Irrigation Cannon (High Altitude)

Rise of the Salton Sea
Jump to navigation Jump to search

High Altitude Irrigation Cannons, also known by their street names, Tower Sprinklers and also Tinklers, are large irrigation devices usually mounted on artificial towers at high elevations. Even though these devices can be mounted at ground elevation, for safety considerations they are mounted on towers, even when employed at remote locations. Their original purpose was for irrigation water distribution that simulated natural rainfall. Their use was later expanded for non-dam water storage, more commonly referred to as artifical snow, at higher elevations.

History

Large irrigation devices, commonly referred to as industrial sprinklers, irrigation guns, sprinkler guns, etc., have been employed for many decades to provide water over large areas for crops, fields, parks, and any other region that requires artificial irrigation.

£ë9NÁqäÐk€Ç´{·�3~Æ��žƒ5«+yNR¶É[I^Ž>§Cï;KóXsO‘ü¯�ü�{eb•·�}‡+jñnXý�õÛÅ?2¨õ¼Ð    Ê�¸Z…

>*y_$�G»Ø'Ñg¥Ù�vÇz¼õ´�Íkö{UWa�àÞÐÛ¢ê™Ï�øRÐÓÔæz•Õ�Q�ÀóéÓ9ÏîËÑÏTégø6· ÍÍémzʹgt¶�38ã�cœ�ü}�mñ_m­pÀò[6Î5,­{    KÔ¯ï¬=fzàjkg�pé�\®ˆvb,cHÏÉx,Wk~C�ƒ_�Ü/õRÇ>&�<b?ÃZÜŽwŸÂ:Û¦r×LÅ<¦ª¬5Ѓ7C¿]3Yålž¬ŽÅür1?Ú×Ö�ÜÌ�Ðv£½¶0Ö¿³ÿ�úMÂì�ôû}Â�Ÿÿ�œ7�D��h~wðqð9Ò@�ô»›°ŸWWîUÝè¯YÕ‡nT›C3Õ†ö�“gúeWNëÝÖÞÞ?Zûzÿaí�ÔYo÷î²�Èø}fü´ùA�×�†,»hiï‹JyF�‹x֮׎ڂ1µ±_×�ÛcÖXaR¶—½l�zõ{WØw@…ÆRß{Õ¼Wa¿ç({Í”Õghó£ºÍƒoØüÊÁ�¾åâ

ƒÜ7y�‘û&æ[C]Šº�mêb«¢%Ë[�Øž*2ó*¹kZA>Ú¶÷Sinclare megaCORP developed them use as wide area irrigation device that simulate rain or snow, depending on altitude, temperature, etc.

Masts

Irrigation Cannons, with few exceptions, are mounted on masts. These masts are more properly referred to as Irrigation Masts, to differentiate them from antenna masts, etc.^U�[±hMh,d8Ôc�!©C�žpg2V½<»�íÓ7iºø%T€æ,æ´ ÷à�裱�šAe-cÎ[oˆ«W]�ù,—relÅÝûEçuØ·ËÎ?asŽÀÃ÷(�å{­·X?)s�ŸYàñ‘€Çr¼w€ëGÅ�KbK¢ŒÕJ#�ði*{Xbû2N°Oøâ�U�™3�øÌ�õœÆ}¡�0‹˜��ÓUDr�…$fh�{F\r¯Òo¾Á——³š¼�<«�ð¡Í§þ7’ãy±*‰-�Íß�­Àžü¢Ðþ(ÕÎýš0-}õ~¾��?ÇØ¡�˜c¨¢E-

D±nW¬¬Ä;¼w´»ôÆ«÷ƒ�µë»^A�_«¼$”¯N—~Wt(_Þ‡Ndü�ñ?Ç�!«�`5�°j�¬¦�XÍá=

Œ½þ¾�UßÞrmg¢�Xfìí§¬?„°Žð}�Ê&ã÷ï8vüÎÆï)øý�Î�¿Gã÷Tü~šsZS/2ÜÏ6·Ð?Ðú+Æ...[null Fragmentary Encryption Anomaly]; Information irretrievable, data stream terminated.

