PHD_ZAGONJOLLI.

PHD_ZAGONJOLLI.
Dam Break Modelling, Risk
Assessment and Uncertainty
Analysis for Flood Mitigation
Dam Break Modelling, Risk
Assessment and Uncertainty
Analysis for Flood Mitigation
DISSERTATION
Submitted in fulfillment of the requirements of
the Board for Doctorates of Delft University of Technology
and of the Academic Board of the UNESCO-IHE Institute for Water Education
for the Degree of DOCTOR
to be defended in public
on 24 September 2007 at 10:00 hours
in Delft, the Netherlands
by
Migena ZAGONJOLLI
born in Tirana, Albania
Bachelor of Science in Hydraulic Engineering, Polytechnic University of Tirana
Master of Science in Hydroinformatics, UNESCO-IHE
This dissertation has been approved by the promotor: Prof.dr.ir. A.E. Mynett
Members of the Awarding Committee:
Chairman
Vice Chairman
Prof.dr.ir. A.E. Mynett
Prof.dr.ir. H.J. de Vriend
Prof.drs.ir. J.K. Vrijling
Prof.dr. N. Wright
Prof.dr. Y. Zech
Prof.dr. K. Takeuchi
Prof.dr.ir. G. S. Stelling
Rector Magnificus TU Delft, the Netherlands
Rector UNESCO–IHE, the Netherlands
TU Delft / UNESCO-IHE, the Netherlands, Promotor
TU Delft / WL | Delft Hydraulics, the Netherlands
TU Delft, the Netherlands
UNESCO–IHE / TU Delft, the Netherlands
Université Catholique de Louvain, Belgium
ICHARM Centre, PWRI, Japan
TU Delft, the Netherlands, Reserve Member
Copyright © 2007 Taylor & Francis Group plc, London, UK
All rights reserved. No part of this publication or the information contained herein
may be reproduced, stored in a retrieval system, or transmitted in any form or by
any means, electronic, mechanical, by photocopying, recording or otherwise,
without written prior permission from the publisher.
Although all care is taken to ensure the integrity and quality of this publication
and the information herein, no responsibility is assumed by the publishers nor the
authors for any damage to property or persons as a result of operation or use of
this publication and/or the information contained herein.
Published by A.A. Balkema Publishers, a member of Taylor & Francis Group plc.
www.balkema.nl and www.tandf.co.uk
ISBN 9 780415 455947 (Taylor & Francis Group)
Keywords: dam break modelling, flood risk reduction, flood mitigation, data
mining techniques, graph theory, constraint based approach
This thesis is dedicated to my parents, for their endless love,
encouragement and support, and for always being near me
even when I was far away.
Summary
More than 800,000 dams and thousands of kilometers of dikes have been constructed
around the world. However, the history of the construction of dams and dikes (in
this thesis referred to as ‘structures’) coexists with the history of their collapse. Hundreds of dam failure events were reported the past centuries, but still today dikes
breach every year due to high water levels, often with catastrophic consequences. In
the Netherlands the storm surge of 1953 with 1850 casualties led to the construction
of the famous Delta Works. One more recent example is the breaching of the New
Orleans levee systems during hurricane Katrina in August 2005, which caused prolonged flooding with 1,300 casualties as well as tens of billions of dollars of economic
and social damage.
Effects of climate change are likely to cause more severe flow conditions within the
life span of existing structures, leading to increased safety concerns. If a structure
fails, the release of (large quantities of) water may threaten the lives of people as
well as property in the downstream areas. Likely loss of life depends on actual water
depth and flow velocity, the geographical distribution of the population, warning
time necessary to reach them and their awareness at the time of disaster. Warning
messages released in advance can be an important factor for saving lives. Hence,
developing and improving risk assessment and flood mitigation models is becoming
increasingly important and can be considered a necessity to reduce human casualties
and economic damage.
The aim of this research is to develop a framework and explore techniques for modelling dam and dike failure events, as well as to develop novel approaches for risk
assessment. Numerical, statistical and constraint based methods are applied to
breach modelling and flood water mitigation. A new breach model (BREADA) is
developed for simulating the gradual failure of a structure due to overtopping which
is validated against historical dam failure events. In order to explore the accuracy
of breach models in a different way, and to try to extract possible additional information from available data of recorded dam failure events, we use data mining
techniques that have been successfully applied in the field of hydroinformatics.
While physically based methods require proper understanding of all processes occurring during dam breaching, data mining methods rely only on recorded data of dam
failure events. In this research we apply data mining techniques including Artificial
Neural Networks and Instance Based Learning for predicting dam breach characteristics and peak outflows. Despite the shortage of documented data, this research
demonstrates there is a possibility to improve the presently available empirical relations and prediction capabilities of physically based models by complementing with
data mining techniques.
viii
Summary
The analysis of a potential failure event for existing structures (especially for large
dams) is essential for planning and organizing emergency procedures that anticipate
and mitigate downstream damages in case of disaster. In this thesis we analyse a
hypothetical failure event for the Bovilla Dam near Tirana, Albania, and explore
potential mitigation measures in case of a worst case scenario. A comparison is
made between the results of the developed BREADA model, other available breach
modelling formulations, and empirical techniques in order to get a range of peak
outflows. Flood routing is carried out using WL | Delft Hydraulics’ hydrodynamic
modelling package Sobek 1D2D. Sensitivity analysis is carried out to identify uncertainties associated with dam failure analysis. The model is used to identify areas
prone to flooding, to assess the risk involved, as well as to take measures to reduce
flood damage and develop emergency plans.
Clearly, structural failure events pose a significant threat not only to human life but
also to the environment and in general also to economic development. With such
catastrophic consequences in mind, it is essential to investigate not only mechanisms
for predicting these failure events but also to reduce their risk of occurrence. Traditional approaches focus on establishing very small probabilities of occurrence of
extreme events. However, if such event were to occur - despite its low probability
value - the consequences may be very severe, like in the case of New Orleans.
In this research, instead of focusing on methodologies to minimise the failure probability of a structure, we consider an alternative approach that aims at decreasing
the consequences of a flood event. A numerical–constraint based model is developed
for evaluating risk and mitigating consequences in a system of polders or low–lying
areas. The model is capable of simultaneously evaluating different flood mitigation
scenarios in a very short time by utilizing algorithms based on ‘graph theory’. The
results of a case study which takes into account different objective functions such
as storage capacities and economical values of a multiply connected polder system,
look quite promising for flood risk mitigation.
The approach developed in this thesis can be used to complement existing practices
of flood modelling, which are traditionally carried out by simulating the consequences
of a forecasted or assumed flood event and elaborated into a few typical ‘what - if’
scenarios. The ‘lightweight’ numerical–constraint based technique proposed in this
thesis is capable of evaluating many scenarios in a very short period of time by first
determining the most feasible scenarios, which can then be modelled in more detail
using a conventional hydrodynamic simulation approach. In this way computation
time is considerably reduced while focusing on the most feasible options is ensured.
Clearly a combination of these two methods can either be achieved by enhancing a
hydrodynamic modelling package with an optional numerical–constraint based approach, or vice versa.
Samenvatting
Wereldwijd zijn meer dan 800,000 dammen en vele duizenden kilometers dijk aangeled. De geschiedenis van dammen en dijken gaat echter hand in hand met de
geschiedenis van hun falen. Honderden gevallen van het bezwijken van dijken hebben
zich de afgelopen eeuwen voorgedaan en ook vandaag de dag bezwijken er dammen
en dijken onder de druk van het water - met alle gevolgen vandien. In Nederland
leidde de stormvloed van 1953 waarbij 1850 mensen omkwamen, tot de aanleg van de
fameuze Deltawerken. Een recent voorbeeld van het bezwijken van waterkeringen betreft de orkaan Katrina in augustus 2005 die aanzienlijke overstromingen tot gevolg
had met 1300 doden en tientallen miljarden aan economische en sociale schade.
De verwachting is dat de gevolgen van klimaatverandering de komende decennia
zullen leiden tot meer bedreigende omstandigheden gedurende de levensduur van
waterkeringen wat aanleiding is tot toegenomen aandacht voor veiligheid. Immers,
als een waterkering het begeeft, dan kan dat grote waterstromen veroorzaken die een
gevaar vormen voor mens en haard benedenstrooms. Eventueel verlies aan mensenlevens hangt af van waterdiepte en stroomsnelheid, waarschuwingstijd en de aanwezigheid van bewoners ten tijde van een eventuele ramp. Tijdige waarschuwing
speelt een belangrijke rol bij het voorkomen van verlies aan mensenlevens. Het
ontwikkelen en verbeteren van modellen voor risicobenadering en het afwenden van
gevolgen van overstromingen, wordt steeds belangrijker bij het toetsen van de sterkte
van reeds bestaande waterkeringen.
Het doel van dit onderzoek is om een raamwerk op te zetten en technieken te ontwikkelen voor het modelleren van het bezwijken van waterkeringen. Ook worden
mogelijke nieuwe benaderingen op het gebied van risico analyse onderzocht. Naast
numerieke en statistische benaderingen zijn ‘constraint based’ technieken ontwikkeld
voor het modelleren van dijkdoorbraken en het afwenden van overstromingsgevaar.
Er is een nieuw model voor dijkdoorbraak (BREADA) ontwikkeld voor het geleidelijk
bezwijken van waterkeringen ten gevolge van het ’over’stromen. Dit is gevalideerd
op basis van beschibare veldmetingen. Om de nauwkeurigheid van eerdere modellen
na te gaan en om eventuele nieuwe informatie aan de beschikbare meetgegevens te
onttrekken, zijn ‘data mining’ technieken gebruikt die al geruime tijd in de hydroinformatica met succes zijn beproefd op toepassingen in waterbouw en waterbeheer.
Op fysica gebaseerde modellen vragen om een goed begrip van onderliggende processen om een wiskundige beschrijving te kunnen opstellen; deze wordt vervolgens
getoetst aan de hand van beschikbare meetgegevens. Data mining technieken gaan
uit van dezelfde meetgegevens, maar proberen het fysisch proces hieraan te onttrekken zonder vooraf een bepaald model op te leggen. In dit onderzoek worden
data mining technieken gebruikt om de maximale waarde van uitstroom bij dijkdoor-
x
Samenvatting
braak te voorspellen. Ondanks de beperkte hoeveelheid gedocumenteerde gegevens
laat dit onderzoek zien dat het mogelijk is om de bestaande empirische modellen te
verbeteren.
Een adequate analyse van een mogelijke catastrofale gebeurtenis als een grote damdoorbraak is essentieel om noodmaatregelen voor te bereiden die de benedenstroomse
gevolgen van een ramp kunnen beperken. In dit proefschrift wordt een analyse uitgevoerd naar de een eventuele doorbraak van Bovilla Dam bij Tirana in Albanie, en
worden mogelijke maatregelen onderzocht om een ramp af te wenden. Resultaten
van BREADA en andere modellen worden gebruikt om de variatie in uitstroomcondities na te gaan. Met WL | Delft Hydraulics’ Sobek 1D2D numerieke modelsysteem
worden overstromingen gesimuleerd en gevoeligheidsanalyses uitgevoerd om onzekerheden vast te stellen. Voor mogelijk bedreigde gebieden worden noodmaatregelen
onderzocht.
Het is duidelijk dat het falen van waterkeringen levensbedreigend kan zijn met grote
economische gevolgschade. Daarom is het noodzakelijk om niet alleen een faalkans
vast te stellen, maar ook om mogelijke gevolgen te kunnen beperken. Immers, mocht
een faalkans worden overschreden, dan kunnen de gevolgen verstrekkend zijn, zoals
bijvoorbeeld bij New Orleans. In dit proefschrift wordt daarom een alternatieve route
bewandeld met de nadruk op het verkleinen van de gevolgen van overstromingen.
Daartoe is een numeriek model gecombineerd met een ‘constraint’ aanpak gebaseerd
op ‘graph theory’ wat het mogelijk maakt om meerdere scenario’s in zeer korte tijd
te evalueren. De resultaten van een toepassing in een gebied met meerdere polders
met verschillende doelfuncties zoals bergingscapaciteit en economische waarde (ook
wel systeemwerking genoemd) zien er veelbelovend uit.
De benadering die in dit proefschrift is gekozen kan gebruikt worden als aanvulling op
de huidige aanpak die veelal is gebaseerd op het simuleren van een groot aantal mogelijkheden waarvan pas later blijkt of deze relevant zijn of niet. De hier voorgestelde
‘lichte benadering’ van gecombineerde ‘numerical–constraint based’ technieken is
flexibel genoeg om zeer veel mogelijkheden in korte tijd te evalueren en om de meest
waarschijnlijke scenario’s te selecteren die vervolgend met behulp van een conventionele hydrodynamische aapak in meer detail kunnen worden onderzocht. Op deze
manier wordt de rekentijd sterk gereduceerd en alleen gebruikt om de meest waarschijnlijke opties te onderzoeken. Een combinatie van beide methoden is mogelijk door
bestaande hydrodynamische pakketten uit te breiden met opties voor een ‘numerical–constraint based’ benadering, of vice versa.
Acknowledgment
This dissertation would not have been possible without the continuous encouragement of my promotor Prof. Arthur Mynett. I am very grateful to him not only for
directing my research, but also for the invaluable moral support I received throughout this project. His guidance and supervision enabled me to complete my work
successfully.
I would like to acknowledge WL | Delft Hydraulics for their financial support and
for providing the professional environment to carry out this research. Many thanks
go to all my friends and colleagues at UNESCO-IHE, Delft University of Technology
and WL | Delft Hydraulics: your friendship and professional collaboration meant
a great deal to me. I am grateful to Dr. Hans Goossens and Dr. Henk van den
Boogaard of the Strategic Research Department of WL | Delft Hydraulics for contributing their time and expertise to this project. Special thanks go to Prof. Roland
Price and Prof. Dimitri Solomatine of UNESCO-IHE for the informal and fruitful
discussions.
I would like to express my gratitude to the thesis committee members for their interest and valuable comments on my work and to Prof. Nigel Wright for helping
improve the thesis with his useful observations and suggestions.
This list of acknowledgments would not be complete without all the people to whom
I am indebted at a personal level. My friends and relatives have provided invaluable
moral support during the four years of this research. I am very grateful to each and
every one of you. I wish to express my special appreciation to my dear friend Merita
Hatibi Serani who introduced me to the field of hydraulic engineering. Although she
untimely passed away, the memories and creative energy she left behind are always
with me.
I am as ever, especially grateful to my family. To my brothers for their love and
encouragement. To my mother for her continuous support in my objective of enriching my knowledge, despite the pain of being away from her. To the happy memory
of my father, who always believed in me but unfortunately did not live to see this
thesis being completed, but who provides a persistent inspiration for my journey in
life.
Migena Zagonjolli,
24 September 2007
xiii
Contents
Summary
vii
Samenvatting
ix
Acknowledgment
xi
1 Introduction
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2 Management of the flood risk caused by structural failure
1.3 Scope of the thesis . . . . . . . . . . . . . . . . . . . . . .
1.4 Outline of the thesis . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
1
4
6
7
2 Water Retention and Flood Defence Structures
2.1 Design criteria and failure modes for dams . . . .
2.2 Design criteria and failure modes for dikes . . . .
2.3 Breach modelling . . . . . . . . . . . . . . . . . .
2.3.1 Breach shape . . . . . . . . . . . . . . . .
2.3.2 Breach development . . . . . . . . . . . .
2.3.3 Breach formation mechanisms . . . . . . .
2.3.4 Hydraulics of flow over the dam . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
9
9
13
16
17
19
21
23
.
.
.
.
.
25
25
26
34
36
41
4 Current Approaches for Breach Modelling
4.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2 Experimental work . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.3 Empirical equations . . . . . . . . . . . . . . . . . . . . . . . . . . .
43
43
44
47
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3 Current Approaches for Dealing with Flooding
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.2 The Netherlands’ long history of battle against floods . . . .
3.3 Japan’s experience in dealing with floods . . . . . . . . . . . .
3.4 Modelling of propagation of flood caused by structural failure
3.5 Uncertainty associated with flood modelling . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
xiv
4.4
Contents
Physically based models . . . . . . . . . . . . . . . . . . . . . . . . .
5 Data Mining Techniques in Dam Breach Modelling
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.2 Main principles of data mining techniques . . . . . . . . . . . . . . .
5.2.1 Linear regression . . . . . . . . . . . . . . . . . . . . . . . . .
5.2.2 Artificial Neural Networks (ANNs) . . . . . . . . . . . . . . .
5.2.3 Instance Based Learning (IBL) . . . . . . . . . . . . . . . . .
5.3 Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3.1 Data preparation and model evaluation . . . . . . . . . . . .
5.3.2 Predicting breach width based on water depth behind the dam
5.3.3 Predicting peak outflow . . . . . . . . . . . . . . . . . . . . .
5.4 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
50
57
57
58
59
60
64
67
67
69
71
73
6 BREADA model: Breach Model for Earthfill Dams
6.1 Development of a dam breach model . . . . . . . . . . . .
6.1.1 First formulation of dam breaching development .
6.1.2 Second formulation of dam breaching development
6.2 Validation of the BREADA model . . . . . . . . . . . . .
6.3 Failure analysis of an earthfill dam . . . . . . . . . . . . .
6.3.1 Modelling of breach development . . . . . . . . . .
6.3.2 Modelling of flood propagation . . . . . . . . . . .
6.4 Uncertainty in dam break analysis . . . . . . . . . . . . .
6.5 Discussion and conclusions . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
75
. 75
. 79
. 80
. 81
. 85
. 89
. 95
. 98
. 101
7 A Numerical-Constraint based Model
7.1 Introduction . . . . . . . . . . . . . . . . . . .
7.2 Description of the numerical–constraint based
7.3 Application . . . . . . . . . . . . . . . . . . .
7.4 Conclusions . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. . . . . .
approach
. . . . . .
. . . . . .
.
.
.
.
8 Conclusions and Recommendations
8.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.1.1 Traditional and novel approaches for predicting dam breach
characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.1.2 Identification of dam failure flood extent, uncertainty, and risk
reduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.1.3 A numerical–constraint based approach for flood mitigation .
8.2 Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . .
103
103
104
111
116
119
119
119
121
122
123
Bibliography
125
List of symbols
139
Contents
xv
List of abbreviations
141
Curriculum vitae
143
Chapter 1
Introduction
If any one be too lazy to keep his dam in proper condition, and
does not so keep it; if then the dam break and all the fields be
flooded, then shall he in whose dam the break occurred be sold
for money, and the money shall replace the corn which he has
caused to be ruined.
The Code of Hammurabi (18th century BC)
1.1
Background
The history of water defence and water retention structures coexists with the history of their failures. Around the world thousands of dams have been constructed
over many centuries. But also, hundreds of dams have failed and every year many
dikes breach due to high flows in the rivers, sea storm surges, etc. often leading to
catastrophic consequences. By far the world’s worst dam disaster occurred in Henan
province in China, in August 1975, when the Banqiao Dam and the Shimantan Dam
failed catastrophically due to the overtopping caused by torrential rains. Approximately 85,000 people died from flooding and many more died during subsequent
epidemics and starvation; millions of residents lost their homes (Qing, 1997). This
catastrophic event is comparable to what Chernobyl and Bhopal represent for the
nuclear and chemical industries (McCully, 1996). In the Netherlands, in February
1953, a high–tide storm caused the highest water levels observed up to date and
breached the dikes in more than 450 places, causing the death of nearly 1,900 people
as well as enormous economic damage (Gerritsen, 2005).
During recent years, the observation is made that the global impact of climate change
will be devastating (see e.g. Intergovernmental Panel on Climate Change (IPCC) assessment reports at www.ipcc.ch; Millennium Ecosystem Assessment (2005); Archer
(2006); Flannery (2006); Wentz et al. (2007)). According to the IPCC, “the observed warming trend is unlikely to be entirely natural in origin”. We witness the
Climate Change 2001: The Scientific Basis
Page 1 of 2
Climate Change 2001:
Working Group I: The Scientific Basis
2
Table of contents
Go Section
1.1. Background
Other reports in this collection
averagesea
sea level
1990for
to 2100
the SRES1990
scenarios.
Thermal
expansion
11.12: Global
Figure Figure
1.1: Global
average
levelriserise
theforperiod
to 2100
for
different
and land ice changes were calculated using a simple climate model calibrated separately for each of
scenarios
(IPCC,
2001).
seven
AOGCMs,
and contributions from changes in permafrost, the effect of sediment deposition and the
long-term adjustment of the ice sheets to past climate change were added. Each of the six lines
appearing in the key is the average of AOGCMs for one of the six illustrative scenarios. The region in
dark shading shows the range of the average of AOGCMs for all 35 SRES scenarios. The region in light
shading shows the range of all AOGCMs for all 35 scenarios. The region delimited by the outermost
rising of
temperatures,
in itself
does not
always
meanin land-ice
nicer sunny
lines
shows the range ofwhich
all AOGCMs
and scenarios
including
uncertainty
changes, weather
permafrost
and sediment
deposition.increase
Note that this
does not allow
uncertainty
but more
likelychanges
enhances
the potential
of range
the intensity
offor
flash
floods, heat
relating to ice-dynamical changes in the West Antarctic ice sheet. See 11.5.4.3 for a full discussion. The
waves, bars
mudslides
and
droughts,
leading
to
catastrophic
social,
environmental
and
show the range in 2100 of all AOGCMs for the six illustrative scenarios
economic damages. The declining ice extent in Arctic, the increase in melting rate
to text
of Greenland ice sheet, and rising globalBack
mean
sea level (Figure 1.1) are the most
evident consequences of global warming. The number of high category hurricanes
Table of contents
Other reports in while
this collection
has increased,
the first ever hurricane was recorded in 2004 in the South Atlantic (South Coast of Brazil).
http://www.grida.no/climate/ipcc_tar/wg1/fig11-12.htm
6/2/2007
The failure
of the New Orleans’ levee system during hurricane Katrina of
2005
contributed to prolonged flooding causing 1,300 casualties and billions of dollars
of economic damage. In August 2002, floods caused by torrential rains in Europe
claimed the lives of at least 109 people. The Elbe exceeded its 200 year flood return
period in Dresden, flooding much of the city, and a flood return period of 500 years
was estimated in Prague.
Nowadays there are more than 800,000 dams and thousands of kilometers of dikes,
constructed around the world for different purposes: flood control (the most common purpose), irrigation, electricity generation, water supply, recreation, etc. Dams
Chapter 1. Introduction
3
and dikes are often designed based on the statistical distribution of recorded river
flows or sea storm surge measurements. However, climate change has introduced
uncertainty related to increasing maximum flows within the life span of dams and
dikes, leading to safety concerns. Many dams and dikes previously considered adequate (safe) now exhibit a potential to experience overflowing (overtopping) during
high (flash) flood events. If a dam or dike fails, loss of life and economic damage are
direct consequences of such an event, depending on the magnitude of water depth
and velocity, warning time, and presence of population at the time of the event.
Early warning is crucial for saving lives in flood prone areas.
Costa (1985) compared the loss of life during two dam failure events: the Teton
Dam in Idaho (93m high) that failed at midday on 5 June 1976 and Laurel Run
Dam in Pennsylvania (12.8m high) that failed on 20 July 1977 at 4:00 a.m. The
latter event claimed the lives of 1 out of every 4 people exposed to floodwaters, while
only one out of 3,000 people exposed to floodwaters suffered from casualties in the
case of the Teton Dam failure. The database compiled by the Centre for Research
on Epidemiology Disasters (www.em-dat.net) identifies floods as the second most
endangering factor after drought in terms of loss of human lives around the world
for the period 1900-2007.
When the failure of a tailing dam happens, the socio–environmental implications
might affect the flooded region for a long period of time. The dam failure at the
Los Frailes mine in Spain, in April 1998, released between 5 to 7 million tonnes
of toxic mud carrying heavy metals and highly acid compounds in the Guadiamar
River spreading in large areas of the floodplains. Large scale pollution of the Doñana
World Heritage nature park, one of Europe’s primary wildlife sites, was narrowly
avoided thanks to an emergency dike constructed by the Spanish authorities. However, the environmental disaster was immense and its long–term consequences are
feared to affect the region for many years to come (Olı́as et al., 2005).
The construction of dams and dikes (hereafter referred to as structures) leads people
to believe that the floods are fully controlled, and therefore an increased urban and
industrial development in the floodplains usually takes place. Hence, if the structure fails, the damage caused by flooding might be much greater than it would have
been without the structure’s presence. Having the historical failures of structures
in mind, one might pose the question what can be done in order to reduce the risk
posed from a dam or dike failure event.
4
Section 1.2. Management of the flood risk caused by structural failure
1.2
Management of the flood risk caused by structural failure
The traditional approach of preventing the impact of flood through flood protection, is more recently being replaced by the flood management approach (Mynett
and de Vriend, 2005; de Vriend, 2005; Samuels et al., 2005; Simonovic and Ahmad,
2005) as a result of the recognition that absolute flood prevention is unachievable
and unsustainable, due to high costs and inherent uncertainties. The purpose of
flood risk management is to protect the people facing risk up to a certain acceptable (affordable) level, and to reduce the consequences of an extreme event exceeding
the acceptable level, so that a disaster can be avoided. Thus, risk management is
defined to be the process of assessing and reducing the risk. Assessment of the
risk involves recognizing the plausible failure modes for a structure or the plausible flooding events, quantifying probabilities and consequences (socio-economic and
environmental) for all (or only plausible) failure modes or flooding events, and evaluating the risk by comparing the posed risk to the predefined risk criteria (acceptable
or non acceptable risk level). Usually a threshold criterion is applied that establishes a level over which risk is considered unacceptable. International Commission
on Large Dams (2005) defines the tolerable risk as follows:
A risk within a range that society can live with so as to secure certain
net benefits. It is a range of risk that we do not regard as negligible or
as something we might ignore, but rather as something we need to keep
under review and reduce it still further if and as we can.
The key approach in achieving tolerable risk is reducing risk as low as reasonably
practicable. It is usually defined for each structure or system of structures (dike
rings) rather than as a general criteria. It is based on a case specific evaluation
of all possible risk measures, and different criteria might be applied for life safety
and other consequences in different countries. A tolerable level of life risk is often
evaluated in reference to risk of loss life due natural hazards or disease (Shortreed
et al., 1995).
Different methods can be applied for reduction of the risk posed by a dam failure
according to Bowles (2001):
1. Avoid the risk before or after the dam is built. If the safety of the dam is
questionable, then decommissioning of the dam can be proposed as a solution
to the problem.
2. Reduce failure probability occurrence through structural and non–structural
measures.
3. Reduce (mitigate) consequences through transferring the risk, effective emergency evacuation planning or relocation of population at risk. The ‘Peace
Chapter 1. Introduction
5
Dam’ is constructed about 125 kilometers northeast of Seoul, South Korea for
the purpose to mitigate the flood water in case of collapse of North Korea’s Imnam or Mount Geumgang Dam or sudden release of water through the outlet
works.
4. Retain (accept) the risk, but protection measures should be taken in the downstream area against the flood water as well as other measures should be applied
to mitigate the flood water from the most populated or economically valuable
areas.
The risk associated with flooding is generally expressed as the product between the
probability of the event occurrence and the monetary value of its consequences.
Expressing loss of life in monetary terms usually is not morally acceptable, thus,
the population at risk is commonly taken into account as a decisive element in
risk analysis. Risk expression might lead to the equivalence of an event with low
probability and high consequences to an event that has high probability of occurrence
but very low consequences. Generally, risk reduction measures try to reduce the
probability of flooding, though minimizing the probability of a flood might come at
the price of increasing its destructive power. The Indian Ocean tsunami of December
26, 2004 demonstrated that the consequences should be a triggering element of any
risk analysis, instead of focusing on the probability of the event only. The impact of
the Asian tsunami could have been lower in terms of human live losses if an effective
warning system would have been implemented and operated.
The total failure probability of a structure involves the combination of individual
probabilities estimated for different factors and loading conditions that contribute to
its failure (Hartford and Baecher, 2004). Correctly defining the overall probability,
while taking into account all factors that could lead to the failure of the structure
is questionable, especially when extreme probabilities are deduced from small data
samples. A new extreme flow record or new development at the areas potentially
affected by the structure failure will make the calculated probability value outdated.
Furthermore, in most cases the failure modes are not independent and therefore the
failure probabilities are not simply additive.
Nowadays, as a result of economic development and population growth in flood
prone areas, the potential flood damage increases as well. Furthermore, climate
change caused by global warming might lead to more devastating flooding than
ever. Higher river dikes are now seen more as a contributor to major flooding than a
protection against it, in addition to having negative effects on nature, landscape and
cultural heritage of the surrounding areas. In the Netherlands, the standard policy
of raising dike crest levels in order to maintain the required level of flood protection
is being abandoned in favour of the ‘Room for the River’ policy: widening river cross
sections by relocating dikes further away from the river and/or by lowering the river
floodplains, constructing floating houses, etc. (van Schijndel, 2005).
6
Section 1.3. Scope of the thesis
Unfortunately, we might fail to stop an event from happening due to our incapability,
negligence or unpredictability of extreme natural events, but we can develop models
and tools for fast response to any event in order to reduce its consequences. The
aim is to find measures that reduce the probability of flooding and minimize the
potential consequences.
1.3
Scope of the thesis
Developing and improving flood propagation, risk assessments and flood mitigation
models for already constructed dams and dikes is becoming a necessity for a variety
of reasons such as decreasing human casualties and economic damage. In this thesis,
instead of focusing on methodologies to estimate and lower the failure probability of
hydraulic structures, we propose approaches that cope with hazards caused by structural failure events by decreasing their consequences. We consider events, though
not likely to happen in any given year, if occurring are extremely catastrophic and
have enormous socio–economic impact.
We address the problem of dam and dike breach analysis as well as simulation and
mitigation of the flood water caused by failure of these structures. Formation of
the breach in a structure is a complex process that depends on various hydraulic,
hydrologic, geotechnical factors. In this thesis, we develop a framework and techniques for modelling dam and dike failure events as well as propose several novel
approaches for dam breach modelling. Furthermore, we introduce and apply several
numerical, statistical and constraint based methods in particular related to dam and
dike breach modelling and flood water mitigation.
In this thesis, a ‘lightweight’ numerical–constraint based technique is proposed. This
technique offers advantages of simultaneous evaluation of different flood mitigation
scenarios. Through constraints we optimize the strategy for choosing the most feasible flood propagation scenario that minimizes economic consequences.
The objectives of this thesis can be summarized as follows:
1. Review and comparison of different existing methods (mainly physically and
statistically based) for dam and dike failure modelling.
2. Development of a dam breach model for breach formation in earthfill dams
and its validation against a real dam failure event.
3. Development of a methodology for predicting dam breach characteristics and
peak outflow during the failure event by using statistical and data mining
techniques.
4. Development of an approach for reduction of flood consequences caused by a
dam failure event, identification of areas prone to flooding, identification of
Chapter 1. Introduction
7
uncertainties (input, model, and completeness uncertainty), and proposal of
risk reduction measures.
5. Development of a numerical constraint based model for flood mitigation in
low–lying areas subject to flooding.
1.4
Outline of the thesis
The thesis is composed of eight chapters. Chapter 2 presents a literature review on
earthfill dams and dikes, focusing on their failure analysis and the processes involved
during the breaching of a structure.
Chapter 3 describes in detail current state–of–the–art approaches used for dealing
with floods in particular in the Netherlands and Japan. Furthermore, it provides
in depth overview of the applied methods, namely their characteristics, advantages,
and disadvantages.
Chapter 4 compares the theoretical and practical aspects of available approaches
and/or models used for breach modelling of water defence and water retention structures.
Chapter 5 introduces a new approach for the estimation of dam breach characteristics. It starts with an overview of the theory behind the data mining techniques
used in this research and demonstrates their application to the dataset of dam failure
events.
Chapter 6 presents the mathematical model of a dam breach tool developed during
this research as well as its application to the modelling of a hypothetical failure of
an earthfill dam. It provides an evaluation of breach characteristics using different
approaches, a sensitivity analysis of important breach parameters and an evaluation
of uncertainties.
Chapter 7 describes the development of a numerical–constraint based model which
is capable to simulate different flood mitigation scenarios taking into account the
social and economic value of areas that could be prone to inundation.
Chapter 8 presents the conclusions of the research and future recommendations.
Chapter 2
Water Retention and Flood
Defence Structures
Engineering is the professional art of applying science to the
optimum conversion of natural resources to the benefit of man.
