their descriptive or inferential structure.
They check the findings’ reliability and internal and external validity and may provide confidence intervals for the population parameters.
Statements, data, tables, and graphs are used to report their findings addressing each research question, hypothesis, or both.
Conclusions align with the findings, research questions, hypotheses, or both, and theories test or expand on extant ideas or provide insight for future approaches.
Qualitative dissertations involve qualitative research methods such as unstructured interviews, focus groups, and participant observation. As they use research methods not employed in quantitative dissertations, qualitative research is beyond a choice between research methods. Qualitative research regards the research process differently by establishing research questions, developing and utilizing theory, choosing a research strategy, and presenting and discussing research findings in a substantially unique way. Thus, qualitative dissertations will have a distinct approach, relying on the specific route you adopt (for example, case study research compared to ethnographies). The traditional ways are autoethnography, case study, ethnographies, grounded theory, narrative, and phenomenological research . Nonetheless, whatever path you pursue, many broad characteristics relate to qualitative dissertations:
They are considered emergent designs, implying that the research process, and sometimes even the qualitative research questions you handle, often develop during the dissertation process.
They employ many ways to tackle the theory - sometimes capitalizing on theory to assist the research process; in other times, utilizing it to develop new theoretical insights. They sometimes use both techniques. However, the goal is seldom to test a particular theory from the outset.
Many research paradigms support them, including interpretivism, constructivism, and critical theory.
They pursue research designs that radically affect your choices during the research process and the analysis and discussion of findings. Such research designs substantially vary based on the approach taken, whether autoethnography, case study research, ethnography, grounded theory, narrative research, and phenomenological research.
They employ theoretical sampling - non-probability sampling techniques – to explore cases most fit to address their research questions.
They study people in their natural settings by using multiple research methods. This process generates qualitative data involving unstructured interviews, focus groups, and participant observation.
They interpret the qualitative data from the researcher’s perspective and employ an inductive method to specific themes or abstractions, establishing a holistic/gestalt picture of the study.
They assess their findings’ quality concerning their dependability, confirmability, conformability, and transferability.
They elaborate on their findings primarily using personal accounts, case studies, and narratives. Moreover, they employ other means of describing themes or abstracts, processes, observations, and contradictions to address research questions.
They deliberate the theoretical mainly from the findings via the research questions and deduce tentative conclusions.
Many reasons exist to include mixed methods in thesis and dissertations . Mixed methods dissertations use both qualitative and quantitative approaches in research. Although they are increasingly used with a more profound legitimacy, their components have not been adequately addressed. One can better tackle a research question by gathering qualitative and quantitative data, analyzing or interpreting them individually or in combination, and conducting multiple research phases. Thus, it is critical to perform qualitative research to investigate an issue and unearth primary themes before employing quantitative analysis to assess the relationships between them.
Mixed methods often confront challenges because qualitative and quantitative research substantially vary structure-wise. They may even be said to oppose. Hence, when having a mixed methods dissertation, you should be careful about the goals of your research and must decide whether the qualitative or quantitative components are more crucial in philosophical, theoretical, and practical terms and whether they can be combined or kept separate.
Editing and proofreading your dissertation is exceedingly crucial . A professional editing and proofreading service has trained, experienced experts with PhD in their fields and will edit your work without prejudice. Their suggestions will make the dissertation or thesis more legible and practical. Another set of eyes can check your dissertation much better than you as they can readily find mistakes or areas that need fine-tuning. In academic writing, editing and proofreading ensure the credibility of the content. Many mistakes concerning grammar, punctuation, syntax, sentence construction and other minor errors are amended. An expert who will amend such mistakes will save time and ensure consistency and error-free writing for your thesis or dissertation.
How to Structure a Dissertation: A Brief Guide
Dissertation Submission Checklist: 5 Important Tips
How to Layout and Format a Dissertation: 10 Tips
How to Choose a Dissertation Editor in 3 Steps
A Step-by-Step Guide on Writing and Structuring Your Dissertation
Visit our order page if you want our subject-area editors or language experts to work on your manuscript to improve its tone and style and give it a perfect academic tone and style through proper editing and proofreading. The process of submitting a paper is very easy and quick. Click here to find out how it works.
Our pricing is based on the type of service you avail of here, be it editing or proofreading. We charge on the basis of the word count of your manuscript that you submit for editing and proofreading and the turnaround time it takes to get it done. If you want to get an instant price quote for your project, copy and paste your document or enter your word count into our pricing calculator.
Contact us to get support with academic editing and proofreading. We have a 24/7 active live chat mode to offer you direct support along with qualified editors to refine and furbish your manuscript.
Follow us on Twitter, LinkedIn, Facebook, Instagram, and Medium .
For more posts, click here.
This brief guide elaborates on quantitative dissertations, qualitative dissertations, and mixed methods dissertations by addressing their similarities and differences. To give you an opportunity to practice proofreading, we have left a few spelling, punctuation, or grammatical errors in the text. See if you can spot them! If you spot the errors correctly, you will be entitled to a 10% discount.
How to Determine Variability in a Dataset
How to Determine Central Tendency
How to Specify Study Variables in Research Papers?
Population vs Sample | Sampling Methods for a Dissertation
7 Issues to Avoid That may Dent the Quality of Thesis Writing
How to Ensure the Quality of Academic Writing in a Thesis and Dissertation?
How to Define Population and Sample in a Dissertation?
ANOVA vs MANOVA: Which Method to Use in Dissertations?
Research takes a crucial role in developing an outstanding academic paper. Ensuring credible research sets the foundation of an academic paper is essential for researchers to obtain the acceptability of the paper. This article discusses four practices that make students better at researching.
Research databases are the foundation of any dissertation or research paper. Scanning through previous findings and research is a key factor while compiling your research proposal or a thesis. Here we discuss the top 5 free online journal and research databases for academics.
What is most critical is that your thesis statement should reflect the primary points of your paper or essay. Its most frequent place is at the end of the introduction section. Based on the essay you are penning, your thesis may look different. Nevertheless, the essential idea must be in your thesis statement so that people can comprehend your fundamental idea. What is left in your essay should relate to the main idea.
For a high-quality research paper, dissertation, or thesis, a helpful research question plays a critical role in designing it. It precisely suggests what you wish to study, presenting your research's apparent emphasis and objective.
Finding a dataset's middle or average is critical and involves measuring central tendency. The central tendency's most common measures include the mode, median, and mean. The mode is the most repeated measure in a data set.
Types Of Thesis Statements
Published on: Sep 3, 2024
Last updated on: Sep 3, 2024
People also read
If you’ve come to this, You might be asking yourself, "How many types of thesis statements are there?"
Well, there are different types of thesis statements, each designed for a specific kind of essay. If you’re looking to inform, persuade, or analyze, picking the right type of thesis statement is key.
We’ll explore the main types and even some you might not be familiar with, giving you clear examples to guide you along the way.
By the end of this blog, you'll know all about the different types of thesis statements in essays and how to use them in your writing.
Let's get started and make your essays more structured and impactful!
A thesis statement is a single sentence that tells the main idea or point of your essay. A good thesis statement clearly explains what your essay is about and what you’re trying to show or argue.
Depending on the nature and the type of paper you’re writing, thesis statements can be divided into three primary types.
An explanatory or expository thesis statement is all about giving information and explaining something. When you use this type, you’re setting up your essay to provide details, describe a process, or clarify a concept. Your goal is to inform the reader rather than to argue or analyze.
Example: “The process of photosynthesis involves the conversion of sunlight into energy, which plants use to grow and produce oxygen.”
In this example, the thesis statement clearly indicates that the essay will explain how photosynthesis works. It doesn’t try to persuade the reader or analyze different aspects; it simply provides information on a topic.
In this example, the thesis statement clearly indicates that the argumentative essay will explain how photosynthesis works. It doesn’t try to persuade the reader or analyze different aspects; it simply provides information on a topic.
Example: “Implementing a four-day workweek would increase productivity and improve employee well-being, making it a beneficial change for modern businesses.”
Here, the thesis statement makes a clear argument that the four-day workweek is a positive change. The essay will then focus on providing evidence and reasons to support this point of view, as well as addressing any opposing views.
An analytical thesis statement breaks down a topic into its components and examines them. It’s used when you want to analyze how something works or evaluate different parts of a subject. This type of thesis statement is great for essays that involve analyzing literature, processes, or events.
Example: “In Shakespeare’s Hamlet , the use of soliloquies reveals the internal conflicts of the characters, illustrating their struggles with morality and action.”
This thesis statement sets up an essay that will analyze how soliloquies in Hamlet reflect the characters’ inner conflicts. It shows that the essay will dissect the use of these soliloquies and explain their significance.
Besides the major types of thesis statements, there are several others that you might come across. Each type serves a different purpose and helps shape your essay in specific ways. Here’s a quick look at some commonly used kinds of thesis statements:
Persuasive Thesis Statement
Narrative Thesis Statement
Descriptive Thesis Statement
Comparative Thesis Statement
Cause and Effect Thesis Statement
Evaluative Thesis Statement
Open Thesis Statement:
Closed Thesis Statement:
Choosing the right thesis statement is essential for guiding your essay in the right direction. To find the best fit, consider the following steps:
In Summary,
So, what’s the takeaway from all these different types of thesis statements? Understanding and choosing the right one can make a huge difference in how you communicate your ideas. Each type has its own role in shaping your essay.
If you need a helping hand with writing thesis statements, don’t worry—there’s help available. Try using the thesis statement generator from MyEssayWriter.ai . It’s a powerful tool that can guide you in creating a strong, clear thesis statement tailored to your essay’s needs.
Give our essay writer a try and take the guesswork out of your writing process!
What is the 3 parts of a thesis statement.
A theme statement is a sentence that shows the main message or big idea of a story. Instead of just summarizing what happens, it explains what the author wants to say about life, society, or people through the story.