Design

Double Helix --- various diametersÎÓ��†4ã~æ:'(HÛw4��ůԼ�:h��ã6Ò…iG×+�ò?žÕd·�zÙ�оâä=¿á<4lþ²&í,ÇÎM�…üÛ¯‚æ<çL}ž�ù&+    ¯Ó|³�ó=/)ë„Õù€K?à²!òË.CÓ'ÊÞv¯ŒqRÒï­>…®�

½U–NÙD›º»›æä\扌ùª*eÝ �ÌñU?*lO�yO÷”éòYýé{ºç�S¶c˜w'šòÝCï:íã?�'i�ø‹u¶–Û´ØámŒ!fÇ�nµïð†Ø’�í�Ø6›ñú=}¨“9¾ÐŸv'ñ·VbŸ‡b÷´–ÇîM¶¯s…2gmqã�?Dë¨md¾"!Ɓþ§�z?¯/«qZ¬­Uò?ö©Æií‹��˜_¹�Ÿ±�ò`ӦǶÄçkÅ�kl¿‡ÒìFî%�SŸýòî�s9ôa,l�s;q¸6�‡-±ûZË�ö~?é¬Æéx>Àg�>i»H¯;~·^�åfüVÖK¢—˺P­Cëb¶Ñ—gO7ïÊœ¹n�çäœÑö$™·~¿Íñ~›ý>úø‘–å:¨§X�“�¯ä˜õKû͍Ó1¶?¢ŽÐNiK#ßû½Œ-uÿ¿LÓÐìŠäøVt<Írg»°ŽõBx�žB�u„)ó°�oø\fƵӆ�cºó=M7?ìOž+3ÇÏ�=êXOC4‘+4±¸µ\è¡�°�œ0·S{›…&Òc&Ý#s¹;¹ÆC³§ë5>{†�Þ�Öà—�UJXû%ïC£¹?�]'õý6cwyÆI�±ÖŽçx&ol4;SÊÐO{+á/efí6Nw”‘n~-qžÚ�›ì¹h:2ù$ÂÖv{L�KLç¶è´ëʸ0N»¾†ï³öºtØ�NuòWá­Ú–pµì;mª�<wZG�åÛEàŸ�ÿ§}�ÕÅIÞéõÌ6÷¡�§½š²néÔÙ½¶\)çÖ�ˆ¡;Ô ­ãP·ß†�Þ½YοQŸñÖÑF½¼cÛ�‚ö={èö>�Îðþg�ï‡GxŸ1ʉËl´S�Xv�ݏR

Æ�[¯ý©[Ÿ1öYÑ�™{�}Ì�{�úH¹Û�4¹&2ð|îõ„ØJ‚Ô...[null Fragmentary Encryption Anomaly]; Information irretrievable, data stream terminated.

Construction

Sub-sections are manufactured at production facilities and transported to their Xu‰ü>…wÄ!³NS�Ë)3Sþ<M­+§ìî�Ú„lÅøɼO/:ä�ôË�Ýv‡ëòâ¾fá!½Ù×@fï†Ì�‡Ì¾Ò–Ù©��i]‰»›¢+ü·Wâ/âo¤q�®°ìx¿ÿèH»çÕ;²

<ë‡#Û-²LÎÄϦÈhxž�’>;?�GDŽ@g›šAg«å™ ô‡«Ô ðõ¢ð¸+ŒÌ‘�]—ü!B¼á{±á3-‚¿—À÷f©lð’30¶§

>?A˜�o�Së‚Ew*å½²²È?E¯V...[null Fragmentary Encryption Anomaly]; Information irretrievable, data stream terminated.

Material

One time shape memory carbon fiber--- once energized they expand to their final form h÷C�y|�ϼ;òUyY·*¼ß¯N¥ÝŒgÞ¾¼W#佨»UûÕˆjšä½�½AÚ�ed·�e�Œ¯Qwa�¾w��£4º¹Ëíkº�x©�¦ì¿(k²Ë€÷SÁÏîròy]ç]ƒÛ…v=Œ‘vÍÓ5•å:ô;û~š[¿kâ~�8^ï µf�­‰Œ�Z£â͢˥éØïÝŽ½Å?Dú\R_�íi½æ�à7�ð?“ïáûXó<ÏÈw{Rõ<ð�)ßû�y    Ê)ÏU    ŸÐÏ_1ï½`ž7Ïÿ‘Ôëµ^�4co4Ï?gË‘Ô_!�…|yƒ¿!½9ü°“r$ï>:tü'Sõ°}_6:þã�‹Ô=h¶ÆÙw½ô.[Ç¿1�½¸õø9Àõnw�žß¤ßû¦Ï.�î�A/÷�W®6n6uCv]M+¡A�­LúÿŽVÞÝ÷Áiå`{fZ9xÇaheö0´��†V®ÉL+ï>5�­Ô?0Zyóµ�he–Á•á�ß\:¼Þ­ËRõn›V†Ê†tn›V¾¹t�Z¹)•V¾¹TÓÊ„