Ralph J. Smith
2.1
Design criteria and failure modes for dams
A dam is a barrier made of earth, rock, or concrete or a combination thereof that
is constructed across a river for impounding or diverting the flow of water. The
history of dam construction dates back to 2900 B.C. with the oldest dam in the
world believed to be constructed in Wadi el–Garawi, 30 km south of Cairo, Egypt
(Singh, 1996). The dam was built for irrigation purposes and had a crest length of
106m and a maximum height of 11.3m. It collapsed the first winter it was in use, but
its remains are still present today. The Alicante Dam in Spain was 46m high when
completed in 1594 and remained the world’s highest dam for 300 years. Currently,
hundreds of high dams are in operation worldwide. The Nurek Dam in Tajikistan
(300m high) is the highest and the Three Gorges Dam in China with a reservoir
storage of 39.3 billion m3 is the largest dam in the world.
The construction of dams is often seen as a solution for providing water supply, flood
control or for ‘green’, renewable electricity. The dams must be designed, built, and
operated so that they make a positive contribution to socio–economic development,
while having minimal impact on the environment. There are, however, different
perspectives on this issue and discussions are taking place about the controversial
impacts of dam construction. Resettlement of people that have to withdraw from
their social and cultural identity is often seen as a major impact of dam construction,
especially for large dams. Irreversible degradation of natural habitat, degradation of
10
Section 2.1. Design criteria and failure modes for dams
water quality, sedimentation of reservoirs and the downstream effects are other negative impacts of dam construction. The reader is referred to the report by the World
Commission on Dams (2000) for a detailed description of the complex impacts of
dams. To alleviate the impacts, measures are usually taken for adequate mitigation
of the natural habitat e.g. by creating nearby protected areas for wildlife, or new
fisheries within reservoirs, etc. The dam proponents propose more hydropower dam
construction to play “a major role in reducing greenhouse gas emissions in terms of
avoided generation by fossil fuels” (Lafitte, 2001). On the opposite side, environmentalists insist that any large dam, including hydropower dams, emits greenhouse
gases (GHGs) due to the rotting of the flooded organic matter. However, the science
of quantifying GHGs reservoir emissions is uncertain and controversial conclusions
are drawn related to hydropower emissions in comparison to those from fossil fuels,
viz. the difference between the pre–dam emissions from the undamed catchment and
the post–dam emissions. In this thesis we focus on a dam as a structure, while its
construction impacts - though very important - are out of the scope of this thesis.
The interested reader is referred to e.g. Galy-Lacaux et al. (1999); Rosa and dos
Santos (2000); Soumis et al. (2005); Tremblay et al. (2004).
Constructed dams can be categorized in two large groups: gravity and arch dams
(Figure 2.1). Gravity dams rely on their weight to resist the forces imposed upon
them. Arch dams, with the arch pointing back into the water, use abutment reaction forces to resist the water pressure force. They can be made of concrete or
masonry. Gravity dams can consist of concrete or earth, rock, a mixture of these
materials, or masonry. Dams are designed to have a low probability of failure during
their construction and operation life span. Dam design criteria require the dams
to withstand different loads, namely construction and reservoir water load, with or
without seismic load. The greater the chance of loss of life or damage to valuable
property in case of the failure event, the safer the design should be. Despite this,
dams do frequently fail.
The failure of a structure can be partial or complete. The failure of the structure
to fulfill its purpose is another type of failure. In this thesis, the term ‘dam failure’
indicates the partial or complete collapse of the dam or its foundation, leading to
uncontrolled release of water in the downstream areas. Landslides in the reservoir
might cause the release of water in the downstream areas, despite no failure of the
dam structure occurs. A wave estimated to be 100m high overtopped the Vaiont
arch dam in Italy in 1963 when a massive rockslide of 240 million m3 fell into the
reservoir at a velocity of approximately 30m/s (Pugh and Harris, 1982). Only minor
damage to the dam crest was observed though the wave that reached a height of
70m at 1.6km downstream the dam caused the loss of 2,600 human lives. Failure
of a dam can be sudden or gradual. A sudden failure is associated with concrete
11
Chapter 2. Water Retention and Flood Defence Structures
Cross section
Cross section
Plan view
Plan view
Cross
section
Cross
section
Planview
view
Plan
Upstream
Upstream
slopeslope
Upstream
Upstream
Downstream slope
Downstream
Downstream slope
Downstream
abutment
abutment
Toe
Toe
abutment
abutment
(a)
(b)
Figure 2.1: Schematic picture of (a) gravity and (b) arch dams.
dams, gravity or arch dams∗ . If breaching is initiated, the further development is
faster than for earthfill dams under the same conditions. This observation allows
modelling of the concrete dam failure events simply as a sudden (gate opening) process. Rockfill and earthfill dams, termed embankment dams, constitute the largest
percentage of constructed dams around the world and not surprisingly the largest
number of dam failure accidents occur with these dams, particularly with earthfill
dams. Their failure, depending on the triggering factors, is mostly a gradual process
rather than a sudden one. In this thesis we investigate the failure of embankment
dams, in particular of earthfill dams.
Failure of an earthfill dam can be triggered by different factors, e.g. overtopping,
foundation defect, seepage and piping. Overtopping is one of the most common
failure modes for earthfill dams. It can be triggered by inflows higher than the design inflow, malfunctioning or a mistake in the operation of the spillway or outlet
structure, inadequate carrying capacity of spillways, settlement of the dam or as a
result of landslides into the reservoir. According to National Performance of Dams
Program in USA (NPDP, 2007), 245 of 256 dam failure events recorded in the USA
during the year 1994 happened due to high inflow discharges. Any embankment
dam will fail if the spillway capacity is too small and flood waters rise high enough
to flow over the top of the dam for a considerable amount of time. In August 1979,
a flood two to three times larger than the design flood triggered the failure of the
Machhu II dam in India, causing more than 2,000 casualties (Hagen, 1982). Once
∗ The Malpasset Dam in southern France, an arch dam of 66.5m in height and maximum designed
reservoir capacity of 55 million m3 , is described to have failed explosively on 2 December 1959
(Hervouet, 2000).
12
Section 2.1. Design criteria and failure modes for dams
Reservoir water surface
Pervious foundation
Flow line
Impervious layer
Figure 2.2: Seepage on the foundation of a dam.
an initial breach channel is created, and the high reservoir water levels persist, the
breaching will continue to develop and any effort made to stop it will be unsuccessful. Overtopping may not result in structural failure, but still presents a major flood
hazard as happened during the overtopping of the Vaiont Dam in Italy (Pugh and
Harris, 1982). Similarly, rapid release of reservoir water in order to lower the water
level within safe limits, can be a big concern in downstream areas.
Water penetrating through the dam’s interior body or its foundation might progressively erode soil from the embankment or its foundation leading to the failure of the
dam. Here, we define piping failure as a failure mode caused by water penetrating
through the dam’s body, carrying with it small particles of dam material, continuously widening the gap. If the initial piping can be detected before it reaches the
critical condition, remedy might be possible. Penetration of water in the dam body
can cause slope failure. To prevent this type of failure, appropriate instrumentation
is needed to estimate the rate of infiltration within an embankment.
Seepage failure (Figure 2.2) or foundation failure occurs due to the saturation of
the foundation material leading to either washout of the material or a weakening of
the rock towards a sliding failure. The flow of water through a pervious foundation
produces seepage forces as a result of the friction between the percolating water and
the walls of the pores of the soil through which it flows. Figure 2.2 shows how water
flows through the pervious foundation of a dam.
Earthquakes or sabotage are yet two other causes of dam failure. Earthquakes that
have stimulated immediate failure of a dam appear to be very rare. The upstream
slope of the Lower San Fernando Dam in California (USA) failed due to liquefaction
during the earthquake in 1971. The dam was constructed by fill soil mixed with a
large amount of water, transported to the dam site by pipeline, deposited on the em-
Chapter 2. Water Retention and Flood Defence Structures
13
bankment in stages, allowing the excess water to drain away. The fill that remained
was loose, and was subject to liquefaction as a result of the earthquake. Fortunately,
the reservoir level was low at the time of the earthquake and no flooding occurred.
Failure due to an earthquake might result in a higher threat to the population downstream rather than the overtopping failure. In the first case a sudden breach of the
dam would cause a flood wave moving downstream while the population might have
no clue about the structural failure of the dam and the approaching flood water. On
the other hand, prior to an overtopping failure, rising flood waters often give reason
for concern to the residents in the floodplain area and lead to issuing flood warning.
The historical database of dam failure events shows that the number of failures
caused by sabotage is small. One example is the British bombardment of the German dams on the Ruhr River during World War II. The Dnieprostroy Dam (43m
high) on the Dnieper River was also destroyed for the purpose of preventing the
movement of German troops.
2.2
Design criteria and failure modes for dikes
A dike is a barrier built along the shore of a sea or lake or along a river with the
objective of holding back water and preventing flooding (Figure 2.3). Dikes are often
constructed in the floodplain for the purpose of protecting from flooding. They are
usually built from sand, clay or a combination of them, or from peat (like in many
places in the Netherlands, where local soils were used for construction).
There are many aspects that are important in making decisions related to dike construction. Economic, environmental and other social interests have to be considered,
involving different parties in the process of decision making. Different methods exist
for the design of flood defence systems or water impounding structures: probability
and risk–based design methods.
In a probabilistic approach, dikes are designed based on a water level with a particular frequency of being exceeded. The design flood levels as well a safety level or a
margin ensure the dikes’ integrity. Depending on the probabilistic method used in
the analysis and on the available data records, the design levels might be different.
Thus, including uncertainty in the estimation of the design levels is necessary, and
the margin can deal to some degree with the small uncertainties. During the years
the design levels might change as a results of changing flow conditions or as a result
of development in the area protected by dike. Therefore different measures are implemented to ensure the structural integrity that take into account new developing
conditions.
Dikes might fail due to different reasons and triggering factors. The common failure
modes that are similar to the dam failure modes are piping, seepage, overtopping
caused by sabotage is small. One example is the British bombardment of the
German dams on the Ruhr River during World War II. Other factors involve
dynamiting of dams through military action. Russian engineers realised in 1941 the
destruction of the Dnieprostroy Dam (43m high) near Kichkas on the Dnieper River.
Dikes and their failure modes
***The words dike and polder came from Dutch***Dikes are usually constructed
along the river banks and sea shores for the purpose of protecting an area from
flooding. Dikes are classified based on their function and construction material.
sand, clay,
combination
them
or from
peat.for
Sea
14 They are usually built from Section
2.2.and
Design
criteriaof
and
failure
modes
dikes
dikes have a seaward slope in order to reduce the wave run-up and the erodible
effect of the waves.
(a)
(b)
(c)
(d)
Figure 2.3: Dike along a (a) coastline, (b) river, (c) channel, and (d) on the floodFigure 2.3. Dike along a channel and on the floodplain.
plain.
In the Netherlands, there are 53 areas enclosed by continuous system of dikes, high
ground areas and other hydraulic structures (gates, sluices, locks, pumping stations
etc.). These areas are called dike ring areas and for each of them the flooding
12
Figure 2.4: Possible failure modes for dikes (TAW, 1998).
Chapter 2. Water Retention and Flood Defence Structures
15
Figure 2.5: Failure of a canal dike in Wilnis, the Netherlands (2003).
(overflowing), uplift, and slope failure. For a typical dike, various potential failure
mechanisms are distinguished as shown in Figure 2.4. Water is not the only one
triggering factor of dike failure. In August 2003, after a very dry and warm summer,
one section of a peat dike (Figure 2.5) constructed along a canal in the Netherlands
suffered a horizontal sliding, causing flooding of about 600 houses and evacuation
of 2,000 people. In specific cases, the integrity of a dike might be affected by the
activity of burrowing animals (field mouse, gopher, mole and fox). In case of their
presence, actions are usually taken to control their activity through wire screening
or traps placing along the structure.
The dike failure probability is calculated on the basis of a so–called reliability function
Z. If the resistance R is determined and also the load S is known, the determination
whether the structure will fail is simply Z = R − S. Here load and strength are
both stochastic variables. If we consider the stochastic nature of the strength and
load, the probability that the construction will fail is the probability of P {Z < 0}.
If Z = 0, the limit state is reached, which constitutes the failure boundary.
Calculating the failure probability is as complex as modelling the dike failure processes. The factors affecting accurate estimation and modelling are:
ˆ Variation of the properties of structural material (strength, deformation, permeability, time–dependent consolidation, compaction of the material, different
quality of construction works, length of the dike).
ˆ Lack of a reliable mathematical description of the failure processes needed for
16
Section 2.3. Breach modelling
accurate determination of the limit states. As for overtopping and overflowing,
these processes are understood with some degree of accuracy, but much less is
known for other failure modes, such as piping.
ˆ Uncertainty in estimating the overall failure probability of the dike. The total
failure probability of a structure involves the combination of individual probabilities estimated for different factors and loading conditions that contribute to
its failure. Correctly defining the total probability, while taking into account
all the factors that could lead to the failure of the structure seems questionable. In most cases the failure modes are not independent and therefore the
failure probabilities are not simply additive.
For the probabilistic safety analysis to be meaningful the accurate computational
models and sufficient (statistical) data are needed. Different techniques are available for determining the failure probability given a reliability function and statistical
characteristics of the basic variables. The uncertainties associated with them “are
often even greater than the uncertainties due to the intrinsically stochastic character of load and strength” (CUR/TAW, 1990). As a result, the calculated value of
failure probability is often used as a relative indicator for implementing priorities in
maintenance of the dike ring system. For detailed analysis the reader is referred to
CUR/TAW (1990) and Thoft–Christensen and Baker (1982).
Due to the shortcomings of the probabilistic approach (CUR/TAW, 1990), the risk
analysis approach is drawing more attention. The risk based design approach considers the probability as well as the consequences of inundation in case of a failure
of a flood defence system. Breaching of the dikes and consequent flooding have
claimed many lives and caused enormous economical damages worldwide. Based on
the risk estimation method the magnitude of the damage or loss is considered during
the design of the dike. For detailed description see CUR/TAW (1990) and Vrijling
(2001).
In this thesis we only consider the overflowing and overtopping failure modes that are
the most common failure modes for embankment dams and dikes. In the following
section we give a general description of the breach development characteristics and
emphasize the differences between modelling of the breaching processes in earthfill
dams and dikes.
2.3
Breach modelling
Breaching of a structure is a time–dependent and non–linear phenomenon. Water–soil interaction together with often non–homogeneous and specific material properties for each structure lead to the difficulty of accurately modelling the processes
involved in breach development. Hydrodynamics, sediment transport mechanics,
Chapter 2. Water Retention and Flood Defence Structures
17
and geotechnical aspects are all present in the breach formation and their accurate
modelling is very important for the accurate prediction of breach outflow. The development of effective emergency action plans and the design of early warning systems
heavily rely on these prediction results.
There are similarities and differences in the processes involved during the breaching
of embankment dams and dikes, as summarized below:
ˆ Dikes in comparison to embankment dams are typically longer than high.
While the breaching of a dam might develop to the limit of its geometry, for
dikes only one section is usually breached. Also, the settlement along the dike
length might vary in different sections, resulting in different crest elevations
along the dike length.
ˆ The breaching of embankment dams depends mostly on reservoir volume rather
than river inflow. During the breaching of river dikes and sea dikes, the river
flow and sea surge determine the breach development respectively. A relatively
finite volume of water is involved in dam breaching and river dike breaching,
opposite to sea dike breaching where an infinite and periodic volume of water
is caused by tides.
ˆ The flow in the river is parallel to the river dike axis, while for embankment
dams and sea dikes the flow direction is perpendicular to the structure axis.
ˆ Hydraulic load behind a dam is usually larger than the one for a dike.
Numereous methods have been developed for the purpose of modelling breach development as further discussed in Chapter 4. Here we elaborate on specific breach
characteristics and the processes involved during breaching.
2.3.1
Breach shape
The mathematical description of the interaction between dam material and water
flow is not yet fully accurate (Morris, 2005). The opening formed in the structure
during the failure process - from here on defined as breach shape - depends on that
interaction. For accurate modelling, the soil mechanic parameters should be known.
Nevertheless, they can be determined only with limited degree of accuracy. Assumptions are made concerning the breach shape in order to avoid the non–linearity in
the equations. Models usually predefine the shape of the breach. Constant breach
shape and uniform erosion of the breach section throughout the whole breaching
development time, is usually assumed. The breach cross section is often considered
to be triangular, rectangular, trapezoidal or parabolic (Figure 2.6).
Johnson and Illes (1976), after analysing the data from approximately 100 case
studies concluded that the breach develops initially in ‘V ’ shape, three to four times
18
Section 2.3. Breach modelling
Figure 2.6: Erosive patterns of various breach shapes.
Top width
Height
Figure 2.7: Parameters of the breach opening shape.
wider than deep, later developing in the lateral direction, once the apex reaches the
hardest material of the dam core or its foundation. The lateral erosion continues until either the dam is completely washed out, or the reservoir is emptied. MacDonald
and Langridge-Monopolis (1984) observed from the collected historical dam failure
events that in most of the cases the ultimate breach shape is of trapezoidal shape.
They concluded that for embankment dams, the breach shape can be assumed to be
triangular up to the time that the base of the embankment is reached. Once the apex
of the triangle reaches the foundation level, the breach develops forming a trapeReservoir
water surface
zoidal section
extending
due to lateral erosion. The conclusions drawn from several
field and laboratory tests performed within the IMPACT project is that breach sides
preserve the vertical angle during the breach development (Morris, 2005). However,
a factor influencing the conclusion can be that the rectangular initial breach shape
is predefined in all experiments.
Data related to the progressing breach shape dePervious foundation
velopment (in time) during real dam failure events are still missing.
Flow line
The parameters that specify the shape of a breach channel are: the breach depth
hb or the vertical extent of the breach measured from the dam crest down to the
breach bottom, width at the top Bt and bottom Bbot of the breach channel, and the
Impervious
breach side slope
factorlayer
z (see Figure 2.7).
Chapter 2. Water Retention and Flood Defence Structures
2.3.2
19
Breach development
Breach development in time
Breach initiation time is defined as the time of duration starting with the first observable flow over or through the structure that might initiate warning, evacuation,
or awareness, and ending with the start of the breach formation phase. During the
breach initiation phase, the outflow is relatively small, and if it can be stopped the
structure might not fail. Typical breach initiation times may range from minutes to
days. Especially piping failure might be preceded by a prolonged initiation phase.
The breach formation phase is considered to begin at the point where the structure
failure is imminent and ends when the breach has reached its maximum size. For
small reservoirs, the peak outflow from a dam break may occur before the breach
fully develops due to significant drop in reservoir levels during the formation of the
breach, whereas in larger reservoirs the peak outflow may occur when the breach has
reached its maximum size. During the breach formation phase, outflow and erosion
are rapidly increasing; while for a dike it might be possible to stop the breaching,
it is unlikely that the outflow and failure can be stopped in case of an embankment
dam. Several small springs were noticed near the right abutment of the Teton Dam,
one day before its failure. All efforts made to close the sinkholes while the leak
was rapidly growing, failed. In contrast, dike breaching can be stopped by human
intervention; the famous Hans Brinker story† is a typical example.
The rate of breach formation depends on soil material properties (cohesive, non
–cohesive, compaction, etc.) and embankment condition. Breach formation in embankment dams is highly dependent on the reservoir capacity and continues till
either the reservoir is depleted or the dam can withstand further. According to the
historical data, the breach formation phase for embankment dams ranges from 0.1
to 4 hours. The breach formation in the dike structure depends on the river flood
or sea storm conditions as well as on the dike material. Cohesive dikes are likely to
breach slower than non–cohesive dikes.
Breach development in space
All breach models assume an initial channel to have been created on the structure body (Figure 2.8) either parallel to the structure crest (DEICH A (Broich,
1998)), with rotation around the downstream toe, or parallel to the downstream
face (BREACH (Fread, 1988), BRES (Visser, 1998)). The initial channel forms the
starting condition for the breaching process. If no initial channel exists then the
subsequent stages of the breaching process will not occur. The initial characteristics
of the breach channel define further breaching development.
† The legend tells the story of the brave Dutch boy thought to be named Hans Brinker, who
supposedly prevented the flooding of Harlem city by pressing his finger in the dike opening (Dodge,
1997).
20
Section 2.3. Breach modelling
(
(c)
Figure 2.8: Modelling modes of breach growth: (a) parallel to the structure crest,
(b) with rotation around downstream dam toe, and (c) parallel to downstream face
(Broich, 1998).
It is rather difficult to predict where the initial breach channel will be formed as
this depends on many factors e.g. structure coverage, flow characteristics, bad compaction at any point in the structure. Initial erosion may begin anywhere in the
structure. For embankment dams, the developed models commonly assume a breach
located at the center of the dam. However, some historical failure events showed
that breaching might occur near an abutment as well. Examples include the failures of Teton Dam (Figure 2.9), Baldwin Hills Dam, etc. The breach development
and outflow from a centrally located breach will most likely be different from a ‘side’
Chapter 2. Water Retention and Flood Defence Structures
21
Figure 2.9: Teton Dam failure (Rogers, 2007).
breach in terms of time to peak discharge, peak value, and hydrograph shape. When
lateral growth is restricted in one direction, erosion rates in the other direction do
not compensate (Morris, 2005). Therefore, to predict the initial breach location
there is a need to undertake local surveys to identify weaknesses in the structure or
sub surface geology by visual means, sensors or remote sensing techniques. Within
the scope of this thesis, no attention is given to the processes that might define the
development of the initial channel location.
The structure might be homogeneous or heterogeneous with an impervious core at
the center of the structure (embankment dams). Different types of material may
lead to different channel slopes. When breaching is initiated at the downstream face
of the dam, a steep slope can be observed at the first stage of dam breaching due
to overtopping, but as the breaching continuous, the slope might remain about the
same or even decrease.
2.3.3
Breach formation mechanisms
Two breach formation mechanisms are identified: erosion and headcut erosion. The
latter is the process of removal of structural material by the combined effect of
the erosive force of water flow and by mass wasting (see Figure 2.10). Laboratory
experiments and observations of real earthfill structure failures show that erosion
is predominant for non–cohesive structures without a cohesive core. Headcut erosion is observed to be predominant during the breaching of structures with cohesive
filling material, or with non–cohesive filling material but with a cohesive core (see
formed by erosion headcutting, and breaches formed by erosion of the dam material as a
result of flowing water. Dam breaching mechanisms differ depending on the dam’s
material (cohesive or non-cohesive). For non-cohesive embankments without a cohesive
core, breaching occurs mostly because of erosion, which depends on the flow velocity
and the embankment material. This erosion process progresses in time until water level
in the reservoir is low enough to cause further breach erosion. For cohesive
embankments or rockfill embankments with cohesive core, breach can be formed by
headcutting and erosion. This process starts when the protective layer on the
embankment dam fails. Headcutting typically starts at the toe of the dam or in the
knickpoint at the downstream edge of the crest (as shown in Figure 2-4).
22
Section 2.3. Breach modelling
FigureFigure
2.10: Headcut
erosion process
in a cohesive
soil embankment.
2-4 Headcutting
in a cohesive
soil embankment
Powledge
et al.(1987);
(1989)Dodge
describe
flowPowledge
over an embankment,
with lowetoral.no(1999);
tail water,
e.g. Ralston
(1988);
et al. (1989); Hanson
through
the (2005).
following
zones:the modeling results versus field and laboratory exMorris
Bythree
validating
periments carried out during the IMPACT project, the breach models that predict
breach growth considering the headcut erosion processes rather than only erosion,
were argued to perform better (Morris, 2005) than the models that consider only
erosion.
Modelling of the headcut erosion is not 9trivial, and while many experiments are
carried out to gain insight into this process, the mathematical modelling of this process is just at the initial stages (see e.g. Temple and Hanson (1994); Temple and
Moore (1997); Wu et al. (1999); Robinson and Hanson (1994); Hanson et al. (2001);
Alonso et al. (2002)). Most breach models either do not consider headcut erosion,
or consider this process using very simplified assumptions, usually modelling it as
an energy dissipation process.
Erosion is modelled using the sediment transport equations that are conventionally
derived for steady subcritical flow conditions, specific types and certain diameter
ranges of sediment (Yalin, 1972; van Rijn, 1993; Bogárdi, 1974). During structure
breaching, the flow might develop into unsteady, supercritical flow and if these conditions apply, the use of unsteady non–uniform sediment transport equations is more
appropriate. However, due to their absence the Meyer-Peter and Müller (1948);
Exner (1925), Einstein–Brown (Brown, 1950), and the modified Meyer–Peter and
Müller formula adapted by Smart (1984) are commonly used.
The rate of erodibility is given by:
Er = k(τ − τc )a
where, Er presents the erosion rate, k and a are two correlation coefficients, τ
presents the flowing water tractive stress and τc is the critical tractive stress for the
erodible material.
The rate of erosion is commonly assumed to be uniform throughout the channel
Chapter 2. Water Retention and Flood Defence Structures
Subcritical flow
23
Supercritical flow
Different erosion rates
H
Figure 2.11: Description of the flow over an embankment as from Powledge et al.
(1989).
section that is the submerged part of the breach channel sides is supposed to erode
at the same rate as the unsubmerged part and the breach channel bottom. Most
of the mathematical models deal with the homogeneous dams or dikes. The failure
modelling of the heterogeneous structures is commonly done through averaging the
characteristics
of soil properties.
a)
b)
c)
d)
2.3.4
Hydraulics of flow over the dam
The breach outflow hydrograph is of crucial importance for the assessment of the
flooding characteristics in the downstream areas. The available breach models simulate flow through the breach channel using either the orifice equation (at the
initial phase of piping failure) and the weir equation, or the one dimensional de
Saint–Venant equations.
The weir equation that estimates the unit discharge for the free flow (low tailwater)
condition is generally expressed as:
q = CH 1.5
(2.1)
where q is the discharge per unit width, C is the discharge coefficient that depends
on the weir (breach) shape, and H is the total (energy) head above the crest. The coefficient C ranges between 1.60 and 2.15 in SI metric units. If the crest is submerged
by tailwater, then Eq. 2.1 becomes
q = Cs H 1.5
(2.2)
where, Cs is a coefficient that considers the submergence effect. Powledge et al.
(1989) describe the three flow zones (Figure 2.11) observed during overflowing of
the dam with no tailwater effects. The first zone is the movement of the flow from
24
Section 2.3. Breach modelling
the calm reservoir (static energy head) to subcritical velocity state (static and dynamic head) over the upstream portion of the dam crest. In this zone the hydraulic
forces and flow velocities are low. The small energy slope of the subcritical flow range
imposes small tractive stresses too. In the second zone, the flow travels through critical velocity on the crest to supercritical flow across the remainder of the dam crest,
to the downstream slope. In this zone the tractive stresses might become significant.
In the third zone a rapidly accelerating turbulent supercritical flow is observed on
the steep downstream slope. Here the energy levels increase significantly as the flow
proceeds along the downstream slope of the dam. Due to the steep energy slope, the
vertical velocities might increase significantly and the tractive stress will be large.
The downstream slope of the dam is a steep slope in hydraulic terms and a correction must be made in the calculation of gravitational forces.
The weir formula is often used to calculate the flow along the crest. The steady
non–uniform flow equations have also been used to compute the water depths, velocities, and energy slope on the downstream slope despite the short reach of the
breach channel and its steep slope because of their relatively simpler computations
compared to full de Saint–Venant equations.
Chapter 3
Current Approaches for
Dealing with Flooding
Happy Holland, had we not dug and even diked,
We were now living above the rivers,
That must cut the land, but now run over it in man–made
channels,
Whose bottom is ever higher raised by falling silt,
And so rise ever more above the land and in force and violence
their dikes can overwhelm.
Willem Bilderdijk (XIX Century)
3.1
Introduction
Nishat (2006) defines flood as “the process of inundating normally dry areas and
causing damages”. Inundation does not always pose a risk and not necessarily has
only negative impacts. It can have positive effects on soil fertility, ecosystems, etc.
(Nishat, 2006). Floods∗ , on the other hand, can be very severe and have enormous
consequences in terms of economic, ecological and social values. Floods’ destructive
forces are a threat that has been faced by humans for generations already. Noah’s
legend is one of the thousands of legends related to floods and their devastating
consequences.
Therefore, novel strategies and methods are continuously developed worldwide for
dealing with floods (Knight et al., 2006). Several common types of measures are
distinguished, such as:
1. Measures for preventing flooding: dam or dike construction, maintenance and
improvement, river dredging, etc.
∗ Reader
is referred to FLOODsite (2005) for definition of flood and risk related terms.
26
Section 3.2. The Netherlands’ long history of battle against floods
2. Measures for reducing flood impact: retention and detention basins, floodways, flood forecasting, spatial planning, awareness raising (games, role–plays,
brochures, etc.).
3. Measures for dealing with an approaching flood and during a flooding period:
Decision Support Systems (DSS), warning and emergency plans, evacuation
and local emergency protection, etc.
4. Measures taken after the flooding occurred: aftercare, compensation, insurance
and restoring of the flooded area. The loss or damage of property, and in some
cases the inability to return home for a period of time causes great stress
and disruption to people. The metro of Prague, was unable to run for several
months after the 2002 torrential flood that hit large parts of Europe. Measures
should be taken to deal not only with direct but also with indirect (long term)
consequences.
These measures taken against flooding are categorized in two groups of strategies:
1. Flood controlling strategies referred to as resistance strategies, and
2. Flood damage reduction strategies referred as resilience strategies (Vis et al.,
2003).
The first strategy aims at fully preventing floods. However, as flood prevention is
not always possible and feasible, nowadays more emphases is given to strategies that
improve the coping capacity, resilience, and adaptability, and offer more flexibility
for future interventions. Disaster mitigation is suggested as a priority at numerous
international events such as the Fourth World Water Forum in Mexico† in 2004,
the Conference of International Center for Water Hazard and Risk Management‡
in 2006, etc. In the following sections we describe flood dealing strategies in two
countries that are similarly vulnerable to water related disasters.
3.2
The Netherlands’ long history of battle against
floods
“...Dutch created the Netherlands”, is the Dutch expression that emphasizes the continuous battle against water to expand or protect the Netherlands territory through
which three major European rivers flow into the sea: the Rhine with its branches
the Waal and the Neder Rijn flowing from Germany, and the Maas (a branch of the
Meuse) and the Schelde, flowing from Belgium. Being one of the most densely populated deltas in the world with 25% of its land area below sea level and 65% prone
† Reader
‡ Reader
is referred to www.worldwaterforum4.org.mx
is referred to www.icharm.pwri.go.jp/html/meetings/iwfrm2006
alternative resilience strated assessed for their hydrauty criteriaʼ.
distinguished:
– ‘room for rivers’, a strategy focusing on measures to lower
the water levels despite a rise in the design discharge, e.g. by
enlarging the discharge capacity of the channel itself and/or
through lowering the floodplains (5);
– a resilience strategy for the protected areas based on minimizing flood risks by controlled flooding and by limiting the
flood-damage through dedicated physical planning in tune
ds experienced periods of unwith flood frequencies (6).
euse Rivers reached very high
n 1926 had a higher discharge Although both strategies have to address similar issues such as
er 250 000 people were evacu- the distribution of discharge from the Rhine River over the variChapter 3. Current Approaches for Dealing with Flooding
when the stability of the dikes ous river branches and the relationship between river manage-
27
scussions on The Netherlands’
sified and extended to include
elevant factor for the long term.
n the discharge regime of the
crease in the so-called design
a probability of 1/1250 years)
owards 16 800 (minimum scem scenario) by 2100. Addition, sea level rise may hamper the
sea level rise is currently estibove present. Finally, in deltas
ge and oxidation of extensive
Figure 3.1: The land and sea level throughout the years in the Netherlands (Klijn
of large areas, a process which
et al., 2004).
The1.dashed
line
presents
forecasted
estimates.
Figure
The land
level
sinks the
whereas
the sea
level rises, hamand maintained by a history of
pering the discharge of rivers in deltaic areas and increasing the
vulnerability of the protected areas.
1).
to
flooding,
the Netherlands has no other choice of existence but to fight against sea
al changes, social
and river high water levels. The land has been continuously subsiding (Figure 3.1)
demographic and
as a result of drainage during the Middle Ages’ reclamation and the action of both
etherlands is such
shrinkage and oxidation of peat layers. Since the eleventh century, when the first
bly affected by a
dikes are known to have been built (van de Ven, 2004), nowadays, 53 rings of dikes
00 the population
protect the delta area from flooding.