Its types are:
Caleb S. (Mass Literature and Linguistics, Masters)
Caleb S. is an accomplished author with over five years of experience and a Master's degree from Oxford University. He excels in various writing forms, including articles, press releases, blog posts, and whitepapers. As a valued author at MyEssayWriter.ai, Caleb assists students and professionals by providing practical tips on research, citation, sentence structure, and style enhancement.
On This Page On This Page
Get Access to Advanced Features with our Affordable Plans
Complimentary Trial
Continue for FREE
OFFER ENDS Today
Signup for Free Access
Access to all Tools
No Credit Card needed
Quota: 1500 Words (6 pages)
Offer ends in: 03hr 19m 8s
Already a user? Login instead
For Monthly Usage
$ 9.99 /month
Up to 2500 words/month
Access to all features
AI Essay Writer
AI Essay Outliner
Go Big Monthly!
$ 14.99 /month
Up to 100,000 words/month
Access to all existing tools
50% off on custom essay orders
500 credits for plagiarism check
Top Annual Savings!
Advanced (4 Months FREE )
$ 99.99 /year
OFFER ENDS Soon
Unlimited essays
12 Months for the price of 8
Access to all upcoming tools
Get started for free
Please enter a valid Name
Please enter a valid email address
Please enter a valid Phone Number
Please enter atleast five characters
Please enter a valid Password
Show Password
Already have an account? Sign In here.
Please enter your email address
Forgot Password?
Don’t have an account? Sign Up
Verify Your Account
Enter the verification codes to confirm your identity.
Code sent to [email protected]
Send again in seconds
Code sent to +1 302 385 6690
Claim Free Essay
Your first custom essay order on our website is FREE!
Thesis & dissertation formatting process.
To complete your format check submission, you must complete every registration step and fully submit your thesis or dissertation to the website listed below.
Dissertations and theses turned in as a part of the graduation requirements at Loyola University Chicago must be formatted according to the rules laid out in the Format Manual for Theses and Dissertations created by the Graduate School.
To ensure that theses/dissertations are formatted correctly, each thesis/dissertation must undergo a format check by the staff of the Graduate School prior to the submission of final copies. You must electronically submit your manuscript for a format check to the Graduate School's ProQuest ETD Administrator website ON OR BEFORE the published format check deadline for the term in which you expect to receive your degree.
On or before the format check deadline, please also submit the following items as supplemental pdf files to ProQuest ETD Administrator (do not submit them by email):
Once your dissertation has been defended, formatted correctly, and approved by your committee, you will need to electronically submit your final copy to the Graduate School for approval. You will also need to replace the Approval Sheet with a scanned copy that has been signed by your director.
Your final electronic submission must be uploaded ON OR BEFORE the published final electronic copy deadline for the term in which you expect to receive your degree. The final electronic copy deadlines are as follows:
If your materials are complete or inaccurate, the Graduate School will contact you with a list of required corrections. If required corrections are too extensive or take too long to complete, you may not graduate and the Graduate School will not confer your degree. For this reason, please make every effort to format your manuscript correctly, include all of the materials listed above, and to meet the published deadlines. Also, please keep in mind that a dissertation or thesis is only one of your degree requirements, and that the Graduate School will not confer your degree unless you meet all of these requirements.
Students must submit final copies with approved revisions within one semester of a successful defense (e.g., if a student’s defense falls within a Fall semester, their final copies must meet the Spring semester submission deadlines). After one full semester a student may be discontinued and be required to apply for reinstatement (Approved 4 May 2021)
Visit the for answers to new questions about the electronic submission process.
Questions regarding the format check and the final copy submission process should be directed here .
The Graduate School hosts two info-sessions each semester about the thesis and dissertation formatting process. Make sure to follow weekly Graduate School Announcements emails for more information.
Publishing Your Work: Thesis and Dissertation Formatting Workshop (Recorded January 14, 2021)
The Thesis/Dissertation Committee Form, Thesis/Dissertation Proposal Ballot, and the Request for Change in Degree-Seeking Status are located in the Graduate Student Progress System at GSPS . Please log in to submit these forms. Medical Center Biomedical Science Students MUST Use LUHS Forms.
Before publication:.
LUC's University Libraries: If relevant articles, book chapters, and books are not accessible through the library's online catalogue, they can be requested through InterLibrary Loan.
Zotero: No matter what citation format you use, this free citation software can help save and format citations for use in your article.
Scimago Journal & Country Rank: To find out the ranking of peer-reviewed journals in your particular discipline before you submit, go to this website.
LUC's Writing Center : Make an appointment with a graduate tutor to have your work reviewed at any stage of the writing or revision process. Often an article will be accepted for publication but an editor requires various corrections. An extra pair of eyes can be useful.
GSPS: Make sure to update publications through this LUC site; submitted entries will be reviewed, approved, and recorded by your GPD.
Google Scholar: Various peer-reviewed articles and publications found on the internet will be linked to the student's account, which can be created by going to this site and clicking on "My Profile."
ORCiD: Creating a free ORCiD ID will allow peer-reviewed publications to be linked across digital platforms with this persistent signifier.
Publishing conventions vary widely across disciplines; some graduate students may publish as single authors while others, particularly in the sciences, may be one of several authors collaborating on a project and its resulting published study. When seeking peer-reviewed publication opportunities, one of the best methods is to consult with professors in your department about how to publish and locate journals reputable in your field of study.
Besides helping you avoid scams and predatory publishing through their advice, faculty can also provide you with useful information about the publishing process and direct you to discipline-specific online listservs hosting frequent Calls for Papers.
The following list details other publication resources for graduate students:
Like humans, businesses experience a lifecycle in which they find themselves in infantile, juvenile, adult, and elderly stages.
When a business is recently born, or launched, it requires an inordinate amount of time and attention to nurture it. Then, finally, it can stand on its own two feet, as is the case for human beings when they are born.
Over time, businesses evolve and mature, through which the perception of those businesses shifts, as is also the case for humans, in that the world's perception of us as children shifts as we age and enter adulthood.
With every business you own, there have been notable “paradigm shifts” that have followed approximately the same course I described above:
The business started out infantile and precarious, during which time much attention and care needed to be paid to it; then, it matured and developed a relative sturdiness to it, though perhaps it experienced growing pains or an ugly duckling phase; then, it reached peak productivity years, contributing to society and its shareholders at maximum levels.
And, in the same way your businesses experienced this lifecycle, we ourselves have experienced it throughout our lives.
Let's consider a couple of examples to further bring this concept to life; then, we will apply it to Tesla, Inc. ( NASDAQ: TSLA ) with a few pieces of very notable data that, I believe, will shift your Tesla paradigm, i.e., your perception of Tesla.
In 2007, Apple ( AAPL ) offered a series of hardware products and scantly much else. To this end, it was often considered a business that lacked a moat, as building a replica of the iPhone or MacBook seemed to be rather easy.
What the market missed was that the software in the iPhone would create profound moats for the business over time.
The iPhone's transition from a hardware product to a software platform was its “Paradigm Shift,” and an appreciation of this shift would have given investors greater confidence in the company's prospects.
The developer-operating system-consumer network effects for Apple's App Marketplace has served to create a virtuous cycle that gravitationally pulls the world into the Apple ecosystem. Apple's iCloud storage acts as memory augmentation for humans and creates a formidable embedding moat. Apple's blue text boxes status signal and create network effects.
In short, the paradigm shift for Apple over the last decade has been our collective perception shifting from seeing Apple as a hardware producer to seeing Apple as a hardware ecosystem. Atop of this ecosystem and within which it has embedded software products that are highly valuable.
This is just one example of a paradigm shift.
I could share with you an endless list of companies who have experienced paradigm shifts. Many of them you can read about via my profile and past ideas. I would invite you to think about the businesses you own through this lens, as well as your life and the lives of your children or spouse.
For the sake of brevity, let's now transition this discussion to a focus on Tesla's paradigm shift.
The argument could be made that Tesla has undergone one or two major paradigm shifts already; however, I believe it's currently in the midst of its most significant shift in the company's history, which will poise it to generate exceptional shareholder returns in the decades ahead.
I would characterize the business as roughly being a teenager or early 20s adult, and, as Blink 182's wisdom reminds us, “ nobody likes you when you're 23. ”
The Market Has Not Liked Tesla For Almost Four Years Now
It's currently transitioning from the way its high school and college classmates saw it to the way the world will see it as a peak productivity adult, so the analogy goes.
To put this into more concrete terms, Tesla is transitioning from a hardware electric vehicle producer, prone to commoditization over time, to an EV plus AI and Energy business.
To provide concrete data illustrating this evolution, let's start with Tesla's Energy business, without which Tesla's sales would have declined in Q2 '24, instead of eking out a meager 2.3% gain year over year.
Tesla Energy Now Contributes Very Meaningfully To Tesla's Overall Sales ($3B Out Of ~$25B In Q2 '24, Up From $1.5B Out Of ~$25B In Q2 '23)
Yahoo Finance
Irrespective of how you feel about my thoughts today, you cannot deny the indisputable and concrete data presented above, in which we can see that Tesla's Energy business now operates at $12B in annualized sales scale, while growing at ~100%.
This is the reality, and it represents the business evolving from an EV pure play to an EV business that now offers genuine energy infrastructure globally as well, and materially benefits from that offering in a way investors should acknowledge.
Tesla's Energy business growth has been driven by the growth of Tesla Megapack deployments specifically, the growth of which is measured in GWh, and this can be seen below.
Tesla's Energy Business Growth Through The Lens Of GWh Deployments
Tesla Q2'24 Earnings Presentation
In 2023, I shared a series of notes with you illustrating that this line of business was, in some sense (don't take it so literally), Tesla's “AWS.”
I did so in this article .
To a large degree, my writing to you today is just an update to that article, though with a little twist that we've already covered.
As we can see via the concrete data above, Tesla must now be considered both an EV business and a rapidly growing Energy business.
