wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Landslide Hazard

profile
Het Mehta
Jan 30, 2023
0 Likes
0 Discussions
144 Reads

Protection of life and properties from landslide disaster is indispensable in creating a safe environment for the society. The national imperative towards safety due to landslide initiation is increasing in view of the higher rate of human settlement in the mountain slope across the country. Landslides are significant amongst those hazards that can be disastrous to human life and property. It is estimated that economic loss due to landslides may reach between 1-2% of the gross national product in many developing countries. Evaluating and mitigating the landslide hazard and risk is a major challenge for the technocrats and decision makers in the developing world as 80% of the reported fatalities due to landslide is within the developing countries.

In India, about 0.42 million sq. km or 12.6% of land area, excluding snow covered area, is prone to landslide hazard. Out of this, 0.18 million sq. km falls in North East Himalaya, including Darjeeling and Sikkim Himalaya; 0.14 million sq. km falls in North West Himalaya (Uttarakhand, Himachal Pradesh and Jammu & Kashmir); 0.09 million sq. km in Western Ghats and Konkan hills (Tamil Nadu, Kerala, Karnataka, Goa and Maharashtra) and 0.01 million sq. km in Eastern Ghats of Aruku area in Andhra Pradesh. The landslide-prone Himalayan terrain falls in the maximum earthquake-prone zones (Zone-IV and V; BIS 2002) where earthquakes of Modified Mercalli intensity VIII to IX can occur, and thus, are also prone to earthquake-triggered landslides. The most recent example is the aftermath of 18 September 2011 Sikkim Earthquake in the Sikkim-Darjeeling Himalayas.


Comments ()


Sign in

Read Next

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

Cache memory

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

semaphores

Blog banner

Visualization in Data Science

Blog banner

Process states

Blog banner

VIRTUAL MACHINES

Blog banner

OLA

Blog banner

Security in Operating Systems

Blog banner

To travel is to live

Blog banner

Modern OS

Blog banner

GOOGLE

Blog banner

Instagram

Blog banner

Asana

Blog banner

Direct Memory Access

Blog banner

The most common internet security threats

Blog banner

Art and Culture of Rajasthan

Blog banner

Man is free by the birth .

Blog banner

Memory heirachy (Operating system)

Blog banner

Man In The Middle Attack

Blog banner

Marvel Cinematic Universe

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Culture Of Ladakh

Blog banner

Bots and Cyber Security

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

virtual memory

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

File management in os

Blog banner

"Audit" In Data Science

Blog banner

History of ITIL

Blog banner

Sage business cloud accounting

Blog banner

Direct memory access

Blog banner

Understanding the 'Ambiverts'

Blog banner

WINDOWS I/ O

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Decoding Modern Assessment: Why We Look Beyond the Grade Sheet

Blog banner

Jira service Management

Blog banner

Boxing

Blog banner

Capacity management in ITSM

Blog banner