5 million inhabitwas over 16 milIn 1927, after the severe flood of 1916, the implementation of the Zuiderzee Works
concentrated in
started (see Figure 3.2). A system of artificial dams, land reclamation and water
hereas nowadays
drainage works was built. The Afsluitdijk or the ‘closure dike’ (in English) has been
vailable room for
the longest man–made dam§ for 74 years. Some 32km long, 90m wide and 19m high
re, infrastructure,
(some 7.25m above sea level), the dam is essential for protecting the land from the
er vast areas, and
2.
Floodplain
area and
intensity
around
(a) 1830
North
Sea. After
the land-use
completion
of thearound
works, Arnhem
the coastline
length
was decreased
and-surface area. Figure
and (b) 2000.
by almost 300km and a freshwater lake was created that provides drinking water as
well
as reclaiming
© Royal Swedish
Academy
of Sciences land
2004 for agriculture and urban development.
http://www.ambio.kva.se
141
During the February 1953 storm (Gerritsen, 2005), the greatest storm surge on
record for the North Sea, the Afsluitdijk prevented flooding on the Zuiderzee coast.
However, on the southwest of the country, the storm lead to the worst ever disaster
in the Netherlands when 800km of dikes protecting the area were breached causing
1,835 casualties and flooding 2,000 km2 of land. Afterwards, the construction of the
Delta Works (Figure 3.3), the most spectacular water related mega structure in the
world, took place.
Numerous dams and dikes, sluices, locks, and storm surge barriers were built in the
Netherlands to protect the land from sea and river flows. However, in 1993 and 1995,
§ The Saemangeum Seawall, located on the southwest coast of the South Korea, is the world’s
longest man–made dike from the time of its inauguration in 2006, being 0.5km longer than the
Afsluitdijk dike.
28
Section 3.2. The Netherlands’ long history of battle against floods
(a)
(b)
Figure 3.2: Afsluitdijk - the ‘closure dike’ - in the Netherlands.
(a)
(b)
Figure 3.3: Eastern Schelde storm surge barrier (Rijkswaterstaat).
Chapter 3. Current Approaches for Dealing with Flooding
29
the Netherlands was again under threat of significant flooding, when the Rhine and
the Maas Rivers reached very high levels and the stability of the dikes seemed no
longer guaranteed. Some 200,000 people were evacuated during the January 1995
storm.
Nowadays, there are over 16,000km of dikes and 300 structures that protect the
Netherlands from flooding. About 2,400km of constructed dikes are designated as
primary dikes - dikes in direct contact with water bodies (sea, lakes and rivers) and 14,000km are secondary dikes - dikes sorrounding the canals. The design of
sea and river dikes is traditionally based on a design water level with a particular frequency of exceedance. Following the disaster of 1953, the Delta Committee
(1960) defined the design water levels for the sea dikes, which are built to withhold
the 10,000 year return period storm surge levels. The Commission on River Dikes
(1977) recommended that river dikes should be designed and improved to retain
water levels associated with a governing rate of discharge of the Rhine River at
Lobith (entry location of the Rhine River in the Netherlands), which is exceeded
with a frequency of about 1,250 year (CUR/TAW, 1990). The design levels keep
increasing, as the current 1,250 year return period discharge at Lobith corresponds
to 16,500m3 /s while further increase in the design discharge is forecasted to be from
16,800 (minimum scenario) to 18,000m3 /s (maximum scenario) by the year 2100
(Kwadijk and Rotmans, 1995). Still, those values are uncertain as the 1,250 year
flood event is forecasted based on only 100 years of records.
Innovation in flood protection, prevention, and management is continuously developing as the perception that the Netherlands can be subject to flooding anytime
has not perished. Climate change has increased the uncertainty about river flows
while sea level rise might impede the rivers’ discharge. Moreover, sedimentation that
occurs on the floodplains along the rivers and the subsidence of the land behind the
dikes, lead to larger differences between floodplain and hinterland level (Asselman
and Middelkoop, 1995). In other words: when the river capacity is decreased, the
flood hazard is increased. Construction of dikes leads people to believe that they are
safe, and as such the urbanization and economic development of the areas continue
to grow, increasing in turn the flood risk. This development along the rivers makes it
more difficult to implement flood measures, such as compartmenting areas, creating
water retention basins or floodways, viz. developing so–called green rivers.
In the Netherlands, it is typical to have continuous system of dikes that together
with high ground areas and other hydraulic structures (gates, sluices, locks, pumping stations, etc.) create an enclosed area. These areas are called dike ring areas
and currently there are 53 of them identified in the Netherlands (Figure 3.4). The
largest dike ring surface area of 600 km2 is in the Betuwe, in the so–called central
river land. The Flood Defences Act of 1996 defined the safety standard for each dike
ring area, “expressed as the average exceedance probability–per year–of the highest
hazard has substantially increased.
The above-mentioned dike-rings consist of
ly closed rings of dikes or of dikes which con
grounds. Their surface area ranges from less t
about 600 km2 for the largest, the Betuwe. This
large differences in potential flood damage throug
BRIEF HISTORY AND PRESENT SITUATION
tude. Also the potential flooding depths differ sub
Before 1000 AD inhabitants of the delta and alluvial plains lived much less than 2 m for dike-rings adjacent to h
on natural levees, other natural heights, or they built mounds. more than 6 m in the lower parts of the enclosed
Since then, the Dutch started to construct dikes, resulting in a differences become even more accentuated whe
closed pattern of dikes from about 1400 AD onwards. Today, status and development rate are taken into acco
this pattern of dikes is largely unchanged. It consists of 53 so- largest dike-ring with the largest potential depth
called dike-rings for the whole country, 10 of which adjoin the vulnerable land-use types are now being develop
industry, and (inter)national transport.
Rhine
River branches
(Fig.
3).
Section
3.2. The
Netherlands’
long history of battle against floods
Although on the one hand flood protection ha
sound, a further heightening of the dikes meets v
This partly follows from the notion: “the highe
bigger the disaster”, but also because of the neg
protective structures on natural, cultural, and sc
values. Even more importantly, the improved
tains the negative spiral of further economic inv
protected areas. The enhanced ‘notion of safet
economic investments in the protected areas, wh
a social call for dike reinforcements, etc. The op
reinforcement therefore calls for a change of stra
escape this negative spiral.
A summary of the current situation would re
structure from 1400 AD, equal safety standards
the river, and a steadily increasing flood-damag
cause of a still largely unbridled 21st century lan
nomic development rate. The urgency of changin
of future developments is acknowledged and incr
trated by the many reports and the advice to the
research institutions (3, 10), dedicated committe
water management authorities.
ments and hence sustainability. We go into the advantages but
also the far-reaching implications. However, we first briefly
introduce the present situation along The Netherlands’ Rhine
River branches.
30
LIMITING THE RISKS OF FLOODING
A resilience strategy for flood-risk management r
ber of principles and related measures. Firstly,
phasize that flood-risk management is not the sam
trol. Flooding risks result from a flood hazard in
Figure
3. Dike-rings
(numbered,
referring
to Tables
1 and 2) and
is vulnerable. Without a vulnerable society or eco
Figure
3.4: Dike
ring areas
of the
Netherlands.
safety levels along the lower Rhine River in The Netherlands.
may be regarded as a natural phenomenon which
ified in a normative way as posing ‘a risk’. This a
The height of the dikes along the Rhine River has, however, the concept of flood risk embraces the concepts
steadily
the course
of history.
Initially,
this of
meant
water level, which
theincreased
primaryover
water
defence
must be
capable
withstanding
from often, it is expressed as a funct
and vulnerability;
adapting
to
the
last-experienced
flood
level.
From
the
1950s
onthe outside, while taking into account other factors which determine the
water
de-precise). In The Netherlands, how
product,
to be
wards, a more scientific approach has been followed, based on mon practice (12) to define flood risk as flood pro
fensive capability”
(Floris,
2005).forFor
a dikedischarge’
ring, itswith
weakest
link defines its safety
hydraulic
modelling
a ‘design
a recurrence
damage. Obviously, the approach is the same, o
intervalRepresenting
of 1/1250 years.the
Thissafety
design level
discharge
determined
by itsquantification
level or its strength.
of aisdike
ring by
weakest link
differs. The difference lies primari
a
statistical
analysis
of
all
floods
recorded
in
the
last
100
years.
is economically undesirable, as the failure probability of the entire dikeflooding
ring isdepth
high,is included:
The 1993 and 1995 floods have caused the design discharge to
when only partrise
of from
it has
failure in
and
attention.
Hf x V = Pf x Df
, resulting
the needs
appliedparticular
linear Rf =
15high
000 toprobability
16 000 m3 s-1of
regression becoming slightly tilted. This emphasizes the suscep- Rf = flood risk; Hf = flood hazard; V = vulnerab
Water retentiontibility
and of
detention
areas
are seen
as two
potentialwhether
solutions,
both being
probability;
Df = flood damage; with both Hf an
this statistical
method
to climatic
fluctuations,
on flooding
normal or resulting
from global
It also emphasizes
applicable to particular
situations.
Floodchange
water(7).
detention
areas are useful
for depth.
atuncertainty
of forecasts
of rare events
(1/1250
years),
when
of an area depends on the n
tenuating floodthe
peaks,
provided
the storage
volume
is large
compared
toThe
thevulnerability
flood
based on only a 100 years of records. The 1/1250 years discharge ple, the economic value (invested capital and
peak and the detention
occurs
in
time
of
peak
discharge.
The
area
is
temporarily
can only—with 90% certainty—be estimated to lie between 13 and/or ecological values. In the downstream par
3 -1be available for land use or other functions again
flooded and can
500be
andrestored
18 000 mor
s (5, 7).
River basin, an adequate Flood Early Warning S
The
fixation
of
the river between
since about
1400efficient
later on. For flood reduction purposes,
they the
aredikes
considered
more
than re-Presently, the water levels can be
is operational.
AD in combination with the steady heightening of the dikes has
tention areas that serve to store water, not allowing it to flow downstream. Water
retention basins
feasible
solution
as they
Swedish Academy
of Sciences
2004
142along the Rhine River are not seen as©aRoyal
http://www.ambio.kva.se
are considered to contribute only to the attenuation of low to medium peak flows,
and not in the case of extreme or prolonged events. Detention areas far upstream in
the Rhine basin are “not considered very effective in lowering extreme floods that
endanger the downstream areas” (Hooijer et al., 2004). Clearly, some flood control
solutions cannot be transferred to different places and are very much depending on
Ambio Vo
Chapter 3. Current Approaches for Dealing with Flooding
31
the particular location and situation.
Dividing a dike ring area into compartments might significantly reduce the risk.
During the Flood Risks and Safety (Floris) project, the re–estimation of flooding
probabilities and consequences of flooding for 16 dike ring areas (out of 53 in total),
together with in-situ examination of the dike rings was accomplished. The objective
was to check the reliability of the dikes and the hydraulic structures, as well as to
identify and reduce uncertainty. The risk was calculated for each dike ring area
separately ignoring hydraulic interactions effects, that are not taken into account
in the current design and safety assessment practice in the Netherlands despite the
awareness of its importance. The damage in the province of South Holland varied
approximately from e280 million to e37 billion (depending of the location of the
breach) when the presence of embankments (highway, railroads, etc.) and natural
terrain was considered, instead of e290 billion calculated assuming the flooding of
the whole area without partitioning. For more details the reader is referred to the
report by the Dutch Ministry of Transport, Public Works and Water Management
(VenW, 2005).
Dutch are currently implementing the plan to give back some of the land to water.
Creating room for the river means more storage for flood water by relocating the
dikes further inland, lowering the floodplains, creating bypasses or so–called green
rivers, creating detention areas along the river, etc. (see Figure 3.5). The green river
definition is used since this solution is believed to give more priority to ecological
benefits rather than only economic. It is a general belief that the ‘Room for the
River’ policy is effective. However, its implementation at a large scale might be difficult especially when periodical flooding of inhabited areas is involved or when the
water retention basins highly affect the economic development of the community.
The idea of amphibious floating houses and roads is currently on its way to implementation. The first floating village, expected to accommodate 20,000 people, is
under construction at a semi aquatic city on IJburg near Amsterdam. This technology allows the houses to float on the water if the water levels rise during a flood
event.
Vis et al. (2003) and Klijn et al. (2004) compared the controlling strategies of successively heightening and strengthening of dikes for coping with the Rhine River
floods with two resilience strategies consisting of
1. Using detention areas of low economic value along the river and partitioning
of a dike ring area into compartments with different flooding probabilities; or
2. Increasing river discharge capacity either by enlarging the floodplain area or
by adding retention compartments of low economic value that have a high
probability of flooding.
Towards sustainable flood risk management in the Rhine and Meuse river basins
32
Section 3.2. The Netherlands’ long history of battle against floods
Illustration
of typical location
of flood risk
management
measures
the river basin.
Figure
3.5: Illustration
of typical
location
of flood
risk within
management
measures within
(From Project 5).
the river basin (Hooijer et al., 2004).
The following criteria were assessed (Klijn et al., 2004):
1. Costs (investment and maintenance),
2. Flexibility (to adapt to changes in boundary conditions, normative views, etc.),
3. Resulting (expected) flood damage,
4. Economic impact,
5. Ecological impact,
6. Landscape qualities (scenery and cultural heritage).
The first (traditional) strategy was found economically favorable to implement being
cheaper than the other two resilience strategies. While the first strategy involves
the heightening of the dikes, the other two incorporate the construction of new
dikes, adaptation of infrastructure, and financial compensation to the owners and
inhabitants of areas where economic development will be affected as a result of increased allowed flooding frequency. The incremental costs of heightening existing
dikes, is expected to be lower since the original costs of constructing dikes are not
included
in the
estimation
or comparison.
Klijn
et al.Rhine
(2004)
Some ‘Room
foroverall
Rivers’ measures
practised
or considered along
the lower
river:concluded that
(From ‘Room for
Rhine’) strategies have fewer disadvantages than the flood conin long–term,
thetheresilience
trolling strategy of dike heightening. However, the implementation of the resilience
IRMA-SPONGE Summary Report - 10
Towards sustainable flood risk management in the Rhine and Meuse river basins
Chapter 3. Current Approaches for Dealing with Flooding
33
A map of the Rhine basin with flood trav
the Dutch-German Dutch border. Also sh
contributions to floods from different pa
basin
(Result of Room for the Rhine).
An improved flood early warning system
a forecasting time of 4 days to The Neth
(Result of Project 12).
Figure 3.6: A map of the River Rhine basin with flood travel times (in days) to the
Dutch–German border (Hooijer et al., 2004).
strategies requires large investments in the short–term whereas their revenues will
become clear only after relatively long period of time.
Different types of flood risk management measures were considered during the IRMA
–SPONGE project (Hooijer et al., 2004), focusing on flood prevention measures, development of methodologies to assess the impact of flood risk reduction measures
and climate change scenarios. The objective was “to support the spatial planning
process in establishing alternative strategies for an optimal realization of the hydraulic, economic and ecological functions of the Rhine and Meuse River Basins”
(Wolters et al., 2001). Alternative resilience strategies have been elaborated and
assessed for their hydraulic functioning and ‘sustainability’ in risk management criteria. The IRMA–SPONGE project (Hooijer et al., 2004) concluded that for the
Rhine River:
34
Section 3.3. Japan’s experience in dealing with floods
1. The timing of flood peaks from tributaries to the main stream is
highly complex.
2. The storage volume available in detention areas is utilized most
effectively for peak shaving provided accurate timing of detention
can be achieved during flood peaks and not during the earlier stages
of floods.
3. The further upstream retention and detention areas are created, the
less effective they are for reducing extreme floods downstream.
Downstream the Rhine River basin (Figure 3.6), the Flood Early Warning System
(FEWS) is in operation. The water levels can currently be predicted with adequate
accuracy 2 days ahead of a flood, and efforts are currently being made to lengthen
this period up to 3 to 4 days.
As the flood risk increases, public awareness becomes a key factor for saving lives
and it is important to have better participation of people in the decision making
related to measures needed to decrease the risk. The population living in risk zones
should be aware of the flood hazard maps. This is something that is not generally implemented in the Netherlands, but has been widely adapted in some other
countries (e.g. disseminated by the Internet in UK).
3.3
Japan’s experience in dealing with floods
Japan is a country where the occurrence of disasters is quite common. Earthquakes,
floods, tidal waves, volcano eruptions and typhoons are part of every day life in
Japan. Enclosed in all directions by the sea, it is vulnerable to storm surges, high
waves, and tsunami on the coasts. Preserving the coastline from these hazards is
crucially important while at the same time preserving various ecosystems. More
than 50% of the population and more than 70% of the nation’s assets are concentrated in the floodplains.
Storm surges by typhoons have caused catastrophic damages in Japanese coastal
areas throughout the years. The typhoon Vera in 1959 caused Japan’s greatest
storm disaster accounting for nearly 5,000 casualties, and leaving some 1.5 million
people homeless due to the enormous damage from wind, floods and landslides. If it
were not for the construction of coastal dikes and improvement of weather forecast
systems, the number of casualties from storm surge floods can continue to be high
nowadays. However, the storm surge flood of 1999, the worst flood disaster since
1959, indicated that there is still a need to improve the measures against storm
surges.
Rivers with their short length, steep slopes and narrow catchment areas are another
source of flooding disaster. In response, engineers have taken disaster prevention and
Breach width
Breach depth
Breach side slope
35
Chapter 3. Current Approaches for Dealing with Flooding
[Before the construction of a super levee]
Back slope of the riverbank
River zone
[After the construction of a super levee]
Existing back slope of riverbank is used
Super levee special zone
Figure 3.7: Example of super levee (www.rfc.or.jp).
conventional dike
Reservoir water surface
conventional dike
conventional dike
Pervious foundation
Figure 3.8: Behaviour of conventional
dike (above), and super levee (below) subject
Flow line
to overflow, seepage and earthquake shaking.
Impervious
layer control and management is implemented through a
management measures.
Flood
number of structural and non–structural measures. In addition to these mentioned
in Section 3.1, artificial underground channels, stimulation of flood–proof building
construction, installation of flood sensors that can assist in deciding on evacuation,
and other options described in detail below are taken in Japan.
The underground floodways and regulating reservoirs are two solutions applied in
Japan to deal effectively with urban flooding. The construction of super levees
(Figure 3.7) is seen as a good solution to prevent flooding in urban areas where
a potential dike break may have catastrophic consequences. In the battle against
floods and earthquakes (Figure 3.8), they seem to offer stronger foundation and
better protection. A super levee is considered resistant to overflow and seepage.
Having a width of about thirty times their height, super levees have the strength to
withstand severe flooding. Super levees provide usable land and space for dwellings
and restores access to the riverfront.
The design tide level for coastal dikes is estimated based on the recorded values or
the expected maximum water level creating uncertainty about any storm stronger
than the designated storm. To deal with these exceptional events, early warning systems are in operation and evacuation plans are utilized. Urbanization near coastal
Breach depth
Breach side slope
[Before the construction of a super levee]
Back slope of the riverbank
River zone
[After the construction of a super levee]
Existing back slope of riverbank is used
36
Section 3.4. Modelling
of propagation
of flood caused by structural failure
Super levee special
zone
Number
of people
1 hour
People aware
of hazard
maps
People not
aware of
hazard maps
Flood Frequency
500-1000 years
100 years
50 years
30 years
10 years
5 years
3 years
Flood Elevation (m)
6
5
4
3
2
Time
Evacuation
announcement
1
Evacuation
order
(a)
0
(b)
Number
of people
People aware
of hazard
1 hour
People not
aware of
hazard mapstorrential flood in
Figure 3.9: (a) Effectiveness of flood maps
hazard map during
Fukushima and (b) Expression of the safety degree against flood water levels (Merabtene et al., 2004).
Evacuation
Time
Evacuation
announcement
areas and extensive expansion of mega cities
in underground
levels make people more
order
vulnerable to potential flooding. For warning the population of the risk posed due
to flood hazard, vulnerability maps are made available and are distributed to public.
Merabtene et al. (2004) confirms that warning the population using up to date information technology and preparatory work of flood hazard map distribution among
them proves to be effective to mitigating flood damage and reduce the numbers of
casualties. During the torrential rain of 1998 in Fukushima, people of Sukagawa city
that were aware of flood hazard maps evacuated 1 hour earlier than those who were
not (Merabtene et al., 2004). Figure 3.9a shows the difference in evacuation time
among the people with and without knowledge about flood hazard maps.
A comprehensible Flood Risk Indicator has been developed in Japan to indicate the
degree of safety/risk against flood damage through the means of a chart depicting
the frequency of floods and inundation level versus the height of people and houses
(see Figure 3.9b).
3.4
Modelling of propagation of flood caused by
structural failure
To correctly estimate the consequences derived from a structural failure the modelling of flood propagation should be of high accuracy. Identification of the inundated
areas, inundation depth, speed and duration, as well as the impact that flood water
characteristics (salt, freshwater, contaminated water, etc.) can have on the inun-
Chapter 3. Current Approaches for Dealing with Flooding
37
dated areas, are very important for decision making, emergency evacuation and early
warning.
Most of the research on modelling dam break flood wave propagation has been focused on the movement of clear water in the downstream valley, excluding debris
flows and sediment transport. Clear water dam break floods have been studied extensively experimentally, analytically and numerically.
The De Saint–Venant (1871) equations or shallow water equations are used for modelling dam break flood propagation. These equations consist of the mass and momentum conservation equations, and assume that the vertical velocities are much
smaller than the horizontal velocities, which leads to hydrostatic pressure distribution in a channel cross section (Derivation of these equations can be found in Stoker
(1957); Abbott (1979); Cunge et al. (1980); Chow (1959); Chaudhry (1993)).
At first, dam break flood analysis was assuming instantaneous and complete failure process rather than gradual failure of a dam. The sudden failure results into a
highly unsteady flow, with a forward (positive) wave advancing in the channel downstream the dam and a back (negative) disturbance propagating into the still water
upstream the dam (see Figure 3.10). Owing to their mathematical complexity, the
analytical integration of de Saint–Venant equations in an unsteady flow situation
can be obtained only for very few idealized situations. The first explicit solution to
a dam break problem was given by Ritter (1892) who solved the de Saint–Venant
equations analytically for the case of dam break flow in a horizontal and infinitely
large rectangular channel neglecting the hydraulic resistance caused by stream bed
friction and turbulence.
When the wave is considered to advance into still water of appreciable depth, the
flow is approximated by a shock wave with jump conditions of mass, momentum,
and energy conservation. The solution is deduced by evaluating the relation between
hydrostatic forces and rate of change of momentum at the wave front. Many authors
have carried out experimental investigations for the purpose of checking the validity
of the analytical solution Schoklitsch (1926); Dressler (1954); U.S. Army Corps of
Engineers (1960, 1961); Montuori (1965), etc.
The experiments of Schoklitsch (1917) indicated that the velocities for the forward
wave may be as low as 40 percent of the result obtained by Ritter’s solution, while
having good agreement for the tip of the negative wave. Later, Dressler (1952)
considered the wave propagation on a dry horizontal channel bed taking into consideration the effect of hydraulic resistance in the forward part of the flow. The
hydraulic resistance caused by bed friction and turbulence in the shallow front region of the flow were considered dominant over the effect of the small slopes that
were investigated later by Dressler (1958).
38
Section 3.4. Modelling of propagation of flood caused by structural failure
Removed dam wall
y
Negative wave
Advancing positive surge
t
x
Figure 3.10: Dam break wave in a horizontal wet channel.
The numerical solution of the de Saint–Venant equations in natural streams was first
achieved using the methods of characteristics. Later, Ré (1946) analyzed the dam
break flood wave for a non–horizontal initially wet channel with a Chézy resistance
coefficient using a finite–difference method applied to the characteristic equations.
Different numerical schemes have been developed to solve the de Saint–Venant equations in 1 and 2 dimensional forms. Finite–difference (Abbott, 1979), finite–element
methods (see e.g. Hervouet (2007)), and lately finite–volume (Toro, 1999) methods
are generally preferred for their ability to reproduce discontinuous solutions.
Depending on the addressed problem and on the numerical scheme used to solve the
shallow–water equations, conservative or non–conservative forms of the equations
can be used. For different cross sections - arbitrary shape (natural shape), prismatic
or rectangular - different forms of the shallow–water equations can be written. In
Table 3.1 the conservative and non–conservative form of the shallow equations in
arbitrary shape cross section are presented. For further information on modelling of
dam break induced flows in complex topographies the reader is referred to Soares
Frazão (2002); Chanson (2005).
During dam breaching, reservoir trapped sediment and dam material is moved away
together with the water and is deposited in the downstream valley. According to
Costa and Schuster (1988), historical floods from dam failure events have induced
39
Chapter 3. Current Approaches for Dealing with Flooding
Table 3.1: Shallow water equations in one dimension.
Represented forms
Continuity & momentum equation
Conservative form on
arbitrary cross section, where:
A = cross sectional area
∂Q
∂A
Q = discharge
∂t + ∂x = ql
I1 = first moment of the cross
section
I2 = spatial variation of the cross
Q2
A
section width
S0 = bottom slope
Sf = friction slope
ql = lateral inflow per unit length
∂Q
∂t
Non-conservative form on
arbitrary cross section,
where: U = velocity
∂h
∂t
∂U
+ U ∂h
∂x + h ∂x = 0
∂U
∂t
∂h
+ U ∂U
∂x + g ∂x =g (S0 − Sf )
1
+ g ∂I
∂x +
∂
∂x
=gA (S0 − Sf ) + gI2
severe soil movements in various forms: debris flows, mud flows, floating debris and
sediment–laden currents. Intense erosion and deposition is expected to highly affect
the morphology of the valley that in turn affects the flow. Still, nowadays, the propagation of flood wave induced by a structural failure is commonly modelled ignoring
any presence of debris and sediment. It is the complexity of the processes involved,
that limits the modelling of floods induced by structural failure to clear water wave
propagation. Despite the awareness of the importance that the proper modelling of
flood water and sediment/debris interaction have on the hazard evaluation, mathematical or numerical modelling of this process is not yet satisfactory. For information
on ongoing work on modelling of debris and sediment transport during structural
failure see e.g. Leal et al. (2002); Nsom (2002); Spinewine and Zech (2007).
There are a number of commercial and non–commercial hydrodynamic packages
available worldwide. Sobek 1D2D developed at Delft Hydraulics (www.sobek.nl),
MIKE FLOOD at DHI (www.dhisoftware.com/mikeflood), Telemac at EDF-DRD
(www.telemacsystem.com) are few of the most widely used commercial hydrodynamic computation products. There are also freely available software packages,
mostly used for one dimensional modelling of the steady or unsteady flow.
In this thesis we use Sobek 1D2D, an integrated one– and two–dimensional numerical
simulation package developed by WL | Delft Hydraulics for modelling the propaga-
40
Section 3.4. Modelling of propagation of flood caused by structural failure
tion of flood wave caused by a structural failure. Sobek 1D2D solves the shallow
water equations using the so–called ‘Delft Scheme’ (Stelling et al., 1998; Stelling
and Duinmeijer, 2003). The 1D schematization for flow through a river channel is
combined with a 2D schematization for overland flow, bringing the model’s behavior
closer to the real physical behavior (see Figure 3.11). A control volume approach is
used for the 1D calculation points of the channel in combination with the 2D grid
cells. The flow in the 1D channel below the 2D grid bed level is treated as 1D flow,
while the flow above the 2D grid level is treated as 2D flow within the area of the
2D grid cell.
Sobek 1D2D is capable of simulating the dynamics of overland flow over an initially
dry land, as well as flooding and drying processes on every kind of geometry (Dhondia and Stelling, 2002). It can correctly simulate the transition between sub and
supercritical flows and vice versa (Verwey, 2001). Stelling and Duinmeijer (2003)
give a description of the grid scheme used in the two dimensional overland flow
model of Sobek 1D2D, and present a comparison between numerical and experimental results of the dam break flood propagation experiments under dry and wet
conditions. A GIS based tool is associated with Sobek 1D2D for data input and
output processing.
Figure 3.11: Schematization of the hydraulic model: Combined 1D/2D staggered
grid.
Chapter 3. Current Approaches for Dealing with Flooding
3.5
41
Uncertainty associated with flood modelling
The processes involved in structural failure analysis are neither completely understood nor accurately described in mathematical terms. Uncertainty analysis is necessary for identifying sources of uncertainty and reducing it. Identifying the reducible
and the irreducible uncertainties in a model is an important step in the overall
process of uncertainty reduction. There are several types of uncertainties classified
differently by various researchers (Funtowicz and Ravetz, 1990; Hoffman and Hammonds, 1994; Rowe, 1994; Krzysztofowicz, 2001; van der Sluijs, 1997). Vesely and
Rasmuson (1984) classified uncertainty as:
1. Input or data uncertainty.
2. Modelling uncertainty, that is a result of incomplete understanding of the
modelled phenomena, or numeral approximations used in mathematical representation.
3. Completeness uncertainty. The uncertainty associated with all omissions that
occur due to lack of knowledge.
Tools for dealing with uncertainty are sensitivity analysis, error propagation equations, Monte Carlo analysis, expert elicitation, scenario analysis, Bayesian belief
networks, etc. Saltelli et al. (2000) and Saltelli (2004) define the Sensitivity Analysis (SA) as the study of how uncertainty in the output of a model can be apportioned
to different sources of uncertainty in the model input, and how a given model depends on the information fed into it. There are three types of sensitivity analysis:
(i) Screening, (ii) Local Sensitivity Analysis, and (iii) Global Sensitivity Analysis.
Local Sensitivity Analysis consist in varying one parameter at a time and observing
its influence on the output, while Global Sensitivity Analysis consist in varying all
parameters and evaluating their contribution to the variance of the output.
Janssen et al. (1994) defines uncertainty analysis as the study of the uncertain aspects of a model and their influence on the model output. Stochastic modelling
is traditionally used to analyze uncertainty and uncertainty propagation associated
with input data and model parameters that are represented by probability distribution functions rather than by a single value.
Monte Carlo Simulation and Latin Hyper Cube sampling are some of the methods
for stochastic model calculations. Due to their time and calculation complexity, less
time consuming sampling methods (best case, mean case, and worst case sampling
methods) have been designed, that consequently provide less accurate information
on the uncertainty in the outcome. The lack of information about the shape of the
probability distribution functions of the values of the input data and model parameters leads to the idea of uncertainty of the uncertainty methods such as Monte Carlo
or Latin Hyper Cube. Alcamo and Bartnicki (1987) argued that the uncertainty
42
Section 3.5. Uncertainty associated with flood modelling
about the shape of probability distribution functions might be negligible.
In flood risk modelling, usually a sensitivity analysis is undertaken to detect the
influence of the inputs on the output of the model. In this thesis we apply local
sensitivity analysis to the models developed.
Chapter 4
Current Approaches to
Dam/Dike Breach Modelling
There are lies, damned lies, and statistics.
Benjamin Disraeli
4.1
Background
One important step in dam break modelling is the accurate prediction of the breach
outflow hydrograph. Significant effort has been made in developing models that
accurately predict breach characteristics; still, many uncertainties related to breach
modelling are still existent (Franca and Almeida, 2004; Morris, 2005; Zagonjolli
et al., 2005; Zagonjolli and Mynett, 2005a). Due to the incomplete understanding
of breach formation processes and hence the limited capabilities of mathematical
description of dam breaching mechanisms, the presently available models rely on
several assumptions as mentioned in Section 2.3.
In fact, no model is exclusively represented from first principles into mathematical
equations and there always exist some degree of approximation and empiricism. In
this thesis a distinction is made between empirical models and models created using
data mining techniques, where a model is derived from the data itself, and physical
models, where data are used to fit the equations based on physical principles.
During the IMPACT project, a European project investigating extreme flood processes and uncertainties∗ , several breach models were assessed using field and laboratory scale experimental data. Though these models offer improved capabilities
and reliability in comparison with earlier models, their prediction accuracy is still far
∗ The
reader is referred to the extra issue of Journal of Hydraulic Research, VOL 45, 2007.
44
Section 4.2. Experimental work
from satisfactory. A 30% uncertainty band was identified for predicting peak outflows in the field and laboratory tests. When applied to the historical failure event
of the Tous Dam in Spain, a 50% uncertainty band was observed. Poor prediction
of the outflow hydrograph and unreliable prediction of the breach development in
time was observed in the experimental results (Morris, 2005) suggesting that further
research is needed to increase the capabilities of the existing physically based models. In this chapter we describe the present tools and methodologies used for breach
modelling.