To further quantify this Energy business before we transition to Tesla's AI work and concluding thoughts, Tesla has set a goal to achieve 1,500 GWh of storage deployment by 2030. While I think this may be too ambitious, the goal seems more attainable in light of the data presented above. As shown, Tesla grew GWh deployments at 100%+ year over year and now deploys nearly 40 GWh on an annualized basis, up from just 10-15 a year or two ago.
Should it maintain this growth, then 1.5K GWh of annual deployments maybe attainable, if still very, very ambitious.
At 1.5K GWh of annual storage deployment, using the current ratio of 9 GWh/$3B in quarterly revenue, on which Tesla generates ~25% gross margins, Tesla would generate ~$500B in energy sales.
At $500B in energy sales, with ~25% gross margins, which is where Tesla's Energy margins stood in Q2 '24, I believe the company could generate between $50B and $75B in free cash flow, i.e., 10-15% free cash flow margins.
Considering the transition to an alternative energy and electric vehicle future is still in its very, very early innings, I believe that not only is this achievable, but also there will be further runway for growth after achieving it.
EV Adoption Is Still In Its Early Innings
Our World In Data
But It Has Been Growing Rapidly
This is the first paradigm shift that is purely a matter of data. Don't shoot the messenger. Note that I use this language because I've gotten push back on highlighting Tesla's evolution, though I do not know how someone could invest in growth stocks without leveraging some forecasting of the evolution of a company's business model. There would be no sense in even commenting on Tesla today without acknowledging the possible paradigm shift underway for the business, and the same could be said for every great investment of the last 100 years:
There are many, many examples of “paradigm shifts,” and they are always underway in the market. It is the process of “being” and “becoming,” and it's worth considering businesses through this lens, even if we don't get them right all the time.
Let's now turn to a consideration of Tesla “becoming” an AI company, then we will wrap up this review.
Full self-driving, or FSD, should be understood as the creation of an AI that is as smart as its biological AIs who operate vehicles on the road currently.
Tesla's FSD represents building a genuine intelligence that can reason, infer, and predict just as a human would, and, for those that use the software, and I am one of those people, you will very deeply understand this: The software interprets the movements of pedestrians, the actions of other cars, and road signs, by which it ultimately makes decisions about its maneuvers and speed.
It seems like magic, but it's actually a hardcore AI problem, which involves building genuine intelligence that is just like the biological intelligences currently on the road (over time, it will likely be better because it will not be prone to distraction or malfunction such as drunk driving).
With these ideas in mind, Tesla's FSD AI must ingest massive quantities of data, and Tesla must feed that data into giant AI compute clusters, and this Tesla has been doing.
This is similar to a child ingesting data in its early years, and developing a framework for interaction with the world over time, which allows it to survive and thrive.
Tesla FSD Miles Driven Continues To Reach New Heights
Tesla's AI Compute Capacity Continues To Aggressively Build
While Tesla's revenue generation from this business is objectively more nebulous than the concrete data we have on its Energy business, the training data above illustrates that there is progress being made.
Tesla's Robotaxi event will be one worth paying attention to for investors and prospective investors alike.
The concept of “Paradigm Shifts” is also synonymous with the ongoing process that we all experience of “being” and “becoming.”
At any given time, we're constantly torn between these two spectrum ends, which is a paradox of life. We're simultaneously in a state of being and becoming.
And there's risk associated with this process.
There was risk associated with Apple being a hardware produce and becoming a software producer.
There was risk associated with Amazon being a books retailer on the internet and becoming one of the most important cloud computing businesses on earth.
And, there was risk associated with Axon Enterprise ( AXON ) being a body cam and Taser vendor and becoming a global security and software vendor.
Risk lies in competition, execution, and an almost infinite series of other variables, and this could unequivocally be said for Tesla as well.
Whatever your perspective is on Tesla, I believe these ideas are worth pondering.
In a similar vein to my most recent Affirm article, even if you don't agree, it's worth taking time to assess these possible paradigm shifts. Consider the process of being and becoming for your own companies and for your own life.
Thank you for reading, and remember to follow for more insights such as these.
Get started with us today!
This article was written by
Louis Stevens offers a proprietary approach to equity (stock) investing.
Employing his Four Foundational Investment Frameworks, Louis purchases industry-leading businesses that possess mountainous cash hoards, robust free cash flow generation, long runways for growth, and quality company cultures.
Here is a snapshot of the performance of the companies selected using these frameworks: https://www.tipranks.com/experts/bloggers/louis-stevens
Analyst’s Disclosure: I/we have a beneficial long position in the shares of TSLA either through stock ownership, options, or other derivatives. I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it (other than from Seeking Alpha). I have no business relationship with any company whose stock is mentioned in this article.
Seeking Alpha's Disclosure: Past performance is no guarantee of future results. No recommendation or advice is being given as to whether any investment is suitable for a particular investor. Any views or opinions expressed above may not reflect those of Seeking Alpha as a whole. Seeking Alpha is not a licensed securities dealer, broker or US investment adviser or investment bank. Our analysts are third party authors that include both professional investors and individual investors who may not be licensed or certified by any institute or regulatory body.
About tsla stock.
Symbol | Last Price | % Chg |
---|
Related stocks.
Symbol | Last Price | % Chg |
---|---|---|
TSLA | - | - |
TSLA:CA | - | - |
Trending news.
Environmental Systems Research volume 13 , Article number: 37 ( 2024 ) Cite this article
Metrics details
Studies on concrete dam breach are limited compared to earthen and other types of dams. With an increase in the construction of concrete dams, particularly in the developing world, it is imperative to have a better understanding of the dam breach phenomena and the identification of the most influential breach parameters. This study aims to contribute to this gap by taking the case of the concrete arch dam proposed for the 1200 MW Budhigandaki Hydropower Project located in central Nepal. This study carries special significance for Nepal, primarily because of the increasing number of under construction and proposed large dams for water resources development in the country. We carry out dam breach analysis of the Budhigandaki dam using HEC-RAS 2D model to calculate the flood discharge peaks, time to peak, water surface elevation and the extent of inundation for two scenarios (with and without probable maximum flood) to estimate the damage on four downstream settlements. We carry out sensitivity analysis of the breach parameters on the flood magnitudes and severity. Results show that all the study locations lie in the high flood hazard zone. Flood peaks can reach as high as 286,000 m 3 s − 1 to 511,000 m 3 s − 1 in the considered settlements. The time to peak ranges from 11.3 to 17 h after the breach at these locations. We estimate that if a breach should happen, it would most likely inundate around 150,000 buildings, impact nearly 672,000 lives and flood 3,500 km of road downstream. Furthermore, dam breach elevation is found to be the most sensitive parameter to downstream floods. Hence, rather than structural measures, it is recommended that non-structural measures are implemented for minimizing the impacts of flood disasters at the study locations. The findings could be a useful reference for future dam projects in Nepal and other areas with similar hydrological and topographical conditions.
Dams are storage structures providing beneficial functions such as flood control and water supply for different types of users (for example, domestic water supply, hydropower, irrigation, recreation and water transport). The construction of large dams along with generation of electricity started during the industrial revolution in Europe and America. The early 1900s ushered in an era of “big dam” building in America mostly for hydropower generation as demands for electricity increased, the Hoover Dam being regarded as an engineering marvel. The Asian region includes some of the largest dams in the world today such as Tarbela Dam and Mangla Dam in Pakistan, Nurek Dam in Tajikistan, San Rogue Dam in Phillipines and Three Gorges Dam in China, mostly for hydropower generation.
Despite the benefits, failure of dams can cause tremendous losses by generation of unforeseen flood magnitudes in downstream areas. Unfortunately, the history of dams has been studded with disasters of various types, sometimes of great magnitude, with loss of human lives and destruction of property and infrastructure (Aureli et al. 2021 ). USACE ( 2018 ) lists causes of dam breach as earthquakes, landslides, extreme storms, piping, equipment malfunction, structural damage, foundation failure, and sabotage. Regardless of the reason, almost all failures begin with a breach formation.
Basically, breach is defined as the opening formed in the dam body that leads the dam to fail and this phenomenon causes the stored water behind the dam to propagate rapidly downstream (Dincergok 2007 ). Despite piping or overtopping being the main modes of dam failure, the actual mechanics are still not completely understood for either earthen or concrete dams (USACE 2018 ). Past dam-failure disasters have shown that the majority of dams that have failed are earthen (74 dam breaks out of 7812 earthen dams) and the highest percentage of failure of rockfill dams (17 dam breaks out of 200 rockfill dams) (Fang et al. 2017 ). The world’s worst dam disaster happened in China in 1975 when the Banqiao and Shimantan dams failed killing about 171,000 people while 11 million lost their homes (Vincent et al. 2020 ). In 1979, the 25 m high Machu Dam in India, which stored 100 million m 3 , failed after several hours of over-topping causing about 10,000 deaths, 150,000 people were displaced, and 10,000 habitations were destroyed (Lempérière 2017 ). A recent case of the failure of the Rishiganga dam in Uttarakhand (India) in 2021 due to glacier avalanche caused more than 200 deaths and severely damaged infrastructure (Shugar et al. 2021 ). Similarly, failure of the Edenville dam followed by the Sanford dam downstream on the same day in 2020 due to heavy rain in Michigan USA ( Independent Forensic Team 2022 ), and failure of the Spencer Dam in Nebraska USA in 2019 due to ice run (Ettema et al. 2021 ), demonstrate the devastation that dam breaches can lead to. Thus, identification of the vulnerable areas and being aware of the likely damages are key for minimization of the adverse impacts of dam breach.
