Technical tools in a political environment: Uses and abuses

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Kentucky River Authority was first established by the Kentucky General Assembly in 1986 to take over operation of the Kentucky River Locks and Dams 5 through 14 from the United States Corps of Engineers. Following the drought of 1988, the Authority was given a mission to protect and improve the waters of the Kentucky River through environmental management of the entire watershed. It is the first effort by the Commonwealth of Kentucky to protect a great water resource through watershed management. In 1995 the Authority contracted with the Kentucky Water Resources Research Institute to perform a comprehensive water supply study for the Kentucky River Basin. The Kentucky Water Resources Institute was chosen ostensibly so as to provide a «unbiased» and scientifically based study. This study resulted in the development of two computer models KYBASIN and KYQUAL which were used to develop and evaluate five separate water supply alternatives for the Kentucky River Basin. These alternatives included: 1) conservation, 2) installation of temporary crest gates on dams 9-14; 3) construction of a large dam on the Kentucky River, 4) construction of a smaller dam on a tributary to the Kentucky River, and 5) construction of a treated-water pipeline from Louisville to Lexington.

Original languageEnglish
Title of host publicationWRPMD 1999
Subtitle of host publicationPreparing for the 21st Century
DOIs
StatePublished - 1999
Event29th Annual Water Resources Planning and Management Conference, WRPMD 1999 - Tempe, AZ, United States
Duration: Jun 6 1999Jun 9 1999

Publication series

NameWRPMD 1999: Preparing for the 21st Century

Conference

Conference29th Annual Water Resources Planning and Management Conference, WRPMD 1999
Country/TerritoryUnited States
CityTempe, AZ
Period6/6/996/9/99

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Technical tools in a political environment: Uses and abuses'. Together they form a unique fingerprint.

Cite this