4.2
Experimental work
For better understanding the processes involved and to correctly describe the complex phenomena of embankment breaching, various field and laboratory experiments
were carried out during the previous century. At first, the experimental work was
focused on identifying the scale of flooding resulting from a sudden failure of the
dam structure. This approach, though appropriate for concrete and arch dams that
usually exhibit a failure within a relatively short duration of time - similar to sudden
failure - did not provide insight into the breach modelling processes except for the
flood wave movement in the downstream channel (Dressler, 1954). A thin plate representing the dam was located in a rectangular ‘channel’, and its removal simulated
instantaneous failure of the dam.
During recent years, several field tests and laboratory experiments were carried out
modelling gradual failure of dams. In the Netherlands, research regarding breach
growth in dikes started with some field experiments on non cohesive sand dikes
in 1989. Two fields tests were carried out at ‘Het Zwin’ located in ZeeuwschVlaanderen, at the boundary between the Netherlands and Belgium. The experiment was focused on modelling sea sand dike breaching processes neglecting the
effect of waves on the test results. The results of two other tests performed on 6th
and 7th October 1994 are reported by Visser et al. (1996). Later, in 1996, large-scale
field experiments were carried out for investigating the three dimensional aspects of
breach growth in sand dikes (Visser, 1998).
Different failure modes and triggering conditions have been simulated in small scale
laboratory tests and large scale field tests with the aim to better understand the
breaching mechanisms and obtain data for calibration and validation of mathematical models. For further information on some of the experiments undertaken the
reader is referred to Tinney and Hsu (1961); Tingsanchali and Hoai (1993); Coleman et al. (2002); Rozov (2003); Zhu et al. (2006). Here we focus on the latest
experimental work carried out during the IMPACT project (IMPACT, 2004).
Several large scale field tests have been performed on non–cohesive and cohesive em-
Chapter 4. Current Approaches for Breach Modelling
No.
1
2
3
45
Table 4.1: Information about five field tests undertaken in Norway.
Description of the test
6m high clay and silt embankment (D50 = 0.01 mm) with 25% clay
and less than 15% of sand to fail due to overtopping.
5m high non-cohesive embankment with D50 about 5mm (less than 5%
fines) to fail due to overtopping.
6m rock fill embankment with moraine core to fail due to overtopping.
4
6m rock fill embankment with moraine core to fail due to piping.
5
4.5m moraine fill embankment to fail due to piping.
Table 4.2: Information about five laboratory tests undertaken at HR Wallingford
(Morris, 2005).
Tests
9
8
5
Description of the test
Overtopping failure of homogeneous, non–cohesive embankments for
various grain size, breach location and embankment geometry.
Overtopping failure of homogeneous, cohesive embankments with
different material type and grading, compaction, water content
and geometry.
Piping failure through homogeneous, cohesive embankments.
bankments failing from overtopping and piping failure modes. The five large scale
field tests (see Figure 4.1) conducted in Norway are summarized in Table 4.1. The
information about the twenty two laboratory tests conducted at a 1:10 scale at the
HR Wallingford laboratories are summarized in Table 4.2.
These field and laboratory results lead to extensive validation of the numerical models being used and under development. In contrast to other experimental findings,
during the field tests in Norway it was concluded that the breach shape is rectangular (vertical walls), not trapezoidal as often assumed previously. Morris (2005)
suggest that the trapezoidal shapes might develop after the breaching is finalized,
during the drying process of the embankment material. However, it is important
to mention that in all laboratory experiments and field tests an initial rectangular
breach channel was imposed as initial condition, which might have influenced the
further development of the breach shape.
46
Section 4.2. Experimental work
(a)
(b)
Figure 4.1: Development of the breach in the field tests in Norway for (a) piping
failure and (b) overtopping failure (Vaskinn, 2003).
Chapter 4. Current Approaches for Breach Modelling
4.3
47
Empirical equations
An alternative, conservative way of estimating dam breach characteristics is the use
of empirical predictor equations obtained from regression analysis of historical dam
failure events. They are often used for providing ultimate breach extent information
to physically based models (see e.g. Table 4.3), or as a comparative tool for the
output obtained from physically based methods. However, their application to a
particular dam should be used cautiously making sure that dam and reservoir characteristics are within the range of the dataset upon which the empirical equation is
based.
Numerous empirical formulations have been developed for predicting dam breach
characteristics and peak outflows based on hydraulic and geometrical characteristics
of dams and reservoirs e.g. reservoir storage, depth and volume of water in the
reservoir at the failure time, dam height, etc. In the following, some of the available
empirical equations are described.
The U.S. Bureau of Reclamation (1988) suggested that for earthfill dams the ultimate width of a rectangular dam breach shape equals three times the initial water
depth in the reservoir measured to the breach bottom elevation assumed to be at
the stream bed elevation. This relationship was used as a guideline in the National
Weather Service Simplified Dam Break Model (SMDBRK).
Bavg = 3hw
(4.1)
where, Bavg is the ultimate average breach width and hw is the water depth in the
reservoir initiating the failure.
Hagen (1982) analysed 18 historical events of dam failure from overtopping. The
product of volume Vw and depth hw of water in the reservoir triggering the failure,
hereafter called dam factor DF , was plotted versus peak discharge Qp . As a result,
Hagen provided an envelope equation:
Qp = 1.205(Vw hw )0.48
(4.2)
The peak outflow discharge varied from 730 to some 83,000m3 /s while the dam factor
Vw hw ranged from 2.9×106 to 4.8×1010 m4 .
MacDonald and Langridge-Monopolis (1984) analysed 42 dams: 30 earthfill and 12
non–earthfill dams (rockfill and other dams with protective concrete surface layers
or core walls). The height of the dams varied from 6 to 93m. The product of water
volume outflow Vout from the reservoir with the depth hw−b was plotted versus
the peak outflow for 18 earthfill dams and the following envelope and regression
equations were obtained:
Qp = 3.85(Vout hw )0.41
(4.3)
48
Section 4.3. Empirical equations
Table 4.3: Estimation of breach width and time of failure as a function of dam height
Hd , crest length CL and different dam types.
Type of dam
Breach width √
Formation Time
Earthfill & rockfill 3Hd
√Hd
Concrete gravity
CL/3
Hd
Arch
CL
Hd /50
Qp = 1.15(Vout hw )0.41
(4.4)
The volumeVout includes the reservoir storage at the failure time Vw plus the inflow
associated with the rising limb of the inflow hydrograph.
Singh and Snorrason (1982, 1984) analysed some historical earthfill dam failure
events due to overtopping. One finding of this analysis was the identification of a
strong correlation between breach width and dam height. For most of the cases the
breach width fell between the two bounding lines: B = 2hd and B = 5hd . The maximum water depth above the dam crest triggering failure varied in a range from 0.15
to 0.61m, and the failure time from inception to completion of the breach, fell in the
range between 0.25 to 1 hour. Singh and Snorrason (1982, 1984) analysed the hypothetical failure of eight earthfill dams in Illinois (USA) with a height hd ranging from
4.4m to 28m. Six out of eight dams were simulated for failing from overtopping and
two of them were simulated for failing from piping assuming a Probable Maximum
Flood inflow in the reservoir. US Army Corps of Engineers HEC-1 and National
Weather Service BREACH (Fread, 1988) models were used for predicting the peak
outflow. In both models, the maximum failure time, maximum breach depth and
width, and initial water depth above the dam crest (for overtopping failure) were
predefined by the user equal to 0.5 hours, hd , 4hd and 0.15m, respectively. The
obtained peak outflows were plotted versus the reservoir storage S and dam height
hd and the following regression equations were obtained:
Qp = 1.78S 0.47
(4.5)
Qp = 13.4h1.89
d
(4.6)
Costa (1985) analysed 31 historical dam failure events. The height of the dams
considered in the analysis varied from 1.8m to 83.8m, while the volume of the reservoir at the failure time ranged from 3.8×103 m3 to 7.0×108 m3 . No distinction was
made between different failure modes and dam types. The following envelope curves
encompassing 29 data points were derived:
Qp = 1.12Vw 0.57
(4.7)
Qp = 2.63(Vw hd )0.44
(4.8)
49
Chapter 4. Current Approaches for Breach Modelling
3
Peak discharge [m /s]
100000
10000
1000
100
10
1.0E+03
1.0E+05
1.0E+07
1.0E+09
1.0E+11
4
Dam factor [m ]
Costa
MacDonald & Langridge-Monopolis
Froehlich
Figure 4.2: Dam factor vs. peak discharge for dams analysed by MacDonald and
Langridge-Monopolis (1984), Costa (1985), and Froehlich (1987).
while, the regression relations are proposed as follows:
Qp = 10.5hd 1.87
(4.9)
Qp = 1.27Vw 0.48
(4.10)
Qp = 0.981(Vw hd )0.42
(4.11)
There is no significant difference between the regression equations obtained by MacDonald and Langridge-Monopolis (1984) and Costa (1985), though the first authors
include in the analysis only earthfill dams, while the second author includes earthfill
and non–earthfill dams in his analysis.
Froehlich (1987) analysed 22 embankment dam failures with hw ranging from 3.4m
to 77.4m and Vw ranging from 0.1 to 310 million m3 . The regression equation obtained is expressed as:
Qp = 0.607(Vw 0.295 hw )1.24 .
(4.12)
In all analysis, more than 90% of the analysed dam failure events belong to dams in
the USA. In Figure 4.2, peak outflow regression relations suggested by MacDonald
and Langridge-Monopolis (1984); Costa (1985); Froehlich (1987) are presented along
with measured peak outflows.
Broich (1998) analysed 39 embankment dam failures and obtained two regression
50
Section 4.4. Physically based models
equations which relate peak outflow to the depth and volume of water in the reservoir
at the initial failure time in the following way:
Qp = 255.859(Vw hw )0.449
(4.13)
Qp = 72.611(Vw hw 4 )0.256 ,
(4.14)
where Vw is in 106 m3 .
Wahl (2004) carried out an uncertainty analysis of the empirical equations using
a compiled database of 108 dam failure events. In the analysis no distinction was
made between different failure modes (the same stands for Costa (1985) analysis). It
is clear that for peak outflow prediction based on dam height and reservoir storage,
the distinction between different failure modes is important. The water depth in the
reservoir can be lower than the dam height in case of a piping failure mode, and
higher than the dam height during an overtopping failure mode.
4.4
Physically based models
Cristofano (1965) as reported by Singh (1996) developed a dam breach model with
the following characteristics: Breach Shape is considered trapezoidal during entire
breach development; Bottom Width of the breach channel is assumed constant; Top
Width is enlarged with the maximum width defined by the maximum side angle
equal to the angle of repose of the compacted material of the dam. The initial
channel is supposed to be parallel to the dam bottom and the (bottom) slope of the
breach channel is assumed equal to the internal friction angle.
The flow through the channel is calculated using the broad–crested weir flow equation
with a discharge coefficient ranging from 2.9 at the beginning of failure to 2.2 at peak
flow
Q = CLH 1.5 ,
(4.15)
where C is the discharge coefficient, H is the water depth above the breach bottom,
L is the length of the breach channel, and Q is the discharge.
Sediment erosion is deduced by relating the force of the flowing water through the
breach channel to the resistive shear strength of the soil particles acting on the
bottom surface of the breach channel. The rate of erosion is expressed as a function
of the rate of change of water flowing through the breach.
Harris and Wagner (1967) presented a simple model for the breaching of embankment
dams due to piping and overtopping. The breach shape is assumed parabolic with
top width of the parabolic shape Btop assumed to be 3.75 times the depth D (see
Figure 4.3). The flow through the breach channel, assuming critical flow over a
Cross section
Plan view
Upstream slope
Downstream slope
abutment
Chapter 4. Current Approaches for Breach Modelling
51
Btop
D
Figure 4.3: Parabolic breach shape.
broad–crested weir and accounting for the parabolic breach shape, is expressed in
SI units as
Q = 5.54H 2.5 .
(4.16)
Three modes of sediment erosion were adopted in the model: bed load, suspended
load and saltation load. The Schoklitsch bed load formula (Schoklitsch, 1917) was
modified to estimate the bed load transport along the breach channel. The rate of
sediment transport was computed as
G = 86.7S 1.5 Qd−0.5 ,
where G is the sediment transport rate, S is the hydraulic slope, and d is the soil grain
diameter (expressed in English units). The suspended load had to be estimated based
on the turbulence intensity and fall velocity. A constant sediment concentration is
assumed and no slope stability or failure mechanism is considered.
Brown and Rogers (1977, 1981) developed the BRDAM model that simulates the
breach erosion of earthfill dams due to piping or overtopping. The initial channel is
created at the dam crest, when simulating overtopping failure. The parabolic breach
shape of the notch is assumed constant during the whole process of dam breaching.
Some 45◦ side slopes and a channel slope of 5◦ up to 20◦ is assumed, depending on
the fill material of the dam. The outflow during overtopping failure is calculated by
the broad–crested weir formula:
√
Q = gBtop yc 1.5 .
(4.17)
The critical depth of the flow over the crest is taken to be 75% of the water depth
above the breach bottom level. Like Harris and Wagner (1967), the Schoklitsch
(1934) bed load formula is used to estimate the solid load which is transported
along the breach channel bed assuming constant sediment concentration. The slope
stability and lateral erosion mechanisms are not taken into account in the model.
Ponce and Tsivoglou (1981) presented a model for gradual failure of earthfill dams
52
Section 4.4. Physically based models
due to overtopping. The initial location of the breach is assumed at a weak point
on the crest and downstream face. The top width of the breach opening is related
to the flow rate.
Lou (1981) developed a mathematical model that is similar to the Ponce and Tsivoglou
(1981) model. The breach grows in space and time until an equilibrium section is
attained. The most efficient stable section derived for describing the breach shape
is expressed as:
π
y = hmax cos(
x),
Btop
where y is the depth at a distance x, hmax is the maximum depth at the center,
and x is the distance from the center. De Saint–Venant equations are applied to
model the unsteady flow of water during breaching of an earth dam. The dam is
divided into n-reaches, with the discharge flowing from the reservoir routed downstream from the dam. During dam overtopping, the sediment discharge is computed
using three approaches: 1)Du Boy’s equation (Du Boys, 1879) for bed load sediment
transport combined with Einstein’s equation for suspended load sediment transport
to calculate the total sediment transport; 2) a sediment transport formula derived as
a function of failure duration, erodibility index, and water velocity, 3) Cristofano’s
equation for computing the erosion rate. Du Boy’s equation is written as:
qbl = Kτ0 (τ0 − τc ),
(4.18)
where qbl is the rate of soil transported as bed load per unit width, (τ0 − τc ) is the
excess shear stress, and K is a parameter dependent on the thickness of the moving
bed layer, velocity of the layer as well as critical shear stress τc .
Einstein’s (1942) suspended load rate per unit width can be expressed as
30.2h
qsl = Ks 2.303log
I1 + I2 ,
d65
(4.19)
where h is the flow depth, I1 and I2 are integral quantities depending upon the flow
depth, d65 is a representative grain size diameter, Ks = 11.6Ca us abl , abl is thickness
of the bed layer where the suspended load starts, us = (gRS)0.5 and Ca is the
sediment concentration at a known distance from the bed.
Lou (1981) as described in Singh (1996) derived an expression for solid transport in
embankments by relating the kinetic energy to the erosion process, with the following
expression:
Ce
td u 4 ,
Er =
12
where Ce is a constant, td is the duration of failure, u is the water velocity and Ms is
the mass of soil lost during erosion. Slope stability mechanisms are not considered,
while the lateral erosion stops once the peak flow is reached.
Chapter 4. Current Approaches for Breach Modelling
53
The National Weather Service model BREACH developed by Fread in 1984 and
later revised in 1988 (Fread, 1988) simulates overtopping and piping failure modes
for cohesive and non–cohesive embankment dams. The dam may consist of two
materials with different properties in the inner core and outer zone of the dam or
otherwise be homogeneous. Erosion initially occurs along the downstream face of
the dam where a small rectangular–shaped rivulet is assumed to exist along the dam
face. The sides of the breach channel are assumed to collapse when the depth of the
breach reaches a critical value and then the breach is transformed into a trapezoidal
shape channel. Maximum values of breach dimensions are defined by the user (dam
height, maximum top and bottom breach width limited from the valley cross section). The flow through the breach channel is calculated by the broad–crested weir
equation and the orifice flow relationship (for piping). The sediment transport rate
is calculated by the Meyer-Peter and Müller (1948) sediment transport relation as
modified by Smart (1984) for steep channels.
DEICH (Dam Erosion with Initial breach Characteristic) models are developed at
the University of the Federal Armed Forces Munich (Broich, 1998). Depending on
their calculation approach, they are named: DEICH A (analytical model), DEICH P
(parametrical model), and DEICH N1/N2 (1D/2D numerical model), respectively.
These models calculate the overtopping failure of cohesive and non–cohesive embankment dams with or without covering core. Initially a channel or pipe is created at the
dam crest. The breach develops parallel to the dam crest. A constant trapezoidal
breach shape with side slopes of 45◦ and a constant relationship between lateral and
bottom erosion is assumed. Breach discharge is calculated using the broad crested
weir formula enhanced to take into account backwater effects. DEICH A and DEICH P calculate the total sediment load, while DEICH N1/N2 distinguish between
bed load and suspended load. DEICH A uses Ponce–Tsivoglou’s transport formula
(Ponce and Tsivoglou, 1981), a combination of the Exner with the Meyer-Peter and
Müller (1948) equation. Slope stability mechanisms are not considered in all models.
Several commercial hydrodynamic modelling packages have incorporated breach
models. However, most of the time the final breach characteristics and rate of
breach growth have to be predefined by the user who often bases his decision on
expert judgment or empirical equations that relate breach parameters to dam and
reservoir characteristics. Mike11, the Danish Hydraulic Institute’s modelling package, includes a simple dam breach model. In this package the failure of the dam
can initially take place from overtopping or as a piping failure. The breach will
continue to develop until it has reached the breach geometry limit, which is defined
by final bottom depth, width and the breach slope on each side of the breach. The
development of the breach can take place in two different ways:
1. Time Dependent: The development of the dam breach is specified by the user
in terms of breach level, width and slope as functions of time.
54
Section 4.4. Physically based models
Initial width
5
Initial crest level
4
1
2
4
5
Maximum breach height
3
Reference level
Figure 4.4: Breach development in Sobek 1D2D, first in vertical direction (step 1,
2, and 3) and then in horizontal direction (step 4 and 5).
2. Erosion Based: MIKE 11 calculates the breach development by using a sediment transport formula.
In Sobek 1D2D, WL | Delft Hydraulics’ modelling package, a dam break can be
modelled either in 1D or 2D, using the 1D Flow Dam Break Reach (mainly for flood
defense structures along the water body) or the 2D-Breaking Dam Node (mainly for
water retaining structures) respectively. The 1D Flow Dam Break Reach model (Verheij, 2002) can simulate breach development in clay or sandy dikes. The breach shape
is considered rectangular during the entire breach development. The breach will first
deepen in vertical direction only, until the maximum breach depth is reached, after
which the breach grows in lateral direction only. Figure 4.4 presents the different
breach development stages during the breach growth. The breach development can
take place as either:
1. Irrespective of actual occurring flow conditions in the breach, or
2. Depending on the occurring hydraulic conditions and the parameters defined.
In the first case, the breaching development is user defined. The user must provide
the initial breach width, and initial crest level of the dam, maximum breach depth,
the starting time of the breaching process, the duration of the breaching process,
the maximum breach–width or the maximum duration for reaching the maximum
breach width. The discharge through the breach channel is calculated using standard weir formulas.
In the second case, the user must supply information about the lowest level that the
breach will reach, the maximum flow velocity for which erosion does not occur, the
starting time of the breaching process and the duration of the breaching process. In
this case the increase in crest width as a function of time is not known beforehand,
but depends on the occurring hydraulic conditions and the parameters defined.
For information about other breach models the reader is referred to Table 4.4 and
Chapter 4. Current Approaches for Breach Modelling
55
Singh (1996); Singh and Quiroga (1987); Loukola and Huokuna (1998). To further understand the mechanisms associated with embankment failure, we examine a
database of the historical events. In the following sections, we present a methodology for estimating breach shape and breach outflow characteristics based on a data
mining approach.
Fread (1988)
NWS BREACH
Singh & Quiroga (1987)
BEED
Loukola & Houkuna (1998)
EDBREACH
Broich (1998)
DEICH N1/N2
Broad crested weir
de Saint-Venant
Diffusion approach
Broad crested weir
orifice flow
Broad crested weir
de Saint-Venant
Trapezoidal
Trapezoidal
Effective shear stress section
(Cosine curve shape)
Rectangular and trapezoidal
Nogueira
de Saint-Venant
de Saint-Venant
Top width flow rate relation
Most effective stable section
(Cosine curve shape)
Broad-crested
Parabolic with side slope of 45
Lou (1981)
Brown and Rogers (1981)
BRDAM model
Ponce and Tsivoglow (1981)
Harris and Wagner (1967)
Model
Cristofano (1965)
Table 4.4: Breach model characteristics.
Geometry
Hydraulics
Trapezoidal with side angle
Broad-crested weir
equal to angle of repose of
the compacted material
Parabolic with top width
Broad-crested weir
3.75 times the depth
Several transport eqs.
Meyer-Peter-Muller
Modified bed load
Schoklitsch formula
and suspended load formula
based on turbulence and
fall velocity
Modified bed load,
Schoklitsch formula
Exner with
Meyer-Peter-Muller
1. Du Boy & Einstein,
2. Lou,
3. Christofano.
Exner equation with
Meyer-Peter-Muller
Meyer-Peter-Muller
modified by Smart
Einstein-Brown
Sediment
Developed empirical
formula
56
Section 4.4. Physically based models
Chapter 5
Data Mining Techniques in
Dam Breach Modelling
First get your facts, then you can distort them at your leisure.
Mark Twain
5.1
Introduction
While capabilities of computational modelling systems are continuously advancing,
data from sensor measurements, satellites and computational operations are rapidly
expanding. Hence, data mining techniques are becoming increasingly more popular
nowadays and are being applied to different fields including water science and engineering (Minns and Hall, 1996; Price, 2000; Babovic et al., 2001; Mynett, 2002,
2004a,b, 2005; Solomatine, 2002).
Data mining techniques can be used to extract knowledge from large amounts of
data. Despite the scarcity of reliable data related to historical dam failure events, it
was hypothesized that present day data mining techniques might prove to be useful
to some extent for predicting breach characteristics and peak outflow resulting from
dam failure. Ultimate breach width and dam peak outflow might be predicted based
on dam and reservoir characteristics at the failure time. In this chapter, we present
a methodology for predicting dam failure characteristics and peak outflow using a
range of data mining techniques, including linear and non–linear regression methods.
The algorithms and underlying theory are introduced in the following section.
58
5.2
Section 5.2. Main principles of data mining techniques
Main principles of data mining techniques
The engineering of intelligent machines has been a focus of scientific research for a
long time. Already in 1950 Alan Turing (1950) proposed a test that would measure
machine’s capability to perform human–like conversation. It was John McCarthy
(1956) who first introduced the term ‘Artificial Intelligence (AI)’ as the topic of the
Dartmouth Conference in 1956, the first conference devoted to this subject, defining AI as “the science and engineering of making intelligent machines, especially
intelligent computer programs”. The ultimate goal of the artificial intelligence is to
imitate human intelligence.
The field of machine learning is concerned with the question of how to construct computer programs that automatically improve with experience. It is a field based on
computer science, psychology, neuroscience and engineering. In recent years many
successful machine learning applications have been developed, ranging from data
mining programs, to information filtering systems, all aiming to program computers in the way that they could “learn to improve automatically with experience”
(Mitchell, 1997). There are different manners of machine learning, namely: supervised, unsupervised and reinforcement learning.
Supervised learning is a machine learning technique that creates a function based on
training data of input–output pairs. The output of the function can be a continuous
value (called regression), or a class label of the input object (called classification).
The objective is to correctly predict the output given a new input after having seen
a number of training examples.
In the unsupervised learning the model is fit to input data with no a priori output.
The learner’s task is to represent the inputs in a more efficient way, as clusters, categories or reduce the dimensions. Unsupervised learning is used for data compression,
outlier detection, classification, etc.
Reinforcement learning (RL) is another learning technique much closer to supervised
than unsupervised learning. It concerns learning from the consequences of action.
The learner receives information that what it did is appropriate or not. Contrary
to supervised learning where the learner is ‘advised’ on exactly what it should have
done, reinforcement learning only says that the behavior was inappropriate and (usually) how inappropriate it was.
In this chapter we use the supervised learning techniques and algorithms, namely linear and non–linear techniques, for extracting information from the available dataset
of historical dam failure events.
59
Chapter 5. Data Mining Techniques in Dam Breach Modelling
5.2.1
Linear regression
A linear model is written as
Y = Xw + ,
(5.1)
where w is the k–dimensional parameter vector, i is the error vector usually assumed to be normally distributed with zero mean. The objective is to compute the
parameter vector w = (w1 , w2 , ..., wk ) that best fits the data by the linear model.
The linear model should be robust and not exhibit an unstable behavior that can
greatly amplify even small changes in the dataset.
At the end of the 18th century, Gauss (1809) and Legendre (see Stigler, 1981) proposed the method of Least Squares (LS) regression that consists of minimizing the
sum of the squared residuals with respect to the coefficient vector w as
minimize
w
k
X
ri2 ,
(5.2)
i=1
where the residuals ri are the differences between what is actually observed and
what is estimated. However, this method is known to be highly influenced from
the presence of outliers in the dataset. Thus other versions of this estimator were
proposed such as replacing the squared residuals by the median of squared residuals (Rousseeuw, 1984; Rousseeuw and Leroy, 2003). The least absolute deviation
method introduced in 1757 by Boscovich (Birkes and Dodge, 1993) (also known as
least absolute value method) and least median of squares linear regression methods
are considered better methods for regression and often recommended as robust or
outlier resistant alternatives of LS, though they can exhibit instabilities for small
changes in the data.
The least absolute value method, presented by Edgeworth (1887) is expressed as
minimize
w
k
X
|ri |.
(5.3)
i=1
In contrast to the LS method, it minimizes the sum of the absolute values of the
residuals. Here, we use the Least Median of Squares (LMS) method (Rousseeuw,
1984) that is considered a less sensitive and more robust fitting technique compared
with the simple linear regression method. It is also considered to be the most widely
used robust estimator. It minimizes the median of the squared residuals with respect
to the coefficient vector w:
minimize med ri2 .
(5.4)
w
i
Thus the largest residuals in the sample (i.e. those whose absolute values are larger
than the median) are ignored, making this technique more robust in the presence of
outliers or noisy data. At least 50% of the data would need to be corrupt in order
60
Section 5.2. Main principles of data mining techniques
to skew the result, while for ordinary least squares a single corrupt data sample can
already give the resulting regression line an excessively large slope.
5.2.2
Artificial Neural Networks (ANNs)
McCulloch and Pitts (1943) were the first to introduce the concept of how the brain
could produce complex patterns by using basic cells called neurons that are connected to each other. McCulloch and Pitts (1943) presented an artificial neuron
model with binary input and output and an activation threshold.
Artificial Neural Networks (ANNs) are envisioned to have similarities to the human
brain functioning. As the latter are built of very complex webs of interconnected
neurons, ANNs are built to form complex interconnected sets of units, each of which
takes a number of real–valued inputs and produces a single real–valued output (Figure 5.1). They can be used for approximating discrete–valued, real–valued and
vector–valued target functions.
The perceptron is a type of artificial neural network invented in 1957 by Rosenblatt
(1958). The perceptron (Figure 5.2) takes a vector of real–valued inputs, calculates
a linear combination of these inputs, and then outputs results based on some activation function. Using the McCulloch and Pitts (1943) threshold function, the
output is 1 if the result is greater than the threshold value and 0 (or −1) otherwise.
Therefore, given inputs x1 through xn , the output o (x1 , ..., xn ) computed by the
perceptron is
1 if
w0 + w1 x1 + w2 x2 + ... + wn xn > 0
o (X1 , ..., Xn ) =
, (5.5)
0 otherwise
where each wi is a real–valued constant referred to hereafter as weight, determining
the contribution of input xi to the perceptron output. Teaching a perceptron network
involves establishing values for the weights w0 , ..., wn . Depending on the problem,
one of the activation functions showed in Figure 5.3 can be used.
Several algorithms are known to solve this learning problem e.g. perceptron rule,
delta rule, etc. (Mitchell, 1997). The perceptron rule finds a successful weight vector
when the training examples are linearly separable. It revises the weight wi associated
with input xi according to the rule:
wi ← wi + ∆wi ,
(5.6)
∆wi = η (t − o) Xi .
(5.7)
where
Here t is the target output for the current training example, o is the output generated
by the perceptron, and η is a positive constant called the learning rate. The role of
61
Chapter 5. Data Mining Techniques in Dam Breach Modelling
hw
Vw
Qp
hw
Hd
Vw
Qp
Hd
Input layer
Hidden layer
Output layer
Figure 5.1: Architecture of a three layer neural network with three inputs and one
output.
Input layer
Hidden layer
Output layer
X1
X1
w1
w1
Inputs
Inputs
X2
w2
X2
∑
Treshold
wn
∑
w2
Output
Sigmoid activation function
wn
Xn
Xn
Figure 5.2: A perceptron.
Treshold
Sigmoid activation function
Outpu
Subcritical flow
Supercritical flow
Different erosion rates
H
62
Section 5.2. Main principles of data mining techniques
(a)
(b)
(c)
(d)
Figure 5.3: Commonly used activation functions: (a) Binary (threshold step function), (b) Sigmoid, (c) Piecewise Linear, and (d) Gaussian activation functions.
the learning rate is to control (lessen) the degree to which weights are changed every
time step. The rule converges within a finite number of applications of the perceptron
training rule to a weight vector that correctly classifies the training data, provided
they are linearly separable and provided a sufficiently small η is used (Mitchell,
1997). Contrary to the perceptron rule that can fail to converge when the data are
not linearly separable, the delta rule (or sometimes the LMS rule, Adaline rule, or
Widrow-Hoff rule - after its inventors) converges towards a best–fit approximation
to the target concept in that case. The delta rule uses the gradient descent to
search the hypothesis space of possible weight vectors to find the weights that best
fit the training data. This is done by specifying a measure for the training error of
a hypothesis (weight vector) relative to the training examples such as:
E(w) ≡
1 X
(to − od ),
2
(5.8)
m∈M
where m is the set of training examples, to is the target output for training example
m, and o is the output of the linear unit for training example m. To understand
the gradient descent algorithm, we visualize the entire hypothesis space of possible
weight vectors and their associated E values, as illustrated in Figure 5.4.
During the gradient descent search, a weight vector is determined that minimizes
E by starting with an arbitrary initial weight vector, then repeatedly modifying
the weights in small steps, during the learning phase. During each step, the weight
vector is altered in the direction that produces the steepest descent along the error
surface shown in Figure 5.4. The direction can be found by computing the derivative
of E with respect to each component of the vector w. This vector derivative is called
the gradient of E with respect to w, written ∆Ew.
∂E ∂E
∂E
∆E(w) ≡
,
, ...,
.
(5.9)
∂w0 ∂w1
∂wn
The gradient specifies the direction that produces the steepest increase in E. The
negative of the vector therefore gives the direction of steepest decrease. Single perceptrons can only express linear decision surfaces. In contrast, multilayer perceptron
(MLP) networks trained with a Backpropagation algorithm are capable of capturing
Chapter 5. Data Mining Techniques in Dam Breach Modelling
63
Figure 5.4: Hypothesis space of possible weight vectors and their associated error
values E (Mitchell, 1997).
a variety of non–linear decision surfaces. The Backpropagation algorithm is the most
commonly used ANN learning technique. Gradient descent provides the basis of the
algorithm. It has been found to be appropriate for many problems, as summarized
from Mitchell (1997), as follows:
ˆ Instances are represented by many input attributes being correlated or independent of each other.
ˆ The target function output might be discrete–valued, real–valued or a vector
of several real–or discrete–valued attributes.
ˆ Training examples might contain errors or noisy data.
ˆ Training time is relatively long compare to other methods, depending on the
number of weights in the network, the number of training examples considered,
and the settings of various learning algorithm parameters.
ˆ Despite the biological motivation of the neural networks, the learned neural
networks are less easily communicated to humans and should be used when
the readability of the results is not important.
Backpropagation algorithm uses a gradient approach descent to tune network parameters to best fit the training set of input–output pairs.
64
5.2.3
Section 5.2. Main principles of data mining techniques
Instance Based Learning (IBL)
In contrast to above described learning methods which produce a generalization as
soon as the data are introduced, there are the so–called instance based learning
methods or ‘lazy’ learning methods that postpone the description of the target function until a new instance (query) is requested.