Dam breach analysis involves three key sequential steps: predicting the reservoir outflow hydrograph, determining dam breach parameters, and routing the hydrograph downstream. Essentially, the breach flood hydrograph depends on the prediction of breach geometry and breach formation time (Basheer et al. 2017 ). There have been many studies on dam breach analysis around the world from the 1980’s (Leng et al. 2023 ; Singh and Snorrason 1984 ; USACE 2024 ). Dam breach analysis is generally carried out by either numerical/computer models or scaled-down physical models. The United States Department of Interior ( 1988 ), recommends estimating a reasonable maximum breach discharge using four principal methods:
Physically Based Methods: Using erosion models based on principles of hydraulics, sediment transport and soil mechanics, development of breach and resulting breach outflow are estimated;
Parametric Models: Time to failure and ultimate breach geometry are assessed utilizing case studies; breach growth is simulated as a time-dependent linear process and breach outflows are computed using principles of hydraulics;
Predictor Equations: Using data of case studies, peak discharge is estimated from empirical equations and a reasonable shape of outflow hydrograph is assumed; and.
Comparative Analysis: Breach parameters are determined by comparison of dam under consideration and a dam that failed.
There are far fewer studies on the failures of concrete dams compared to earthen dams, especially due to breaches which leads to difficulty in determining the concrete dam breach parameters (Fang et al. 2017 ). Moreover, a study of well documented dam-failure cases showed that empirical formulas provide results closer to reality (Fang et al. 2017 ). For instance, Froehlich( 1995 ) developed a prediction equation for the average breach width based on 63 cases of embankment-dam failures and an equation for the breach-formation time based on 21 cases. Focusing on earthen dams has been driven by their historical prevalence, cost-effectiveness, and adaptability. However, studying concrete arch dams is crucial for advancing engineering practices, improving safety and efficiency in dam construction, supporting hydroelectric power generation, addressing environmental impacts, and preserving significant cultural landmarks. Many federal agencies such as FERC ( 1993 ),Office of the State Engineer( 2020 ) and USACE ( 2014 ) have published guidelines recommending possible ranges of values for breach width, side slopes, and development time for different types of dams. This study aims to investigate the breach characteristics of concrete arch dams, an area with limited existing literature. Several dam breach analysis studies have been carried out in Nepal such as in Kulekhani dam using HEC-RAS (Pandey et al. 2023 ), Kaligandaki landslide dam using BREACH (Bricker et al. 2017 ), Koshi high dam using HEC-RAS (Gyawali, D.R. and Devkota, 2015 ), among others. However, no sensitivity analysis of dam breach parameters has been carried out for the afore-mentioned studies.
The proposed Budhigandaki dam located in the transboundary Budhigandaki Basin, spread over southern China and central Nepal, is taken as a case. The Government of Nepal (GoN) has prioritized hydropower generation as the backbone of economic development to attain the goals to raise the country’s status to middle income country level by 2030 (Government of Nepal 2020 ). As a result, there are currently more than 9 planned and proposed large hydropower dam projects by the state (Nepal Electricity Authority 2022 ). The Budhigandaki Hydropower Project (BGHPP) could be the largest storage project of Nepal, if constructed, which could lead to catastrophic damages downstream in the event of a breach.
Hence, the overarching objective of this study is to assess the flood impacts of the Budhigandaki Dam on the downstream settlements due to possible dam breach scenarios. Specifically, this study intends to quantify the peak discharge, time to peak, and the water surface elevation at the downstream locations due to a dam-breach flood. Further, sensitivity analysis of five different dam breach parameters is conducted to acquire information about extent of influence of each parameter on the dam breach. The analysis is carried out in the widely-used hydraulic model Hydrologic Engineering Center’s - River Analysis System (HEC-RAS) developed by the United States Army Corps of Engineers (USACE). Furthermore, zoning of the downstream settlement areas in Geographic Information System (GIS) based on flood severity provides meaningful information to the project developers as well as planners in the impacted areas.
The Budhigandaki Hydropower Project (BGHPP) is a 1200 MW storage type proposed project of Nepal located approximately 2 km upstream of the confluence of Budhigandaki River with Trishuli River as shown in Fig. 1 . The Budhigandaki Dam is a 263 m high double curvature concrete arch dam with a reservoir volume of 4.5 billion cubic meters (BCM), out of which the active storage is 2.2 BCM. The dam crest length is 737.4 m and the reservoir Full Supply Level (FSL) is at 540 m above sea level (masl) (Budhigandaki Development Committee, 14a). There are some major settlement areas nearly 110 km downstream which are susceptible to danger in case of dam breach. For this study, four major towns namely, Narayangarh, Baraghare, Divyanagar and Meghauli, have been assessed. Moreover, future risk of impact from the dam failure can be expected to increase as increased in population growth due to improved job opportunities and other economic activities in the area because of the construction of the dam. Therefore, the Budhigandaki Dam has been taken as a case in this study to assess the flooding impacts of the dam on the downstream areas through simulation of a hypothetical dam failure.
Location of Budhigandaki dam and downstream settlement areas
Dam breach analysis of the Budhigandaki dam has been carried out in HEC-RAS using unsteady flow simulation with terrain and land cover as the geometric input data. The upstream boundary condition is the probable maximum flood (PMF) hydrograph which has been generated using an empirical method while the downstream boundary condition is normal depth. Two dam failure scenarios, namely, dam breach at reservoir full condition with PMF (Scenario I: base case) and dam breach at reservoir full condition without PMF (Scenario II), have been modelled in the study. Outputs of the simulation are used for creating flood inundation maps, flood hazard vulnerability maps and flood arrival time maps corresponding to the different scenarios. Sensitivity analysis of the dam breach parameters is also carried out to assess their impacts on the flood conditions downstream of the dam. Figure 2 summarizes the overall research methodology.
Overall research methodology of this study. DEM: Digital Elevation Model, PMP: Probable Maximum Precipitation, PMF: Probable Maximum Flood, SA: Storage Area, 2D: Two Dimensional, FSL: Full Supply Level
The spatial inputs required to model the dam breach are digital elevation model (DEM), land cover and Manning’s roughness coefficient. Rainfall and discharge are needed for generation of inflow hydrograph as upstream boundary condition to the model. In addition, infrastructure data of the downstream area is required for estimating the impacts of floods. Details of the required data and their sources are presented in Table 1 .
The probable maximum precipitation (PMP) is the theoretical maximum precipitation for a given duration under current meteorological conditions (World Meteorological Organization 2009 ). Daily maximum rainfall data of 13 surrounding stations from 1972 to 2014 has been used for the calculation of PMP. The 1-day PMP for all the stations was calculated using Hershfield formula (Hershfield 1965 ) given in Eq. ( 1 ) :
Where, PMP = Probable maximum precipitation.
M = mean of maximum daily rainfall sample S = Standard deviation.
K = Frequency factor = 15 (Hershfield 1965 ).
The calculated 1-day PMP of the point stations was further interpolated using Thiessen Polygon, Kriging, Spline and Inverse Distance Weighing (IDW) methods in GIS to compute the 1-day PMP for the Budhigandaki Basin. In order to model a worst-case scenario, the maximum value of the PMP among these methods was chosen for generating the PMF hydrograph.
Probable Maximum Flood (PMF) is theoretically the flood resulting from a combination of the most severe meteorological and hydrologic conditions that could conceivably occur in a given area (FERC 2001 ). HEC-RAS requires a flood hydrograph to be provided as input for the unsteady flow analysis in the dam breach model. Therefore, a synthetic unit hydrograph was developed using Snyder’s Method (American Geophysical Union 1938 ) using the following equations (Eq. ( 2 ) to Eq. ( 7 ) which was then transposed to generate a direct runoff hydrograph of PMF.
Mathematically,
Dam breach analysis of the Budhigandaki dam has been carried out in HEC-RAS model under two-dimensional dynamic (unsteady-flow) mode. Hypothetical breach of the dam and its propagation downstream has been modelled using 2D Diffusion wave equations (Eq. ( 8 ) to Eq. ( 10 )).
Where, h is the water depth (m), p and q are the specific flow in the x and y directions (m 2 s − 1 ), ζ is the surface elevation (m), g is the acceleration due to gravity (9.8 m s − 2 ), n is the Manning’s coefficient, ρ is the water density (1000 kg m − 3 ), τ xx , τ yy , and τ xy are the components of the effective shear stress along x and y directions (N m − 2 ), and f is the Coriolis (s − 1 ).
Two-dimensional (2D) mesh of size 100 m x 100 m was chosen to represent the downstream land. Comparison of different mesh sizes (100 m and 200 m) indicated no significant difference in model performance. The storage areas and downstream areas are connected using an inline structure (Budhigandaki dam) as shown in Fig. 3 . “Storage Area” refers to upstream reservoir of the dam axis while “Downstream Study Area” represents the four towns (Narayangarh, Baraghare, Divyanagar, and Meghauli) located downstream which are likely to be inundated in case of dam breach (BGHP, 2015). Boundary conditions are required at the upstream and downstream ends of the model for flood routing. The upstream boundary was fixed at the reservoir extent (storage area) and the boundary condition was provided in the form of flood hydrograph generated from PMF. Outlet is the downstream boundary past the settlement areas as shown in Fig. 3 while the boundary condition of normal depth is maintained by providing the river bed-slope obtained from the DEM.
HEC-RAS 2D flow area and model schematic for the flood simulation of Budhigandaki dam breach
In order to quantify the downstream effects of the Budhigandaki dam breach, the following two scenarios have been simulated:
Scenario 1: Dam breach when reservoir is at FSL with PMF. Scenario 2: Dam breach when reservoir is at FSL.
Only overtopping breach mode was analyzed as the dam is made up of concrete and there are less chances of other failure modes (Zhang et al. 2016 ). Moreover, for better understanding the Budhigandaki dam breach mechanism and impacts, sensitivity analysis of the following five important breach parameters as breach bottom elevation, breach bottom width, breach weir coefficient, breach formation time and breach side slope was carried out by varying their values over a reasonable range obtained from literature.
Scenario I have been considered as the base case. Sensitivity of the above-mentioned breach parameters on flood peak discharge, water surface elevation and flood arrival time at the four downstream locations along with inundation area are analyzed considering the base case.
