wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Landslide Hazard

profile
Het Mehta
Jan 30, 2023
0 Likes
0 Discussions
144 Reads

Protection of life and properties from landslide disaster is indispensable in creating a safe environment for the society. The national imperative towards safety due to landslide initiation is increasing in view of the higher rate of human settlement in the mountain slope across the country. Landslides are significant amongst those hazards that can be disastrous to human life and property. It is estimated that economic loss due to landslides may reach between 1-2% of the gross national product in many developing countries. Evaluating and mitigating the landslide hazard and risk is a major challenge for the technocrats and decision makers in the developing world as 80% of the reported fatalities due to landslide is within the developing countries.

In India, about 0.42 million sq. km or 12.6% of land area, excluding snow covered area, is prone to landslide hazard. Out of this, 0.18 million sq. km falls in North East Himalaya, including Darjeeling and Sikkim Himalaya; 0.14 million sq. km falls in North West Himalaya (Uttarakhand, Himachal Pradesh and Jammu & Kashmir); 0.09 million sq. km in Western Ghats and Konkan hills (Tamil Nadu, Kerala, Karnataka, Goa and Maharashtra) and 0.01 million sq. km in Eastern Ghats of Aruku area in Andhra Pradesh. The landslide-prone Himalayan terrain falls in the maximum earthquake-prone zones (Zone-IV and V; BIS 2002) where earthquakes of Modified Mercalli intensity VIII to IX can occur, and thus, are also prone to earthquake-triggered landslides. The most recent example is the aftermath of 18 September 2011 Sikkim Earthquake in the Sikkim-Darjeeling Himalayas.


Comments ()


Sign in

Read Next

MYNTRA

Blog banner

SQL Injection

Blog banner

GIS

Blog banner

CyberSecurity Color Wheel

Blog banner

INSTAGRAM

Blog banner

Processes : Process description and control

Blog banner

E-commerce

Blog banner

Virtual memory

Blog banner

Honeypot in cyber security

Blog banner

Security and E-mail

Blog banner

What is Virtual Memory

Blog banner

Blockchain Transactions

Blog banner

Modern Operating System

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Balance

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Creating Digitally Signed Document

Blog banner

Lucidchart

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Online Games

Blog banner

INTERRUPTS

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

IT RISK

Blog banner

Deadlock

Blog banner

E-learning

Blog banner

How To Secure Operating Systems ?

Blog banner

Importance of modern technology era

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Raid

Blog banner

TEAMWORK

Blog banner

What is metaverse?

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Evolution of Operating system

Blog banner

Child labour

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Memory management

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

DISK SCHEDULING

Blog banner

A Heartfelt Act of Kindness

Blog banner

Man VS Nature

Blog banner