Larsen & Toubro (L&T), the prominent infrastructure company responsible for constructing the Medigadda (Lakshmi) Barrage as part of the Kaleshwaram Project, has taken swift action in response to an alarming incident. Following reports of a section of the road bridge "sagging" on Saturday night, L&T has deployed a team of technical experts to assess the situation.
The sagging of the bridge segment occurred at one of the locations within Block-7 and was first observed on Saturday evening, accompanied by a loud noise. In response to the incident, L&T has joined forces with the state authorities in Telangana to investigate the cause of this abrupt damage.
L&T authorities issued a statement on Sunday, affirming their commitment to addressing the issue. According to the statement, L&T's technical expert team is already on site to conduct a thorough assessment of the damage and determine the most suitable course of action. S. Suresh Kumar, the General Manager and Business Unit Head for Hydel & Tunnel at L&T, further stated that the company will take the necessary measures to rectify the damage upon completing the technical assessment. Their goal is to provide a solution as quickly as possible to ensure the bridge's safety and structural integrity.
Notably, L&T had previously constructed the 1.632 km-long Medigadda (Lakshmi) Barrage, featuring 86 piers, in 2019. The barrage has been in operation since its completion, enduring multiple flood seasons. Last year, it withstood an unprecedented flood of 28.7 lakh cusecs, surpassing its design discharge capacity of 28.25 lakh cusecs.
The company emphasized that the barrage's design was provided by the state authorities, and it has consistently operated safely, even during the extraordinary flood event in July 2022. L&T's immediate response to the bridge damage underscores its commitment to maintaining the structural integrity and safety of this vital infrastructure project.
THE HINDU
This site is best viewed with a resolution of 1024x768 (or higher) and supports Microsoft Internet Explorer 4.0 (or higher)
Copyright © 2016-2026