The inputs for the dam break analysis adopted for the base case i.e., Scenario I is listed in the Table 2 . The values of breach parameters have been derived from FERC ( 1993 ), Office of the State Engineer ( 2020 ) and USACE ( 2014 ) specific for concrete dams.
Using RAS Mapper, a series of flood maps were generated based on the outputs of the 2D simulation of the Scenario I dam breach. These maps were helpful in identifying the potentially risky and safe areas. The outputs of the HEC-RAS model were exported to GIS for further analysis and mapping.
Using the simulation results, flood inundation maps were prepared illustrating the maximum flood depths across the study area for the different scenarios.
Flood Hazard Vulnerability Map : A flood hazard vulnerability map based on the product of depth and velocity was prepared using the Australian Rainfall-Runoff Guidelines (Australian Rainfall and Runoff 2019 ) which categorize the flood in six zones as: H1 ( D*V ≤ 0.3, D max = 0.3 m, V max = 2.0 m/s, safe for people, vehicles and buildings); H2 ( D*V ≤ 0.6, D max = 0.5 m, V max = 2.0 m/s, unsafe for small vehicles); H3 ( D*V ≤ 0.6, D max = 1.2 m, V max = 2.0 m/s, unsafe for vehicles, children and elderly); H4 ( D*V ≤ 1.0, D max = 2.0 m, V max = 2.0 m/s, unsafe for people and vehicles); H5 ( D*V ≤ 4.0, D max = 4.0 m, V max = 4.0 m/s, unsafe for people and vehicles, buildings vulnerable to structural damage) ; H6 ( D*V > 4.0, unsafe for people and vehicles, all buildings vulnerable to failure) where D and V refer to the flood depth and velocity, respectively while D max and V max refers to the maximum depth and maximum velocity, respectively.
Flood arrival time maps represent the computed time (in hours or days) from a specified time in the simulation when the water depth reaches a specified inundation depth. For the case of Budhigandaki dam breach, flood arrival times at the four settlement areas were calculated and mapped.
The 1-day PMP value using the 13 precipitation stations was calculated to be 518 mm, 530 mm, 556 mm and 485 mm using Thiessen polygon, Kriging, inverse distance weighted (IDW), and Spline interpolation methods, respectively. As a worst-case scenario, we chose the IDW method, which gave the maximum value of PMP among the four methods, for generating the PMF hydrograph. Using the input data listed in the Appendix 1, ordinates of the synthetic unit hydrograph was computed using Snyder’s method as shown in Fig. 4 .
Synthetic Unit Hydrograph and Probable Maximum Flood Hydrograph for the Budhigandaki dam
From the synthetic unit hydrograph and rainfall intensity duration curve, Direct Runoff Hydrograph was generated. The flood values are generated for a 60-minute interval by linear interpolation between the ordinates of the unit hydrograph. August is the month with the highest flows at the Budhigandaki dam site. Therefore, base flow of 441 m 3 s − 1 which is the mean August flow (during 1964–2012) was added to obtain the final hydrographs (BGHPP Development Committee 2014b ). The final results are plotted in Fig. 4 . I t can be seen that the peak discharge of 11,669 m 3 s − 1 occurs at 33.9 h after the start of rainfall for PMF + base flow.
The river valley of 110 km length from Budhigandaki dam to Meghauli was considered for the analysis. The maximum flood depth Fig. 5 shows that the flood depth is as high as 212 m in the upstream area as the river channel is narrow whereas the depth becomes lesser in the downstream river sections where the area is relatively wide and plain. The maximum water depths at Narayangarh is estimated to be 90 m followed by 50.3 m at Baraghare.
Flood Inundation Map Based on Maximum Depths
Similarly, Flood Hazard Vulnerability Map based on the depth and velocity was prepared as shown in Fig. 6 . It can be identified from the map that all the downstream area lies in H6 zone i.e., unsafe for people and vehicles and all buildings are vulnerable to failure.
Flood Hazard Vulnerability Mapping Based on Depth and Velocity
Simulated flood peak arrival times calculated at the four downstream settlement areas are shown in Fig. 7 . It is useful in designing of early warning systems at these locations. It can be seen that the travel times range from 11.3 h (Narayangarh) to 17 h (Meghauli) immediately after the dam breach depending on the proximity from the dam.
Flood arrival time for the major downstream settlement locations; D/S is downstream
As an impact of dam breach on land cover, it is seen that the inundated type to be most likely inundated is agricultural area (538 km 2 ). Similarly, 239 km 2 of forest is likely to be inundated second in rank. Grassland, water body, barren area, built-up area and shrub land are expected to be inundated with areas of 43 km 2 , 38 km 2 , 25 km 2 , 22 km 2 and 1.5 km 2 respectively as shown in Fig. 8 .
Inundation extent due to dam breach by land cover
Water surface elevations along the modelled river reach corresponding to the two scenarios are shown in Fig. 9 . It is seen that the water surface is nearly 110 m above the bed level at immediate downstream of the dam site while it is as low as 30 m in the downstream study areas. There is an enormous volume of water flowing down in a very short time because of the breach resulting in such high values of water depths along the river reach. There is very less change in the water surface elevation between Scenario-1 and 2. Also, at the settlement areas, the flow width is large i.e., flat plain area and hence lesser change is seen on the water surface elevation at downstream areas.
Profile of water surface elevation and river bed for Scenario I and Scenario II. Scenario I: Dam Breach at FSL with PMF and Scenario II: Dam Breach at FSL without PMF
For the two scenarios (Scenario-1 and Scenario-2), the flow hydrographs have been compared at immediate downstream of the dam and at the four major settlement locations as shown in Fig. 10 . It is to be noted that the peak discharge occurs nearly at the same time for both scenarios at all locations. At Narayangarh, peak discharges for Scenarios-1 and 2 are 511,587 m 3 s − 1 and 501,479 m 3 s − 1 respectively i.e., around 2% of difference in the value. Similarly, at Baraghare, the peak discharge for Scenario-1 is 454,267 m 3 s − 1 whereas 441,862 m 3 s − 1 for Scenario-2 and for Divyanagar, the peak discharge for Scenario-1 is 364,697 m 3 s − 1 whereas 357,294 m 3 s − 1 for Scenario II respectively. Lastly for Meghauli, the peak discharge for Scenario-1 is 294,928 m 3 s − 1 whereas 286,813 m 3 s − 1 for Scenario-2. It is obvious that the peak discharge for Scenario-1 is greater than that of Scenario-2, however, the differences in the peak values between the two scenarios are quite small (in the range of 2–3%). This implies that the storage volume of the dam is the major contributor to the flood discharge rather than the PMF.
Comparison of flood hydrographs at major study locations for Scenario I and Scenario II. Scenario I: Dam Breach at FSL with PMF and Scenario II: Dam Breach at FSL without PMF
The possible impact of inundation due to dam breach on buildings and roads was assessed. The total road length includes several types of roads such as highways, feeder roads, district roads and local roads. The inundated highway road length has been computed separately and all other types of roads has been kept as other roads (Table 3 ). It can be seen that Chitwan is the most impacted district with 58.5% of buildings and 2,541 km of road likely to be inundated. Meanwhile, Gorkha is expected to be the least affected district with 2.6% buildings and 132.4 km road inundated. Also, 149,311 numbers of buildings are inundated in total. If the total number of persons on average per household is taken as 4.5 (Cental Bureau of Statisitics 2016 ), a total of about 0.7 million people are likely to be affected by inundation in the case of dam breach. This is about 2.3% of the total population of Nepal.
Sensitivity analysis was performed in order to estimate the impact of the breach parameters on the simulated floods in the downstream impacted areas. The values of the input breach parameters were changed within a reasonable range, one at a time, in the dam breach model and the corresponding values of the peak discharge, water surface elevation, flood arrival time and land inundation area were recorded. Breach bottom elevation was varied from 450 masl to 525 masl. Similarly, breach width was varied from 55 m to 150 m and breach weir coefficient was varied from 0.9 to 1.7. Also, breach formation time was varied from 0.05 h to 0.3 h and breach side slope was varied from 0.7:1 to 2.5:1 ( H : V ). Results of the sensitivity analysis have been presented in Table 4 .
It is seen from Table 4 that as the breach bottom elevation is increased from 450 masl to 525 masl, the value of peak discharge and WSE are significantly decreased at the different downstream locations. It is observed that a 30% increase in breach bottom elevation (450 masl to 475 masl) led to 20–35% decrease in peak discharge, 20–25% decrease in WSE at different downstream locations and nearly 30% decrease in inundation area (893 km 2 to 735 km 2 ). However, the flood peak arrival time is not much altered due to change in breach bottom elevation.
It is seen from Table 4 that an increase in breach width from 55 m to 150 m corresponds to an increase in discharge, WSE and inundation area but the change is not as significant as compared to that of change in breach bottom elevation. A 30% increase in breach width (80 m to 105 m) led to nearly 3% increase in peak discharge at all downstream locations. However, not much change is seen on the WSE, flood arrival time and inundation area due to change in breach bottom width.
An increase in the breach weir coefficient from 0.9 to 1.7 led to increase in discharge, WSE and inundation area but with a smaller magnitude compared to that of change in breach bottom elevation (Table 4 ). A 20% increase in breach weir coefficient (1.44 to 1.7) led to nearly 3% increase in peak discharge at all downstream locations. Also, no significant change is seen on the WSE, flood arrival time and inundation area due to change in breach weir coefficient.
Interestingly, there is very insignificant change in peak discharge, WSE, flood arrival time and inundation area due to varying breach formation time (Table 4 ). The values of peak discharge, WSE, flood arrival time and inundation area remain almost unchanged despite the breach formation time is increased up to 200% (0.1 h to 0.3 h).
A 50% increase in the side slope (1.3:1 to 2:1) led to nearly 2–3% increase in peak discharge as shown in Table 4 . Also, no significant change is seen on the WSE, flood arrival time and inundation area due to change in breach side slope.