Each time a new query instance is encountered, its relationship to the previously
stored examples is examined in order to assign a target function value for the new
instance. These methods fit the training data only in a region around the location
of the query instance instead of estimating the target function once for the entire instance space. Therefore, even a very complex target function can still be described,
by constructing it from a collection of less complex local approximations using the
instance based learning methods (Mitchell, 1997). These methods can construct a
different approximation to the target function for each specific query instance requiring classification.
However, there are disadvantages associated with these kinds of methods such as:
the cost of classifying new instances can be high since the computation takes place
at classification time rather than when the training examples are first encountered.
And since all attributes of the instances are considered when attempting to retrieve
similar training examples from memory, the instances that are truly most ‘similar’
may well be a large distance apart.
The instance based learning methods include Nearest neighbor, locally weighted
regression methods, and case-based reasoning methods. The Nearest neighbor
method (IBk) chooses the closest points near the query point and uses its output.
The weighted average model averages the outputs of neighbouring points, inversely
weighted by their distance to the query point. The locally weighted learning regression model (LWL) weighs the outputs of neighbouring points according to their
distance to the query point and then performs a local linear regression based on the
weighted data.
The k-NEAREST NEIGHBOR method
The most basic instance-based method is the k–Nearest neighbor algorithm that
computes the classification of each new query instance as needed. It assumes all
instances as points in the n–dimensional space <n and the nearest neighbours of an
instance are defined in terms of the standard Euclidean distance.
Let an arbitrary instance x be described by the feature vector
ha1 (x), a2 (x), ..., an (x)i,
(5.10)
Chapter 5. Data Mining Techniques in Dam Breach Modelling
65
where ar (x) denotes the value of the r–th attribute of instance x. Then the distance
between two instances xi and xj is defined to be d(xi , xj ), where
v
u n
uX
2
d(xi , xj ) ≡ t (ar (xi ) − ar (xj )) .
(5.11)
r=1
In Nearest neighbor learning the target function may be either real–valued or
discrete–valued. When approximating real–valued (continuous valued) target functions, the k–Nearest neighbor algorithm calculates the mean value of the k nearest training examples, where:
Pk
f (xi )
F (xq ) ← r=1
(5.12)
k
is a function that approximates the function f (x) and that returns the mean value
of f among the k training examples nearest to xq .
For approximating a discrete–valued target function, the k–Nearest neighbor
algorithm denotes the k instances x1 , ..., xk from the training examples that are
nearest to the query instance xq and returns the most common value rather than
the mean value of the k nearest training examples, where
v
u k
uX
F (xq ) ← argmaxt δ (v, f (xi ))
(5.13)
v∈V
r=1
is a function that approximates the function f (x) and that returns the most common
value of f among the k training examples nearest to xq . If k is chosen equal to 1
then the 1–Nearest neighbor algorithm assigns to F (xq ) the value f (xi ) where
xi is the training instance nearest to xq . For larger values of k, the algorithm assigns
the most common value among the k nearest training examples.
The algorithm can better be explained through the graphical presentation of the
Voronoi diagram (Figure 5.5). The instances are points in a two–dimensional space
with the target function being boolean valued with positive and negative training
examples shown by ‘+’ and ‘-’ respectively. The 1–Nearest neighbor algorithm
classifies the query instance xq , as positive, whereas the 5–Nearest neighbor
algorithm classifies it as a negative example. The diagram shows the shape of the
decision surface induced by 1–Nearest neighbor over entire instance space.
The distance between instances is calculated based on all attributes of the instance.
As such it is important to select the most important defining attributes. Large
number of non important (irrelevant) attributes might influence the distance between
neighbours and as a result lead to misclassification. The k–Nearest neighbor
algorithm is robust to noisy training data and quite effective when it is provided a
hc H
hc
66
HH
d
Hd
Section 5.2. Main principles of data mining techniques
- + +
+
+
xq + xq
+
+
-
+
-
--
-
+
-
+
(a)
(b)
Figure 5.5: (a) Example of Nearest neighbor and (b) Voronoi diagram.
sufficiently large set of training data.
Distance-weighted NEAREST NEIGHBOR
This algorithm weighs the contribution of each of the k neighbors according to their
distance to the query point xq giving greater weight to closer neighbors. Thus the
algorithm formulation for approximating a real–valued target function changes to
Pk
F (xq ) ←
r=1 wi f (xi )
.
Pk
r=1 wi
(5.14)
In a similar way, the algorithm formulation for approximating a discrete–valued
target function changes to
k
X
F (xq )←argmax wi δ(v, f (xi )),
v∈V
where
wi ≡
(5.15)
r=1
1
2.
d(xq , xi )
(5.16)
Considering all training instances while approximating the function without the cost
of misleading is possible with distance weighting as the very distant examples will
have very little effect on F (xq ). The only disadvantage of considering all examples
is the ‘longer’ processing time. Furthermore, by taking the weighted average, the
impact of noisy training examples will be smoothed.
Chapter 5. Data Mining Techniques in Dam Breach Modelling
67
Locally weighted regression
The locally weighted regression method constructs an explicit approximation to f
over a local region or only on data near the query point xq . The contribution of each
training example is weighted by its distance from the query point. The distanceweighted training examples are used to form a local approximation to f . The target
function in the neighborhood surrounding the instance xq can be approximated
using a linear function, a quadratic function, a multilayer neural network, or some
other functional form. Here, let us consider the case when the target function f is
approximated near xq using a linear function of the form
F (x) = w0 + w1 a1 (x) + ... + wn an (x).
(5.17)
As before, ai (x) denotes the value of the ith attribute of the instance x. Fitting the
local training examples is done through an error criterion E (xq ), expressed in three
different manners.
1. Minimize the squared error over just the k nearest neighbors:
E1 (xq ) ≡
1 X
2
(f (x) − F (x)) .
2
(5.18)
x∈knrs
2. Minimize the squared error over the entire set of training instances M , while
weighing the error of each training example by some decreasing function N of
its distance from xq :
E2 (xq ) ≡
1X
2
(f (x) − F (x)) N (d (xq , x)).
2
(5.19)
1 X
2
(f (x) − F (x)) N (d (xq , x)).
2
(5.20)
x∈M
3. Combine 1 ands 2:
E3 (xq ) ≡
x∈knrs
Second criterion allows every training example to influence the classification of xq ,
but at the same time increases the computation time. The third criterion minimizes
the squared error only over the nearest neighbors and thus the computation cost
depends only on the number of k neighbors rather than the number of all training
examples.
5.3
5.3.1
Application
Data preparation and model evaluation
During this research, we use the Waikato Environment for Knowledge Analysis
(WEKA) modelling package (Witten and Frank, 2000). It is a comprehensive suite
68
Section 5.3. Application
of Java class libraries that implement many state–of–the–art machine learning and
data mining algorithms. Tools are provided for preprocessing data, creating models using a variety of learning schemes, and analyzing the resulting classifiers and
their performance. The techniques described in the previous section are applied to
the relatively small database of 108 historical dam failure events compiled by Wahl
(2004). For each dam failure event the information consists of:
1. Dam characteristics before failure occurred: dam type, height and length,
width at crest and bottom, upstream and downstream slope;
2. Reservoir characteristics: area and storage capacity;
3. Failure characteristics: failure mode, volume and depth of water at initial
failure time, final breach characteristics (breach shape, top, bottom or average
breach width and breach height, breach side slope factor), material removed
from the dam, breach formation time and peak outflow.
Data are often incomplete, lacking attribute values, noisy, containing errors and
outliers, or containing discrepancies in their information. Dataset does not provide
enough information for prediction of time needed to initiate a breach and the rate of
breach formation. Still, it might be useful for the prediction of breach characteristics
and peak outflow.
We apply data preprocessing for transforming the raw data into a format that will
be more easily and effectively used by data mining techniques. The first step in this
analysis consists of visual inspection of the data, dealing with missing and inaccurate
values and calculating statistical properties. Domain knowledge is applied for filling
in missing values and resolving inconsistencies as shown in Table 5.1. In the first row
for each of the dams some information is missing or is considered inaccurate. The
given water depth and volume in the reservoir at the failure time for Swift Montana
dam that failed from overtopping are substituted with values higher than the dam
height and reservoir storage respectively. For Kendall dam the missing values of
the water volume and depth in the reservoir at the time of the failure are assumed
to be larger than maximum dam specification, for the reason that it failed due to
overtopping.
The correlation between available attributes is calculated by dividing their covariance by the product of their standard deviations. We measure the accuracy with
which one variable can be predicted from knowledge of another one by correlation
coefficient. Dam height, reservoir storage and the water depth behind the dam at
the initial failure time are used for the prediction of the breach characteristics and
peak outflow. However, due to the absence of adequate information for all the dams,
we use only a subset of the original database for experiments.
The problem of dealing with small datasets is that there is not enough data for train-
Chapter 5. Data Mining Techniques in Dam Breach Modelling
69
Table 5.1: Examples of missing values and inconsistencies.
Dam name (location) hd
hw
S
Vw
Failure mode
Swift Montana (USA)
57.61 47.85
3.7E+07
3.7E+07
Overtopping
≥ 57.61
>3.7E+07
Kendall Lake (USA)
5.49
?
7.28E+05 ?
Overtopping
≥ 5.49
7.28E+05 ≥ 7.28E + 05
ing and testing the model. Thus, we consider a 10-fold cross validation procedure
in this study. In the cross validation method, the result does not depend on how
the dataset is divided: every instance is used only once in testing. In this case, the
dataset is randomly reordered and then split into ten folds of (approximately) equal
size. During each iteration one fold is used for testing and the rest for training the
model. The test results are collected and averaged over all folds. The Root Mean
Square Error (RMSE) is used to measure the model performance:
v
u n
u1X
2
RM SE = t
(yi − ŷi ) ,
(5.21)
n i=1
where yi and ŷi represent the observed and computed values for the calculated
attribute, whether it is average breach width or peak outflow. Lower RMSE values
guarantee better performance of the model.
5.3.2
Predicting breach width based on water depth behind
the dam
The first problem addressed in this section is the prediction of average breach width
based on the water depth behind the dam at the initial failure time. The database
(Wahl, 1998) provides a ‘training’ sample of previously observed cases in which both
water depth in the reservoir at initial failure time and the average breach width have
been recorded. Here, we construct a data–driven model for predicting likely average
breach width values for future dam failure events, when only the water depth in the
reservoir at the initial failure time is known.
For this analysis, only the overtopping failure mode is considered. In the dataset,
most of the 23 dams belong to earthfill, mixed earthfill and rockfill types with
or without revetment on the dam slopes. For 20% of the dams no information
is available on their material type. Table 5.2 shows the performance of different
algorithms applied to the available dataset. We apply the LMS (Section 5.2.1)
algorithm to the available data using the cross validation procedure and use the
equation obtained from LMS on the dataset (23 dams). The RMSE obtained is about
70
Section 5.3. Application
Table 5.2: Prediction of average breach
Method
LMS1: Bavg = 4.6hw − 5.7
USBR: Bavg = 3hw
width for 23 dams.
RMSE
15.0
22.5
180
LMS1
Predicted
160
140
USBR
120
100
80
60
40
20
0
0
20
40
60
80
100
120
140
160
180
Observed
Figure 5.6: Average breach width prediction based on the water depth in the reservoir.
30% lower than the error when using the USBR equation on the same dataset, thus
making former more applicable for predicting the average breach width in case of
dam failure from overtopping. Figure 5.6 shows the observed and predicted average
breach width computed using the LMS algorithm and the USBR equation. As can
be seen from Figure 5.6, the USBR prediction tends to underestimate the average
breach width, while LMS prediction results in a correct or overestimated average
breach width.
Since in the dataset, 84% of the dams failing from overtopping belong to the low
and medium dam categories, another experiment is performed for predicting breach
width excluding the high dams from the dataset. It can be seen from Table 5.3
and Figure 5.7 that the LMS model performance increases by 30%, while the USBR
equation performs 40% better than in the previous experiment. Both LWL and LMS
algorithms perform 20% and 10% better, compared to the USBR equation.
From both experiments different equations (LMS1 and LMS2) are obtained, the
second one demonstrating better performance on the dataset used for this analysis.
It can be seen that for the prediction of breach width for non–high earthfill dams
71
Chapter 5. Data Mining Techniques in Dam Breach Modelling
Table 5.3: Prediction of average breach width for 18 low
Method
LWL using inverse–distance weighting kernels
LMS2: Bavg = 3.8hw − 1
USBR: Bavg = 3hw
and medium dams.
RMSE
9.6
10.9
12
50
LWL
Predicted
40
LMS
USBR
30
20
10
0
0
10
20
30
40
50
Observed
Figure 5.7: Average breach width prediction based on the water depth behind the
dam at initial failure time for low and medium dams.
the LMS2 and USBR equations are performing almost the same with very small
difference in RMSE.
5.3.3
Predicting peak outflow
In this section we address the issue of estimating the peak outflow based on dam
height and reservoir storage. A total of 27 dams are included in the analysis for estimating peak outflow as a function of dam height. No distinction is made between
different dam materials and failure modes. We consider this assumption as valid due
to small dataset size, though the breach outflow hydrograph and consequently the
peak outflow is likely to be affected by geotechnical characteristics of the embankment.
As can be seen from Table 5.4, models created with IBk and MLP perform comparably better than the Singh & Snorrason equation in case of peak outflow prediction
based on dam height only. Two neighbours are used for classification in case of IBk
application, while no changes are made in the default settings for the MLP network
in WEKA. The decision to use default parameters is motivated by the scarcity of
72
Section 5.3. Application
Table 5.4: Prediction of peak outflow Qp = f (hd ).
Method
IBk–2 neighbours
MLP
Singh and Snorrason (1982)-Eq. 4.6
RMSE
1000
1367
2342
12000
IBk
Predicted
10000
MLP
8000
6000
4000
2000
0
0
2000
4000
6000
8000
10000
12000
Observed
Figure 5.8: Peak outflow prediction based on dam height.
data and therefore the difficulty of having a separate validation set for parameter
estimation. Though IBk RMSE estimate is high, it is 57% smaller compared to the
one obtained from the Singh & Snorrason’s empirical equation. The performance of
IBk and MLP model and the Singh & Snorrason equation is presented in Figure 5.8.
Due to missing data, a smaller dataset of 22 dams is used for predicting peak outflow based on reservoir storage and dam height. The performance of the developed
data mining models is compared with the available empirical formulations of Singh
& Snorrason, Hagen and Costa (Table 5.5).
Using the same data mining algorithms the results obtained by including the reservoir storage in the analysis are compared to the empirical equations of Costa (Figure
5.9). Here, better model performance is observed using MLP rather than with IBk
algorithm. Higher errors are observed when Hagen and Costa equations are applied
to the whole dataset. However, better results can be expected if the distinction
between failure types is taken into consideration, which in turn implies the necessity
of more data.
73
Chapter 5. Data Mining Techniques in Dam Breach Modelling
Table 5.5: Prediction of peak outflow Qp = f (hd , S).
Method
IBk–2 neighbours
MLP
Hagen, Eq. 4.2
Costa, Eq. 4.11
RMSE
1200
1135
8400
1300
10000
MLP
Predicted
8000
IBk
Costa
6000
4000
2000
0
0
2000
4000
6000
8000
10000
Observed
Figure 5.9: Peak outflow prediction based on dam height and reservoir storage.
5.4
Conclusions
Despite the shortage of documented data from historic dam failure events, in this
chapter we demonstrate that it is possible to improve currently available empirical
relations and prediction capabilities for breach characteristics by applying data mining techniques. Encouraging results are obtained for predicting the average breach
width based on the water depth behind the dam at the initial failure time. The
applied data mining algorithms, LMS and MLP, perform better than the available
empirical equation of USBR (1988).
A 30% improved performance of the LMS and MLP models is observed when the
complete dataset is used. Since 84% of the dams in the dataset belong to low and
medium category, another experiment is carried out excluding the instances belonging to high dams. An improvement of the LMS and MLP model performance (9.6
and 10.9 RMSE respectively) and USBR equation (12.0 RMSE) is observed, leading
to the conclusion that the data mining models seem to perform slightly better in
experiments for predicting average breach width for low and medium earthfill dams
74
Section 5.4. Conclusions
failing from overtopping.
Furthermore, the prediction of peak outflow based on dam height and reservoir storage provides better results compared to the prediction of peak outflow based on
dam height only. The results obtained by using IBk and MLP algorithms are better
than the ones obtained by applying the empirical equations developed by Singh &
Snorrason, that predict peak outflow based on dam height only, and of Hagen and
Costa, whose equations use dam height, depth and volume of water in the reservoir
for peak outflow prediction. Clearly, the relatively small number of recorded dam
failure events contained in the database, limits the capabilities of data mining techniques. However, with increasing amount of information about historic (or future)
dam failure events, better results might be expected.
Chapter 6
BREADA model: Breach
Model for Earthfill Dams
One certainly cannot predict future events exactly if one
cannot even measure the present state of the universe precisely.
Stephen Hawking
6.1
Development of a dam breach model
In this chapter we propose a method for modelling the overtopping failure of earthfill
dams. In dike failure literature a distinction is made between overtopping and
overflowing failure. The first is identified as the failure initialized from the waves
(e.g. wind waves) flowing over the structure’s crest for considerable amount of
time, though the water depth in the water body is (still) lower than or equal to
the structure’s height. The overflowing failure is caused due to continuously rising
water level (in the water body) above the structure’s crest in absence of waves. The
overflowing definition is almost never used in (embankment) dam failure literature.
Instead, the term overtopping is generally used to describe the flow over the dam’s
crest irrespective of the waves’ presence. Here, we also use the overtopping term
though we do not consider waves in our model, but only the free flow over the dam,
initiating a failure. The overtopping failure mode is known to be the most common
failure mode (Costa, 1985; Singh, 1996) for embankment dams caused as a result of
extreme inflows, malfunction of any hydraulic structure designated to release part
of the hydraulic load, etc.
Controversial conclusions are drawn by different researchers (Johnson and Illes, 1976;
MacDonald and Langridge-Monopolis, 1984; Morris, 2005) related to the initial,
progressive, and ultimate breach shape, since proper monitoring of a real dam failure
event is difficult to achieve so far. During laboratory and field experiments the
76
Section 6.1. Development of a dam breach model
initial breach shape is commonly predefined and thus influences in some way its
further development (see Section 2.3.1). In the model BReaching of the EArthfill
DAm (BREADA) it is possible to choose between two breaching developments. One
formulation assumes a trapezoidal breach shape to be initially formed at the crest
of the dam, which progresses to the dam bottom elevation (usually assumed at
streambed elevation at the dam toe). Once the dam bottom is reached, the breaching
develops in a lateral direction only. In the second formulation, a triangular breach
channel is initially formed and progresses to the dam bottom (see Figure 6.1). Once
the dam bottom is reached, the breaching develops in lateral direction having a
trapezoidal shape. The latter is considered by several authors (Johnson and Illes,
1976; MacDonald and Langridge-Monopolis, 1984; Macchione and Rino, 1989) to be
a common type of breach evolution during historical dam failure events.
The initial breach location, though an important component in breach modelling,
is usually difficult (if not impossible) to predict beforehand, since many factors can
affect any potential initial location, such as:
ˆ Bad compaction quality of the dam material during construction, or inappropriate material used in dam construction.
ˆ Presence of internal structures and weak points inside the dam’s body.
ˆ Damage to the dam structure that can occur during operation life, possibly at
the slopes or at the crest.
The breaching of a dam usually initiates at the weakest point on the dam crest or
downstream slope when overtopping occurs. In our model, the initial breaching is
assumed to occur at the dam crest in the middle of the dam length (unless specified
otherwise) and further breaching develops parallel to the dam crest (the implemented
breach development mode is described in Section 2.3.2).
For routing of the flow through the breach, the reservoir routing principle is applied:
dV
= Qin − Qb − Qc − Qoutlet ,
dt
(6.1)
where Qin , Qb , Qc and Qoutlet are the inflow into the reservoir, the flow through
the breach, the flow over the crest, and the flow through the outlet, respectively and
dV /dt represents the change of reservoir volume in time.
Significant uncertainty is associated with experimental results obtained from laboratory and field experiments that determine the dominant sediment transport mechanisms during dam breaching (Section 2.3.3). For non–cohesive embankment dams,
the erosion in a breach channel is considered to be similar to a morphological bed
evolution (Broich, 2003). While in rare cases the erosion of dam material is assumed
to be similar to suspended load transport, most of the time it is simulated as a bed
77
Chapter 6. BREADA model: Breach Model for Earthfill Dams
δβ δβ
hc
hc
δ
H
y
hc
δβ
β
hc
y
H
hd
hc
hd
y
H
hc
hd
H
hd
hc
hc
(a)
H
Hhd
hd
H
Hhd
hd
y
(b)
Figure 6.1: Breach development in both formulations: (a) triangular shape to the
bottom of the dam and afterwards trapezoidal shape and (b) trapezoidal shape with
vertical and lateral erosion to the bottom of the dam and afterwards lateral erosion
only.
load transport (see Section 4.4 and Table 4.4). In the BREADA model, the erosion
of the embankment material is calculated using an empirical formula presented by
Meyer-Peter and Müller (1948).
Meyer-Peter and Müller (1948) performed the experiments on uniform bed material as well as with mixtures of particles with diameter ranging from 0.4 to 29mm,
channel slope from 0.0004 to 0.02, water depth of 0.1 to 1.2m and specific weight
of particles in range from 0.25 to 3.2N/m3 . The bed load transport rate [m2 /s]
empirical equation obtained was written as
1/2
qbl = φb [(s − 1) g]
d3/2
m ,
(6.2)
where s is the relative density ρs /ρ, ρs is soil density, dm is the mean particle
diameter [m] considered 1.1 to 1.3 times the d50 for nearly uniform material and
equal to the d50 for mixture of materials (van Rijn, 1993), and φb is the bed load
transport rate expressed in dimensionless form as
3/2
φb = 8 (µθ − θcr )
,
(6.3)
78
Section 6.1. Development of a dam breach model
where θcr is generally interpreted as the critical mobility parameter that for mixtures
of sediments on stream beds it is usually taken equal to 0.047. During a dam breach
erosion, θcr might be considered negligible compared to θ that is the dimensionless
particle mobility parameter estimated as
RI
.
(s − 1) dm
θ=
(6.4)
A bedform factor or efficiency factor µ is calculated with
µ=
k
k0
3/2
,
(6.5)
where k 0 is the grain–related Strickler coefficient and k is the overall Strickler coefficient. Yalin (1972) emphasized that if the plane is flat and the flow is two dimensional
then the ratio k/k 0 becomes 1.
Substituting Eq. 6.3, 6.4, 6.5, into Eq. 6.2 we obtain
3/2
qbl = ker (γRS)
,
(6.6)
where ker is an erodibility coefficient equal to
ker =
8
,
(γs − γ) g 1/2
R is the hydraulic radius, γ is the water specific weight, γs is the soil specific weight,
and S is the energy slope that can be calculated with Strickler’s equation
S=
u2
,
k 2 R4/3
where u is the mean flow velocity. Assuming that the solid discharge entering our
domain from the reservoir is null and considering a space step ∆x = 1m, we can
write the following mass conservation:
as
dAb
dqbl c
=
dt
dx
(6.7)
dAb
= qbl c,
dt
(6.8)
where c is the wetted perimeter.
We assume that the initial conditions - water depth in the reservoir, initial breach
depth and the inflow hydrograph - are known. For each time step, the flow over the
crest, through the spillway and the outlet is calculated based on reservoir elevation.
The difference between inflow and outflow is then used to calculate the change
79
Chapter 6. BREADA model: Breach Model for Earthfill Dams
in reservoir storage and the new reservoir elevation. The reservoir stage–volume
relationship is provided to the model through a mathematical expression. Based on
this relationship the reservoir water level is extracted for every estimated reservoir
storage at each time step. Other flow characteristics specific for different breach
shapes are presented in the following.
6.1.1
First formulation of dam breaching development
The breach shape is assumed to be trapezoidal. At first the breaching of the dam
progresses in vertical and lateral direction until the bottom of the dam is reached.
The breach opening area is calculated as
2
Ab = B (Hd − y) +
(Hd − y)
(tan β + tan δ) ,
2
(6.9)
where B is the bottom breach width. The development of breach cross section in
time can be written:
dAb dy
dy
dAb
=
= − [B + (Hd − y) (tanβ + tanδ)] .
dt
dy dt
dt
(6.10)
Flow in the breach channel is assumed a critical flow and the outflow discharge is
calculated as
1/2 3/2
g
(2B + hc (tan β + tan δ)) hc
Qb =
,
(6.11)
B + hc (tan β + tan δ)
2
where hc is expressed as:
hc =
−3B + 2 (H − y) (tan β + tan δ) + R1/2
,
5 (tan β + tan δ)
(6.12)
and
2
R = 9B 2 + 8B (H − y) (tan β + tan δ) + 4 (H − y) (tan β + tan δ).
Combining the Eqs. 6.6, 6.8 and 6.10, the breach bottom elevation can be estimated
every time step with following equation
3/2
dy
ker (γg)
=− 3
dt
k
2

B + hc
1
cos β
+
1
cos δ
3/2
(2B + hc (tan β + tan δ))hc 

B + (Hd − y) (tan β + tan δ) B + hc (tan β + tan δ)
.
(6.13)
For the development of the breach only in lateral direction (once the dam bottom
is reached) the model equations for the breach characteristics are given as follows.
The breach area is estimated as
Hd
Ab = B +
− y (tan β + tan δ) Hd ,
(6.14)
2
80
Section 6.1. Development of a dam breach model
and the development of the breach only in lateral direction is expressed as
2
dy
ker
3/2 hc [2B − (2y − hc ) (tan β + tan δ)] cos β + cos δ
= − 3 (γg)
dt
k
2Hd
sin (β + δ)
i1/2
h
B − y (tan β + tan δ) + hc cos1 β + cos1 δ
.
×
3/2
[B + (hc − y) (tan β + tan δ)]
The discharge through the breach opening is estimated to be
r
3/2
g [hc (2B − (2y − hc ) (tan β + tan δ))]
Q=
.
2 2 [B + (hc − y) (tan β + tan δ)]1/2
(6.15)
(6.16)
Assuming β = δ we write a dependency between the lateral and vertical erosion as
∆B
= Const
∆y
where ∆B and ∆y represent the change in width (bottom or top) and in depth of
the breach opening.
6.1.2
Second formulation of dam breaching development
In this formulation, a triangular breach channel is initially formed and progresses
to the dam bottom (see Figure 6.1). The area of the triangular cross section of the
breach channel (Figure 6.1), for β 6= δ is:
2
Ab =
(Hd − y) (tanβ + tanδ)
.
2
(6.17)
We differentiate Ab with respect to time t as follows
dAb
dAb dy
dy
=
= − (tanβ + tanδ) (Hd − y) .
dt
dy dt
dt
(6.18)
The discharge through the breach channel is calculated as
Qb =
g 1/2
2
h5/2
c
tan β + tan δ
,
2
(6.19)
where, the critical depth is
4
(H − y) .
(6.20)
5
Combining the Eqs. 6.6, 6.8 and 6.18, the breach bottom elevation can be estimated
every time step with
hc =
dy
1 ker
h2c
3/2
=−
(γg)
3
dt
2 k
Hd − y
cos β + cos δ
sin (β + δ)
3/2
.
(6.21)
Chapter 6. BREADA model: Breach Model for Earthfill Dams
81
Once the dam bottom is reached, the breaching develops in lateral direction into a
trapezoidal shape. The breach area cross section for trapezoidal breach shape with
y < 0 is equal to
Hd
Ab = (Hd − 2y) (tan β + tan δ)
.
(6.22)
2
The wetted area is
hc
A = (hc − 2y) (tan β + tan δ) ,
(6.23)
2
where hc is the critical depth derived as
p
3y + 2H + 9y 2 − 8Hy + 4H 2
hc =
.
(6.24)
5
Using the above expressions the discharge through the breach channel may be written
as
r
g tan β + tan δ
3/2
−1/2
Qb =
[hc (hc − 2y)] (hc − y)
.
(6.25)
2
2
The breach bottom elevation can be estimated at every time step with
1/2
2
dy
ker
cos β + cos δ
(hc − 2y) cos β + cos δ
3/2 hc
= − 3 (γg)
h
−
y
. (6.26)
c
dt
k
2Hd (hc − y)3/2 sin (β + δ)
sin (β + δ)
Based on the formulations described above, a software package (see Figure 6.2) is
developed using Borland Delphi. The program has user–friendly graphical interface,
which allows the user to load the necessary information and to run the model.
6.2
Validation of the BREADA model
We validate the BREADA model against a historical dam failure event: the breaching of the Schaeffer Dam in the USA that failed due to overtopping in 1921. To
extend even further the comparison with the real measurements (or known information), we also compare our results to the output of the commercially available model
BREACH (Fread, 1988). We analyze the breach outflow time series generated by
both models and compare the peak outflow values with the results obtained from
empirical equations (introduced in Section 4.3) and data mining techniques (introduced in Section 5.3).
The Schaeffer Dam was a 30.5m high non–cohesive earthfill dam constructed across
Beaver Creek in USA. The dam failed due to heavy rains described in Follansbee and
Jones (1922) as ‘cloud-bursts’, which led to water levels in the reservoir higher than
the dams top elevation. Some of the dam and reservoir characteristics are presented
in Table 6.1.
According to Follansbee and Jones (1922), the dam was washed away in 30 minutes.
82
Section 6.2. Validation of the BREADA model
Figure 6.2: Main window of the BREADA program.
Table 6.1: Schaeffer Dam characteristics.
Dam Characteristics
Dam height [m]
30.5
Embankment width at crest [m]
4.6
Embankment length at crest [m]
335
Upstream slope [H:V]
1:3
Downstream slope [H:V]
1:2
Grain size D50 [mm]
2.5
Uniform factor d90/d30
12.4
Porosity
0.5
Unit weight [KN/m3 ]
18.5
Friction angle
25 - 40
Hydraulic Characteristics
Reservoir [m3 ]
3.92 million
Initial water depth in the reservoir [m] 30.5
Inflow [m3 /s]
270
Initial breach depth [m]
0.3
83
Chapter 6. BREADA model: Breach Model for Earthfill Dams
5000
3
Discharge [m /s]
4000
3000
2000
1000
0
00:00
00:15
00:30
00:45
01:00
01:15
01:30
Time [hr:mm]
Figure 6.3: Sensitivity analysis for breach side angle with the BREADA model.
At the end of failure the breach opening was observed to be of a trapezoidal shape
with a top width of about 210m (some 70% of dam crest length) and side slopes of
approximately 1:2.25 [H:V]. A peak outflow of 4,500m3 /s was recorded.
The available record of parameters for the Schaeffer Dam is incomplete and, therefore, a sensitivity analysis is undertaken to identify which of the (unknown) input
data influences the outflow discharge. The inflow into the reservoir was estimated by
Follansbee and Jones (1922) to be 270m3 /s and belongs to the maximum discharge
estimated for Beaver Creek, due to the storm that occurred more than 24 hours
before the failure of the dam. It includes the rainfall and tributary inflow. In our
experiment a reservoir stage–area curve is created based on the available information
for some representative reservoir levels. Model parameters, namely the initial breach
depth, breach side slope and erodibility coefficient are part of the sensitivity analysis for the BREADA model and the internal friction angle is part of the sensitivity
analysis for the BREACH model. In this section, we briefly discuss the influence of
side slope and internal friction angle on breach outflow hydrograph.
Figure 6.3 presents the resulting outflow hydrograph simulated for sensitivity analysis of the breach channel side slope (β = δ) by the BREADA model. The angle
that the breach sides create with the vertical is varied from 25◦ to 40◦ . It can be
observed that the variation in the side slope influences the peak outflow magnitude
and its time of occurrence. This is expected since the breach channel area depends
on the breach channel side slope. Smaller is the angle that the breach side creates
with the vertical, smaller is the initial breach channel cross section area. This leads
to smaller initial breach outflow meaning an increase of water depth in the reservoir.
84
Section 6.2. Validation of the BREADA model
12000
3
Discharge [m /s]
10000
8000
6000
4000
2000
0
00:08
00:20
00:32
Time [hr:mm]
00:44
Figure 6.4: Sensitivity analysis for internal friction angle with the BREACH model.
This process continues for few minutes. Then the water depth in the reservoir that
is increased as a result of lower outflow values, initiates higher erosion rates, thus
higher discharge rates flowing through the breach channel. In Figure 6.3 we can
observe that the angle of 25◦ is producing a more realistic breach outflow hydrograph, with peak values similar to the observed one and a flood duration of about
30 minutes. This result is consistent with the observed final side slope of the breach
channel of 1:2.25.