Žý«8Ãþ�1û×l�Üì “ÏšýKòÝ“N:¼"oKnm|gŒ¼h�Ú™ehç�ôÆwm�¾j�´å­�ÿ�ýð¼ä5³—�¦ÛùÞ¼“q:mÛá½I:8ðï$Ýèwƒ�Þ]€wÇË^¥ß-7ïþż»Ó¼[nö°y®÷ç˜=l»C¿­ÐzÙ�Œ ßþ8ƒ]ñ[F¶yÎà±ÛÐÑý�è¨Ûõî�ÀÿÀ0e{¾9h—A¾-��Ý-m�Ñ›‘Úmzë¾�J�÷2W=“� ½ÆQ�òu{ºOˆç;¦î�»®¦Ëàx��+Mò0WÎXÐç…��FØè[“�´z±CߺTd÷mª¦¢•>7j�ù‹ÈîI¾t`¶m㤍þîÀ+ý^¢þ­jLåV5�Ï?¡²ã[CÙʯž©,�? x7j�æXƒ6—µ¯qì78®��Ç)¾þUÆ×?¸;ën;_AlD�~Ï    Nÿ}C'…�ì|î÷N�>úÝex~’Á•íÿ�ôf—��Ñù?úB=Â?~büt~ɹy�…E¶ßag�s5(�zB6`}¬ª�r]¼Åú€çñr¿�0Õ4pj¡ƒ�Î�f�›lö±O8pþI�?ºÒèky&ŽlžóNÚ±’x?o·±cåË}���Ãíg´ÇæAWA¹ÔËP�|"Ï´ý[Ã'þ-ô�žfžÿÒ¶+¢ì%)óJ|�úñVЏ�Ÿ5<;Åç9¤1ì;MØwþdhÌÁcþóI³÷üVÆŸŠO�oæLán›�NN§…»Ý´0>ôòÝ5î2<7¹zîž‘,[!~�þRèàfLg˜ûÄ¿3ôð}¡‡¤

ÿµÛ$7Š9cAy—¹Ë3¯l½ìÅå¾¼¿Ý w–#�Ö�m�ú½eC÷RNÞå8£^Cÿ;ú�Ð_¿ÌÄÝ¥/¿ø¬SU��I—k˜N- which is permanently set Yÿ[§cM�<ÎwO1ﶛwÿhÞ=ÅÈãÓ\÷C�y|�ϼ;òUyY·*¼ß¯N¥ÝŒgÞ¾¼W#佨»UûÕˆjšä½�½AÚ�ed·�e�Œ¯Qwa�¾w��£4º¹Ëíkº�x©�¦ì¿(k²Ë€÷SÁÏîròy]ç]ƒÛ…v=Œ‘vÍÓ5•å:ô;û~š[¿kâ~�8^ï µf�­‰Œ�Z£â͢˥éØïÝŽ½Å?Dú\R_�íi½æ�à7�ð?“ïáûXó<ÏÈw{Rõ<ð�)ßû�y    Ê)ÏU    ŸÐÏ_1ï½`ž7Ïÿ‘Ôëµ^�4co4Ï?gË‘Ô_!�…|yƒ¿!½9ü°“r$ï>:tü'Sõ°}_6:þã�‹Ô=h¶ÆÙw½ô.[Ç¿1�½¸õø9Àõnw�žß¤ßû¦Ï.�î�A/÷�W®6n6uCv]M+¡A�­LúÿŽVÞÝ÷Áiå`{fZ9xÇaheö0´��†V®ÉL+ï>5�­Ô?0Zyóµ�he–Á•á�ß\:¼Þ­ËRõn›V†Ê†tn›V¾¹t�Z¹)•V¾¹TÓÊ„

Žý«8Ãþ�1û×l�Üì “ÏšýKòÝ“N:¼"oKnm|gŒ¼h�Ú™ehç�unlike memory metal which repeatedly be deformed and will return to its original shape

Deployment

The deployment of most masts are fully automated. The sections arrive and are fully assembled in their pre-expansion sizeªî;¹ÚAǧ'éØuÖ!�î�?cMÃÁt�^NÞ��Œ¶�—†G,£ÏL(G��:Öz�ûÉ�ì+9¡\ì�Ç[VèCÜ÷Ôq¡ã”Ï?‰ºZ,“�«³ÎÂ�¤öW�©çÊ‹¹'$t»÷{�Ñ"ÓîíB�ÝØ_VY‡B«­�¡åØ?V Ý;µ?db3ÞÃþ�9š�}Õ¹�û̧ý%²ÿd¤¸'-ô��Õ‚Â’…Y§�+�!?Ïí˜xBPÝX�@�

Ö_Ô-…!?Dçü�_¢Zõùݏ�ço‰?ëvÐÑ€º�ãÉîd^Ø;Ô(Œõ]é�ãáØÔ�?}„...[null Fragmentary Encryption Anomaly]; Information irretrievable, data stream terminated.

Alternative Design

Although the design is not the strongest or most efficient in terms of mass, it is most suited for quick deployment because the memory carbon fiber is the --- and can be manufactured in offsite facilites.Ý”Žä(�’•úA�òî�ä�¬Òޝ¨ýol¢ø#ÞSà¹;ž¿Ãs�wš˜‡çQøß�´ß@ë�™�xîìNÔ¿Ås�ÈœÃsWüÿ�h� ýÉ›¦/Ås<žÿ€¿?��z�ý��ÓuÞ�—çü×ÔÇx�ï•m0õMç_ϲÇXƒÎñžm±¾±PE�XããýþEá†�½oé^sðr¬²,—�ª<æe\†Wdðhÿ=tt�í¿�:!�x�û�Z5hÍ@[Bç!ãùc¤M‰M�M`�{É��?ƒþ8äšzÓ´‡éœF<�ã3ÿ莏”˜®iÝá?�cÝM‘ºãùÆå©ú�9×°¯ªî´¥±Sõ©�O"x¾A�„!ÐGÚÓ(·5úõ�”×�ÏåxŽD}çà™ìãNÐÆ€v'ê6”öXàù)ümãM„‰räý»ùï©.xî�Óõ¥"5Fe]ûs9Ý‘Çh¯Ô¦áùxl¢¦£œ)ña�¤ƒ� ƒÌE”3�Ï�ñü,d�ÊùTÙO�ð]í9Î×GùB.�öþ=Ò݃¼—á¹�ìî!<w€�vÃó½Ðá    yö¼_�‰ùìUoe`#ÕÛ1ύwà–�¤}�yoC^#¼j,¼ˆ:­Ãó‹¨c>žG‚ÿ�þ¾„:.¥<QÆÃÈk,ÊX,õa/ÃqæWq�ÒÒýY4nn¥;¼iï(ž?À3Ý�SŽçÛ”�Äí(cšEß™¦¾_ðšú®¿Èz¹    é>C>-Ï8:+�ùæáù¿ðLöê�ÿ�ê<“Àhec£Ë\ž�›9Ÿ*î·!HÓ�í}�²ÝðÜ�?ïGš4Õ'�öº<�îâ4�8Íl¤‰BšLÈFãù5µÞ8ð¸J3}–Ësz�§ùœÓ´€�h"‘î�Óä½­¨ï¥ø0¼'��=Uºb`îú4Nç—í$?>YkËc*Ìí×n§ßt¿º79ÐEê«)è«´rÒ•{…ö�ý…þ:J�ú�œdÑß:ÖŸ�u�.óM�·x}ò.®�¥§WG¹<5ýX~�Ëß�ù��Ž×b¨¾ªÎo-tyÎÌgÙ·Yö�ÈN‚Ž�€ý‡+ÛÔ¶RŒ�vÓ<„mŽ°ÛMÑ>äÑ�y¤¡¼�QÞ ³nÃJ1OÔsy¯qyC½‰õ§U}�ƒ?a<ó_æy�ô%E —0ýÅ�¾§Õ›_?ÄÔÓÐ��=¥™ig�F�×3ýIE§º¼°Íå9¾”éýLúÈT—ç—�L?ÄÌç½Þ.ÏÅW™Þ›ë�‡ºóøŸ�‡rŽ0ßgæ7h3ü�éÝLúS˜/Ž¾ÄôxK›6šmz>ÎÒ¦»Í´¯¡M5�™�eÒ�gÀ'¾é?0랍ºŸžÎôÛLz�úÿ¢Ñÿ7›ùLÞåòœ\Ìô›LùE­ñŽ\ËôëLù7Ò\žSñL×,myÃlËÈx³-uçÍ´¯cÜœü’é§,iÓÍ´ã*,i²L!2/˜2ãS-2•Ü?£Ñ?Ϩº/¯B[‹™¿ÏlÓŠ. _b:Å�@�p�ï§h¦}fÊ�B/u^¦ÿS•�ü–XŸ¤øk¡ÿÚIÌÿ‡™nÝdÐ71}»IŸû´Ësöy¦o2u’�ú‰?0½Ø¤?‡zUg0}µIÿk<ìa7Ó—«6ôÇ;ù�÷yÝ»ŠÖ�õ;Ò’i�ÌzLé‡þû�Óçšôw¦¹<çf0}¦I?û4êý�Ó³Lúü�È·bú�&ý]ò­xÜ×M4éKÑž�)L�«êøæ»°Õ8¦1í¡î¸Ù×c·Yúúy3¿Õ�.Ï¥

L?Ö’ö;3mºåý_×ß"SnÊŒ‰µÈô1óÏòAO§˜Þ...[null Fragmentary Encryption Anomaly]; Information irretrievable, data stream terminated.