Thus, results of the sensitivity analysis varying the values of the breach parameters, namely, dam breach bottom elevation, breach bottom width, breach weir coefficient, breach formation time and breach side slope on the peak discharge, WSE, flood arrival time and downstream inundation area has been summarized in Table 5 . It can be seen that dam breach bottom elevation is the most sensitive parameter with respect to output values such as peak discharge, WSE and downstream inundation area while breach formation time is the least sensitive parameter with respect to all the output parameters.
We have estimated the PMP followed by PMF which is the upstream boundary condition required for the dam breach model in HEC-RAS. The PMP value was chosen as 556 mm from the IDW method. Also, the PMP value as per the detail design report (BGHPP Development Committee 2014b ) is 594 mm. Both the values of PMP are generated using Hershfield formula. However, this slight variation in the PMP values is due to the difference in the values of frequency factor. The value of frequency factor in this study is taken as 15 (Hershfield 1965 ). Subsequently, the PMF value for this study is generated using Snyder’s Unit Hydrograph Method with peak discharge as 11,669 m 3 s − 1 . Besides, by using regional method the PMF was calculated to be 11,479 m 3 s − 1 and regional regression flood analysis method 11,957 m 3 s − 1 (Department of Electricity Development 2006 ). Hence, the PMF values considered in this study are assumed to be reliable.
Simulation results of Scenario I and Scenario II showed that there is a huge peak discharge immediately downstream of the dam breach (Fig. 10 and the difference in discharge values for both scenarios is low. The reason for this is due to the large storage volume of the dam leading to minimum effect of PMF being observed. Also, the downstream tributaries are much smaller compared to the Budhigandaki mainstream river. Hence, their additional impacts on the dam breach flood magnitudes can be considered to be marginal. Additionally, the outputs such as peak discharge, WSE, flood arrival time and inundation area from the dam breach has been estimated as a standalone event. The impact of addition of inflows from the other tributaries (for example, due to localized cloudburst events) to the mainstream river in the downstream settlement area could be areas of further study.
Previous dam breach analysis on Budhigandaki dam has been carried out by Tractebel and jade consult as JV using TELEMAC software (BGHPP Development Committee 2014a ). The output results of the previous study appeared to be quite different from the study carried out using HEC-RAS. There could be various reasons for such discrepancies. The TELEMAC model has considered full dam breach whereas our study does not consider full dam breach. Also, the earlier model has considered high accuracy resolution LiDAR data and other input data (mesh size 30 m*50 m) whereas our study considers 30 m*30 m DEM data and 100 m*100 m mesh size due to model stability issues. However, the pattern of change in peak discharge and WSE at the different study locations are quite similar for both models.
Dam breach analysis has been carried out in different parts of the world using HEC-RAS adopting a methodology similar to ours. For example, simulations of the breach of Batutegi earthen Dam, Indonesia (Wahyudi 2004 ), Mosul earthen Dam, Iraq (Basheer et al. 2017 ) and the results of sensitivity analysis are found out to be quite similar to this study. All these studies showed that dam breach bottom elevation is the most sensitive parameter. Further, the trends in WSE and peak discharge with time and distance from the dam obtained in these studies are also comparable to those of our study. The WSE and peak discharge increased with the increase in the breach parameters as breach bottom elevation, breach bottom width, breach weir coefficient and breach side slope. The peak discharge decreased with increase in breach formation time and negligible change was seen on WSE. Hence, through sensitivity analysis, it is seen that dam breach bottom elevation is the most sensitive parameter while breach formation time is the least sensitive parameter with regards to the floods.
This analysis of a hypothetical dam breach provides insight to the level of possible damage should such a breach occur. Also, it can be deduced from this study that construction of embankments along the river is not a practical mitigation measure because of the extremely high-water depths (nearly 90 m) that these structures need to retain within them. Hence, other non-structural preventive measures such as creating awareness regarding flood risks, community-based flood early warning system (CBFEWS), training and deployment of efficient disaster response teams, zoning of high-risk areas, avoiding construction/settlements in such areas, identification of evacuation centers etc. are recommended. The Yokohama Strategy and Plan of Action (World Conference on Natural Disaster Reduction 1994 ), Hyogo Framework for Action 2005–2015 (International Strategy for Disaster Reduction 2005 ), and the current Sendai Framework for Action 2015–2030 (United Nations 2015 ) highlight the importance of early warning in reducing disaster risk and enhancing the resilience of vulnerable communities. CBFEWS generates and disseminates meaningful and timely flood warnings to vulnerable communities threatened by flood, so they can prepare and act correctly in sufficient time to minimize the possibility of harm. Owing to non-structural measures, the response and adaptation to floods of the vulnerable communities vary widely and are impacted upon by various factors, such as community resilience and susceptibility to flood. Also, the effectiveness of the non-structural measures appears sensitive to the socio-economic changes and governance arrangements (Dawson et al. 2011 ). Nonetheless, non-structural measures provide flexible flood management options for adapting to the ever-changing river basins, socio-economic and climate scenarios, and are in line with the spirit of environment friendly and sustainable development (Shah et al. 2018 ). Also, research on identification of shelter areas and evacuation plan can be an extension of this study using network analysis, buffers and proximity analysis in GIS. Moreover, the sensitivity analysis depicts the most sensitive breach parameters which need to be considered with extreme importance during planning, design, construction and operation of the dam.
This paper simulated the dam breach scenarios of the proposed Budhigandaki dam in central Nepal using HEC-RAS and assessed the impacts on the downstream settlements. Flood peaks, water surface elevations and flood arrival times were calculated for the two scenarios with and without PMF. In addition, sensitivity analysis was carried out to examine the influence of the breach parameters on the flood characteristics.
Results show that the entire downstream area lies in high hazard zone with flood arrival times at Narayangarh, Baraghare, Divyanagar and Meghauli ranges from 11.3 h to 17 h. Moreover, a total of 1,49,311 number of buildings are prone to inundation in the case of dam breach along with 671,900 lives at risk and around 3,500 km stretch of road most likely to be severely damaged. The dam-break flood peak exceeds 650,000 m 3 s − 1 in the immediate downstream of the dam while it attenuates to 511,000 and 286,000 m 3 s − 1 at Narayangarh and Meghauli, respectively. The maximum depth of water ranges from 30 m (in the downstream flat areas) to 212 m (in the upstream steep gorges) clearly discarding the physical and economic feasibility of structural measures for flood management in this case. In addition, 538 km 2 of agricultural land and 25 km 2 of built-up land is at risk of flood inundation. Therefore, it is imperative to implement preventive and non-structural measures such as creating awareness regarding flood risks, developing community-based flood early warning system (CBFEWS), training and deployment of efficient disaster response teams, zoning of high-risk areas, avoiding construction/settlements in such areas, identification of evacuation centers, monitoring and constant auscultation of the structure and developing robust and efficient emergency and alert plans.
Furthermore, the differences in the peak discharges and water surface elevations between the two scenarios are very less at the study locations. This implies that the impact of the huge storage volume of the reservoir on the breach flood characteristics is considerably larger in comparison to the PMF. In addition, change in dam breach bottom elevation was found to be the most sensitive to floods compared to other dam breach parameters.
Additionally, the methodology applied in this study is conveniently replicable of other dams, large or small. However, the simulation run-times may vary depending upon the size of the dam, mesh size, simulation time step and other model complexities. It is to be noted that the case may change for snow fed rivers and glacier lakes. Also, while applying this method to other projects, one should always be careful about the boundary conditions and the initial values of dam breach parameters as they vary depending upon the dam under consideration.
Nepal has currently only one storage dam hydropower project (Kulekhani) in operation. With a greater number of storage projects being planned and under construction, this study could be a useful reference for such future projects. Moreover, this study provides interesting results particularly related to the sensitivity of the breach parameters of concrete arch dams, which could be applicable in study of similar dams in other regions of the world.
No datasets were generated or analysed during the current study.