Figure 6.4 presents the sensitivity analysis of the BREACH model for variable internal friction angle. The angle of 40◦ generates a peak outflow about 40% higher
than the recorded value, but lower than the peak outflow obtained for angles of
25◦ and 30◦ . For the internal friction angle equal to 60◦ , the obtained side slope
angle is 26◦ coinciding with the observed one and the corresponding peak outflow is
4,000m3 /s. This happens due to the same reason as for the BREADA model. The
internal friction angle value affects the enlargement of the breach width. During all
the simulations, the duration of the hydrograph rising limb in the BREACH model
is very short, fast reaching the maximum peak outflow.
In order to evaluate the applicability of data mining techniques to dam breach modelling, the models created with IBk and MLP algorithms in Section 5.3.3 are used to
predict the peak outflow for the Schaeffer Dam and the resulting peak outflow values are analyzed. The results of peak outflow estimation for the Schaeffer Dam are
presented in Figure 6.5. The peak outflow estimated by the IBk model is 4,000m3 /s
viz. about 10% smaller than the observed value, while a 34% lower peak outflow is
predicted by the MLP model.
85
Chapter 6. BREADA model: Breach Model for Earthfill Dams
12000
Measured
MLP
IBk
3
Peak flow [m /s]
10000
8000
6000
4000
2000
0
0
5
10
15
20
25
Dam height [m]
30
35
40
Figure 6.5: Peak outflow estimation based on dam height.
Table 6.2: Peak outflow estimation using empirical equations for Schaeffer Dam.
Reference
Peak outflow
(m3 /s)
Regression Equations
Singh and Snorrason (1982)
- Eq. 4.5
2230
MacDonald and Langridge-Monopolis (1984) - Eq. 4.4
2584
Costa (1985)
- Eq. 4.11 2422
Froehlich (1987)
- Eq. 4.12 3843
Envelope Equations
Hagen (1982)
- Eq. 4.2
9700
MacDonald and Langridge-Monopolis (1984) - Eq. 4.3
8460
Costa (1985)
- Eq. 4.7
6991
- Eq. 4.8
9435
Using the empirical relations (see Table 6.2), the peak outflow varies from 2,230m3 /s
to 3,843m3 /s excluding the upper limits from the envelope equations. Froehlich’s
equation estimating peak outflow based on depth and volume of water in the reservoir at failure time, performs better than the other equations, where the estimated
peak outflow is 15% lower than the recorded peak outflow.
6.3
Failure analysis of an earthfill dam
Failure of large dams is most likely to result in the release of enormous quantities
of water, endangering people’s lives and property in downstream areas. The conse-
86
Section 6.3. Failure analysis of an earthfill dam
Figure 6.6: View of the Bovilla Dam facing upstream.
quences are particularly high in terms of human casualties when no warning system
is available. A dam break analysis is required for every constructed large dam for
the purpose of identifying the impact of failure in the downstream areas and the
necessary measures for mitigating the consequences.
In this section, we undertake a dam break analysis for the hypothetical failure of
Bovilla Dam (Figure 6.6) that was constructed on the Terkuze river, 15km northeast of Tirana City, Albania. It is an earthfill homogeneous dam, 81m high, and
135m long at the crest. The dam’s filling material is composed of gravel and sand,
taken from alluvial deposits of the Terkuze River upstream of the dam. The normal capacity of the reservoir (Figure 6.6) is 80 million m3 at the pool elevation of
318m from which 50 million m3 are used for water supply and the rest for irrigation.
Bovilla Reservoir can accommodate the average annual volume that the Terkuze
River brings, that is evaluated to be nearly 105 million m3 water. The purpose
for constructing the Bovilla Dam is to provide enough water to the continuously
expanding population of Tirana city and to satisfy the demands for irrigation purposes.
Though dams are meant to function for a long period of time, the probability of their
failure is never zero. The Bovilla Dam is classified into the high hazard category
due to populated areas located just 10 km from the dam. The dam construction
lead to permanent displacement of more than 400 families from their homes and
traditional livelihood in 1993. However, a year later, people started to settle near
Chapter 6. BREADA model: Breach Model for Earthfill Dams
Bovilla Reservoir
Disolv1.shp
Populated Areas 1994.shp
Commercial
Construction area
Existing rural construction
Hospitals
Industrial area
New construction
Terkuza River
(a)
87
Bovilla Reservoir
Disolv1.shp
Populated areas 2001.shp
Schools, hospitals, government offices
Low density informal housing area
Mix of apartments and single-family housing
Residential multi-story construction
Singe-family detached housing
Residential and commercial
Very low density rural settlement
Medium density informal housing
Retail, wholesale,office or hotel
Airport
Terkuza River
(b)
Figure 6.7: Land use data for the area downstream the dam showing the populated
areas for the years (a) 1994 and (b) 2001.
the river banks downstream the dam. Figure 6.7 shows the land use data for two
different years: 1994, a year after the work for construction of the dam had been
started and 2001, five years after the work was completed. A potential failure of the
Bovilla Dam may lead to highly devastating consequences in the areas downstream.
Therefore, a dam break analysis needs to be conducted to identify the potential
flood propagation scenarios and consequences in case of a failure event. Modelling
of the flood wave propagation induced by a potential dam break event can help the
implementation of emergency plans, risk assessment, and future development of the
areas.
The pertinent properties of the dam and the reservoir are presented in Table 6.3.
The impenetrability of the upstream slope of the dam is achieved by mean of a
geo-textile material. There is a bottom outlet, used for water release for flood control and irrigation purposes. The total discharge capacity of the bottom outlet is
150m3 /s and is designed to handle 1,000 year return period flood event with peak
discharge in the river of 700m3 /s. This flood brings an increase of the water level
in the reservoir to maximum of 320m. Two gates are installed at the outlet tower:
the principal gate and the emergency gate. Next to the outlet tower an intake tower
releases water on a regular basis for water supply.
The hydrologic data consist of the flood discharge time series for return period events
of 10, 100 and 1,000 years (Albinfrastrukture, 1996). The relationship between reservoir surface area and water elevation (Figure 6.9) is obtained from digital elevation
data (Figure 6.8) using Arc–GIS. An area 32km downstream of the dam is considered in this analysis. The terrain elevation varies from 240m above sea level at the
88
Section 6.3. Failure analysis of an earthfill dam
Table 6.3: Bovilla Dam Pertinent Data.
Dam Characteristics
Dam top elevation, [m a.s.l]
321
Height above streambed [m]
81
Length at the crest [m]
135
Width of top crest [m]
8
Upstream slope
1.6
Downstream slope with 4 berms
1.6
Reservoir Characteristics
Normal pool elevation [m a.s.l]
318
Maximal pool elevation [m a.s.l]
319
Normal pool area [km2 ]
4.1
Normal pool capacity [m3 ]
75 million
Maximum pool capacity [m3 ]
84.3 million
Catchment area [km2 ]
98
Bottom Outlet
Type
armoured concrete surface
Bottom elevation at the entrance (m a.s.l) 275
Principal gate dimension [m]
3.5×3.7
Emergency gate dimension [m]
3.5×4.0
Length of outlet gallery [m]
156
Maximum capacity [m3 /s]
150
Freeboard
Normal pool [m]
3
Bovilla Reservoir
Terkuza River
Grid
300 - 1050
250 - 300
180 - 250
140 - 180
120 - 140
80 - 120
70 - 80
60 - 70
50 - 60
40 - 50
30 - 40
20 - 30
10 - 20
No Data
Figure 6.8: Digital elevation grid for the area downstream the dam.
89
Chapter 6. BREADA model: Breach Model for Earthfill Dams
330
320
Elevation (m)
310
300
290
280
270
260
250
240
0
1
2
3
Area (km2)
4
5
(a)
(b)
Figure 6.9: (a) Surface area-water elevation relationship for Bovilla reservoir and
(b) Surface boundary for different elevations starting from inner boundary at 240m,
250m, 270m, 280m, 300m, 321m elevation, respectively
dam site to 15m above sea level at the downstream boundary. The floodplain at
the first kilometers from the dam is quite narrow and steep, but expands rapidly
afterwards.
6.3.1
Modelling of breach development
The first step in this dam break analysis is the prediction of the breach outflow hydrograph that will constitute the upstream boundary condition of the flood routing
model. The main goal is the modelling of the flood wave propagation in case of
the dam’s failure, regardless of the expected probability of occurrence of such event.
Here, we describe in detail the overtopping failure of the dam that might represent
the worst flooding scenario (high magnitude of flood conditions) and discuss the
piping failure.
Different scenarios can lead to dam overtopping, namely the inflow into the reservoir
is higher than the spillway’s capacity, malfunctioning of the spillway, etc. Currently,
there is no methodology that is able to determine the extent of overtopping (flow
depth and duration of flow over the crest) that the earth dam can withstand. Dam
failure depends on the resistance of the embankment soil to water flow, type of dam
covering material, slope of the embankment, which in turn influences the flow velocities, etc. In this study, we conduct a sensitivity analysis for the inflows into the
reservoir assuming the 1,000 year and the 100 year return period flood events to
inflow into the reservoir when the dam erosion is initiated. We ignore the effect of
90
Section 6.3. Failure analysis of an earthfill dam
other small stream and rainfall inflows into the reservoir and the hydrologic characteristics of the basin.
Other assumptions used in modelling are the following:
ˆ Final breach bottom level corresponds to the stream bed elevation. Failure
of a high dam, might not always develop down to the bottom as the width
of the dam is usually much wider at that location. However, we make this
assumption for the sake of simplicity.
ˆ Water depth in the reservoir at the initial time is assumed at the dam top
elevation or 0.2m above.
We start with a sensitivity analysis of the two different breach development formulations: (a) trapezoidal breach shape throughout simulation (see Section 6.1.2), and
(b) triangular breach shape till dam foundation is reached and trapezoidal breach
shape afterwards (see Section 6.1.1). In Figure 6.10 we can observe that the hydrographs do not differ significantly from each other in terms of peak outflow magnitude, but differ in timing. The trapezoidal breach development formulation exhibits
slower breaching of the dam. While this might seem counterintuitive, the result can
be expected due to the fact that the ratio between the vertical and lateral erosion is
limited to a constant factor (in this case ∆B/∆y = 2), signifying slow enlargement
of the breach width. For the following simulations we use the second formulation of
breach development unless specified otherwise.
Figure 6.11 presents the sensitivity analysis for two different inflows into the reservoir. It can be observed that the magnitude of inflow into the reservoir does not
influence notably the flood hydrograph. The peak of the flood hydrograph is reached
about 6 minutes faster and is only 3% higher for the 1,000 year return period flood
event compared to the 100 year return period event. That is expected as the inflow
peak discharge for the 1,000 year return period flood is just 700m3 /s compared to
430m3 /s for the flood with return period of 100 years, with both values being significantly lower than the breach outflow. For further analysis we assume the inflow
in the reservoir at the failure time to be 1.05 times higher than the peak discharge
of 1,000 year return period flood used for the design of the spillway, thus considering dam (and the spillway) to be able to accommodate lower inflow floods into the
reservoir.
Two different stage–volume relationships are created for the reservoir: one based on
the GIS data and the other based on the data provided by the designers of the dam
(Albinfrastrukture, 1996). The latter does not include the reservoir dead storage
information, but only the active storage capacity. The peak outflow obtained by the
model for different reservoir stage–volume relationships differs as much as 15% (see
Figure 6.12). This emphasizes the uncertainty related with the actual volume of
91
Chapter 6. BREADA model: Breach Model for Earthfill Dams
70000
1st Formulation
2nd Formulation
50000
3
Discharge [m /s]
60000
40000
30000
20000
10000
0
00:00 00:30 01:00 01:30 02:00 02:30 03:00 03:30
Time [hr:min]
Figure 6.10: Breach outflow hydrograph for first and second breach development
formulations.
60000
T=100
3
Discharge [m /s]
50000
T=1000
40000
30000
20000
10000
0
0:00
0:30
1:00
1:30
2:00
Time [hr:min]
2:30
3:00
Figure 6.11: Breach outflow hydrograph for 1,000 and 100 year return period flood
event.
92
Section 6.3. Failure analysis of an earthfill dam
70000
GIS Data
Active Storage Capacity
50000
3
Discharge [m /s]
60000
40000
30000
20000
10000
0
0:00
0:30
1:00
1:30 2:00
Time [hr:min]
2:30
3:00
Figure 6.12: Breach outflow hydrograph for two reservoir stage–volume relationship.
water in the reservoir at the failure time, which is affected as well from the sediment
mass accumulated in the basin throughout the years, though not considered in this
analysis.
Two user–defined parameters of the BREADA model, initial breach channel depth
D and the angle that the breach channel sides create with the vertical β = δ, are
subject to a sensitivity analysis. Different values for initial breach channel depth
(D=1m, 0.5m, and 0.3m) are considered in order to understand the influence of
the initial conditions on the breach development. As shown in Figure 6.13, D does
not affect the breach outflow magnitude, but has an impact on the peak timing.
Higher initial depth in the breach opening results in faster breach development. In
contrast, β has an influence on the breach outflow hydrograph (Figure 6.14). For
different values of β the magnitude of the peak discharge changes. An increase of
β leads to a decrease of the peak discharge and vice versa similarly as observed in
Section 6.2. Compared to the angle of 35◦ , the magnitude of the breach outflow for
angles of 40◦ and 45◦ , decreases 11.8% and 15.8% respectively.
Furthermore, we compare the dam breach modelling results obtained from the
BREADA and BREACH model. In Figure 6.15 it can be observed that though the
peak outflows differ in range of only 10%, the timing, which is a very important factor for proper warning of the population downstream from the dam, is significantly
different. In the BREACH model the peak outflow occurs after about 39 minutes
from the beginning of initial breach, while the peak outflow in the BREADA model
93
Chapter 6. BREADA model: Breach Model for Earthfill Dams
60000
D = 1.0m
3
Discharge [m /s]
50000
D = 0.5m
D = 0.3m
40000
30000
20000
10000
0
0:00
0:30
1:00
1:30 2:00 2:30
Time [hr:min]
3:00
3:30
Figure 6.13: Sensitivity analysis for different initial breach depth D (β=40◦ ; Q1% ).
60000
3
Discharge [m /s]
50000
40000
β = 35°
β = 40°
β = 45°
30000
20000
10000
0
0:00
0:30
1:00
1:30 2:00 2:30
Time [hr:min]
3:00
3:30
Figure 6.14: Sensitivity analysis for different breach angle β (D=0.5m; Q1% ).
94
Section 6.3. Failure analysis of an earthfill dam
80000
BREADA
BREACH
60000
3
Discharge [m /s]
70000
50000
40000
30000
20000
10000
0
0:00
0:30
1:00
1:30
2:00
Time [hr:mm]
Figure 6.15: Breach outflow hydrograph for the BREACH and BREADA model.
occurs about 70 minutes later. A sharper rising limb is produced by the BREACH
model compared to a more gradual development of the breach in the BREADA
model.
The breach cross section could be a possible reason for this discrepancy - the
BREACH model develops a rectangular breach shape from the beginning till the
moment when the sides of the breach channel collapse, creating a trapezoidal shape.
This moment in time depends on the dam material internal friction angle that in
turn controls the side slope. Instead, the BREADA model develops a triangular
shape till the bottom of the dam is reached and then develops into a trapezoidal
breach shape. This leads to a slower development of the breach in the latter model.
However, the duration of the rising limb produced by the BREACH model is only
6 minutes, and that might not be realistic. The results obtained from both breach
models represent two different scenarios, one being less catastrophic to the downstream area due to slower development despite 10% higher peak outflow, and the
other predicting a disastrous situation with faster development of breaching. In
both models we do not take into account the cover layer at the upstream slope of
the dam, which might influence the results. Peak outflows obtained by the BREACH
and BREADA models are 63,570m3 /s and 68,740m3 /s respectively.
To conclude, we predict the peak outflow using the empirical equations. From the
results in Table 6.4, it can clearly be seen that only Hagen’s formula produces almost
the same peak outflow as predicted using the dam breach models. The upper curve
Chapter 6. BREADA model: Breach Model for Earthfill Dams
95
Table 6.4: Peak outflow estimation based on dam height and reservoir storage.
Reference
Peak outflow
(m3 /s)
Hagen (1982)
- Eq. 4.2
67,230
MacDonald and Langridge-Monopolis (1984) - Eq. 4.3
43,630
- Eq. 4.4
13,030
Costa (1985)
- Eq. 4.9
38,910
- Eq. 4.11 13,950
- Eq. 4.7
39,560
- Eq. 4.8
58,950
Froehlich (1987)
- Eq. 4.12 31,980
Broich (1998)
- Eq. 4.13 14,260
- Eq. 4.14 21,040
of the envelope equation proposed by Costa is 17% and 9% lower than the peak
outflow produced by the BREADA and BREACH models respectively. These results were expected since Hagen’s formula is the only formula derived from historical
data of earthfill dams failing due to overtopping, with a range of characteristics that
covers the characteristics of the Bovilla Dam. The dam considered in this study, is
higher than all of the 22 dams that Froehlich used for deducing his equation. Moreover, other empirical formulas were extracted from data sets where no distinction
was made between dam material or failure type.
6.3.2
Modelling of flood propagation
The breach outflow hydrograph generated from the BREADA and BREACH models
is routed in the areas downstream the dam using Sobek 1D2D, an integrated one–
and two–dimensional numerical simulation package developed by WL | Delft Hydraulics (see Section 3.4). A 1D model is created for the 32km reach downstream of
the dam with an average bed slope of 0.01. The 2D modelling area is approximately
19km×17km with grid cell size of 30m×30m. Since the purpose of this analysis is
the identification of flooded areas in case of a hypothetical failure of the Bovilla
Dam, rather than the identification of the flood duration period, the simulation is
finalized when the flood wave reaches the downstream boundary.
We ignore the reservoir sediment or the dam material, which are flushed away together with the water stored in the reservoir, but instead consider propagation of
clear water in the valley. The flooded areas are treated as rigid, meaning neither
erosion nor deposition processes are modelled despite the awareness that these processes will occur during a real dam failure flood wave propagation. The presence of
the debris material in the flood water, which will affect the flow pattern significantly,
96
Section 6.3. Failure analysis of an earthfill dam
Figure 6.16: Roughness grid.
is taken into account through higher values of roughness coefficients.
The roughness of the floodplain area is subject to sensitivity analysis. The extent
of the dam break flood event is unprecedented in the natural history of the valley,
thus the calibration of the roughness coefficients is not possible. Sobek 1D2D has
an option to apply constant or variable roughness coefficients for the channel reach
and the overland area. A constant Manning’s roughness coefficient n equal to 0.07
is assumed for the river channel. Constant and variable roughness coefficients are
used for the overland area. The roughness coefficients for different land use categories (Figure 6.16) are deduced from the Tables of Manning’s n presented in Chow
(1959); van der Sande et al. (2003); Huang (2005).
The flood wave propagation scenario for the breach outflow hydrograph generated
by the BREADA model is presented in Figure 6.17. The extent of flooding for two
time intervals is given for the purpose of comparing with the flood patterns when the
breach outflow hydrograph of the BREACH model is used as upstream boundary
condition in the flood modelling analysis. Simulation results show that the flood
wave reaches the location 26 km downstream of the dam (downstream of the river
reach presented in Figures 6.17 and Figure 6.18) in approximately 5, 4, and 3 hours
time span for constant Manning n = 0.15, n = 0.1, and for roughness based on land
use data. It reaches the populated areas located 9 km downstream the dam in 1hr
and 40 minutes, enough time to warn population for immediate evacuation. At 13
km away from the dam, flood peaks are dampened out as the wave reaches the wide
flat areas; still, the water depth at the villages, including the international airport
Chapter 6. BREADA model: Breach Model for Earthfill Dams
(a)
97
(b)
Figure 6.17: Routing of the BREADA model outflow hydrograph using Sobek 1D2D
with Manning coefficient in the floodplain area equal to 0.15 (a) 2hr 38min after the
breach has been initiated and (b) 4hr 38min after the breach has been initiated.
exceeds 2m. The flood speed reaches 7m/s at the populated areas when taking into
account the land use based roughness.
The flood wave propagation scenario for the breach outflow hydrograph generated
by the BREACH model is presented in Figure 6.18. Owing to the fast breach development in the BREACH model, the flood wave reaches 26 km downstream of
the dam in 4, 3, and 2 hours time span for constant Manning n = 0.15, n = 0.1,
and for land use based roughness. In this scenario the time interval from the initial
breaching to the time the flood wave approaches the first residential areas is only 40
minutes. Higher water depths are observed in some locations in comparison to the
BREDA model scenario (see Figure 6.19).
The different roughness maps provide different flood hazard scenarios. The results of
a sensitivity analysis for constant and land use based Manning roughness coefficients
on the floodplain are presented in Figure 6.19. The water depths are shown for various locations in the valley downstream the dam (see Figure 6.17). As expected, the
increase in floodplain roughness coefficient decreases the flood propagation speed,
thereby delaying the flooding of a particular area. An increase in water depth is
observed at the high elevation locations (e.g. location A which correspond to a residential area) while there is no notable change in water depth at the low elevation
areas (location C that corresponds to the airport area). The water depth in A obtained using the BREACH model hydrograph as upstream boundary condition is
lower than the one obtained by using the BREADA model hydrograph, associated
98
Section 6.4. Uncertainty in dam break analysis
(a)
(b)
Figure 6.18: Routing of the BREACH model outflow hydrograph using Sobek 1D2D
when Manning coefficient in the floodplain area equals to 0.15: (a) 2hr 18min after
the breach has been initiated and (b) 4hr 18min after the breach has been initiated.
this with the higher peak outflow values for the latter. These differences are dampened at the location C further away from the dam where the floodplain area is wide.
According to the flood maps the water depths in residential areas are in the order
of 5m. The failure of Bovilla Dam would jeopardize the lives of thousands of people living downstream and extensively affect the environment and the economy of
the area. Based on preliminary population data for the regions inundated by flood
water, the population at risk consists of at least 10,000 people. In case of a dam
failure event, the population faces significant risk. Immediate construction of a flood
warning system is necessary to avoid human casualties, in particular for residents
living as close as 9km away from the dam.
The inundation maps provide an estimate regarding the direct consequences, but
the indirect (long term) consequences as a result of dam failure will be enormous as
well. The development of the areas should be planned by taking into consideration
the above mentioned flood hazard maps ensuring better protection of the people
facing the risk in a potential dam failure event, as well as decreasing economic and
environmental consequences as a result of the failure.
6.4
Uncertainty in dam break analysis
When physically based methods are used for forecasting the flood wave propagation of a dam failure event, no data are usually available for its validation. Instead
the focus is on the identification of sources of uncertainty and the range to which
99
Chapter 6. BREADA model: Breach Model for Earthfill Dams
9
Water Depth [m]
8
A: n = L
C: n = L
A: n = 0.10
C: n = 0.10
2:00
3:00
Time [hr:mm]
A: n = 0.15
C: n = 0.15
7
6
5
4
3
2
1
0
1:00
4:00
5:00
(a)
9
8
A: n = 0.10
A: n = 0.15
B: n = 0.10
B: n = 0.15
C: n = 0.10
C: n = 0.15
Water Depth [m]
7
6
5
4
3
2
1
0
01:00
02:00
03:00
Time [hr:mm]
04:00
(b)
Figure 6.19: Sensitivity analysis of the roughness coefficient at locations 11km, 15km,
and 19km downstream the dam (namely A, B, and C respectively) for (a) BREADA
outflow hydrograph (L stands for land use data) and (b) BREACH outflow hydrograph.
100
Section 6.4. Uncertainty in dam break analysis
they affect the model results. Identifying the uncertainty associated with the prediction of floods imposed by dam failure is necessary for effective flood management
and emergency planning. Three sources of uncertainty are identified in Section 3.4
namely, input uncertainty, model uncertainty, and completeness uncertainty. The
latter, often referred as ignorance uncertainty, is associated with all omissions that
occur due to lack of knowledge.
Input uncertainty
Neither the inflow into the reservoir nor the water depth in the reservoir at the failure time are known for the analysis of a hypothetical dam failure. Both values are
assumed depending on the event that will be simulated e.g. inflow is higher than
the spillway design capacity or the dam design flood for the overtopping failure, and
the water depth in reservoir corresponds to the maximum depth. These characteristics are a source of uncertainty. However, the sensitivity analysis shows that inflow
hydrograph influence is not significant for the large Bovilla Dam. An increase in the
inflow with 60% (from Q1% to Q0.1% ) for Bovilla reservoir resulted in an increase of
the peak outflow with only 1%.
Although the reservoir area and storage volume are considered to be deterministic
quantities, the calculated reservoir area and storage volume at a given elevation may
vary due to different measurement and computational techniques used for their estimation. Moreover the reservoir area and storage volume might be different from
what is assumed, depending on the sedimentation in the reservoir during the years
before the failure occurs. The reservoir characteristics, namely the approximated
shape, volume, and area, all affect the final results.
Dam material characteristics at the failure time are part of the sensitivity analysis
and are very important for the correct estimation of the breach development and
characteristics. Roughness coefficient and Digital Elevation Model (DEM) data for
the floodplain area influence the scale of flooding in terms of magnitude and time
and are part of sensitivity analysis.
Model uncertainty
Model uncertainty is associated with different formulations implemented for modelling the processes involved during the breaching of the structures, mathematical
and numerical description of the processes, etc. Different models result in different output for the common problem due to various approximations made in the
description of the processes. The model related parameters influence significantly
the scale of flooding. We observe that two formulations of the BREADA model, using different breach shapes for breach development, lead to different breach outflow
hydrographs with differences in timing, which is a very important factor in flood
analysis. The same is observed when comparing the BREACH and the BREADA
models.
Chapter 6. BREADA model: Breach Model for Earthfill Dams
101
Completeness uncertainty
The completeness uncertainty represents unknown contributions and hence is a qualitative analysis rather than quantitative. Processes that are currently considered
irrelevant for the dam failure flood analysis, might prove to be important if investigated in greater detail. There are many processes that we omit in modelling due
to current lack of knowledge or awareness (e.g. wind can have impact on the failure
of the dam but its influence is usually not considered in any analysis for high dams
except for dikes). For the overtopping of an earthfill dam, the wind direction might
influence the failure process. The wind blowing toward the dam during high flood
might contribute to higher depth of water overtopping the dam.
6.5
Discussion and conclusions
This chapter starts by describing the model developed for predicting the breach
characteristics of an earthfill dam failing due to overtopping. A sensitivity analysis
is undertaken for assessing the influence of the model parameters on the computed
breach outflow hydrograph. It is observed that the initial breach channel depth,
that is a user defined parameter, has an influence on peak timing. The breach side
slope affects both the peak timing and its magnitude.
Two different methods are used for predicting breach outflow hydrograph in case of
hypothetical failure of an earthfill dam. We compare the resulting breach outflow
hydrographs obtained from the BREADA (Zagonjolli et al., 2005) and the BREACH
model (Fread, 1988). Despite only 10% difference in the peak outflow values obtained
from the two breach models, significant differences are observed in timing and shape
of the hydrograph.
Furthermore, we compare the resulting peak outflows of the BREACH and BREADA
models with the range of peak outflows obtained using the empirical formulations developed during the last decades and data mining techniques (see e.g. Zagonjolli and
Mynett (2005b,a)). Though empirical formulations can be used for a ‘rough/fast’
prediction of the peak outflow values, they are not applicable for dam break flood
forecasting where knowledge about breach development in time is important. Hagen’s empirical formula produces almost the same peak outflow as predicted using
physically based numerical models. Other empirical formulas do not show good
agreement, that can be explained from the fact that the Bovilla Dam characteristics
are not within the range of dam characteristics in the datasets used for developing
those formula.
The resulting breach outflow hydrographs, constituting the upstream boundary condition for the 1D2D hydrodynamic model, led to two different flood progression scenarios in the areas downstream from the dam. For numerical simulation of flood
102
Section 6.5. Discussion and conclusions
propagation downstream of the dam, the breach models are coupled with the Sobek
1D2D modelling package developed by WL | Delft Hydraulics (the Netherlands).
The choice of erodibility factor for the BREADA model turns out to have a high
influence on the breach outflow hydrograph timing and shape, but here we assume
a scenario where the breach development is slower, simulating flood propagation for
the fastest (BREACH) and slowest flood wave (BREADA). Roughness in the areas
subject to flooding influences flood speed and characteristics. A constant and variable roughness based on land use data is used.
Based on preliminary population data for several regions inundated by flood water,
the Population at Risk consists of at least 10,000 people. Immediate construction
of a flood warning system is proposed, as a key source for avoiding loss of human
lives, for residents living as close as 9km away from the dam; since in case of a dam
failure event, this population faces significant risk.
Chapter 7
A Numerical-Constraint
based Model
The more constraints one imposes, the more one frees one’s
self. And the arbitrariness of the constraint serves only to
obtain precision of execution.
Igor Stravinsky
7.1
Introduction
During past decades different methodologies were proposed to prevent and manage
floods. The traditional approach to prevent the impact of flooding through flood
protection is more recently being replaced by a flood management approach (Plate,
2000; Brinkhuis–Jak et al., 2003; de Vriend, 2005; Samuels et al., 2005; Simonovic
and Ahmad, 2005) recognizing that absolute flood prevention is unachievable and
unsustainable, due to high costs and inherent uncertainties. In the Netherlands, the
standard policy of raising dikes crest levels in order to maintain the required level
of flood protection is being abandoned in favor of a new policy of creating ‘Room
for the River’ that involves widening river cross sections by relocating dikes further
away from the river, lowering floodplains, etc. (van Schijndel, 2005). Partitioning of
the area at risk into compartments, utilizing the highway and railroad embankments
as well as the natural terrain, could possibly lead to an increase in warning time and
a reduction of the flooded area.
The risk associated with flooding is usually defined as the product of probability
and consequences. This expression leads to a situation where the total risk of an
event with low probability and high consequences is equal to the total risk of an
event that has high probability of occurrence but low consequences. Generally, risk
reduction measures aim to reduce the probability of flooding and might often be
104
Section 7.2. Description of the numerical–constraint based approach
easier to implement, although minimizing the probability of a flood can come at the
expense of increasing its destructive power (when it happens), thus increasing the
consequences.
Simulation of the consequences of a predicted or assumed flood is typically elaborated in what–if scenarios. Every what–if scenario requires specification of the initial
state and the configuration of the system. Considering different scenarios makes the
number of required simulations grow increasingly large due to the possible combinations of choices for the initial state and the configuration of the system. Therefore,
in practice, only a small fraction of all possible strategies can be explored.
In this chapter we present a numerical–constraint based approach for flood risk reduction and decision support as well as a case study illustrating its application to a
system of polders at risk (Zagonjolli et al., 2006). The model developed is able to
simulate different flood mitigation scenarios taking into account the social and economic value of the areas that could be prone to inundation. The impact of flooding
is minimized by selecting the most feasible mitigation scenarios.
The hydrodynamic modelling packages require extensive and lengthy calculations,
while the proposed ‘lightweight’ numerical–constraint based technique offers advantages of simultaneous evaluation of different flood mitigation scenarios, taking into
account different economic and social aspects that a traditional numerical system is
not able to use. In this chapter we demonstrate the possibility of integrating both
approaches, viz. the usage of the developed method for providing the most feasible
mitigation scenario and detailed hydrodynamic modelling that can be carried out at
a later stage. This in turn allows for inclusion of the proposed approach, into any
existing hydrodynamic modelling package.
7.2
Description of the numerical–constraint based
approach
The key elements of the developed numerical–constraint based technique are the
graph algorithms that are applied to simulate different possible flood propagation
scenarios occurring in areas prone to inundation. Thus, a flood mitigation problem
is converted into a problem of finding the most feasible path for water propagation,
which can be addressed within the existing framework of graph algorithms (Corman
et al., 2001).
Figure 7.1 shows the transformation of a flood prone area into a graph. The area
surrounded by outer dikes (either wet or dry boundary dikes) consists of 12 polders
separated by inner dikes (dikes that belong to more than one polder). Each of the
polders, represented as a vertex v of the graph, has a maximum capacity to store
105
Chapter 7. A Numerical-Constraint based Model
L
K
L
K
I
I
J
H
J
H
F
G
F
G
D
E
C
D
C
E
B
A
B
A
Figure 7.1: Transformation of a system of polders into the graph.
flood water. For each inner dike there is an edge connecting two vertices (polders).