Catchment Area (km2)
Peak flow coefficient (-)
Lag Coefficient (-)
Coriolis (s − 1 )
acceleration due to gravity (m s − 2 )
water depth (m)
Frequency Factor (-)
main channel length from basin outlet to upstream watershed boundary (km)
main channel length from outlet to a point nearest to centroid of watershed (km)
Mean of Maximum daily rainfall (mm)
Manning’s Coefficient (-)
Specific flow in x-direction (m 2 s − 1 )
Probable maximum precipitation (mm)
Discharge (m 3 s − 1 )
Specific flow in y-direction (m 2 s − 1 )
Unit peak discharge (m 3 s − 1 )
Standard Deviation (mm)
Base time (hours)
Rainfall excess duration time (hours)
Basin Lag time (hours)
Width of unit hydrograph at discharge value exceeded 50% of the peak discharge (hours)
Width of unit hydrograph at discharge value exceeded 75% of the peak discharge (hours)
Surface Elevation (m)
Water Density (kg m − 3 )
Effective Shear Stress (N m − 2 )
Effective Shear Stress along x direction (N m − 2 )
Effective Shear Stress along x and y direction (N m − 2 )
Effective Shear Stress along y direction (N m − 2 )
American Geophysical Union (1938) Reports and Papers, Hydrology
Aureli F, Maranzoni A, Petaccia G (2021) Review of historical dam-break events and laboratory tests on real topography for the validation of numerical models. Water 13(14). https://doi.org/10.3390/w13141968
Australian Rainfall and Runoff (2019) A Guide to Flood Estimation, Book 6 - Flood Hydraulics
Basheer TA, Wayayok A, Yusuf B, Rowshon MK, Basheer TA, Kamal R (2017) Dam breach parameters and their influence on flood hydrographs for Mosul dam. Article J Eng Sci Technol 12(11):2896–2908. https://www.researchgate.net/publication/328475986
Google Scholar
BGHPP Development Committee (2014a) Feasibility Study And Detailed Design of Budhi Gandaki HPP, Vol. 2B: Assessment of Downstream Impacts
BGHPP Development Committee (2014b) Feasibility Study and Detailed Design of Budhigandaki HPP Vol. 2A: Hydrological and Meteorological Analysis
Bricker JD, Schwanghart W, Adhikari BR, Moriguchi S, Roeber V, Giri S (2017) Performance of models for Flash Flood warning and Hazard Assessment: the 2015 Kali Gandaki Landslide Dam Breach in Nepal. Mt Res Dev 37(1):5–15. https://doi.org/10.1659/MRD-JOURNAL-D-16-00043.1
Article Google Scholar
C Froehlich D (1995) Embankment dam breach parameters revisited. Int Water Resour Eng Conf - Proc 1(January 1995):887–891
Cental Bureau of Statisitics (2016) Statistical Pocket Book of Nepal . www.cbs.gov.np
Dawson RJ, Ball T, Werritty J, Werritty A, Hall JW, Roche N (2011) Assessing the effectiveness of non-structural flood management measures in the Thames Estuary under conditions of socio-economic and environmental change. Glob Environ Change 21(2):628–646. https://doi.org/10.1016/j.gloenvcha.2011.01.013
Department of Electricity Development (2006) Design Guidelines for Headworks of Hydropower Projects . https://www.doed.gov.np/pages/guidelines-and-manuals
Dincergok T (2007) The role of dam safety in dam-break induced flood management. International Conference on River Basin Management , 683–691
Ettema R, Baker ME, Teal M, Trojanowski J (2021) Ice-Run Destruction of Spencer Dam on Nebraska’s Niobrara River. CGU HS Committee on River Ice Processes and the Environment, 21st Workshop on the Hydraulics of Ice-Covered Rivers, Saskatoon, Saskatchewan, Canada
Fang CH, Chen J, Duan YH, Xiao K (2017) A new method to quantify breach sizes for the flood risk management of concrete arch dams. J Flood Risk Manag 10(4):511–521. https://doi.org/10.1111/jfr3.12240
Federal Energy Regulatory Commission (FERC) (1993) FERC Engineering Guidelines
FERC (2001) FERC Engineering Guidelines for the Evaluation of Hydropower Projects
Government of Nepal (2020) The Fifteenth Plan (Fiscal Year 2019/20–2023/24) . www.npc.gov.np
Gyawali DR, Devkota LP (2015) Dam Break Analysis using HEC-RAS: A Case Study of Proposed Koshi High Dam. Proceedings of the Seminar on Water and Sustainable Development
Hershfield DM (1965) Method for estimating probable Maximum Precipitation. J Am Waterworks Association 57:965–972
Independent Forensic Team (2022) Final Investigation of Failures of Edenville and Sanford Dams
International Strategy for Disaster Reduction (2005) Hyogo framework for action 2005–2015. World Conference on Disaster Reduction , January 2005 , 508–516. https://doi.org/10.1007/978-1-4020-4399-4_180
Lempérière F (2017) Dams and floods. Elsevier 3(1):144–149. https://doi.org/10.1016/J.ENG.2017.01.018
Leng Q, Zhang M, Zhao G, Mao S, Jiang A (2023) Simulation and Hazard Map of flooding caused by the Break of a concrete gravitational dam. Lecture Notes Civil Eng 264 LNCE:1248–1260. https://doi.org/10.1007/978-981-19-6138-0_109
Nepal Electricity Authority (2022) Nepal Electricity Authority, A Year in Review- Fiscal Year 2021/2022 . www.nea.org.np
Office of the State Engineer (2020) Guidelines for Dam Breach Analysis
Pandey BR, Knoblauch H, Zenz G (2023) Potential dam Breach Flood Hazard Assessment of Kulekhani Reservoir Rock fill dam using 2D diffusion and full dynamic shallow water equation defining Coriolis Effect. Preprints Org. https://doi.org/10.20944/preprints202311.0088.v1
Shah MAR, Rahman A, Chowdhury SH (2018) Challenges for achieving sustainable flood risk management. J Flood Risk Manag 11:S352–S358. https://doi.org/10.1111/jfr3.12211
Shugar DH, Jacquemart M, Shean D, Bhushan S, Upadhyay K, Sattar A, Schwanghart W, McBride S, van Wyk de Vries M, Mergili M, Emmer A, Deschamps-Berger C, McDonnell M, Bhambri R, Allen S, Berthier E, Carrivick JL, Clague JJ, Dokukin M, Westoby MJ (2021) A massive rock and ice avalanche caused the 2021 disaster at Chamoli. Indian Himalaya Sci 373(6552):300–306. https://doi.org/10.1126/science.abh4455
Article CAS Google Scholar
Singh KP, Snorrason A (1984) Sensitivity of outflow peaks and flood stages to the selection of dam breach parameters and simulation models. J Hydrol 68(1–4):295–310. https://doi.org/10.1016/0022-1694(84)90217-8
United Nations (2015) Sendai Framework for Disaster Risk Reduction. In UN World Conference
United States Department of Interior (1988) Downstream Hazard Classification Guidelines. In ACER Technical Memorandum No. 11, Assisstant Commissioner - Engineering and Research, Denver, Colorado
USACE (2014) Using HEC-RAS for Dam Break Studies . www.hec.usace.army.mil
USACE (2018) Hydrologic Engineering Requirements for Reservoirs Engineer Manual
USACE (2024) HEC-RAS River Analysis System HEC-RAS Hydraulic Reference Manual
Vincent E, Emeka OM, Dominic P (2020) Dam and its Failure: A Brief Review of some selected Dams around the World. Adamawa State University Journal of Scientific Research , 8 . http://www.adsujsr.com
Wahyudi E (2004) Dam Break Analysis; A Case Study
World Conference on Natural Disaster Reduction (1994) Yokohama Strategy and Plan of Action for a Safer World: Guidelines for Natural Disaster Prevention, Preparedness and Mitigation. World Conference on Natural Disaster Reduction Yokohama, Japan, 23–27 May 1994 , May 1994 , 23–27
World Meteorological Organization (2009) Manual on estimation of probable maximum precipitation (PMP)
Zhang L, Peng M, Chang D, Xu Y (2016) Statistical Analysis of Failures of Concrete Dams. In Dam Failure Mechanisms and Risk Assessment . https://doi.org/10.1002/9781118558522.ch4
Download references
We wish to express my very deepest thanks and gratitude to Mr. Shreeram Shrestha, Civil Engineer, Chilime Hydropower Company Limited, Nepal for his continuous guidance, inspiration and encouragement during the initial preparation of building HEC-RAS model to result interpretation and completion of this study.
This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.
Authors and affiliations.
Nepal Engineering College, Pokhara University, Bhaktapur, Nepal
Institute for Life Sciences and the Environment, University of Southern Queensland, Toowoomba, Australia
Utsav Bhattarai
Centre for Water Resources Studies, Institute of Engineering, Tribhuvan University, Lalitpur, Nepal
Vishnu Prasad Pandey
Department of Civil Engineering, Pulchowk Campus, Institute of Engineering, Tribhuvan University, Lalitpur, Nepal
Pawan Kumar Bhattarai
You can also search for this author in PubMed Google Scholar
A.A. and P.K.B. devised the project, the main conceptual ideas, and the proof outline. A.A. worked out almost all of the technical details, prepared figures, and performed the model analysis for the suggested topics. A.A., P.K.B, and U.B. verified the numerical results. A.A. and V.P.P. interpreted the Results. A.A. with the help of U.B., P.K.B., and V.P.P. wrote the manuscript. U.B., P.K.B., and V.P.P. worked on the discussion of results and commented on the manuscript. A.A. finalizes the manuscript after all the edits.
Correspondence to Pawan Kumar Bhattarai .
Competing interests.
The authors declare no competing interests.
Publisher’s note.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/ .
Reprints and permissions
Cite this article.
Awal, A., Bhattarai, U., Pandey, V.P. et al. Downstream impacts of dam breach using HEC-RAS: a case of Budhigandaki concrete arch dam in central Nepal. Environ Syst Res 13 , 37 (2024). https://doi.org/10.1186/s40068-024-00358-3
Download citation
Received : 31 March 2024
Accepted : 16 July 2024
Published : 01 September 2024
DOI : https://doi.org/10.1186/s40068-024-00358-3
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
Innovation clinic—significant achievements for 2023-24.
The Innovation Clinic continued its track record of success during the 2023-2024 school year, facing unprecedented demand for our pro bono services as our reputation for providing high caliber transactional and regulatory representation spread. The overwhelming number of assistance requests we received from the University of Chicago, City of Chicago, and even national startup and venture capital communities enabled our students to cherry-pick the most interesting, pedagogically valuable assignments offered to them. Our focus on serving startups, rather than all small- to medium-sized businesses, and our specialization in the needs and considerations that these companies have, which differ substantially from the needs of more traditional small businesses, has proven to be a strong differentiator for the program both in terms of business development and prospective and current student interest, as has our further focus on tackling idiosyncratic, complex regulatory challenges for first-of-their kind startups. We are also beginning to enjoy more long-term relationships with clients who repeatedly engage us for multiple projects over the course of a year or more as their legal needs develop.
This year’s twelve students completed over twenty projects and represented clients in a very broad range of industries: mental health and wellbeing, content creation, medical education, biotech and drug discovery, chemistry, food and beverage, art, personal finance, renewable energy, fintech, consumer products and services, artificial intelligence (“AI”), and others. The matters that the students handled gave them an unparalleled view into the emerging companies and venture capital space, at a level of complexity and agency that most junior lawyers will not experience until several years into their careers.
While the Innovation Clinic’s engagements are highly confidential and cannot be described in detail, a high-level description of a representative sample of projects undertaken by the Innovation Clinic this year includes:
More information regarding other types of transactional projects that we typically take on can be found here .