Therefore, all possible ways of flood propagation in the area prone to flooding are
represented as all possible paths from the initially flooded polder to the polder that
needs to be protected. For example, we can assume an initial breaching to occur
at the river dike in polder C as a result of hydraulic conditions or as a result of
the decision to deliberately initiate breaching at that particular location. We also
assume that polder J is estimated (based on the given evaluation) to be the most
important polder that requires maximum protection. Then the algorithm finds the
optimal route for the flood water propagation avoiding the most valuable polder(s)
or a particular polder that needs to be protected. Therefore, one of the main questions arising while addressing a flood mitigation problem, that is find all possible
paths for flood water before it arrives at the protected area, is efficiently addressed
by our numerical–constraint based model, utilizing graph algorithms with different
selection criteria as discussed later in this chapter.
A notable advantage of this approach over traditional numerical models is the calculation of a single (or small number) of paths found by the graph algorithm to be most
feasible flood propagation scenarios, resulting in minimal damage. Using a ‘forward
approach’ involving traditional numerical simulation would require a ‘brute’ force
approach of evaluating all (many) possible ways of the flood propagation, thus conducting extensive simulations and only later providing the user with the possibility
to manually select the most appealing scenario. This might lead to unnecessary
106
Section 7.2. Description of the numerical–constraint based approach
complications during the simulations, resulting in high computation cost and complexity of the model.
We distinguish two ways of modelling flood propagation by:
1. Ignoring economic, social and environmental values of the area, thus reflecting
a ‘naturally’ occurring flood propagation scenario; or
2. Considering economic, social and environmental values of the area prone to
flooding and proposing a preferred route for the flood water to follow.
Another important feature of the proposed method is that different constraints can
be taken into account for social, economic and environmental values of the areas
prone to flooding. The model is able to determine the most valuable polder(s) to be
protected, based on user supplied information. While the value of economic assets
can be determined with some degree of certainty, it is much more difficult to accurately estimate the value of non–economic assets such as environmental, cultural
and social considerations. Objects having national significance can be taken as an
important constraint for inundation of a particular area, and - together with the
population at risk - will contribute to the overall score of the polder’s value.
Let us denote the directed graph in Figure 7.2 as G = (V, E) where V is the vertex
set corresponding to the available polders and E is the edge set and any edge corresponding to the to link between adjacent polders. In case of directed graphs every
edge (u, v) ∈ E is represented through a set of ordered pairs of vertices. In our case,
the direction of each of the edges is not decided beforehand, but according to the
hydraulic conditions in each polder at the every time step, as explained later in the
chapter. We distinguish two types of vertices in our graph: a source s and a sink t.
If polder C is the initial flooded polder then this polder will be the source vertex in
the graph network and polder J, the most valuable polder in the area which we aim
to protect from flooding, will be the sink vertex. Other vertices in the graph that
are neither sources nor sinks are called intermediate vertices. Water flows through
the intermediate vertices and might be stored in them. We assume that every vertex
lies on some path from the source to the sink vertex. The rate at which water enters
a vertex must equal the rate at which it leaves the vertex and the amount remaining
in the vertex, so mass conservation is preserved.
A non–negative real–valued function p is defined on the edges set and represents the
capacity function of our network G. Its value on a particular edge is the capacity of
the edge e that represents the maximum rate of flow from one polder in the other.
The capacity function of the network is related to the initial flow conditions at polder
C.
The flow in the network should satisfy the following constraints
0 ≤ g (e) ≤ p (e) , ∀ e ∈ E
(7.1)
107
Chapter 7. A Numerical-Constraint based Model
s1
S’
s2
t1
s3
t2
s4
t3
t’
s5
Figure 7.2: A network with multi source and multi sink vertices.
and
g − (v) = g + (v) , ∀ v ∈ V.
(7.2)
The value g (e) expresses the rate at which the water flow travels along e. The
upper bound in condition (7.1) is called the capacity constraint; it imposes the
natural restriction that the flow along an edge cannot exceed the capacity of the
edge or cannot be higher than the available water in the polder from where water
is flowing out. Condition (7.2), called the conservation condition, requires that
for any intermediate vertex (polder), the volume of water flowing into v is equal
to the volume flowing out of v. The conservation condition implies that the flow
entering Polder C is equal to the sum of the volumes of water distributed over the
intermediary and sink vertex. Our aim is, given the network G with source s and
sink t, to find the best way of accommodating a flood in the paths consisting of
polder vertices that have a low economic value. As polder J is the polder to be
protected from being flooded, we assume that the graph has many sinks that are
the polders adjacent to the polder to be protected, and name polder J the supersink
t.
Inundation of areas is based on mass conservation (continuity equation):
dVp
= Qin − Qout ,
dt
(7.3)
where V is the polder volume, t is time and Qin and Qout are the flow rates in each
direction into and out of the cell (see Figure 7.3), corresponding to flow through the
breaching dike.
Main Properties of proposed Numerical Model
108
Section 7.2. Description of the numerical–constraint based approach
Qoutflow
dV
= Q up + Qdown + Qleft + Q right
dt
Figure 7.3: Mass conservation principle in an area compartmentalised in many polders. Each cell in the domain represents a polder.
There are different factors that might initiate the failure of a dike structure as described in Section 2.2. PC–Ring (Vrouwenvelder, 1999; Vrouwenvelder et al., 2001)
is a tool developed and used in the Netherlands to calculate the total failure probability of a flood defence system consisting of dikes. A dike ring system is as weak as
its weakest link (dike section). Thus, the failure probabilities are calculated for the
weakest links in a system of dikes and not for every dike section. The total failure
probability includes the failure probabilities for overtopping and overflowing, instability of inner or outer slope, uplifting/piping. The failure probabilities are usually
calculated for dikes along a river, sea or other water body; it is common that the
failure probability of dikes that are not exposed to water, i.e. tertiary dikes is not
known.
Currently, in our model, we consider the overflowing failure mode as the most likely
failure mode for dikes during a flood event. During overflowing, the water level
exceeds (even in the absence of waves) the crest level of the dike and the water
flowing over the dike and along the inner (landward) slope induces structural failure. The probability of water levels exceeding the dike crest level is expressed as
P (Z < 0), where Z is a reliability or state function that represents the difference
Strength − Load. For Z < 0, the load is higher than the strength of the dike and as
such it fails, and vice versa (for Z > 0 the dike does not fail). The state when Z = 0
is called the limit state. For overflowing of the dikes, Z is expressed as follows:
Z = hd +
q 2c
0.36g
1/3
− hw ,
(7.4)
Chapter 7. A Numerical-Constraint based Model
109
where hd is the dike height [m], qc is the critical discharge [m3 /s] or the maximum
discharge flowing over the dike for which failure of the dike is not initiated, and hw
is the occurring water level [m]. The second term in Eq. 7.4 expresses the critical
depth on a broad crested weir.
The flow exchange between two polders in case of a dike failure from overflowing is
estimated using the BREADA model (Zagonjolli et al., 2005; Zagonjolli and Mynett,
2006a,b) presented in Chapter 6 that is adapted for dike failure by increasing the
erodibility coefficient and taking into account the submergence of the breach flow.
Since the BREADA model is applicable for non–cohesive dams, that means that all
the dikes in the domain are assumed to be non–cohesive dikes.
The mutual dependence between the safety of different compartments (polders or
dike ring areas) comes from hydraulic and economic interactions as summarized in
the following:
ˆ Due to high discharge in the river, deliberate failure of one of the dike sections can be induced, which need not be the weakest dike section along the
river. This deliberate failure leads to flooding of a less valuable area while it
might lead to the attenuation of the flood wave in the more valuable areas
downstream, preventing other potential failures.
ˆ When two polders or dike ring areas share a common dike, its failure leads to
flooding of both adjacent areas.
ˆ Failure of one dike section might prevent failure of another dike section due to
a decrease of the water level in the polder.
ˆ From an economic point of view: inundation of one area can impose damage to
another non–inundated area due to economic links (e.g. infrastructure, etc.).
The hydraulic interaction between compartments (dike ring or polder areas) influences the protection level of the area that might depend on another one. Furthermore, risk reduction in one particular area might be followed by an increased risk
of flooding in the other one. Thus, a detailed assessment has to be made, including
the interaction between different compartments. Within the framework of the proposed approach the interactions between compartments of a dike ring are taken into
account. To minimize flooding impact on the complex hydraulic system of dike ring
areas, different objectives could be taken into consideration during the simulation
process:
1. Natural flooding: flooding of the compartments naturally occurring under specific hydraulic conditions
2. Longest Path: intentional flooding of compartments for accommodating the
water, that is finding the longest path for the flood water propagation before
it reaches the protected polder.
110
Section 7.2. Description of the numerical–constraint based approach
3. Maximum Storing Volume Capacity: selection of polders to be flooded based
on their maximum volume capacity.
4. Minimal Total Damage: selection of polders to accommodate the flood water
based on their socio–economic, cultural and environmental value. Less valuable
polders to be flooded first.
5. Combination of the above objectives (2-4).
Below we describe in more detail how these objectives can be satisfied within the
proposed methodology.
Natural flooding
We define the flooding of the area that occurs without deliberate intervention as occurring naturally. In a system of polders it is usually preferable to take into account
the probability of several dike failure modes as well as the associated uncertainties.
Knowing the failure probability of all dike sections is beneficial when identifying the
potential breach location. Moreover, when deliberate breaching of a dike is considered, it provides the possibility to choose the dike section with highest failure
probability. Our modelling tool is built to take into consideration this information,
if provided by the user. However, in our example application we consider only dike
elevation and water depth in the polder as the primary source for breach initiation.
Once the water level in the polder raises higher than the top elevation of any of the
surrounding dikes, overflow breaching of that dike is assumed to be initiated leading
to the flooding of the polder. Another important element for dike breach initiation
is the duration of the overflowing water, which should be large enough to initiate
erosion. We do not specify the overflow duration time in our model, but ensure that
the duration is long enough as the filling up of the first polder coincides with the
rising limb of the inflow hydrograph, which implies that further increase of water
level in the polder is expected.
Longest path flooding
Probably one straightforward way to prevent flood water reaching the most valuable
polder, is the requirement to accommodate as much water as possible along the flood
path. That is, to select the longest path from the source polder to the protected one.
Our numerical–constraint based model employs for that purpose a graph algorithm
that generates all possible paths between them and selects the longest possible one.
The algorithm returns a list of vertices (polders), including the start and the end
vertices (polder C and J) comprising the path. The same vertex does not occur
more than once in the returned path (no cycles are allowed). In some cases the
algorithm can return more than one unique longest path, if several are available. In
these situations, our model randomly selects a single path or provides the user the
possibility to select a preferred one.
Chapter 7. A Numerical-Constraint based Model
111
Then the numerical model for natural flooding uses the suggested path to simulate
controlled flood propagation. This means that previously not breached dikes will be
breached for the purpose of accommodating the excess water and controlling flood
propagation to protect the most valuable polder. In case the flood could be retained
within the polders located on its path before reaching most valuable polder, then J
will be dry, otherwise it will be the last polder to be flooded, thus having more time
for evacuation.
Maximum storing volume capacity flooding
Another possibility to defend the most valuable polder as well as to cause minimal
damage to the rest, is to accommodate the flood water in the polders with maximum
storage capacity. Each of the polders in the domain has a maximum storage capacity
which is assumed to be equal to the polder area multiplied by the minimum height
of its surrounding dikes. The algorithm tries to find the best solution for accommodating the flood water in the polders that have higher storage capacities. For
this purpose we again utilize a graph algorithm that finds the path, such that its
storage volume capacity is maximal. Then the numerical–constraint based model
uses this path to accommodate flood water and to protect the most valuable polder
from flooding, in the same way as discussed previously.
It can be observed that in some cases both the longest path and the maximum storage volume objectives could lead to the same solution. Obviously, in case of a unique
longest path, it possesses the largest storage capacity than any other one. However,
the situation is completely different in case a restriction on the number of polders
that should be used to accommodate flooding is imposed.
Minimal total damage flooding
Finally, the most economically feasible flood propagation scenario could be imposed
by enforcing a minimal total damage constraint. The key idea behind this approach
is to identify and deliberately flood areas that have the least economic value. Thus,
controlled flooding is aimed to produce the least total damage although deliberately
flooded areas might have low flooding probability. The graph algorithm finds a path
along the least valuable areas in the domain based on the user defined input data
in terms of socio–economic, cultural and environmental value. Below we present an
application of our method using synthetic data to demonstrate its main features and
usability.
7.3
Application
The domain area of the case study considered in this section is schematized in Figure
7.4 together with the information about dike height and top elevation as well as the
polder’s maximum storage capacities and economic values. The value is expressed in
112
Section 7.3. Application
L 2.3; 8.8
5
2; 8.
J
H
H
(0.07; 0.1)
2.8; 9.3
F(0.13; 0.6)
(0.11; 0.7)G
D
2; 8.5
3.1;
.9
;8
2.4
;
2.4
8.9
5.5; 12
(0.15; 1)J
2.2; 8.7
2; 8.5
B
(0.25; 0.8)I
F
2.2; 8.7
2.9; 9.4
K
(0.16; 0.7)
2; 8.5
2.6; 9.1
2; 8.5
E
(0.18; 0.7)L
2; 8.5
I
2.4; 8.9
2.3; 8.8
G
K
2; 8.5
C
D(0.16; 0.4)
9.6 3; 9.5
(0.1; 0.5)E
C
(0.08; 0.1)
A
;
3.5
10
(0.384; 0.3)B
A(0.184; 0.3)
Figure 7.4: Transformation of the case study area into the graph. Dike height and
the dike top elevation [m] as well as polder area [km2 ] and its relevant value are
presented.
relative terms varying in a scale from 0 to 1. However, the overall score is calculated
based on a particular economic value of each polder and its social and environmental
aspects are considered as contributing elements, although not expressed in monetary terms. These values are not depending on the water level or velocities in the
polder, but are used as indicators for the polders that are more valuable and require
most protection. Including a depth–damage function as one of the constraints in our
model is foreseen as future work and can be incorporated into existing framework.
TAW (2002) provides guidelines for the critical discharge on overtopped sea dikes of
clay or sand material with either good or bad grass cover. However, to our knowledge, no information exists concerning the critical discharges of overflowed inner
dikes. In the case study, qc = 0.16m3 /s is assumed , which leads to a water depth of
0.2m above the dike crest to initiate dike failure. Due to the fact that the application
is used for demonstration purposes of the developed method, we may argue that our
assumption can be considered reasonable for the purpose of dike breach initiation.
The initial dike to breach is the river dike of Polder C. The breach outflow for that
dike is assumed rather than estimated using a breach model. The hydrograph has
maximum peak outflow of 400 m3 /s. As can be observed in Figure 7.4 the border
dikes have higher heights to satisfy the property of rigid boundaries that never suffer
failure. The same condition is applied for the other river dikes as well.
113
Chapter 7. A Numerical-Constraint based Model
Water depth [m]
2.5
2.0
1.5
1.0
0.5
Time [s]
0.0
0
2000
C
D
4000
E
F
6000
G
J
8000
L
K
10000
I
H
Figure 7.5: The natural flooding of the polders - water depth in polders as a function
of time.
In Figure 7.5 the rate of change of water depth in every polder for a natural propagation of the flood in the domain is shown. It can be observed that Polder J is
flooded. The breaching of the dikes is initiated when the water depth is higher than
hd + 02m. For simplicity, our domain is considered flat with bottom elevation of the
dikes to be the same.
Using the Longest Path objective, for the area presented in Figure 7.4, the longest
path suggested by the algorithm is [C, A, B, D, E, G, F, I, H, K, L, J] (see Figure
7.6 and Figure 7.7). Note, that the first and the last polders are considered as most
crucial for the model, however the intermediate polders might not necessarily be
flooded based on their ranking order in the path. We observe that in this case the
polder we aim to protect is dry at the end of the simulations. The flood water is
directed towards the other polders and the result is the expected flood propagation
scenario at the end of the simulation.
The path obtained when selecting the polders with the largest maximum volume
capacity is [C, A, B, D, E, G, F, I, H, K, L, J] which corresponds to the one obtained for the longest path. This could be expected since the longest path and the
maximum volume objective appeared to be the same objectives in terms of storage
capacity.
A very different flood path propagation (compared to the longest and maximum
storage paths) is obtained for the minimum total damage scenario, thus selecting
114
Section 7.3. Application
Water depth [m]
2.0
1.5
1.0
0.5
Time [s]
0.0
0
C
2000
D
E
4000
F
G
6000
I
L
8000
H
10000
K
Figure 7.6: The longest path and the maximum polder volume flooding scenarios.
Longest Path
Natural Flooding
L
K
L
K
I
I
J
J
H
H
F
F
G
G
D
D
C
E
B
A
C-D-E, D-F, E-G, F-G-J-L-K-(IH)
C
E
B
A
C-D-E, D-F, F-G, E-G, F-I-(HK), K-H, K-L
Figure 7.7: The natural and longest path flooding of the polders in graph representation.
115
Chapter 7. A Numerical-Constraint based Model
Water depth [m]
2.5
2.0
1.5
1.0
0.5
Time [s]
0.0
0
2000
C
4000
D
E
6000
G
8000
F
10000
B
A
Figure 7.8: The minimum damage flooding scenario.
L (0.18)
Largest Storing Volume
K (0.16)
L (0.7)
I (0.25)
Smallest Value
K (0.7)
I (0.25)
J (0.15)
J (1)
H (0.07)
H (0.1)
F (0.13)
F (0.6)
G (0.11)
G (0.7)
D (0.16)
D (0.4)
E (0.1)
B (0.384)
C (0.081)
A (0.184)
C-D-E, D-F, F-G, E-G, F-I-(HK), K-H, K-L
E (0.5)
C (0.1)
A (0.3)
B (0.3)
C-D-E-G-F, E-B-A
Figure 7.9: The flooding of the polders based on the largest storage volume and the
minimum value objective.
116
Section 7.4. Conclusions
the less valuable polders in our domain to be flooded. The polders are found to be
[C, A, B, E, D, F, G, J] and the flooding pattern is shown in Figure 7.8 and Figure
7.9. The Polder J is dry at the end of this simulation.
7.4
Conclusions
The main idea behind the proposed approach of using graph theory to develop constraints for numerical simulations is to manage the flooding process within a system
of polders or dike ring areas divided into a number of compartments. For this purpose we use a numerical–constraint based model that takes into account not only
physical processes involved in dike breaching and flow propagation but also social,
economic and environmental values of the areas prone to inundation. We simulate
different scenarios of flooding based on the hydraulic processes and the constraints
introduced to minimize the flood damage in each protected area.
By temporarily storing the water in compartments, the total risk might be minimized. The flooding probability is increased for some compartments, while the total
flood risk is decreased. The filling process of the compartments depends on the failure process of the dike and on the condition whether a deliberate breaching of the
dike is involved or ‘natural’ failure of hydraulic structure occurs. In both cases the
same breaching model is used, but in the former case dikes are deliberately lowered.
There is a possibility to include faster breach development of the dikes that might
not have a slow breaching process depending on the methods used to remove (open)
a dike section. Furthermore, the model can be enhanced by including the presence
of additional hydraulics structures.
The key difference of our method in comparison to existing ones, is that instead
of assigning a particular probability to a scenario, we propose an alternative approach of evaluating and mitigating consequences based on a numerical–constraint
based approach. In particular, we evaluate different ways for flood mitigation during a flood event. In the simulation we take into account compartments created by
the available dikes, roads and natural high grounds in the areas prone to flooding.
Through constraints, we optimize the strategy for choosing the most feasible flood
propagation scenario that minimizes socio–economic consequences. This is done by
utilizing algorithms based on graph theory that efficiently transform dike ring areas
into a graph and find different optimal paths applicable for each objective function.
The main strategy consists of navigating floodwater ‘away’ from the most populated
or economically valuable regions.
Based on the considerations presented above, we may suggest that flood risk management could draw significant benefit from a constraint based methodology by using
a set of measures that ‘keeps the system dry’. Including targets and goals inside
Chapter 7. A Numerical-Constraint based Model
117
the support system, allows better prediction of different scenarios since in this case
the model will provide optimal solutions. However, the case might be that some
extreme floods in the low-lying areas, caused by prolonged heavy rainfall might not
be prevented as a result of measures taken or the method used.
Chapter 8
Conclusions and
Recommendations
. . . the river . . .
Keeping his seasons and rages, destroyer, reminder
Of what men choose to forget. Unhonoured, unpropitiated
By worshippers of the machine, but waiting, watching and
waiting.
T.S. Eliot
8.1
Conclusions
In this thesis, various approaches are proposed and applied for simulating dam and
dike failure events, flood water routing in downstream areas, and flood risk reduction,
providing a unified framework for addressing flood related events. Numerical, data
mining, graph theory and constraint based methods are applied to the problem of
breach modelling and flood water mitigation. The findings related to each of the
proposed approaches are listed below.
8.1.1
Traditional and novel approaches for predicting dam
breach characteristics
For every dam or dike there is a limit to which the structure is built to withstand
the forces applied. Unexpected or unforeseen events might trigger failure, when the
strength of the structure is weaker than the acting load. In this thesis a range of
modelling techniques is explored to deal effectively with the failure event of hydraulic
structures such as earthfill dams and dikes.
We focus on dams and dikes composed of earth material since they constitute the
120
Section 8.1. Conclusions
largest percentage of total number of dams and dikes built around the world and the
largest number of failures occurs in these structures as well. For structures with cohesive material, two processes are most likely to develop: erosion and headcutting.
The latter was found to be predominant during field and laboratory experiments
(Morris, 2005). The cohesive bond between the particles of the cohesive soil presents
higher resistance to the flow, while for the non–cohesive soil the physical properties
of the particles (size, shape, density, porosity, and fall velocity) contribute to the
resistance to the flow. Because the particles are not bound together, the erosion
process is believed to be the predominant breaching mechanism. However, any instability in part of the structure might also result in mass failure. In this thesis, a
dam breach model is developed for simulating overtopping failure of non–cohesive
dams.
BREADA model
The BREADA model developed in this thesis assumes two different breach shape
evolutions in time and space with two important time intervals. In the first formulation, the initial trapezoidal breach shape develops in vertical and lateral direction,
until the ground is reached and then progresses in lateral direction only. In the
second formulation, a triangular breach shape is initially assumed and continues to
expand in vertical direction until the bottom level of the structure is reached. During
the second phase, the trapezoidal breach progresses in lateral direction until either
the water flow force can not cause any further erosion or the breach has reached its
maximum allowed dimensions that are limited by the dam geometry. Flow through
the breach channel is calculated as a weir flow and the erosion of the dam material is
estimated with a bed load transport empirical equation. The model developed is validated against the historical failure event of Schaeffer Dam in USA. Good agreement
is observed in terms of peak outflow prediction for a range of model parameters.
Data mining models
We apply data mining techniques for deriving dam breach characteristics and peak
outflow from available data. These methods generally rely on large amount of data,
but in the applications presented in this thesis, the information about historical
dam failure events is sparse. Still, performance of data mining techniques is found
to be slightly better than the current empirical equations, suggesting that enriching
the databases with more data about real dam failure events is one possible way
to improve the models that can further be used to evaluate the capabilities of the
physically based methods by providing the range of peak outflow and breach characteristics or to provide some of the input information needed for the simulation of
the semi–physically based models.
Uncertainty in dam breach modelling
The uncertainty associated with each of the processes involved in forecasting flood
risk occurring due to breaching of structures is identified and quantified in relative
Chapter 8. Conclusions and Recommendations
121
terms. We distinguish between model uncertainty and input uncertainty.
Four different methods to calculate dam breach peak outflow are evaluated against
the documented failure event of the Schaeffer Dam. We compare the breach outflow
hydrograph and the peak outflow obtained from our model with the BREACH model
as well as with the range of peak outflows obtained from empirical equations and
data mining techniques. The results show a wide range of predicted peak outflows.
When using empirical equations, the peak outflow discharge varies in a range of
±50%. Though the best performing empirical equation for the Schaefer dam can be
identified, this does not imply its direct applicability to other failure events. When
the dam breach models BREACH and BREADA are used the predicted peak outflow
varies in a narrower range depending on the assumptions and selected parameters.
Good results are obtained from the IBk data mining model that predicts only a 10%
lower peak outflow than the recorded one.
Many dam material characteristics are needed for modelling, but their (precise) values are not always available. The largest uncertainty is observed in the hydrograph
shape, particularly in the timing of the breach development. While the BREACH
model exhibits a very sharp rising limb meaning fast development of the breaching, a
smooth rising limb is observed for the BREADA model, the former leading to worst
downstream flood conditions while the slower wave produed by the latter will leave
more warning time to the population downstream.
8.1.2
Identification of dam failure flood extent, uncertainty,
and risk reduction
We simulate the hypothetical failure of the Bovilla Dam, an earthfill dam of 81m
high and observe the impact of two outflow hydrographs obtained from the BREADA
and BREACH models, in the downstream area. In terms of flood duration, the fast
rising breach outflow hydrograph leads not only to faster flood propagation, but
also to higher water depths in the flat areas further downstream the dam. The slow
developing flood wave leaves room for longer warning period for the population and
the lower water depth values in the flat areas, but higher water depths are observed
in the first kilometers from the dam. The models, one leading to a less catastrophic
scenario than the other, are examples of the uncertainty that current breach modelling techniques possess with respect to the most important element - timing. Peak
outflows of the models do not differ much, and there is a good agreement with the
empirical equation predictions.
Other sources of uncertainty also affect the modelling of dam break flood propagation, especially when failure of large dam is involved. The roughness of the areas
subject to flooding is not known beforehand. The resulting flood propagation scenarios depend on the roughness coefficient used (either constant or land use based
122
Section 8.1. Conclusions
one). Moreover, we ignore the reservoir sediment or the dam material, which are
flushed away together with the water stored in the reservoir, but instead consider
propagation of clear water in the valley. The presence of the material attached to the
water, which will affect the flow pattern significantly is taken into account through
higher values of roughness coefficients.
Once the potential risk is identified, the task is to find the ways of reducing this risk
and take measures for warning the population downstream in case of a structural
failure event. Our modelling results can be used as flood hazard maps and can assist
communities in planning future developments in areas that are prone to flooding.
8.1.3
A numerical–constraint based approach for flood mitigation
The flood risk associated with the failure of a high dam with a large volume of water
stored in the reservoir and the flood risk associated with the failure of a river dike
during a high discharge event is highly dependent on the vicinity of the structure
to the populated areas and the measures taken for dealing with potential flooding. Here, we introduce a numerical–constraint based model for flood mitigation
in low–lying areas that are subject to flooding during a flood event. Instead of assigning a particular probability to a scenario, we propose an alternative approach
of evaluating and mitigating consequences based on a numerical–constraint based
model. During the simulation we take into account compartments created by the
presence of dikes, roads and natural high grounds in the areas prone to flooding.
Through constraints, we optimize the strategy for choosing the most feasible flood
propagation scenario that minimizes socio–economic consequences. This is done by
utilizing graph based algorithms that efficiently transform compartmentalized areas
into a graph and find different optimal paths applicable for each objective function.
The strategy consists of navigating floodwater ‘away’ from most populated or economically valuable regions.
We believe that flood risk management could benefit from a constraint based approach by using a set of measures that keep the system dry. Including objectives
in a hydrodynamic modelling package, allows better prediction of different scenarios
since in this case the model will provide optimal solutions. However, it might still be
the case that some extreme floods or floods caused due to prolonged heavy rainfall
over the domain area might not be prevented as a result of measures taken or the
method used.
Chapter 8. Conclusions and Recommendations
8.2
123
Recommendations
The following recommendations for further research are suggested.
ˆ During the past three decades different dam breach modelling methods have
been proposed for predicting the outflow hydrograph and peak outflow value.
However, none of the methods can guarantee to obtain accurate breach characteristics. The complexity of breach development usually motivates researchers
to make many approximations to obtain simpler mathematical description of
the processes involved, thus increasing the uncertainty related to the structural
failure development. This is the case when modelling erosion and headcut erosion processes. Many laboratory and field experiments have been performed
to provide in depth understanding of these processes. However, the complete
physical description is far from perfect. A possible direction for future investigation could be the analysis of erosion processes in a river stretch during a
high flow and evaluating its application to a dam breaching event.
ˆ For high dams the monitoring and recording of failure events has not been
satisfactory so far, making the calibration of breaching models difficult and
leading to uncertainty in the prediction results. The drawback of the experimental tests is that the weakest spot on the dam structure is predefined,
influencing further development of the breaching. The optimal solution is real
time dam monitoring and aerial pictures of breach development, but these
proposed measures might be difficult to implement, since breaching caused by
overtopping usually occurs during bad weather conditions, therefore limiting
the monitoring possibilities. However, due to technological advances both in
hardware and software sensor technology, one might expect (real time) monitoring of dikes and dams during breach development to become possible and
feasible.
ˆ Scale models are currently the main source of validation data for dam/dike
breach modelling. Although hydraulic conditions, such as water velocity, etc.
are effectively replicated in laboratories, the exact scaling factors for the soil
properties and sediment transport are usually not available. Therefore, an
interesting direction for future research is to investigate scaling of soil related
properties. Furthermore, simulation and visualization of breaching processes
in 3D might lead to better descriptions of the phenomena.
ˆ Improving the accuracy of existing physically based models by using the information extracted from a database of recorded dam failure events is another
direction of this research. Currently, the available database consists of about
100 dam failure events and suffers from inconsistencies between the different
sources. Increased efforts in documenting and sharing the information related
124
Section 8.2. Recommendations
to historical dam dike failure events is necessary. This will lead not only to better validation of the physically based models, but also to more accurate data
mining models for discovering patterns and relationships among dam failure
events.
ˆ During structural breaching, the dam material is flushed away together with
the water, changing the morphology in the areas downstream. The modelling
of flood propagation is usually accomplished by assuming clear water and
rigid terrain throughout the flood water propagation domain. However, including the interaction of debris flow and non–rigid terrain boundaries may
significantly affect the flooding pattern. This problem has recently received
significant attention and further research in this area is necessary.
ˆ The numerical–constraint based approach proposed in this thesis can be extended by introducing different objective functions that are applicable for specific scenarios. Furthermore, its capabilities can easily be boosted by using
an advanced numerical engine of any well known hydrodynamic package. On
the other hand, it is also possible to include the constraint–based part of the
method into existing hydrodynamic packages, which are often part of the decision making process for proposing measures needed to protect important areas
in terms of their socio–economic and cultural value.
125
Bibliography
Abbott, M. B.: 1979, Computational hydraulics: Elements of the theory of free
surface flows, Pitman Publishing Ltd., London.
Albinfrastrukture: 1996, Diga e Bovilles (in albanian and italian), Technical report,
Ministry of Construction, Albania.
Alcamo, J. and Bartnicki, J.: 1987, A framework for error analysis of a long-range
transport model with emphasis on parameter uncertainty, Atmospheric Environment 21(10), 2121–2131.
Alonso, C. V., Bennett, S. J. and Stein, O. R.: 2002, Predicting head cut erosion and
migration in concentrated flows typical of upland areas, Water Resources Research
38(12), 39.1–39.15.
Archer, D.: 2006, Global warming: Understanding the forecast, Blackwell Publishing
Ltd.
Asselman, N. E. M. and Middelkoop, H.: 1995, Floodplain sedimentation: Quantities, patterns and processes, Earth Surface Processes and Landforms 20(6), 481–
499.
Babovic, V., Keijzer, M., Aguilera, D. R. and Harrington, J.: 2001, An evolutionary
approach to knowledge induction: Genetic programming in hydraulic engineering, ASCE, Proc. of the World Water and Environmental Resources Congress,
Orlando, Florida, USA, pp. 64–64.
Birkes, D. and Dodge, Y.: 1993, Alternative methods of regression, John Wiley, New
York.
Bogárdi, J.: 1974, Sediment transport in alluvial streams, Akadémiai Kiadó, Budapest, Hungary.
Bowles, D. S.: 2001, Evaluation and use of risk estimates in dam safety decision
making, Proc. of the United Engineering Foundation Conference on Risk-Based
Decision-Making, Santa Barbara, California, USA, pp. 17–32.
126
Bibliography
Brinkhuis–Jak, M., Holterman, S. R., Kok, M. and Jonkman, S. N.: 2003, Cost
benefit analysis and flood damage mitigation in the Netherlands, Paper for the
ESREL Conference, Maastricht, the Netherlands, pp. 16–18.
Broich, K.: 1998, Mathematical modelling of dam break erosion caused by overtopping, Proc. of the 2nd CADAM Meeting, Universität der Bunderswehr, München,
Germany. Available at www.hrwallingford.co.uk/projects/CADAM/.