Thanks to another generous gift from Douglas Clark, ’89, and managing partner of Wilson, Sonsini, Goodrich & Rosati, we were able to operationalize the second Innovation Trek over Spring Break 2024. The Innovation Trek provides University of Chicago Law School students with a rare opportunity to explore the innovation and venture capital ecosystem in its epicenter, Silicon Valley. The program enables participating students to learn from business and legal experts in a variety of different industries and roles within the ecosystem to see how the law and economics principles that students learn about in the classroom play out in the real world, and facilitates meaningful connections between alumni, students, and other speakers who are leaders in their fields. This year, we took twenty-three students (as opposed to twelve during the first Trek) and expanded the offering to include not just Innovation Clinic students but also interested students from our JD/MBA Program and Doctoroff Business Leadership Program. We also enjoyed four jam-packed days in Silicon Valley, expanding the trip from the two and a half days that we spent in the Bay Area during our 2022 Trek.
The substantive sessions of the Trek were varied and impactful, and enabled in no small part thanks to substantial contributions from numerous alumni of the Law School. Students were fortunate to visit Coinbase’s Mountain View headquarters to learn from legal leaders at the company on all things Coinbase, crypto, and in-house, Plug & Play Tech Center’s Sunnyvale location to learn more about its investment thesis and accelerator programming, and Google’s Moonshot Factory, X, where we heard from lawyers at a number of different Alphabet companies about their lives as in-house counsel and the varied roles that in-house lawyers can have. We were also hosted by Wilson, Sonsini, Goodrich & Rosati and Fenwick & West LLP where we held sessions featuring lawyers from those firms, alumni from within and outside of those firms, and non-lawyer industry experts on topics such as artificial intelligence, climate tech and renewables, intellectual property, biotech, investing in Silicon Valley, and growth stage companies, and general advice on career trajectories and strategies. We further held a young alumni roundtable, where our students got to speak with alumni who graduated in the past five years for intimate, candid discussions about life as junior associates. In total, our students heard from more than forty speakers, including over twenty University of Chicago alumni from various divisions.
The Trek didn’t stop with education, though. Throughout the week students also had the opportunity to network with speakers to learn more from them outside the confines of panel presentations and to grow their networks. We had a networking dinner with Kirkland & Ellis, a closing dinner with all Trek participants, and for the first time hosted an event for admitted students, Trek participants, and alumni to come together to share experiences and recruit the next generation of Law School students. Several speakers and students stayed in touch following the Trek, and this resulted not just in meaningful relationships but also in employment for some students who attended.
More information on the purposes of the Trek is available here , the full itinerary is available here , and one student participant’s story describing her reflections on and descriptions of her experience on the Trek is available here .
The Innovation Clinic is grateful to all of its clients for continuing to provide its students with challenging, high-quality legal work, and to the many alumni who engage with us for providing an irreplaceable client pipeline and for sharing their time and energy with our students. Our clients are breaking the mold and bringing innovations to market that will improve the lives of people around the world in numerous ways. We are glad to aid in their success in any way that we can. We look forward to another productive year in 2024-2025!
COMMENTS
Choose a dissertation type that not only meets academic criteria but also excites you and plays to your strengths, whether they lie in empirical research, theoretical exploration, practical application, or creative expression. Resource availability is another critical factor. Some types of dissertations, like empirical and project-based, may ...
Some choose to include case studies, personal findings, narratives, observations and abstracts. Their presentation focuses on theoretical insights based on relevant data points. 2. Quantitative. Quantitative dissertation research, on the other hand, focuses on the numbers.
A dissertation is a long-form piece of academic writing based on original research conducted by you. It is usually submitted as the final step in order to finish a PhD program. Your dissertation is probably the longest piece of writing you've ever completed. It requires solid research, writing, and analysis skills, and it can be intimidating ...
Revised on 5 May 2022. A dissertation is a large research project undertaken at the end of a degree. It involves in-depth consideration of a problem or question chosen by the student. It is usually the largest (and final) piece of written work produced during a degree. The length and structure of a dissertation vary widely depending on the ...
Why dissertation type matters to you: The implications for you about the type of dissertation you use appear in the method you use to explore your research question and in the structure of the dissertation document, itself. While the three types vary from one another in method, the problem solving approach also varies from the other two in ...
Time to recap…. And there you have it - the traditional dissertation structure and layout, from A-Z. To recap, the core structure for a dissertation or thesis is (typically) as follows: Title page. Acknowledgments page. Abstract (or executive summary) Table of contents, list of figures and tables.
Types of Dissertation. Types of Dissertation are as follows: Empirical Dissertation. An empirical dissertation is a research study that uses primary data collected through surveys, experiments, or observations. It typically follows a quantitative research approach and uses statistical methods to analyze the data.
Types of Dissertations. You can choose what type of dissertation you complete. Often, this depends on the subject and doctoral degree, but the two main types are: Empirical: This relies on conducting your own research. Non-empirical: This relies on studying existing research to support your argument.
There are many different types of dissertation, which don't all use this structure, so make sure you check your dissertation guidance. However, elements of these sections are common in all dissertation types. Dissertations that are an extended literature review do not involve data collection, thus do not have a methods or result section ...
This type of dissertation can also employ the use of replication-based studies, data-driven dissertations, and theory-driven research. When performing this type of research, candidates can utilize quantitative measures that allow them to test different theories, even as they try to make their approach original. Another thing worth noting is ...
A thesis is a long-term, large project that involves both research and writing; it is easy to lose focus, motivation, and momentum. Here are suggestions for achieving the result you want in the time you have. The dissertation is probably the largest project you have undertaken, and a lot of the work is self-directed.
The structure of a dissertation depends on your field, but it is usually divided into at least four or five chapters (including an introduction and conclusion chapter). The most common dissertation structure in the sciences and social sciences includes: An introduction to your topic. A literature review that surveys relevant sources.
Revised on April 16, 2024. A thesis is a type of research paper based on your original research. It is usually submitted as the final step of a master's program or a capstone to a bachelor's degree. Writing a thesis can be a daunting experience. Other than a dissertation, it is one of the longest pieces of writing students typically complete.
Types of Dissertations. It's common to think of a dissertation as an original research project, but that's not the only form that this major paper can take. Empirical Dissertation. This type of dissertation involves performing original research. You would design a research study, carry it out, and collect data.
A dissertation is a paper explaining the individual research that a student has conducted to earn a degree. It usually consists of several sections or chapters and follows the rules of formal academic writing. The degree candidate chooses the research topic. In the United States, a graduate student writes a dissertation to earn a doctorate degree.
Types of dissertation. Whilst we describe the main characteristics of qualitative, quantitative and mixed methods dissertations, the Lærd Dissertation site currently focuses on helping guide you through quantitative dissertations, whether you are a student of the social sciences, psychology, education or business, or are studying medical or biological sciences, sports science, or another ...
Narrative dissertations. You're more than likely to choose doing an empirical or a non-empirical dissertation. However, in other disciplines you may come across different methods of producing a dissertation. Dissertations in many science subjects include or even focus around a laboratory report describing all the aspects of setting up ...
Choosing between types. There are a number of reasons why you may choose one type of dissertation over another. Some are more academic in nature, whilst others tend to be more personal or practical.Academic justifications are important because the person marking your dissertation will expect to see such academic justifications in your final product.
Types of Dissertation Methodology. The type of methodology you choose for your dissertation will depend on the nature of your research question and the field you're working in. Here are some of the most common types of methodologies used in dissertations: Experimental Research. This involves creating an experiment that will test your hypothesis.
A dissertation prospectus or proposal describes what or who you plan to research for your dissertation. It delves into why, when, where, and how you will do your research, as well as helps you choose a type of research to pursue. You should also determine whether you plan to pursue qualitative or quantitative methods and what your research design will look like.
For this guide we will be referring to a dissertation primarily as a research project however most of the advice and information will be relevant to all projects. The guide will be be separated into two sections: the first will look at the process of completing a dissertation, while the second will look at the end product .
The type of dissertation you complete will vary depending on your course of study. One of the main differences is between empirical and non-empirical dissertations. Empirical dissertations are dissertations which involve collecting data, for example in a psychology degree. This may mean putting into practice professional and ethical guidelines ...
You may adopt conventional methods, including phenomenological research, narrative-based research, grounded theory research, ethnographies, case studies, and auto-ethnographies. Again, regardless of the chosen approach to qualitative research, your dissertation will have unique key features as listed below.
Thus, qualitative dissertations will have a distinct approach, relying on the specific route you adopt (for example, case study research compared to ethnographies). The traditional ways are autoethnography, case study, ethnographies, grounded theory, narrative, and phenomenological research. Nonetheless, whatever path you pursue, many broad ...
Cause and Effect Thesis Statement. Exploring how one event leads to another calls for a cause and effect thesis statement. This type examines the relationship between causes and their outcomes. Evaluative Thesis Statement. When making a judgment about the value or significance of something, an evaluative thesis statement is used.
To complete your format check submission, you must complete every registration step and fully submit your thesis or dissertation to the website listed below. Dissertations and theses turned in as a part of the graduation requirements at Loyola University Chicago must be formatted according to the rules laid out in the Format Manual for Theses ...
Summary. Tesla, Inc.'s business is currently in the midst of a paradigm shift. To put it concisely, Tesla started as an EV company, but it is now becoming an AI and Energy company.
Studies on concrete dam breach are limited compared to earthen and other types of dams. With an increase in the construction of concrete dams, particularly in the developing world, it is imperative to have a better understanding of the dam breach phenomena and the identification of the most influential breach parameters. This study aims to contribute to this gap by taking the case of the ...
General The Innovation Clinic continued its track record of success during the 2023-2024 school year, facing unprecedented demand for our pro bono services as our reputation for providing high caliber transactional and regulatory representation spread. The overwhelming number of assistance requests we received from the University of Chicago, City of Chicago, and even national startup and ...