Broich, K.: 2003, Sediment transport in breach formation process, Proc. of the
3rd IMPACT Workshop, Université Catholique de Louvain, Louvain–la–Neuve,
Belgium. Available at www.impact-project.net.
Brown, C.: 1950, Sediment transportation, Engineering Hydraulics pp. 769–857.
Brown, R. J. and Rogers, D. C.: 1977, A simulation of the hydraulic events during
and following the Teton Dam failure, Proc. of Dam–Break Flood Routing Model
Workshop, U.S. Water Resource Council, Bethesda, Maryland, pp. 131–163.
Brown, R. J. and Rogers, D. C.: 1981, Users manual for program BRDAM, U.S.
Bureau of Reclamation, Denver, Colorado.
Chanson, H.: 2005, Applications of de Saint–Venant equations and method of characteristics to the dam break wave problem, University of Queensland, Australia.
Chaudhry, M. H.: 1993, Open-channel flow, Prentice Hall, New Jersey.
Chow, V. T.: 1959, Open channel hydraulic, McGraw-Hill, New York.
Coleman, S., Andrews, D. and Webby, M.: 2002, Overtopping breaching of noncohesive homogeneous embankments, Journal of Hydraulic Engineering 128(9), 829–
838.
Commissie Rivierdijken: 1977, Rapport Commissie Rivierdijken (in Dutch). The
Hague, the Netherlands.
Corman, T. H., Leiserson, C. E. and Rivest, R. L.: 2001, Introduction to algorithms,
MIT Press, Cambridge, USA.
Costa, J. E.: 1985, Floods from dam failures, Open-file report, U.S. Department of
the Interior Geological Survey, Denver, USA.
Costa, J. E. and Schuster, R. L.: 1988, The formation and failure of natural dams,
Geological Society of American Bulletin 100(7), 1054–1068.
Cristofano, E. A.: 1965, Method of computing erosion rate for failure of earthfill
dams, U.S. Department of the Interior, Bureau of Reclamation, Denver, Colorado.
Cunge, J. A., Holly, F. M. and Verwey, A.: 1980, Practical aspects of computational
river hydraulics, Pitman Publishing Ltd., London.
Bibliography
127
CUR/TAW: 1990, Probabilistic design of flood defences, Report 141, Technical Advisory Committee on Water Defences, Center for Civil Engineering Research and
Codes, Gouda, the Netherlands.
de Saint-Venant, A. J. C.: 1871, Théorie du mouvement non-permanent des eaux,
avec application aux crues des rivières et á lintroduction des marées dans leur lit,
Comptes Rendus des Séances de l’Académie des Sciences 73, 147–154.
de Vriend, H.: 2005, State of the art in flood management research, Proc. of the 3rd
International Symposium on Flood Defence, Nijmegen, the Netherlands.
Deltacommissie: 1960, Rapport Deltacommissie (in Dutch), Staatsuitgeverij.
Dhondia, J. F. and Stelling, G. S.: 2002, Application of one dimensional–two dimensional integrated hydraulic model for flood simulation and damage assessment,
Proceedings of the 5th International Conference in Hydroinformatics pp. 265–276.
Dodge, M. M.: 1997, Hans Brinker or the silver skates, The World Wide SchoolTM,
Seattle, Washington, USA.
Dodge, R. A.: 1988, Overtopping flow on low embankment dams–Summary report
of model tests, REC–ERC–88–3, U.S. Bureau of Reclamation, Denver, USA.
Dressler, R. F.: 1952, Hydraulic resistance effect upon dam-break functions, Journal
of Research, National Bureau of Standards, USA 49(3), 217–225.
Dressler, R. F.: 1954, Comparison of theories and experiments for the hydraulic dambreak wave, Vol. 3, Proc. of the International Association of Scientific Hydrology,
Rome, Italy, pp. 319–328.
Dressler, R. F.: 1958, Unsteady Non-Linear Waves in Sloping Channels, Proceedings
of the Royal Society of London. Series A, Mathematical and Physical Sciences
247(1249), 186–198.
Du Boys, M. P.: 1879, Études du régime du Rhône et de laction exercée par les
eaux sur un lit à fond de graviers indéfiniment affouillable, Annales des Ponts et
Chaussées 5(18), 141–195.
Edgeworth, F. Y.: 1887, On observations relating to several quantities, Hermathena
6(13), 279–285.
Einstein, H. A.: 1942, Formulas for the transportation of bed load, ASCE Transactions 107, 561–573.
Exner, F. M.: 1925, Ber die wechselwirkung zwischen wasser und geschiebe inflssen,
Sitzungber. Acad. Wissenscaften Wien Math. Naturwiss, Abt. 2A, 134 pp. 165–
180.
128
Bibliography
Flannery, T.: 2006, The Weather Makers: how man is changing the climate and
what it means for life on earth, Atlantic Monthly Press.
FLOODsite: 2005, Language of Risk-Project Definitions, Consortium Report T3204-01. Available at www.floodsite.net.
Follansbee, R. and Jones, E. E.: 1922, The Arkansas River flood of June 3-5, 1921,
Water-Supply Paper 487 .
Franca, M. J. and Almeida, A. B.: 2004, A computational model of rockfill
dam breaching caused by overtopping (RoDaB), Journal of Hydraulic Research
42(2), 197–206.
Fread, D. L.: 1988, BREACH: an erosion model for earthen dam failures, Hydrologic
Research Laboratory, National Weather Service, NOAA.
Froehlich, D. C.: 1987, Embankment-dam breach parameters, Proc. of the ASCE
National Conference on Hydraulic Engineering, Williamsburg, Virginia, USA,
pp. 570–575.
Funtowicz, S. O. and Ravetz, J. R.: 1990, Uncertainty and quality in science for
policy, Springer.
Galy-Lacaux, C., Delmas, R., Kouadio, G., Richard, S. and Gosse, P.: 1999, Longterm greenhouse gas emissions from hydroelectric reservoirs in tropical forest regions, Global Biogeochemical Cycles 13(2), 503–517.
Gauss, C. F.: 1809, Theoria motus corporum coelestium in sectionibus conicus solem
ambientium, Vol. Translation reprinted as Theory of motions of the heavenly bodies
moving about the sun in conic sections. Dover, New York, 1963, Perthes et Besser.
Gerritsen, H.: 2005, What happened in 1953? The Big Flood in the Netherlands in
retrospect, Philosophical Transactions: Mathematical, Physical and Engineering
Sciences 363(1831), 1271–1291.
Hagen, V. K.: 1982, Re-evaluation of design floods and dam safety, Vol. 1, Proc.
of 14th Congress of International Commission on Large Dams, Rio de Janeiro,
Brasil, pp. 475–491.
Hanson, G. J., Robinson, K. M. and Cook, K. R.: 2001, Prediction of headcut
migration using a deterministic approach., Transactions of the ASAE 44(3), 525–
531.
Hanson, G. J., Temple, D. M. and Cook, K. R.: 1999, Dam overtopping resistance
and breach processes research, Proc. of the Annual Conference Association of
State Dam Safety Officials, St. Louis, Missouri, USA.
Harris, G. W. and Wagner, D. A.: 1967, Outflow from breached earth dams, University of Utah, Salt Lake City, Utah, USA.
Bibliography
129
Hartford, D. N. D. and Baecher, G. B.: 2004, Risk and uncertainty in dam safety,
Thomas Telford.
Hervouet, J. M.: 2000, A high resolution 2-D dam-break model using parallelization,
Hydrological Processes 14(13), 2211–2230.
Hervouet, J. M.: 2007, Hydrodynamics of free surface flows: Modelling with the finite
element method, John Wiley & Sons.
Hoffman, F. O. and Hammonds, J. S.: 1994, Propagation of uncertainty in risk
assessments: The need to distinguish between uncertainty due to lack of knowledge
and uncertainty due to variability, Risk Analysis 14(5), 707–712.
Hooijer, A., Klijn, F., Pedroli, G. B. M. and van Os, A. G.: 2004, Towards sustainable flood risk management in the Rhine and Meuse river basins: synopsis of the
findings of IRMA-SPONGE, River Research and Applications 20(3), 343–357.
Huang, Y.: 2005, Appropriate modeling for integrated flood risk assessment, PhD
thesis, University of Twente, the Netherlands.
IMPACT: 2004, Investigation of Extreme Flood Processes and Uncertainties, EC
Contract EVG1-CT-2001-00037, www.impact-project.net.
International Commission on Large Dams: 2005, Risk assessment in dam safety
management: a reconnaissance of benefits, methods and current applications,
CIGB/ICOLD. Bulletin 130.
IPCC: 2001, Climate Change 2001: The scientific basis, Third Assessment Report
of the IPCC, Cambridge University Press.
Janssen, P. H. M., Heuberger, P. S. C. and Sanders, R.: 1994, UNCSAM: A tool for
automating sensitivity and uncertainty analysis, Environmental Software 9(1), 1–
11.
Johnson, F. A. and Illes, P.: 1976, A classification of dam failures, International
Water Power and Dam Construction 28(12), 43–45.
Klijn, F., van Buuren, M. and van Rooij, S. A. M.: 2004, Flood-risk management
strategies for an uncertain future: Living with Rhine River floods in the Netherlands, AMBIO: A Journal of the Human Environment 33(3), 141–147.
Knight, D., Cao, S., Liao, H., Samuels, P., Wright, N., Liu, X. and Tominaga, A.:
2006, Floods are we prepared?, Journal of Disaster Research 1(2), 325–333.
Krzysztofowicz, R.: 2001, The case for probabilistic forecasting in hydrology, Journal
of Hydrology 249(1), 2–9.
Kwadijk, J. and Rotmans, J.: 1995, The impact of climate change on the river
Rhine: A scenario study, Climatic Change 30(4), 397–425.
130
Bibliography
Lafitte, R.: 2001, Hydropower, The 20th edition of the Survey of Energy Resources,
World Energy Council.
Leal, J., Ferreira, R. M. L. and Cardoso, A. H.: 2002, Dam-break waves on movable
bed, Vol. 2, River Flow 2002, Proc. of the International Conference on Fluvial Hydraulics, Louvain-la-Neuve, Belgium, Swets & Zeitlinger, Lisse, the Netherlands,
pp. 981–990.
Lou, W. C.: 1981, Mathematical modeling of earth dam breaches, PhD thesis, Colorado State University, USA.
Loukola, E. and Huokuna, M.: 1998, A numerical erosion model for embankment
dams failure and its use for risk assessment, Proc. of the 2nd CADAM Meeting,
Universität der Bunderswehr, München, Germany.
Macchione, F. and Rino, A.: 1989, Dimensionless analytical solutions for dam-breach
erosion, Journal of Hydraulic Research 27(3), 447–452.
MacDonald, T. C. and Langridge-Monopolis, J.: 1984, Breaching charateristics of
dam failures, Journal of Hydraulic Engineering 110(5), 567–586.
McCarthy, J., Minsky, M. L., Rochester, N. and Shannon, C. E.: 1956, A proposal
for the Dartmouth summer research project on Artificial Intelligence, Retrieved
from www-formal.stanford.edu/jmc/history/dartmouth.
McCulloch, W. S. and Pitts, W.: 1943, A logical calculus of the ideas imminent in
nervous activity, Bulletin of Mathematical Biophysics 5, 115–133.
McCully, P.: 1996, Silenced rivers: The ecology and politics of large dams, Zed
Books, London & New Jersey.
Merabtene, T., Yoshitani, J. and Kuribayashi, D.: 2004, Managing flood and waterrelated risks: A challenge for the future, Proc. of the AOGS Joint 1st Annual
Meeting & 2nd APHW Conference, Singapore.
Meyer-Peter, E. and Müller, R.: 1948, Formulas for bed-load transport, Proc. of the
2nd Meeting of the International Association for Hydraulic Structures Research,
pp. 39–64.
Millennium Ecosystem Assessment: 2005, Ecosystems and human well-being: Synthesis, Island Press.
Minns, A. W. and Hall, M. J.: 1996, Artificial neural networks as rainfall–
runoff models, Hydrological Sciences Journal/Journal des Sciences Hydrologiques
41(3), 399–417.
Mitchell, T. M.: 1997, Machine learning, McGraw-Hill Higher Education.
Bibliography
131
Montuori, C.: 1965, Introduction d’un débit constant dans un canal vide, Proc. of
the 11th IAHR Congress, Leningrad, Russia, pp. 1–7.
Morris, M. W.: 2005, IMPACT: Final technical report, Proc. of the 1st IMPACT
Workshop, HR Wallingford, UK.
Mynett, A. E.: 2002, Hydroinformatics in aquatic resources management, Proc.
of the NATO Advanced Research Workshop on “New Paradigms in River and
Estuary Management”, Moscow, Idaho, USA.
Mynett, A. E.: 2004a, Artificial Intelligence techniques in environmental hydroinformatics, Proc. of the IAHR-Asian and Pacific Division Conference, Hong Kong.
Mynett, A. E.: 2004b, Hydroinformatics tools for ecohydraulics modelling, Proc. of
the 6th International Conference on Hydroinformatics, Singapore.
Mynett, A. E.: 2005, Hydroinformatics applications in hydroscience and engineering,
Chapter 2, Encyclopedia of Hydrological Sciences, Willey Publishers.
Mynett, A. E. and de Vriend, H. J.: 2005, Next generation information and communication technology (ICT) for integrated water management of the Yellow River
Basin, Proc. of the 2nd Yellow River Forum, Zhengzou, China.
Nishat, A.: 2006, Experiences from Bangladesh on disaster management with focus
on floods, Meeting Report on Regional Journalist Workshop on Water Issues in
Asia, Bangkok, Thailand.
NPDP: 2007, Dam incidents database, National Performance of Dams Program,
Stanford University, California, USA. Available at npdp.stanford.edu.
Nsom, B.: 2002, Horizontal viscous dam–break flow: Experiments and theory, Journal of Hydraulic Engineering 128(5), 543–546.
Olı́as, M., Cerón, J., Fernández, I., Moral, F. and Rodrı́guez-Ramı́rez, A.: 2005,
State of contamination of the waters in the Guadiamar Valley five years after the
Aznalcóllar spill, Water, Air, & Soil Pollution 166(1), 103–119.
Plate, E. J.: 2000, Flood management as part of sustainable development, Vol. 1,
Proc. of the International Symposium on River Flood Defence, Kassel, Germany.
Ponce, V. M. and Tsivoglou, A. J.: 1981, Modeling gradual dam breaches, Journal
of Hydraulic Division 107(7), 829–838.
Powledge, G. R., Ralston, D. C., Miller, P., Chen, Y. H., Clopper, P. E. and Temple,
D. M.: 1989, Mechanics of overflow erosion on embankments. Part II. Hydraulic
and design considerations, Journal of Hydraulic Engineering 115(8), 1056–1075.
Price, R. K.: 2000, Hydroinfomatics for river flood management, Vol. 71, NATO
Science Series 2 Environmental Security, Kluwer Academic Publishers, pp. 237–
250.
132
Bibliography
Pugh, C. A. and Harris, D. W.: 1982, Prediction of landslide generated water waves,
Vol. Q. 54, Proc. of the 14th International Congress on Large Dams (ICOLD),
Rio de Janerio, Brazil, pp. 1056–1075.
Qing, D.: 1997, The River Dragon has come!: Three Gorges dam and the fate of
China’s Yangtze River and its people, ME Sharpe.
Ralston, D.: 1987, Mechanics of embankment erosion during overflow, Proc. of the
ASCE National Conference in Hydraulic Engineering, pp. 733–738.
Ré, R.: 1946, Etude du lacher instantané d’une retenue d’eau dans un canal par
la méthode graphique (Study of the Sudden Water Release from a Reservoir in a
Channel by a Graphical Method.), Jl La Houille Blanche (in French) 1(3), 181–
187.
Ritter, A.: 1892, Die Fortpflanzung der Wasserwellen (Propagation of waves),
Zeitschrift des Vereines Deutscher Ingenieure 36(33), 947–954.
Robinson, K. M. and Hanson, G. J.: 1994, A deterministic headcut advance model,
Transactions of the ASAE 37(5), 1437–1443.
Rogers, J. D.: 2007, Background on failure of Teton Dam near Rexburg,
Idaho on June 5, 1976, University of Missouri-Rolla, USA. Retrieved from
web.umr.edu/˜rogersda/teton dam.
Rosa, L. P. and dos Santos, M. A.: 2000, Certainty & uncertainty in the science of
greenhouse gas emissions from hydroelectric reservoirs, Report prepared for the
World Commission on Dams.
Rosenblatt, F.: 1958, The perceptron: A probabilistic model for information storage
and organization in the brain., Psychological Review 65(6), 386–408.
Rousseeuw, P. J.: 1984, Least median of squares regression, Journal of the American
Statistical Association 79(388), 871–880.
Rousseeuw, P. J. and Leroy, A. M.: 2003, Robust regression and outlier detection,
Wiley-Interscience.
Rowe, W. D.: 1994, Understanding uncertainty, Risk Analysis 14(5), 743–750.
Rozov, A. L.: 2003, Modeling of washout of dams, Journal of Hydraulic Research
41(6), 565–577.
Saltelli, A.: 2004, Global Sensitivity Analysis: An Introduction, pp. 27–43.
Saltelli, A., Chan, K. and Scott, E. M.: 2000, Sensitivity analysis, Wiley.
Samuels, P., Klijn, F. and Dijkman, J.: 2005, River flood risk management policies
in different parts of the world: Synthesis of special session by NCR, Proc. of the
3rd International Symposium on Flood Defence, Nijmegen, the Netherlands.
Bibliography
133
Schoklitsch, A.: 1917, Über Dambruchwellen, Sitzungberichten der Königliche
Akademie der Wissenschaften, Vienna, Austria 126, 1489–1514.
Schoklitsch, A.: 1926, Geschiebebewegung in Flüssen und an Stauwerken, J. Springer.
Schoklitsch, A.: 1934, Der Geschiebetrieb und die Geschiebefracht, Wasserkraft und
Wasserwirtschaft, 29, Jahrgang.
Shortreed, J., Dinnie, K. and Belgue, D.: 1995, Risk criteria for public policy,
Proc. of the 1st Biennial Conference on “Process Safety and Loss Management in
Canada”, Institute for Risk Research, University of Waterloo, Waterloo, Ontario,
Canada, pp. 131–158.
Simonovic, S. P. and Ahmad, S.: 2005, Computer-based model for flood evacuation
emergency planning, Natural Hazards 34(1), 25–51.
Singh, K. P. and Snorrason, A.: 1982, Sensitivity of outflow peaks and flood stages to
the selection of dam breach parameters and simulation models, Technical Report
289, State Water Survey Division at the University of Illinois, USA.
Singh, K. P. and Snorrason, A.: 1984, Sensitivity of outflow peaks and flood stages
to the selection of dam breach parameters and simulation models, Journal of
Hydrology 68, 295–310.
Singh, V. P.: 1996, Dam breach modeling technology, Kluwer Academic Pub.
Singh, V. P. and Quiroga, C. A.: 1987, A dam-breach erosion model: I. Formulation,
Water Resources Management 1(3), 177–197.
Smart, G. M.: 1984, Sediment transport formula for steep channels, Journal of
Hydraulic Engineering 110(3), 267–276.
Soares Frazão, S.: 2002, Dam–break induced flows in complex topographies: Theoretical, numerical and experimental approaches, PhD thesis, Université Catholique
de Louvain, Belgium.
Solomatine, D. P.: 2002, Applications of data-driven modelling and machine learning
in control of water resources, Computational Intelligence in Control, Idea Group
Publishing, pp. 197–217.
Soumis, N., Lucotte, M., Duchemin, a., Canuel, R., Weissenberger, S., Houel, S.
and Larose, C.: 2005, Hydroelectric reservoirs as an anthropogenic sources of
greenhouse gases, John Wiley & Sons, Ohio.
Spinewine, B. and Zech, Y.: 2007, Small-scale laboratory dam-break waves on movable beds, Journal of Hydraulic Research 45(Extra Issue), 73–86.
Stelling, G. S. and Duinmeijer, S. P. A.: 2003, A staggered conservative scheme for
every Froude number in rapidly varied shallow water flows, International Journal
for Numerical Methods in Fluids 43(12), 1329–1354.
134
Bibliography
Stelling, G. S., Kernkamp, H. W. J. and Laguzzi, M. M.: 1998, Delft flooding system:
a powerful tool for inundation assessment based upon a positive flow simulation,
Proc. of 5th International Conference on Hydroinformatics, pp. 449–456.
Stigler, S. M.: 1981, Gauss and the invention of least squares, The Annals of Statistics 9(3), 465–474.
Stoker, J. J.: 1957, Water waves: The mathematical theory with applications, Pure
and Applied Mathematics 4.
TAW: 1998, Fundamentals on water defences, Technical report, Technical Advisory
Committee on Water Defences, the Netherlands.
TAW: 2002, Wave run-up and wave overtopping at dikes, Technical report, Technical
Advisory Committee on Water Defences, the Netherlands.
Temple, D. M. and Hanson, G. J.: 1994, Headcut development in vegetated earth
spillways, Applied Engineering in Agriculture 10(5), 677–682.
Temple, D. and Moore, J.: 1997, Headcut advance prediction for earth spillways,
Transactions of the ASAE 40(3), 557–562.
Thoft–Christensen, P. and Baker, M. J.: 1982, Structural reliability theory and its
applications, Springer.
Tingsanchali, T. and Hoai, H. C.: 1993, Numerical modelling of dam surface erosion due to flow overtopping, Vol. 1, Advances in HydroScience and Engineering,
Washington, USA, pp. 883–890.
Tinney, R. E. and Hsu, H. Y.: 1961, Mechanics of washout of an erodible fuse plug,
Journal of the Hydraulics Division 87(3), 1–30.
Toro, E. F.: 1999, Rieman solvers and numerical methods for fluid dynamics: A
practical introduction, Springer-Verlag, Heidelberg, Berlin.
Tremblay, A., Lambert, M. and Gagnon, L.: 2004, Do hydroelectric reservoirs emit
greenhouse gases?, Environmental Management 33, 509–517.
Turing, A. M.: 1950, Computing machinery and intelligence, Mind 59(236), 433–460.
U.S. Army Corps of Engineers: 1960, Floods resulting from suddenly breached dams:
Conditions of minimum resistance, Report 1(374), U.S. Army Engineers Waterways Experiment Station, Vicksburg, Mississippi.
U.S. Army Corps of Engineers: 1961, Floods resulting from suddenly breached dams:
Conditions of high resistance, Report 2(374), U.S. Army Engineers Waterways
Experiment Station, Vicksburg, Mississippi.
Bibliography
135
U.S. Bureau of Reclamation: 1988, Downstream hazard classification guidelines,
ACER Technical Memorandum No. 11, Assistant Commissioner-Engineering and
Research, U.S. Department of the Interior, Denver, Colorado.
van de Ven, G. P.: 2004, Man-made lowlands: History of water management and
land reclamation in the Netherlands, Matrijs, Utrecht, the Netherlands.
van der Sande, C. J., de Jong, S. M. and de Roo, A. P. J.: 2003, A segmentation
and classification approach of IKONOS-2 imagery for land cover mapping to assist
flood risk and flood damage assessment, International Journal of Applied Earth
Observation and Geoinformation 4(3), 217–229.
van der Sluijs, J. P.: 1997, Anchoring amid uncertainty: On the management of
uncertainties in risk assessment of anthropogenic climate change, PhD thesis,
Utrecht University, the Netherlands.
van Rijn, L. C.: 1993, Principles of sediment transport in rivers, estuaries and
coastal seas, Aqua Publications.
van Schijndel, S.: 2005, The Planning Kit, a decision making tool for the Rhine
branches, Proc. of the 3rd International Symposium on Flood Defence, Nijmegen,
the Netherlands.
Vaskinn, K. A.: 2003, Stability and failure mechanisms of dams, Proc. of the 3rd
IMPACT Workshop, Université Catholique de Louvain, Louvain-la-Neuve, Belgium.
VenW: 2005, Floris study-Full report, Flood Risks and Safety in the Netherlands
(Floris) Project, Dutch Ministry of Transport, Public Works and Water Management.
Verheij, H. J.: 2002, Modification breach growth model in HIS–OM, Q3299, Technical report, WL | Delft Hydraulics (in Dutch).
Verwey, A.: 2001, Latest developments in floodplain modelling–1D/2D integration,
Proc. of 6th Conference on Civil Engineering Hydraulics, Hobart, Australia.
Vesely, W. E. and Rasmuson, D. M.: 1984, Uncertainties in nuclear probabilistic
risk analyses., Risk Analysis 4(4), 313–322.
Vis, M., Klijn, F., de Bruijn, K. M. and van Buuren, M.: 2003, Resilience strategies
for flood risk management in the Netherlands, International Journal of River
Basin Management 1, 33–40.
Visser, P. J.: 1998, Breach growth in sand–dikes, PhD thesis, Delft University of
Technology.
136
Bibliography
Visser, P. J., Smit, M. J. and Snip, D. W.: 1996, Zwin ’94 experiment: Meetopstelling en overzicht meetresultaten, Report 4–96, Delft University of Technology,
the Netherlands.
Vrijling, J. K.: 2001, Probabilistic design of water defense systems in the Netherlands, Reliability Engineering and System Safety 74(3), 337–344.
Vrouwenvelder, A. C. W. M.: 1999, Theoretical manual of PC-Ring, Part C: Calculation methods (in Dutch), TNO-report 98-CON-R1204, Delft, the Netherlands.
Vrouwenvelder, A. C. W. M., Steenbergen, H. M. G. M. and Slijkhuis, K. A. H.:
2001, Theoretical manual of PC-Ring, Part B: Statistical models (in Dutch), TNOreport 98-CON-R1431, Delft, the Netherlands.
Wahl, T. L.: 1998, Prediction of embankment dam breach parameters: A literature review and needs assessment, U.S. Department of the Interior, Bureau of
Reclamation, Dam Safety Office.
Wahl, T. L.: 2004, Uncertainty of predictions of embankment dam breach parameters, Journal of Hydraulic Engineering 130.
Wentz, F. J., Ricciardulli, L., Hilburn, K. and Mears, C.: 2007, How much more
rain will global warming bring?, Science 317(5835), 233–235.
Witten, I. H. and Frank, E.: 2000, Data mining: Practical machine learning tools
and techniques with Java implementations, Morgan Kaufmann.
Wolters, H. A., Platteeuw, M. and Schoor, M. M.: 2001, Guidelines for rehabilitation
and management of floodplains, NCR publication.
World Commission on Dams: 2000, Dams and development: A new framework for
decision-making, Earthscan.
Wu, W., Wang, S. S. Y., Jia, Y. F. and Robinson, K. M.: 1999, Numerical simulation
of two-dimensional headcut migration, ASCE, Proc. of the International Water
Resources Engineering Conference, Seattle, WA, USA.
Yalin, M. S.: 1972, Mechanics of sediment transport, Pergamon Press.
Zagonjolli, M., Goossens, H. and Mynett, A. E.: 2006, A numerical-constraint based
approach for flood mitigation in dike ring areas, Proc. of 7th International Conference on Hydroinformatics, Nice, FRANCE.
Zagonjolli, M. and Mynett, A.: 2006a, Dam breaching uncertainty and its effect
in downstream areas, Proc. of the 7th International Conference on Hydroscience
and Engineering, Philadelphia, USA, Michael Piasecki and College of Engineering,
Drexel University.
Bibliography
137
Zagonjolli, M. and Mynett, A. E.: 2005a, Dam breach analysis: A comparison
between physical, empirical and data mining models, Proc. of the 29th IAHR
Congress Seoul, South Korea, p. 753.
Zagonjolli, M. and Mynett, A. E.: 2005b, Data mining techniques in dam breach
modelling, Submitted to the IAHR Journal of Hydraulic Research .
Zagonjolli, M. and Mynett, A. E.: 2006b, Failure analysis of a high earthfill dam:
Scenario development using numerical simulation and GIS, Proc. of 7th International Conference on Hydroinformatics, Nice, FRANCE.
Zagonjolli, M., Mynett, A. E. and Verwey, A.: 2005, Dam break modelling analysis
of Bovilla Dam near Tirana, Albania, Proc. of the 3rd International Symposium
on Flood Defence, Nijmegen, the Netherlands.
Zhu, Y., Visser, P. J. and Vrijling, J. K.: 2006, Laboratory observations of embankment breaching, Proc. of the 7th International Conference on Hydroscience
and Engineering, Philadelphia, USA, Michael Piasecki and College of Engineering,
Drexel University.
List of Symbols
Roman Letters
Symbol
Description
SI Units
abl
Bavg
Bbot
Bt
C
Cs
d
D
DF
d50 , d65
Fr
g
h
H
hb
hd
hw
k and a
I1 and I2
L
Ms
q
Qp
td
u
Vout
Vw
Y
z
Thickness of the bed layer
Ultimate average width of the breach channel
Bottom width of the breach channel
Top width of the breach channel
Weir discharge coefficient
Submergence coefficient on the weir
Soil grain diameter
Height of the breach channel
Dam factor
Representative grain size diameter
Froude number
Gravitational acceleration
Flow depth
Water depth above the breach bottom
Vertical extent of the breach channel
Dam height or dike height
Depth of water in the reservoir triggering the failure
Correlation coefficients
Integral quantities depending upon the flow depth
Length of the breach channel
Mass of soil eroded during breaching
Discharge per unit width
Peak discharge
Duration of failure
Water velocity
Volume of water outflow from the reservoir
Volume of water in the reservoir triggering the failure
Elevation of breach bottom
Breach side slope factor
[m]
[m]
[m]
[m]
[-]
[-]
[mm]
[m]
[m4 ]
[mm]
[-]
[m2 /s]
[m]
[m]
[m]
[m]
[m]
[-]
[-]
[m]
[kg/s]
[m2 /s]
[m3 /s]
[hr]
[m/s]
[m3 ]
[m3 ]
[m]
[-]
Greek letters
Symbol
Description
SI Units
β, δ
γ
Angle that the breach side creates with vertical
Unit weight of water
[◦ ]
[N/m3 ]
140
τ
τc
(τ0 − τc )
List of Symbols
Tractive stress of the flowing water
Critical tractive stress for erodible material
Excess shear stress
Mathematical symbols and operators
Symbol
Description
≡
Equivalent to (or defined to be)
argmaxf (x) Value of x that leads to the maximum value of f(x)
x
[N/m2 ]
[N/m2 ]
[N/m2 ]
List of Abbreviations
AI
ANNs
BREADA
Floris
GHGs
GIS
IBL
IPCC
LMS
LS
LWL
MLP
NPDP
PAR
RL
RMSE
SMDBRK
TAW
USBR
WCD
WEKA
Artificial Intelligence
Artificial Neural Networks
BReaching of the EArthfill DAm
FLOod RIsks and Safety
GreenHouse Gases
Geographical Information System
Instance Based Learning
Intergovernmental Panel on Climate Change
Least Median of Squares
Least Squares
Locally Weighted Learning
Multi Layer Perceptron
National Performance of Dams Program in USA
People At Risk
Reinforcement Learning
Root Mean Square Error
National Weather Service Simplified Dam Break Model
Technical Advisory Committee on Water Defences in the Netherlands
U.S. Bureau of Reclamation
World Commission on Dams
Waikato Environment for Knowledge Analysis
Curriculum Vitae
Migena Zagonjolli was born in 1975 in Tirana, Albania. She studied hydraulic engineering at the Polytechnic University of Tirana, Albania, where she graduated in
1999. From then until 2001 she worked at the Department of Hydraulic Engineering
as an assistant lecturer in Hydraulics and Water Resources Management. During
this period she visited the University of Limerick, Republic of Ireland, as a guest
researcher.
From 2001 to 2003 she studied at UNESCO–IHE in Delft, the Netherlands, where
she obtained her MSc degree in Hydroinformatics on a research topic related to dam
break modelling. In 2004 she started her PhD research within the collaboration
framework between WL | Delft Hydraulics, UNESCO–IHE and Delft University of
Technology. She addressed a range of research topics, including data mining and
analysis, computational modelling of dam and dike breaching, sediment transport,
and flood risk assessment. One of the novel aspects of her research is the design of
a numerical–constraint based model for flood propagation and risk mitigation.
Her experience includes software development related to dam/dike breaching, flood
wave propagation, constraint based modelling, uncertainty analysis and flood mitigation. She has published several papers in international journals and conference
proceedings. Starting 1st October 2007 she will be employed as a researcher/advisor
at the Department of Inland Water System at WL | Delft Hydraulics.
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement