PHD Zagonjolli PDF
PHD Zagonjolli PDF
PHD Zagonjolli PDF
DISSERTATION
by
Migena ZAGONJOLLI
All rights reserved. No part of this publication or the information contained herein
may be reproduced, stored in a retrieval system, or transmitted in any form or by
any means, electronic, mechanical, by photocopying, recording or otherwise,
without written prior permission from the publisher.
Although all care is taken to ensure the integrity and quality of this publication
and the information herein, no responsibility is assumed by the publishers nor the
authors for any damage to property or persons as a result of operation or use of
this publication and/or the information contained herein.
Published by A.A. Balkema Publishers, a member of Taylor & Francis Group plc.
www.balkema.nl and www.tandf.co.uk
Effects of climate change are likely to cause more severe flow conditions within the
life span of existing structures, leading to increased safety concerns. If a structure
fails, the release of (large quantities of) water may threaten the lives of people as
well as property in the downstream areas. Likely loss of life depends on actual water
depth and flow velocity, the geographical distribution of the population, warning
time necessary to reach them and their awareness at the time of disaster. Warning
messages released in advance can be an important factor for saving lives. Hence,
developing and improving risk assessment and flood mitigation models is becoming
increasingly important and can be considered a necessity to reduce human casualties
and economic damage.
The aim of this research is to develop a framework and explore techniques for mod-
elling dam and dike failure events, as well as to develop novel approaches for risk
assessment. Numerical, statistical and constraint based methods are applied to
breach modelling and flood water mitigation. A new breach model (BREADA) is
developed for simulating the gradual failure of a structure due to overtopping which
is validated against historical dam failure events. In order to explore the accuracy
of breach models in a different way, and to try to extract possible additional in-
formation from available data of recorded dam failure events, we use data mining
techniques that have been successfully applied in the field of hydroinformatics.
While physically based methods require proper understanding of all processes occur-
ring during dam breaching, data mining methods rely only on recorded data of dam
failure events. In this research we apply data mining techniques including Artificial
Neural Networks and Instance Based Learning for predicting dam breach character-
istics and peak outflows. Despite the shortage of documented data, this research
demonstrates there is a possibility to improve the presently available empirical rela-
tions and prediction capabilities of physically based models by complementing with
data mining techniques.
viii Summary
The analysis of a potential failure event for existing structures (especially for large
dams) is essential for planning and organizing emergency procedures that anticipate
and mitigate downstream damages in case of disaster. In this thesis we analyse a
hypothetical failure event for the Bovilla Dam near Tirana, Albania, and explore
potential mitigation measures in case of a worst case scenario. A comparison is
made between the results of the developed BREADA model, other available breach
modelling formulations, and empirical techniques in order to get a range of peak
outflows. Flood routing is carried out using WL | Delft Hydraulics’ hydrodynamic
modelling package Sobek 1D2D. Sensitivity analysis is carried out to identify uncer-
tainties associated with dam failure analysis. The model is used to identify areas
prone to flooding, to assess the risk involved, as well as to take measures to reduce
flood damage and develop emergency plans.
Clearly, structural failure events pose a significant threat not only to human life but
also to the environment and in general also to economic development. With such
catastrophic consequences in mind, it is essential to investigate not only mechanisms
for predicting these failure events but also to reduce their risk of occurrence. Tra-
ditional approaches focus on establishing very small probabilities of occurrence of
extreme events. However, if such event were to occur - despite its low probability
value - the consequences may be very severe, like in the case of New Orleans.
The approach developed in this thesis can be used to complement existing practices
of flood modelling, which are traditionally carried out by simulating the consequences
of a forecasted or assumed flood event and elaborated into a few typical ‘what - if’
scenarios. The ‘lightweight’ numerical–constraint based technique proposed in this
thesis is capable of evaluating many scenarios in a very short period of time by first
determining the most feasible scenarios, which can then be modelled in more detail
using a conventional hydrodynamic simulation approach. In this way computation
time is considerably reduced while focusing on the most feasible options is ensured.
Clearly a combination of these two methods can either be achieved by enhancing a
hydrodynamic modelling package with an optional numerical–constraint based ap-
proach, or vice versa.
Samenvatting
Wereldwijd zijn meer dan 800,000 dammen en vele duizenden kilometers dijk aan-
geled. De geschiedenis van dammen en dijken gaat echter hand in hand met de
geschiedenis van hun falen. Honderden gevallen van het bezwijken van dijken hebben
zich de afgelopen eeuwen voorgedaan en ook vandaag de dag bezwijken er dammen
en dijken onder de druk van het water - met alle gevolgen vandien. In Nederland
leidde de stormvloed van 1953 waarbij 1850 mensen omkwamen, tot de aanleg van de
fameuze Deltawerken. Een recent voorbeeld van het bezwijken van waterkeringen be-
treft de orkaan Katrina in augustus 2005 die aanzienlijke overstromingen tot gevolg
had met 1300 doden en tientallen miljarden aan economische en sociale schade.
Het doel van dit onderzoek is om een raamwerk op te zetten en technieken te on-
twikkelen voor het modelleren van het bezwijken van waterkeringen. Ook worden
mogelijke nieuwe benaderingen op het gebied van risico analyse onderzocht. Naast
numerieke en statistische benaderingen zijn ‘constraint based’ technieken ontwikkeld
voor het modelleren van dijkdoorbraken en het afwenden van overstromingsgevaar.
Er is een nieuw model voor dijkdoorbraak (BREADA) ontwikkeld voor het geleidelijk
bezwijken van waterkeringen ten gevolge van het ’over’stromen. Dit is gevalideerd
op basis van beschibare veldmetingen. Om de nauwkeurigheid van eerdere modellen
na te gaan en om eventuele nieuwe informatie aan de beschikbare meetgegevens te
onttrekken, zijn ‘data mining’ technieken gebruikt die al geruime tijd in de hydroin-
formatica met succes zijn beproefd op toepassingen in waterbouw en waterbeheer.
Op fysica gebaseerde modellen vragen om een goed begrip van onderliggende pro-
cessen om een wiskundige beschrijving te kunnen opstellen; deze wordt vervolgens
getoetst aan de hand van beschikbare meetgegevens. Data mining technieken gaan
uit van dezelfde meetgegevens, maar proberen het fysisch proces hieraan te ont-
trekken zonder vooraf een bepaald model op te leggen. In dit onderzoek worden
data mining technieken gebruikt om de maximale waarde van uitstroom bij dijkdoor-
x Samenvatting
Een adequate analyse van een mogelijke catastrofale gebeurtenis als een grote damdoor-
braak is essentieel om noodmaatregelen voor te bereiden die de benedenstroomse
gevolgen van een ramp kunnen beperken. In dit proefschrift wordt een analyse uit-
gevoerd naar de een eventuele doorbraak van Bovilla Dam bij Tirana in Albanie, en
worden mogelijke maatregelen onderzocht om een ramp af te wenden. Resultaten
van BREADA en andere modellen worden gebruikt om de variatie in uitstroomcon-
dities na te gaan. Met WL | Delft Hydraulics’ Sobek 1D2D numerieke modelsysteem
worden overstromingen gesimuleerd en gevoeligheidsanalyses uitgevoerd om onzek-
erheden vast te stellen. Voor mogelijk bedreigde gebieden worden noodmaatregelen
onderzocht.
Het is duidelijk dat het falen van waterkeringen levensbedreigend kan zijn met grote
economische gevolgschade. Daarom is het noodzakelijk om niet alleen een faalkans
vast te stellen, maar ook om mogelijke gevolgen te kunnen beperken. Immers, mocht
een faalkans worden overschreden, dan kunnen de gevolgen verstrekkend zijn, zoals
bijvoorbeeld bij New Orleans. In dit proefschrift wordt daarom een alternatieve route
bewandeld met de nadruk op het verkleinen van de gevolgen van overstromingen.
Daartoe is een numeriek model gecombineerd met een ‘constraint’ aanpak gebaseerd
op ‘graph theory’ wat het mogelijk maakt om meerdere scenario’s in zeer korte tijd
te evalueren. De resultaten van een toepassing in een gebied met meerdere polders
met verschillende doelfuncties zoals bergingscapaciteit en economische waarde (ook
wel systeemwerking genoemd) zien er veelbelovend uit.
De benadering die in dit proefschrift is gekozen kan gebruikt worden als aanvulling op
de huidige aanpak die veelal is gebaseerd op het simuleren van een groot aantal mo-
gelijkheden waarvan pas later blijkt of deze relevant zijn of niet. De hier voorgestelde
‘lichte benadering’ van gecombineerde ‘numerical–constraint based’ technieken is
flexibel genoeg om zeer veel mogelijkheden in korte tijd te evalueren en om de meest
waarschijnlijke scenario’s te selecteren die vervolgend met behulp van een conven-
tionele hydrodynamische aapak in meer detail kunnen worden onderzocht. Op deze
manier wordt de rekentijd sterk gereduceerd en alleen gebruikt om de meest waarschi-
jnlijke opties te onderzoeken. Een combinatie van beide methoden is mogelijk door
bestaande hydrodynamische pakketten uit te breiden met opties voor een ‘numeri-
cal–constraint based’ benadering, of vice versa.
Acknowledgment
This dissertation would not have been possible without the continuous encourage-
ment of my promotor Prof. Arthur Mynett. I am very grateful to him not only for
directing my research, but also for the invaluable moral support I received through-
out this project. His guidance and supervision enabled me to complete my work
successfully.
I would like to acknowledge WL | Delft Hydraulics for their financial support and
for providing the professional environment to carry out this research. Many thanks
go to all my friends and colleagues at UNESCO-IHE, Delft University of Technology
and WL | Delft Hydraulics: your friendship and professional collaboration meant
a great deal to me. I am grateful to Dr. Hans Goossens and Dr. Henk van den
Boogaard of the Strategic Research Department of WL | Delft Hydraulics for con-
tributing their time and expertise to this project. Special thanks go to Prof. Roland
Price and Prof. Dimitri Solomatine of UNESCO-IHE for the informal and fruitful
discussions.
I would like to express my gratitude to the thesis committee members for their in-
terest and valuable comments on my work and to Prof. Nigel Wright for helping
improve the thesis with his useful observations and suggestions.
This list of acknowledgments would not be complete without all the people to whom
I am indebted at a personal level. My friends and relatives have provided invaluable
moral support during the four years of this research. I am very grateful to each and
every one of you. I wish to express my special appreciation to my dear friend Merita
Hatibi Serani who introduced me to the field of hydraulic engineering. Although she
untimely passed away, the memories and creative energy she left behind are always
with me.
Migena Zagonjolli,
24 September 2007
xiii
Contents
Summary vii
Samenvatting ix
Acknowledgment xi
1 Introduction 1
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Management of the flood risk caused by structural failure . . . . . . 4
1.3 Scope of the thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.4 Outline of the thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Bibliography 125
Introduction
If any one be too lazy to keep his dam in proper condition, and
does not so keep it; if then the dam break and all the fields be
flooded, then shall he in whose dam the break occurred be sold
for money, and the money shall replace the corn which he has
caused to be ruined.
The Code of Hammurabi (18th century BC)
1.1 Background
The history of water defence and water retention structures coexists with the his-
tory of their failures. Around the world thousands of dams have been constructed
over many centuries. But also, hundreds of dams have failed and every year many
dikes breach due to high flows in the rivers, sea storm surges, etc. often leading to
catastrophic consequences. By far the world’s worst dam disaster occurred in Henan
province in China, in August 1975, when the Banqiao Dam and the Shimantan Dam
failed catastrophically due to the overtopping caused by torrential rains. Approx-
imately 85,000 people died from flooding and many more died during subsequent
epidemics and starvation; millions of residents lost their homes (Qing, 1997). This
catastrophic event is comparable to what Chernobyl and Bhopal represent for the
nuclear and chemical industries (McCully, 1996). In the Netherlands, in February
1953, a high–tide storm caused the highest water levels observed up to date and
breached the dikes in more than 450 places, causing the death of nearly 1,900 people
as well as enormous economic damage (Gerritsen, 2005).
During recent years, the observation is made that the global impact of climate change
will be devastating (see e.g. Intergovernmental Panel on Climate Change (IPCC) as-
sessment reports at www.ipcc.ch; Millennium Ecosystem Assessment (2005); Archer
(2006); Flannery (2006); Wentz et al. (2007)). According to the IPCC, “the ob-
served warming trend is unlikely to be entirely natural in origin”. We witness the
Climate Change 2001: The Scientific Basis Page 1 of 2
The failure of the New Orleans’ levee system during hurricane Katrina of
http://www.grida.no/climate/ipcc_tar/wg1/fig11-12.htm 2005
6/2/2007
contributed to prolonged flooding causing 1,300 casualties and billions of dollars
of economic damage. In August 2002, floods caused by torrential rains in Europe
claimed the lives of at least 109 people. The Elbe exceeded its 200 year flood return
period in Dresden, flooding much of the city, and a flood return period of 500 years
was estimated in Prague.
Nowadays there are more than 800,000 dams and thousands of kilometers of dikes,
constructed around the world for different purposes: flood control (the most com-
mon purpose), irrigation, electricity generation, water supply, recreation, etc. Dams
Chapter 1. Introduction 3
and dikes are often designed based on the statistical distribution of recorded river
flows or sea storm surge measurements. However, climate change has introduced
uncertainty related to increasing maximum flows within the life span of dams and
dikes, leading to safety concerns. Many dams and dikes previously considered ade-
quate (safe) now exhibit a potential to experience overflowing (overtopping) during
high (flash) flood events. If a dam or dike fails, loss of life and economic damage are
direct consequences of such an event, depending on the magnitude of water depth
and velocity, warning time, and presence of population at the time of the event.
Early warning is crucial for saving lives in flood prone areas.
Costa (1985) compared the loss of life during two dam failure events: the Teton
Dam in Idaho (93m high) that failed at midday on 5 June 1976 and Laurel Run
Dam in Pennsylvania (12.8m high) that failed on 20 July 1977 at 4:00 a.m. The
latter event claimed the lives of 1 out of every 4 people exposed to floodwaters, while
only one out of 3,000 people exposed to floodwaters suffered from casualties in the
case of the Teton Dam failure. The database compiled by the Centre for Research
on Epidemiology Disasters (www.em-dat.net) identifies floods as the second most
endangering factor after drought in terms of loss of human lives around the world
for the period 1900-2007.
The construction of dams and dikes (hereafter referred to as structures) leads people
to believe that the floods are fully controlled, and therefore an increased urban and
industrial development in the floodplains usually takes place. Hence, if the struc-
ture fails, the damage caused by flooding might be much greater than it would have
been without the structure’s presence. Having the historical failures of structures
in mind, one might pose the question what can be done in order to reduce the risk
posed from a dam or dike failure event.
4 Section 1.2. Management of the flood risk caused by structural failure
Different methods can be applied for reduction of the risk posed by a dam failure
according to Bowles (2001):
1. Avoid the risk before or after the dam is built. If the safety of the dam is
questionable, then decommissioning of the dam can be proposed as a solution
to the problem.
2. Reduce failure probability occurrence through structural and non–structural
measures.
3. Reduce (mitigate) consequences through transferring the risk, effective emer-
gency evacuation planning or relocation of population at risk. The ‘Peace
Chapter 1. Introduction 5
Dam’ is constructed about 125 kilometers northeast of Seoul, South Korea for
the purpose to mitigate the flood water in case of collapse of North Korea’s Im-
nam or Mount Geumgang Dam or sudden release of water through the outlet
works.
4. Retain (accept) the risk, but protection measures should be taken in the down-
stream area against the flood water as well as other measures should be applied
to mitigate the flood water from the most populated or economically valuable
areas.
The risk associated with flooding is generally expressed as the product between the
probability of the event occurrence and the monetary value of its consequences.
Expressing loss of life in monetary terms usually is not morally acceptable, thus,
the population at risk is commonly taken into account as a decisive element in
risk analysis. Risk expression might lead to the equivalence of an event with low
probability and high consequences to an event that has high probability of occurrence
but very low consequences. Generally, risk reduction measures try to reduce the
probability of flooding, though minimizing the probability of a flood might come at
the price of increasing its destructive power. The Indian Ocean tsunami of December
26, 2004 demonstrated that the consequences should be a triggering element of any
risk analysis, instead of focusing on the probability of the event only. The impact of
the Asian tsunami could have been lower in terms of human live losses if an effective
warning system would have been implemented and operated.
Unfortunately, we might fail to stop an event from happening due to our incapability,
negligence or unpredictability of extreme natural events, but we can develop models
and tools for fast response to any event in order to reduce its consequences. The
aim is to find measures that reduce the probability of flooding and minimize the
potential consequences.
We address the problem of dam and dike breach analysis as well as simulation and
mitigation of the flood water caused by failure of these structures. Formation of
the breach in a structure is a complex process that depends on various hydraulic,
hydrologic, geotechnical factors. In this thesis, we develop a framework and tech-
niques for modelling dam and dike failure events as well as propose several novel
approaches for dam breach modelling. Furthermore, we introduce and apply several
numerical, statistical and constraint based methods in particular related to dam and
dike breach modelling and flood water mitigation.
Chapter 5 introduces a new approach for the estimation of dam breach character-
istics. It starts with an overview of the theory behind the data mining techniques
used in this research and demonstrates their application to the dataset of dam failure
events.
Chapter 6 presents the mathematical model of a dam breach tool developed during
this research as well as its application to the modelling of a hypothetical failure of
an earthfill dam. It provides an evaluation of breach characteristics using different
approaches, a sensitivity analysis of important breach parameters and an evaluation
of uncertainties.
The construction of dams is often seen as a solution for providing water supply, flood
control or for ‘green’, renewable electricity. The dams must be designed, built, and
operated so that they make a positive contribution to socio–economic development,
while having minimal impact on the environment. There are, however, different
perspectives on this issue and discussions are taking place about the controversial
impacts of dam construction. Resettlement of people that have to withdraw from
their social and cultural identity is often seen as a major impact of dam construction,
especially for large dams. Irreversible degradation of natural habitat, degradation of
10 Section 2.1. Design criteria and failure modes for dams
water quality, sedimentation of reservoirs and the downstream effects are other neg-
ative impacts of dam construction. The reader is referred to the report by the World
Commission on Dams (2000) for a detailed description of the complex impacts of
dams. To alleviate the impacts, measures are usually taken for adequate mitigation
of the natural habitat e.g. by creating nearby protected areas for wildlife, or new
fisheries within reservoirs, etc. The dam proponents propose more hydropower dam
construction to play “a major role in reducing greenhouse gas emissions in terms of
avoided generation by fossil fuels” (Lafitte, 2001). On the opposite side, environ-
mentalists insist that any large dam, including hydropower dams, emits greenhouse
gases (GHGs) due to the rotting of the flooded organic matter. However, the science
of quantifying GHGs reservoir emissions is uncertain and controversial conclusions
are drawn related to hydropower emissions in comparison to those from fossil fuels,
viz. the difference between the pre–dam emissions from the undamed catchment and
the post–dam emissions. In this thesis we focus on a dam as a structure, while its
construction impacts - though very important - are out of the scope of this thesis.
The interested reader is referred to e.g. Galy-Lacaux et al. (1999); Rosa and dos
Santos (2000); Soumis et al. (2005); Tremblay et al. (2004).
Constructed dams can be categorized in two large groups: gravity and arch dams
(Figure 2.1). Gravity dams rely on their weight to resist the forces imposed upon
them. Arch dams, with the arch pointing back into the water, use abutment re-
action forces to resist the water pressure force. They can be made of concrete or
masonry. Gravity dams can consist of concrete or earth, rock, a mixture of these
materials, or masonry. Dams are designed to have a low probability of failure during
their construction and operation life span. Dam design criteria require the dams
to withstand different loads, namely construction and reservoir water load, with or
without seismic load. The greater the chance of loss of life or damage to valuable
property in case of the failure event, the safer the design should be. Despite this,
dams do frequently fail.
The failure of a structure can be partial or complete. The failure of the structure
to fulfill its purpose is another type of failure. In this thesis, the term ‘dam failure’
indicates the partial or complete collapse of the dam or its foundation, leading to
uncontrolled release of water in the downstream areas. Landslides in the reservoir
might cause the release of water in the downstream areas, despite no failure of the
dam structure occurs. A wave estimated to be 100m high overtopped the Vaiont
arch dam in Italy in 1963 when a massive rockslide of 240 million m3 fell into the
reservoir at a velocity of approximately 30m/s (Pugh and Harris, 1982). Only minor
damage to the dam crest was observed though the wave that reached a height of
70m at 1.6km downstream the dam caused the loss of 2,600 human lives. Failure
of a dam can be sudden or gradual. A sudden failure is associated with concrete
Chapter 2. Water Retention and Flood Defence Structures 11
Cross section
Cross section Plan view
Plan view Cross
Cross section
section Planview
Plan view
Upstream
Upstream slopeslope
Upstream
Upstream
abutment
abutment
(a) (b)
Figure 2.1: Schematic picture of (a) gravity and (b) arch dams.
Pervious foundation
Flow line
Impervious layer
an initial breach channel is created, and the high reservoir water levels persist, the
breaching will continue to develop and any effort made to stop it will be unsuccess-
ful. Overtopping may not result in structural failure, but still presents a major flood
hazard as happened during the overtopping of the Vaiont Dam in Italy (Pugh and
Harris, 1982). Similarly, rapid release of reservoir water in order to lower the water
level within safe limits, can be a big concern in downstream areas.
Water penetrating through the dam’s interior body or its foundation might progres-
sively erode soil from the embankment or its foundation leading to the failure of the
dam. Here, we define piping failure as a failure mode caused by water penetrating
through the dam’s body, carrying with it small particles of dam material, continu-
ously widening the gap. If the initial piping can be detected before it reaches the
critical condition, remedy might be possible. Penetration of water in the dam body
can cause slope failure. To prevent this type of failure, appropriate instrumentation
is needed to estimate the rate of infiltration within an embankment.
Seepage failure (Figure 2.2) or foundation failure occurs due to the saturation of
the foundation material leading to either washout of the material or a weakening of
the rock towards a sliding failure. The flow of water through a pervious foundation
produces seepage forces as a result of the friction between the percolating water and
the walls of the pores of the soil through which it flows. Figure 2.2 shows how water
flows through the pervious foundation of a dam.
Earthquakes or sabotage are yet two other causes of dam failure. Earthquakes that
have stimulated immediate failure of a dam appear to be very rare. The upstream
slope of the Lower San Fernando Dam in California (USA) failed due to liquefaction
during the earthquake in 1971. The dam was constructed by fill soil mixed with a
large amount of water, transported to the dam site by pipeline, deposited on the em-
Chapter 2. Water Retention and Flood Defence Structures 13
bankment in stages, allowing the excess water to drain away. The fill that remained
was loose, and was subject to liquefaction as a result of the earthquake. Fortunately,
the reservoir level was low at the time of the earthquake and no flooding occurred.
Failure due to an earthquake might result in a higher threat to the population down-
stream rather than the overtopping failure. In the first case a sudden breach of the
dam would cause a flood wave moving downstream while the population might have
no clue about the structural failure of the dam and the approaching flood water. On
the other hand, prior to an overtopping failure, rising flood waters often give reason
for concern to the residents in the floodplain area and lead to issuing flood warning.
The historical database of dam failure events shows that the number of failures
caused by sabotage is small. One example is the British bombardment of the Ger-
man dams on the Ruhr River during World War II. The Dnieprostroy Dam (43m
high) on the Dnieper River was also destroyed for the purpose of preventing the
movement of German troops.
There are many aspects that are important in making decisions related to dike con-
struction. Economic, environmental and other social interests have to be considered,
involving different parties in the process of decision making. Different methods exist
for the design of flood defence systems or water impounding structures: probability
and risk–based design methods.
In a probabilistic approach, dikes are designed based on a water level with a partic-
ular frequency of being exceeded. The design flood levels as well a safety level or a
margin ensure the dikes’ integrity. Depending on the probabilistic method used in
the analysis and on the available data records, the design levels might be different.
Thus, including uncertainty in the estimation of the design levels is necessary, and
the margin can deal to some degree with the small uncertainties. During the years
the design levels might change as a results of changing flow conditions or as a result
of development in the area protected by dike. Therefore different measures are im-
plemented to ensure the structural integrity that take into account new developing
conditions.
Dikes might fail due to different reasons and triggering factors. The common failure
modes that are similar to the dam failure modes are piping, seepage, overtopping
caused by sabotage is small. One example is the British bombardment of the
German dams on the Ruhr River during World War II. Other factors involve
dynamiting of dams through military action. Russian engineers realised in 1941 the
destruction of the Dnieprostroy Dam (43m high) near Kichkas on the Dnieper River.
***The words dike and polder came from Dutch***Dikes are usually constructed
along the river banks and sea shores for the purpose of protecting an area from
flooding. Dikes are classified based on their function and construction material.
14 They are usually built from Section
sand, clay,
2.2.and combination
Design criteriaof them
and or from
failure peat.for
modes Sea
dikes
dikes have a seaward slope in order to reduce the wave run-up and the erodible
effect of the waves.
(a) (b)
(c) (d)
Figure 2.3: Dike along a (a) coastline, (b) river, (c) channel, and (d) on the flood-
Figure 2.3. Dike along a channel and on the floodplain.
plain.
In the Netherlands, there are 53 areas enclosed by continuous system of dikes, high
ground areas and other hydraulic structures (gates, sluices, locks, pumping stations
etc.). These areas are called dike ring areas and for each of them the flooding
12
(overflowing), uplift, and slope failure. For a typical dike, various potential failure
mechanisms are distinguished as shown in Figure 2.4. Water is not the only one
triggering factor of dike failure. In August 2003, after a very dry and warm summer,
one section of a peat dike (Figure 2.5) constructed along a canal in the Netherlands
suffered a horizontal sliding, causing flooding of about 600 houses and evacuation
of 2,000 people. In specific cases, the integrity of a dike might be affected by the
activity of burrowing animals (field mouse, gopher, mole and fox). In case of their
presence, actions are usually taken to control their activity through wire screening
or traps placing along the structure.
The dike failure probability is calculated on the basis of a so–called reliability function
Z. If the resistance R is determined and also the load S is known, the determination
whether the structure will fail is simply Z = R − S. Here load and strength are
both stochastic variables. If we consider the stochastic nature of the strength and
load, the probability that the construction will fail is the probability of P {Z < 0}.
If Z = 0, the limit state is reached, which constitutes the failure boundary.
Calculating the failure probability is as complex as modelling the dike failure pro-
cesses. The factors affecting accurate estimation and modelling are:
Uncertainty in estimating the overall failure probability of the dike. The total
failure probability of a structure involves the combination of individual proba-
bilities estimated for different factors and loading conditions that contribute to
its failure. Correctly defining the total probability, while taking into account
all the factors that could lead to the failure of the structure seems question-
able. In most cases the failure modes are not independent and therefore the
failure probabilities are not simply additive.
Due to the shortcomings of the probabilistic approach (CUR/TAW, 1990), the risk
analysis approach is drawing more attention. The risk based design approach con-
siders the probability as well as the consequences of inundation in case of a failure
of a flood defence system. Breaching of the dikes and consequent flooding have
claimed many lives and caused enormous economical damages worldwide. Based on
the risk estimation method the magnitude of the damage or loss is considered during
the design of the dike. For detailed description see CUR/TAW (1990) and Vrijling
(2001).
In this thesis we only consider the overflowing and overtopping failure modes that are
the most common failure modes for embankment dams and dikes. In the following
section we give a general description of the breach development characteristics and
emphasize the differences between modelling of the breaching processes in earthfill
dams and dikes.
and geotechnical aspects are all present in the breach formation and their accurate
modelling is very important for the accurate prediction of breach outflow. The devel-
opment of effective emergency action plans and the design of early warning systems
heavily rely on these prediction results.
There are similarities and differences in the processes involved during the breaching
of embankment dams and dikes, as summarized below:
The flow in the river is parallel to the river dike axis, while for embankment
dams and sea dikes the flow direction is perpendicular to the structure axis.
Hydraulic load behind a dam is usually larger than the one for a dike.
Numereous methods have been developed for the purpose of modelling breach de-
velopment as further discussed in Chapter 4. Here we elaborate on specific breach
characteristics and the processes involved during breaching.
Johnson and Illes (1976), after analysing the data from approximately 100 case
studies concluded that the breach develops initially in ‘V ’ shape, three to four times
18 Section 2.3. Breach modelling
Top width
Height
wider than deep, later developing in the lateral direction, once the apex reaches the
hardest material of the dam core or its foundation. The lateral erosion continues un-
til either the dam is completely washed out, or the reservoir is emptied. MacDonald
and Langridge-Monopolis (1984) observed from the collected historical dam failure
events that in most of the cases the ultimate breach shape is of trapezoidal shape.
They concluded that for embankment dams, the breach shape can be assumed to be
triangular up to the time that the base of the embankment is reached. Once the apex
of the triangle reaches the foundation level, the breach develops forming a trape-
Reservoir
zoidal section water surface
extending due to lateral erosion. The conclusions drawn from several
field and laboratory tests performed within the IMPACT project is that breach sides
preserve the vertical angle during the breach development (Morris, 2005). However,
a factor influencing the conclusion can be that the rectangular initial breach shape
is predefined in all experiments. Data related to the progressing breach shape de-
Pervious foundation
velopment (in time) during real dam failure events are still missing.
Flow line
The parameters that specify the shape of a breach channel are: the breach depth
hb or the vertical extent of the breach measured from the dam crest down to the
breach bottom, width at the top Bt and bottom Bbot of the breach channel, and the
Impervious
breach side slope factorlayer
z (see Figure 2.7).
Chapter 2. Water Retention and Flood Defence Structures 19
The rate of breach formation depends on soil material properties (cohesive, non
–cohesive, compaction, etc.) and embankment condition. Breach formation in em-
bankment dams is highly dependent on the reservoir capacity and continues till
either the reservoir is depleted or the dam can withstand further. According to the
historical data, the breach formation phase for embankment dams ranges from 0.1
to 4 hours. The breach formation in the dike structure depends on the river flood
or sea storm conditions as well as on the dike material. Cohesive dikes are likely to
breach slower than non–cohesive dikes.
† The legend tells the story of the brave Dutch boy thought to be named Hans Brinker, who
supposedly prevented the flooding of Harlem city by pressing his finger in the dike opening (Dodge,
1997).
20 Section 2.3. Breach modelling
(c)
Figure 2.8: Modelling modes of breach growth: (a) parallel to the structure crest,
(b) with rotation around downstream dam toe, and (c) parallel to downstream face
(Broich, 1998).
It is rather difficult to predict where the initial breach channel will be formed as
this depends on many factors e.g. structure coverage, flow characteristics, bad com-
paction at any point in the structure. Initial erosion may begin anywhere in the
structure. For embankment dams, the developed models commonly assume a breach
located at the center of the dam. However, some historical failure events showed
that breaching might occur near an abutment as well. Examples include the fail-
ures of Teton Dam (Figure 2.9), Baldwin Hills Dam, etc. The breach development
and outflow from a centrally located breach will most likely be different from a ‘side’
Chapter 2. Water Retention and Flood Defence Structures 21
breach in terms of time to peak discharge, peak value, and hydrograph shape. When
lateral growth is restricted in one direction, erosion rates in the other direction do
not compensate (Morris, 2005). Therefore, to predict the initial breach location
there is a need to undertake local surveys to identify weaknesses in the structure or
sub surface geology by visual means, sensors or remote sensing techniques. Within
the scope of this thesis, no attention is given to the processes that might define the
development of the initial channel location.
FigureFigure
2.10: Headcut erosion process
2-4 Headcutting in a cohesive
in a cohesive soil embankment.
soil embankment
Powledge et al.(1987);
e.g. Ralston (1989)Dodge
describe flowPowledge
(1988); over an embankment, with lowetoral.no(1999);
et al. (1989); Hanson tail water,
through the (2005).
Morris following Bythree zones:the modeling results versus field and laboratory ex-
validating
periments carried out during the IMPACT project, the breach models that predict
breach growth considering the headcut erosion processes rather than only erosion,
were argued to perform better (Morris, 2005) than the models that consider only
erosion.
Modelling of the headcut erosion is not 9trivial, and while many experiments are
carried out to gain insight into this process, the mathematical modelling of this pro-
cess is just at the initial stages (see e.g. Temple and Hanson (1994); Temple and
Moore (1997); Wu et al. (1999); Robinson and Hanson (1994); Hanson et al. (2001);
Alonso et al. (2002)). Most breach models either do not consider headcut erosion,
or consider this process using very simplified assumptions, usually modelling it as
an energy dissipation process.
Erosion is modelled using the sediment transport equations that are conventionally
derived for steady subcritical flow conditions, specific types and certain diameter
ranges of sediment (Yalin, 1972; van Rijn, 1993; Bogárdi, 1974). During structure
breaching, the flow might develop into unsteady, supercritical flow and if these condi-
tions apply, the use of unsteady non–uniform sediment transport equations is more
appropriate. However, due to their absence the Meyer-Peter and Müller (1948);
Exner (1925), Einstein–Brown (Brown, 1950), and the modified Meyer–Peter and
Müller formula adapted by Smart (1984) are commonly used.
Er = k(τ − τc )a
where, Er presents the erosion rate, k and a are two correlation coefficients, τ
presents the flowing water tractive stress and τc is the critical tractive stress for the
erodible material.
Figure 2.11: Description of the flow over an embankment as from Powledge et al.
(1989).
section that is the submerged part of the breach channel sides is supposed to erode
at the same rate as the unsubmerged part and the breach channel bottom. Most
of the mathematical models deal with the homogeneous dams or dikes. The failure
modelling of the heterogeneous structures is commonly done through averaging the
characteristics
a) of soil properties.
b) c) d)
The weir equation that estimates the unit discharge for the free flow (low tailwater)
condition is generally expressed as:
q = CH 1.5 (2.1)
where q is the discharge per unit width, C is the discharge coefficient that depends
on the weir (breach) shape, and H is the total (energy) head above the crest. The co-
efficient C ranges between 1.60 and 2.15 in SI metric units. If the crest is submerged
by tailwater, then Eq. 2.1 becomes
q = Cs H 1.5 (2.2)
the calm reservoir (static energy head) to subcritical velocity state (static and dy-
namic head) over the upstream portion of the dam crest. In this zone the hydraulic
forces and flow velocities are low. The small energy slope of the subcritical flow range
imposes small tractive stresses too. In the second zone, the flow travels through crit-
ical velocity on the crest to supercritical flow across the remainder of the dam crest,
to the downstream slope. In this zone the tractive stresses might become significant.
In the third zone a rapidly accelerating turbulent supercritical flow is observed on
the steep downstream slope. Here the energy levels increase significantly as the flow
proceeds along the downstream slope of the dam. Due to the steep energy slope, the
vertical velocities might increase significantly and the tractive stress will be large.
The downstream slope of the dam is a steep slope in hydraulic terms and a correc-
tion must be made in the calculation of gravitational forces.
The weir formula is often used to calculate the flow along the crest. The steady
non–uniform flow equations have also been used to compute the water depths, ve-
locities, and energy slope on the downstream slope despite the short reach of the
breach channel and its steep slope because of their relatively simpler computations
compared to full de Saint–Venant equations.
Chapter 3
3.1 Introduction
Nishat (2006) defines flood as “the process of inundating normally dry areas and
causing damages”. Inundation does not always pose a risk and not necessarily has
only negative impacts. It can have positive effects on soil fertility, ecosystems, etc.
(Nishat, 2006). Floods∗ , on the other hand, can be very severe and have enormous
consequences in terms of economic, ecological and social values. Floods’ destructive
forces are a threat that has been faced by humans for generations already. Noah’s
legend is one of the thousands of legends related to floods and their devastating
consequences.
Therefore, novel strategies and methods are continuously developed worldwide for
dealing with floods (Knight et al., 2006). Several common types of measures are
distinguished, such as:
1. Measures for preventing flooding: dam or dike construction, maintenance and
improvement, river dredging, etc.
∗ Reader is referred to FLOODsite (2005) for definition of flood and risk related terms.
26 Section 3.2. The Netherlands’ long history of battle against floods
2. Measures for reducing flood impact: retention and detention basins, flood-
ways, flood forecasting, spatial planning, awareness raising (games, role–plays,
brochures, etc.).
3. Measures for dealing with an approaching flood and during a flooding period:
Decision Support Systems (DSS), warning and emergency plans, evacuation
and local emergency protection, etc.
These measures taken against flooding are categorized in two groups of strategies:
The first strategy aims at fully preventing floods. However, as flood prevention is
not always possible and feasible, nowadays more emphases is given to strategies that
improve the coping capacity, resilience, and adaptability, and offer more flexibility
for future interventions. Disaster mitigation is suggested as a priority at numerous
international events such as the Fourth World Water Forum in Mexico† in 2004,
the Conference of International Center for Water Hazard and Risk Management‡
in 2006, etc. In the following sections we describe flood dealing strategies in two
countries that are similarly vulnerable to water related disasters.
Numerous dams and dikes, sluices, locks, and storm surge barriers were built in the
Netherlands to protect the land from sea and river flows. However, in 1993 and 1995,
§ The Saemangeum Seawall, located on the southwest coast of the South Korea, is the world’s
longest man–made dike from the time of its inauguration in 2006, being 0.5km longer than the
Afsluitdijk dike.
28 Section 3.2. The Netherlands’ long history of battle against floods
(a) (b)
(a) (b)
the Netherlands was again under threat of significant flooding, when the Rhine and
the Maas Rivers reached very high levels and the stability of the dikes seemed no
longer guaranteed. Some 200,000 people were evacuated during the January 1995
storm.
Nowadays, there are over 16,000km of dikes and 300 structures that protect the
Netherlands from flooding. About 2,400km of constructed dikes are designated as
primary dikes - dikes in direct contact with water bodies (sea, lakes and rivers) -
and 14,000km are secondary dikes - dikes sorrounding the canals. The design of
sea and river dikes is traditionally based on a design water level with a particu-
lar frequency of exceedance. Following the disaster of 1953, the Delta Committee
(1960) defined the design water levels for the sea dikes, which are built to withhold
the 10,000 year return period storm surge levels. The Commission on River Dikes
(1977) recommended that river dikes should be designed and improved to retain
water levels associated with a governing rate of discharge of the Rhine River at
Lobith (entry location of the Rhine River in the Netherlands), which is exceeded
with a frequency of about 1,250 year (CUR/TAW, 1990). The design levels keep
increasing, as the current 1,250 year return period discharge at Lobith corresponds
to 16,500m3 /s while further increase in the design discharge is forecasted to be from
16,800 (minimum scenario) to 18,000m3 /s (maximum scenario) by the year 2100
(Kwadijk and Rotmans, 1995). Still, those values are uncertain as the 1,250 year
flood event is forecasted based on only 100 years of records.
Dividing a dike ring area into compartments might significantly reduce the risk.
During the Flood Risks and Safety (Floris) project, the re–estimation of flooding
probabilities and consequences of flooding for 16 dike ring areas (out of 53 in total),
together with in-situ examination of the dike rings was accomplished. The objective
was to check the reliability of the dikes and the hydraulic structures, as well as to
identify and reduce uncertainty. The risk was calculated for each dike ring area
separately ignoring hydraulic interactions effects, that are not taken into account
in the current design and safety assessment practice in the Netherlands despite the
awareness of its importance. The damage in the province of South Holland varied
approximately from e280 million to e37 billion (depending of the location of the
breach) when the presence of embankments (highway, railroads, etc.) and natural
terrain was considered, instead of e290 billion calculated assuming the flooding of
the whole area without partitioning. For more details the reader is referred to the
report by the Dutch Ministry of Transport, Public Works and Water Management
(VenW, 2005).
Dutch are currently implementing the plan to give back some of the land to water.
Creating room for the river means more storage for flood water by relocating the
dikes further inland, lowering the floodplains, creating bypasses or so–called green
rivers, creating detention areas along the river, etc. (see Figure 3.5). The green river
definition is used since this solution is believed to give more priority to ecological
benefits rather than only economic. It is a general belief that the ‘Room for the
River’ policy is effective. However, its implementation at a large scale might be dif-
ficult especially when periodical flooding of inhabited areas is involved or when the
water retention basins highly affect the economic development of the community.
The idea of amphibious floating houses and roads is currently on its way to imple-
mentation. The first floating village, expected to accommodate 20,000 people, is
under construction at a semi aquatic city on IJburg near Amsterdam. This tech-
nology allows the houses to float on the water if the water levels rise during a flood
event.
Vis et al. (2003) and Klijn et al. (2004) compared the controlling strategies of suc-
cessively heightening and strengthening of dikes for coping with the Rhine River
floods with two resilience strategies consisting of
1. Using detention areas of low economic value along the river and partitioning
of a dike ring area into compartments with different flooding probabilities; or
Illustration
Figure of typical location
3.5: Illustration of flood risk
of typical management
location measures
of flood risk within the river basin.
management measures within
(From Project 5).
the river basin (Hooijer et al., 2004).
4. Economic impact,
5. Ecological impact,
Figure 3.6: A map of the River Rhine basin with flood travel times (in days) to the
Dutch–German border (Hooijer et al., 2004).
strategies requires large investments in the short–term whereas their revenues will
become clear only after relatively long period of time.
Different types of flood risk management measures were considered during the IRMA
–SPONGE project (Hooijer et al., 2004), focusing on flood prevention measures, de-
velopment of methodologies to assess the impact of flood risk reduction measures
and climate change scenarios. The objective was “to support the spatial planning
process in establishing alternative strategies for an optimal realization of the hy-
draulic, economic and ecological functions of the Rhine and Meuse River Basins”
(Wolters et al., 2001). Alternative resilience strategies have been elaborated and
assessed for their hydraulic functioning and ‘sustainability’ in risk management cri-
teria. The IRMA–SPONGE project (Hooijer et al., 2004) concluded that for the
Rhine River:
34 Section 3.3. Japan’s experience in dealing with floods
As the flood risk increases, public awareness becomes a key factor for saving lives
and it is important to have better participation of people in the decision making
related to measures needed to decrease the risk. The population living in risk zones
should be aware of the flood hazard maps. This is something that is not gener-
ally implemented in the Netherlands, but has been widely adapted in some other
countries (e.g. disseminated by the Internet in UK).
Rivers with their short length, steep slopes and narrow catchment areas are another
source of flooding disaster. In response, engineers have taken disaster prevention and
Breach width
Breach depth
Breach side slope
River zone
[After the construction of a super levee]
Existing back slope of riverbank is used
Pervious foundation
Figure 3.8: Behaviour of conventional dike (above), and super levee (below) subject
Flow line
to overflow, seepage and earthquake shaking.
Impervious
management measures. layer control and management is implemented through a
Flood
number of structural and non–structural measures. In addition to these mentioned
in Section 3.1, artificial underground channels, stimulation of flood–proof building
construction, installation of flood sensors that can assist in deciding on evacuation,
and other options described in detail below are taken in Japan.
The underground floodways and regulating reservoirs are two solutions applied in
Japan to deal effectively with urban flooding. The construction of super levees
(Figure 3.7) is seen as a good solution to prevent flooding in urban areas where
a potential dike break may have catastrophic consequences. In the battle against
floods and earthquakes (Figure 3.8), they seem to offer stronger foundation and
better protection. A super levee is considered resistant to overflow and seepage.
Having a width of about thirty times their height, super levees have the strength to
withstand severe flooding. Super levees provide usable land and space for dwellings
and restores access to the riverfront.
The design tide level for coastal dikes is estimated based on the recorded values or
the expected maximum water level creating uncertainty about any storm stronger
than the designated storm. To deal with these exceptional events, early warning sys-
tems are in operation and evacuation plans are utilized. Urbanization near coastal
Breach depth
Breach side slope
River zone
[After the construction of a super levee]
Existing back slope of riverbank is used
Time
1
Evacuation Evacuation
announcement order 0
Fukushima and (b) Expression of the safety degree against flood water levels (Mer-
abtene et al., 2004).
Evacuation Time
areas and extensive expansion of mega cities in underground
announcement Evacuation
order
levels make people more
vulnerable to potential flooding. For warning the population of the risk posed due
to flood hazard, vulnerability maps are made available and are distributed to public.
Merabtene et al. (2004) confirms that warning the population using up to date in-
formation technology and preparatory work of flood hazard map distribution among
them proves to be effective to mitigating flood damage and reduce the numbers of
casualties. During the torrential rain of 1998 in Fukushima, people of Sukagawa city
that were aware of flood hazard maps evacuated 1 hour earlier than those who were
not (Merabtene et al., 2004). Figure 3.9a shows the difference in evacuation time
among the people with and without knowledge about flood hazard maps.
A comprehensible Flood Risk Indicator has been developed in Japan to indicate the
degree of safety/risk against flood damage through the means of a chart depicting
the frequency of floods and inundation level versus the height of people and houses
(see Figure 3.9b).
dated areas, are very important for decision making, emergency evacuation and early
warning.
Most of the research on modelling dam break flood wave propagation has been fo-
cused on the movement of clear water in the downstream valley, excluding debris
flows and sediment transport. Clear water dam break floods have been studied ex-
tensively experimentally, analytically and numerically.
The De Saint–Venant (1871) equations or shallow water equations are used for mod-
elling dam break flood propagation. These equations consist of the mass and mo-
mentum conservation equations, and assume that the vertical velocities are much
smaller than the horizontal velocities, which leads to hydrostatic pressure distribu-
tion in a channel cross section (Derivation of these equations can be found in Stoker
(1957); Abbott (1979); Cunge et al. (1980); Chow (1959); Chaudhry (1993)).
At first, dam break flood analysis was assuming instantaneous and complete fail-
ure process rather than gradual failure of a dam. The sudden failure results into a
highly unsteady flow, with a forward (positive) wave advancing in the channel down-
stream the dam and a back (negative) disturbance propagating into the still water
upstream the dam (see Figure 3.10). Owing to their mathematical complexity, the
analytical integration of de Saint–Venant equations in an unsteady flow situation
can be obtained only for very few idealized situations. The first explicit solution to
a dam break problem was given by Ritter (1892) who solved the de Saint–Venant
equations analytically for the case of dam break flow in a horizontal and infinitely
large rectangular channel neglecting the hydraulic resistance caused by stream bed
friction and turbulence.
When the wave is considered to advance into still water of appreciable depth, the
flow is approximated by a shock wave with jump conditions of mass, momentum,
and energy conservation. The solution is deduced by evaluating the relation between
hydrostatic forces and rate of change of momentum at the wave front. Many authors
have carried out experimental investigations for the purpose of checking the validity
of the analytical solution Schoklitsch (1926); Dressler (1954); U.S. Army Corps of
Engineers (1960, 1961); Montuori (1965), etc.
The experiments of Schoklitsch (1917) indicated that the velocities for the forward
wave may be as low as 40 percent of the result obtained by Ritter’s solution, while
having good agreement for the tip of the negative wave. Later, Dressler (1952)
considered the wave propagation on a dry horizontal channel bed taking into con-
sideration the effect of hydraulic resistance in the forward part of the flow. The
hydraulic resistance caused by bed friction and turbulence in the shallow front re-
gion of the flow were considered dominant over the effect of the small slopes that
were investigated later by Dressler (1958).
38 Section 3.4. Modelling of propagation of flood caused by structural failure
The numerical solution of the de Saint–Venant equations in natural streams was first
achieved using the methods of characteristics. Later, Ré (1946) analyzed the dam
break flood wave for a non–horizontal initially wet channel with a Chézy resistance
coefficient using a finite–difference method applied to the characteristic equations.
Different numerical schemes have been developed to solve the de Saint–Venant equa-
tions in 1 and 2 dimensional forms. Finite–difference (Abbott, 1979), finite–element
methods (see e.g. Hervouet (2007)), and lately finite–volume (Toro, 1999) methods
are generally preferred for their ability to reproduce discontinuous solutions.
Depending on the addressed problem and on the numerical scheme used to solve the
shallow–water equations, conservative or non–conservative forms of the equations
can be used. For different cross sections - arbitrary shape (natural shape), prismatic
or rectangular - different forms of the shallow–water equations can be written. In
Table 3.1 the conservative and non–conservative form of the shallow equations in
arbitrary shape cross section are presented. For further information on modelling of
dam break induced flows in complex topographies the reader is referred to Soares
Frazão (2002); Chanson (2005).
During dam breaching, reservoir trapped sediment and dam material is moved away
together with the water and is deposited in the downstream valley. According to
Costa and Schuster (1988), historical floods from dam failure events have induced
Chapter 3. Current Approaches for Dealing with Flooding 39
∂h
Non-conservative form on ∂t + U ∂h ∂U
∂x + h ∂x = 0
arbitrary cross section,
where: U = velocity
∂U
∂t + U ∂U ∂h
∂x + g ∂x =g (S0 − Sf )
severe soil movements in various forms: debris flows, mud flows, floating debris and
sediment–laden currents. Intense erosion and deposition is expected to highly affect
the morphology of the valley that in turn affects the flow. Still, nowadays, the prop-
agation of flood wave induced by a structural failure is commonly modelled ignoring
any presence of debris and sediment. It is the complexity of the processes involved,
that limits the modelling of floods induced by structural failure to clear water wave
propagation. Despite the awareness of the importance that the proper modelling of
flood water and sediment/debris interaction have on the hazard evaluation, mathe-
matical or numerical modelling of this process is not yet satisfactory. For information
on ongoing work on modelling of debris and sediment transport during structural
failure see e.g. Leal et al. (2002); Nsom (2002); Spinewine and Zech (2007).
In this thesis we use Sobek 1D2D, an integrated one– and two–dimensional numerical
simulation package developed by WL | Delft Hydraulics for modelling the propaga-
40 Section 3.4. Modelling of propagation of flood caused by structural failure
tion of flood wave caused by a structural failure. Sobek 1D2D solves the shallow
water equations using the so–called ‘Delft Scheme’ (Stelling et al., 1998; Stelling
and Duinmeijer, 2003). The 1D schematization for flow through a river channel is
combined with a 2D schematization for overland flow, bringing the model’s behavior
closer to the real physical behavior (see Figure 3.11). A control volume approach is
used for the 1D calculation points of the channel in combination with the 2D grid
cells. The flow in the 1D channel below the 2D grid bed level is treated as 1D flow,
while the flow above the 2D grid level is treated as 2D flow within the area of the
2D grid cell.
Sobek 1D2D is capable of simulating the dynamics of overland flow over an initially
dry land, as well as flooding and drying processes on every kind of geometry (Dhon-
dia and Stelling, 2002). It can correctly simulate the transition between sub and
supercritical flows and vice versa (Verwey, 2001). Stelling and Duinmeijer (2003)
give a description of the grid scheme used in the two dimensional overland flow
model of Sobek 1D2D, and present a comparison between numerical and experi-
mental results of the dam break flood propagation experiments under dry and wet
conditions. A GIS based tool is associated with Sobek 1D2D for data input and
output processing.
Janssen et al. (1994) defines uncertainty analysis as the study of the uncertain as-
pects of a model and their influence on the model output. Stochastic modelling
is traditionally used to analyze uncertainty and uncertainty propagation associated
with input data and model parameters that are represented by probability distribu-
tion functions rather than by a single value.
Monte Carlo Simulation and Latin Hyper Cube sampling are some of the methods
for stochastic model calculations. Due to their time and calculation complexity, less
time consuming sampling methods (best case, mean case, and worst case sampling
methods) have been designed, that consequently provide less accurate information
on the uncertainty in the outcome. The lack of information about the shape of the
probability distribution functions of the values of the input data and model parame-
ters leads to the idea of uncertainty of the uncertainty methods such as Monte Carlo
or Latin Hyper Cube. Alcamo and Bartnicki (1987) argued that the uncertainty
42 Section 3.5. Uncertainty associated with flood modelling
Current Approaches to
Dam/Dike Breach Modelling
4.1 Background
One important step in dam break modelling is the accurate prediction of the breach
outflow hydrograph. Significant effort has been made in developing models that
accurately predict breach characteristics; still, many uncertainties related to breach
modelling are still existent (Franca and Almeida, 2004; Morris, 2005; Zagonjolli
et al., 2005; Zagonjolli and Mynett, 2005a). Due to the incomplete understanding
of breach formation processes and hence the limited capabilities of mathematical
description of dam breaching mechanisms, the presently available models rely on
several assumptions as mentioned in Section 2.3.
During the IMPACT project, a European project investigating extreme flood pro-
cesses and uncertainties∗ , several breach models were assessed using field and lab-
oratory scale experimental data. Though these models offer improved capabilities
and reliability in comparison with earlier models, their prediction accuracy is still far
∗ The reader is referred to the extra issue of Journal of Hydraulic Research, VOL 45, 2007.
44 Section 4.2. Experimental work
from satisfactory. A 30% uncertainty band was identified for predicting peak out-
flows in the field and laboratory tests. When applied to the historical failure event
of the Tous Dam in Spain, a 50% uncertainty band was observed. Poor prediction
of the outflow hydrograph and unreliable prediction of the breach development in
time was observed in the experimental results (Morris, 2005) suggesting that further
research is needed to increase the capabilities of the existing physically based mod-
els. In this chapter we describe the present tools and methodologies used for breach
modelling.
During recent years, several field tests and laboratory experiments were carried out
modelling gradual failure of dams. In the Netherlands, research regarding breach
growth in dikes started with some field experiments on non cohesive sand dikes
in 1989. Two fields tests were carried out at ‘Het Zwin’ located in Zeeuwsch-
Vlaanderen, at the boundary between the Netherlands and Belgium. The exper-
iment was focused on modelling sea sand dike breaching processes neglecting the
effect of waves on the test results. The results of two other tests performed on 6th
and 7th October 1994 are reported by Visser et al. (1996). Later, in 1996, large-scale
field experiments were carried out for investigating the three dimensional aspects of
breach growth in sand dikes (Visser, 1998).
Different failure modes and triggering conditions have been simulated in small scale
laboratory tests and large scale field tests with the aim to better understand the
breaching mechanisms and obtain data for calibration and validation of mathemat-
ical models. For further information on some of the experiments undertaken the
reader is referred to Tinney and Hsu (1961); Tingsanchali and Hoai (1993); Cole-
man et al. (2002); Rozov (2003); Zhu et al. (2006). Here we focus on the latest
experimental work carried out during the IMPACT project (IMPACT, 2004).
Several large scale field tests have been performed on non–cohesive and cohesive em-
Chapter 4. Current Approaches for Breach Modelling 45
bankments failing from overtopping and piping failure modes. The five large scale
field tests (see Figure 4.1) conducted in Norway are summarized in Table 4.1. The
information about the twenty two laboratory tests conducted at a 1:10 scale at the
HR Wallingford laboratories are summarized in Table 4.2.
These field and laboratory results lead to extensive validation of the numerical mod-
els being used and under development. In contrast to other experimental findings,
during the field tests in Norway it was concluded that the breach shape is rectan-
gular (vertical walls), not trapezoidal as often assumed previously. Morris (2005)
suggest that the trapezoidal shapes might develop after the breaching is finalized,
during the drying process of the embankment material. However, it is important
to mention that in all laboratory experiments and field tests an initial rectangular
breach channel was imposed as initial condition, which might have influenced the
further development of the breach shape.
46 Section 4.2. Experimental work
(a)
(b)
Figure 4.1: Development of the breach in the field tests in Norway for (a) piping
failure and (b) overtopping failure (Vaskinn, 2003).
Chapter 4. Current Approaches for Breach Modelling 47
Numerous empirical formulations have been developed for predicting dam breach
characteristics and peak outflows based on hydraulic and geometrical characteristics
of dams and reservoirs e.g. reservoir storage, depth and volume of water in the
reservoir at the failure time, dam height, etc. In the following, some of the available
empirical equations are described.
The U.S. Bureau of Reclamation (1988) suggested that for earthfill dams the ulti-
mate width of a rectangular dam breach shape equals three times the initial water
depth in the reservoir measured to the breach bottom elevation assumed to be at
the stream bed elevation. This relationship was used as a guideline in the National
Weather Service Simplified Dam Break Model (SMDBRK).
where, Bavg is the ultimate average breach width and hw is the water depth in the
reservoir initiating the failure.
Hagen (1982) analysed 18 historical events of dam failure from overtopping. The
product of volume Vw and depth hw of water in the reservoir triggering the failure,
hereafter called dam factor DF , was plotted versus peak discharge Qp . As a result,
Hagen provided an envelope equation:
The peak outflow discharge varied from 730 to some 83,000m3 /s while the dam factor
Vw hw ranged from 2.9×106 to 4.8×1010 m4 .
Table 4.3: Estimation of breach width and time of failure as a function of dam height
Hd , crest length CL and different dam types.
Type of dam Breach width √ Formation Time
Earthfill & rockfill 3Hd √Hd
Concrete gravity CL/3 Hd
Arch CL Hd /50
Singh and Snorrason (1982, 1984) analysed some historical earthfill dam failure
events due to overtopping. One finding of this analysis was the identification of a
strong correlation between breach width and dam height. For most of the cases the
breach width fell between the two bounding lines: B = 2hd and B = 5hd . The max-
imum water depth above the dam crest triggering failure varied in a range from 0.15
to 0.61m, and the failure time from inception to completion of the breach, fell in the
range between 0.25 to 1 hour. Singh and Snorrason (1982, 1984) analysed the hypo-
thetical failure of eight earthfill dams in Illinois (USA) with a height hd ranging from
4.4m to 28m. Six out of eight dams were simulated for failing from overtopping and
two of them were simulated for failing from piping assuming a Probable Maximum
Flood inflow in the reservoir. US Army Corps of Engineers HEC-1 and National
Weather Service BREACH (Fread, 1988) models were used for predicting the peak
outflow. In both models, the maximum failure time, maximum breach depth and
width, and initial water depth above the dam crest (for overtopping failure) were
predefined by the user equal to 0.5 hours, hd , 4hd and 0.15m, respectively. The
obtained peak outflows were plotted versus the reservoir storage S and dam height
hd and the following regression equations were obtained:
Qp = 13.4h1.89
d (4.6)
Costa (1985) analysed 31 historical dam failure events. The height of the dams
considered in the analysis varied from 1.8m to 83.8m, while the volume of the reser-
voir at the failure time ranged from 3.8×103 m3 to 7.0×108 m3 . No distinction was
made between different failure modes and dam types. The following envelope curves
encompassing 29 data points were derived:
100000
Peak discharge [m /s]
10000
3
1000
100
10
1.0E+03 1.0E+05 1.0E+07 1.0E+09 1.0E+11
4
Dam factor [m ]
Costa MacDonald & Langridge-Monopolis Froehlich
Figure 4.2: Dam factor vs. peak discharge for dams analysed by MacDonald and
Langridge-Monopolis (1984), Costa (1985), and Froehlich (1987).
Froehlich (1987) analysed 22 embankment dam failures with hw ranging from 3.4m
to 77.4m and Vw ranging from 0.1 to 310 million m3 . The regression equation ob-
tained is expressed as:
Qp = 0.607(Vw 0.295 hw )1.24 . (4.12)
In all analysis, more than 90% of the analysed dam failure events belong to dams in
the USA. In Figure 4.2, peak outflow regression relations suggested by MacDonald
and Langridge-Monopolis (1984); Costa (1985); Froehlich (1987) are presented along
with measured peak outflows.
Broich (1998) analysed 39 embankment dam failures and obtained two regression
50 Section 4.4. Physically based models
equations which relate peak outflow to the depth and volume of water in the reservoir
at the initial failure time in the following way:
where Vw is in 106 m3 .
Wahl (2004) carried out an uncertainty analysis of the empirical equations using
a compiled database of 108 dam failure events. In the analysis no distinction was
made between different failure modes (the same stands for Costa (1985) analysis). It
is clear that for peak outflow prediction based on dam height and reservoir storage,
the distinction between different failure modes is important. The water depth in the
reservoir can be lower than the dam height in case of a piping failure mode, and
higher than the dam height during an overtopping failure mode.
The flow through the channel is calculated using the broad–crested weir flow equation
with a discharge coefficient ranging from 2.9 at the beginning of failure to 2.2 at peak
flow
Q = CLH 1.5 , (4.15)
where C is the discharge coefficient, H is the water depth above the breach bottom,
L is the length of the breach channel, and Q is the discharge.
Sediment erosion is deduced by relating the force of the flowing water through the
breach channel to the resistive shear strength of the soil particles acting on the
bottom surface of the breach channel. The rate of erosion is expressed as a function
of the rate of change of water flowing through the breach.
Harris and Wagner (1967) presented a simple model for the breaching of embankment
dams due to piping and overtopping. The breach shape is assumed parabolic with
top width of the parabolic shape Btop assumed to be 3.75 times the depth D (see
Figure 4.3). The flow through the breach channel, assuming critical flow over a
Cross section Plan view
Upstream slope
Downstream slope
abutment
Btop
broad–crested weir and accounting for the parabolic breach shape, is expressed in
SI units as
Q = 5.54H 2.5 . (4.16)
Three modes of sediment erosion were adopted in the model: bed load, suspended
load and saltation load. The Schoklitsch bed load formula (Schoklitsch, 1917) was
modified to estimate the bed load transport along the breach channel. The rate of
sediment transport was computed as
where G is the sediment transport rate, S is the hydraulic slope, and d is the soil grain
diameter (expressed in English units). The suspended load had to be estimated based
on the turbulence intensity and fall velocity. A constant sediment concentration is
assumed and no slope stability or failure mechanism is considered.
Brown and Rogers (1977, 1981) developed the BRDAM model that simulates the
breach erosion of earthfill dams due to piping or overtopping. The initial channel is
created at the dam crest, when simulating overtopping failure. The parabolic breach
shape of the notch is assumed constant during the whole process of dam breaching.
Some 45◦ side slopes and a channel slope of 5◦ up to 20◦ is assumed, depending on
the fill material of the dam. The outflow during overtopping failure is calculated by
the broad–crested weir formula:
√
Q = gBtop yc 1.5 . (4.17)
The critical depth of the flow over the crest is taken to be 75% of the water depth
above the breach bottom level. Like Harris and Wagner (1967), the Schoklitsch
(1934) bed load formula is used to estimate the solid load which is transported
along the breach channel bed assuming constant sediment concentration. The slope
stability and lateral erosion mechanisms are not taken into account in the model.
Ponce and Tsivoglou (1981) presented a model for gradual failure of earthfill dams
52 Section 4.4. Physically based models
due to overtopping. The initial location of the breach is assumed at a weak point
on the crest and downstream face. The top width of the breach opening is related
to the flow rate.
Lou (1981) developed a mathematical model that is similar to the Ponce and Tsivoglou
(1981) model. The breach grows in space and time until an equilibrium section is
attained. The most efficient stable section derived for describing the breach shape
is expressed as:
π
y = hmax cos( x),
Btop
where y is the depth at a distance x, hmax is the maximum depth at the center,
and x is the distance from the center. De Saint–Venant equations are applied to
model the unsteady flow of water during breaching of an earth dam. The dam is
divided into n-reaches, with the discharge flowing from the reservoir routed down-
stream from the dam. During dam overtopping, the sediment discharge is computed
using three approaches: 1)Du Boy’s equation (Du Boys, 1879) for bed load sediment
transport combined with Einstein’s equation for suspended load sediment transport
to calculate the total sediment transport; 2) a sediment transport formula derived as
a function of failure duration, erodibility index, and water velocity, 3) Cristofano’s
equation for computing the erosion rate. Du Boy’s equation is written as:
where qbl is the rate of soil transported as bed load per unit width, (τ0 − τc ) is the
excess shear stress, and K is a parameter dependent on the thickness of the moving
bed layer, velocity of the layer as well as critical shear stress τc .
Einstein’s (1942) suspended load rate per unit width can be expressed as
30.2h
qsl = Ks 2.303log I1 + I2 , (4.19)
d65
where h is the flow depth, I1 and I2 are integral quantities depending upon the flow
depth, d65 is a representative grain size diameter, Ks = 11.6Ca us abl , abl is thickness
of the bed layer where the suspended load starts, us = (gRS)0.5 and Ca is the
sediment concentration at a known distance from the bed.
Lou (1981) as described in Singh (1996) derived an expression for solid transport in
embankments by relating the kinetic energy to the erosion process, with the following
expression:
Ce
Er = td u 4 ,
12
where Ce is a constant, td is the duration of failure, u is the water velocity and Ms is
the mass of soil lost during erosion. Slope stability mechanisms are not considered,
while the lateral erosion stops once the peak flow is reached.
Chapter 4. Current Approaches for Breach Modelling 53
The National Weather Service model BREACH developed by Fread in 1984 and
later revised in 1988 (Fread, 1988) simulates overtopping and piping failure modes
for cohesive and non–cohesive embankment dams. The dam may consist of two
materials with different properties in the inner core and outer zone of the dam or
otherwise be homogeneous. Erosion initially occurs along the downstream face of
the dam where a small rectangular–shaped rivulet is assumed to exist along the dam
face. The sides of the breach channel are assumed to collapse when the depth of the
breach reaches a critical value and then the breach is transformed into a trapezoidal
shape channel. Maximum values of breach dimensions are defined by the user (dam
height, maximum top and bottom breach width limited from the valley cross sec-
tion). The flow through the breach channel is calculated by the broad–crested weir
equation and the orifice flow relationship (for piping). The sediment transport rate
is calculated by the Meyer-Peter and Müller (1948) sediment transport relation as
modified by Smart (1984) for steep channels.
DEICH (Dam Erosion with Initial breach Characteristic) models are developed at
the University of the Federal Armed Forces Munich (Broich, 1998). Depending on
their calculation approach, they are named: DEICH A (analytical model), DEICH P
(parametrical model), and DEICH N1/N2 (1D/2D numerical model), respectively.
These models calculate the overtopping failure of cohesive and non–cohesive embank-
ment dams with or without covering core. Initially a channel or pipe is created at the
dam crest. The breach develops parallel to the dam crest. A constant trapezoidal
breach shape with side slopes of 45◦ and a constant relationship between lateral and
bottom erosion is assumed. Breach discharge is calculated using the broad crested
weir formula enhanced to take into account backwater effects. DEICH A and DE-
ICH P calculate the total sediment load, while DEICH N1/N2 distinguish between
bed load and suspended load. DEICH A uses Ponce–Tsivoglou’s transport formula
(Ponce and Tsivoglou, 1981), a combination of the Exner with the Meyer-Peter and
Müller (1948) equation. Slope stability mechanisms are not considered in all models.
1. Time Dependent: The development of the dam breach is specified by the user
in terms of breach level, width and slope as functions of time.
54 Section 4.4. Physically based models
Initial width
5 4 1 4 5
Initial crest level 2 Maximum breach height
Reference level
Figure 4.4: Breach development in Sobek 1D2D, first in vertical direction (step 1,
2, and 3) and then in horizontal direction (step 4 and 5).
In the first case, the breaching development is user defined. The user must provide
the initial breach width, and initial crest level of the dam, maximum breach depth,
the starting time of the breaching process, the duration of the breaching process,
the maximum breach–width or the maximum duration for reaching the maximum
breach width. The discharge through the breach channel is calculated using stan-
dard weir formulas.
In the second case, the user must supply information about the lowest level that the
breach will reach, the maximum flow velocity for which erosion does not occur, the
starting time of the breaching process and the duration of the breaching process. In
this case the increase in crest width as a function of time is not known beforehand,
but depends on the occurring hydraulic conditions and the parameters defined.
For information about other breach models the reader is referred to Table 4.4 and
Chapter 4. Current Approaches for Breach Modelling 55
Singh (1996); Singh and Quiroga (1987); Loukola and Huokuna (1998). To fur-
ther understand the mechanisms associated with embankment failure, we examine a
database of the historical events. In the following sections, we present a methodol-
ogy for estimating breach shape and breach outflow characteristics based on a data
mining approach.
Table 4.4: Breach model characteristics. 56
Model Geometry Hydraulics Sediment
Cristofano (1965) Trapezoidal with side angle Broad-crested weir Developed empirical
equal to angle of repose of formula
the compacted material
Harris and Wagner (1967) Parabolic with top width Broad-crested weir Modified bed load
3.75 times the depth Schoklitsch formula
and suspended load formula
based on turbulence and
fall velocity
Brown and Rogers (1981) Parabolic with side slope of 45 Broad-crested Modified bed load,
BRDAM model Schoklitsch formula
Ponce and Tsivoglow (1981) Top width flow rate relation de Saint-Venant Exner with
Meyer-Peter-Muller
Lou (1981) Most effective stable section de Saint-Venant 1. Du Boy & Einstein,
(Cosine curve shape) 2. Lou,
3. Christofano.
Nogueira Effective shear stress section de Saint-Venant Exner equation with
(Cosine curve shape) Meyer-Peter-Muller
Fread (1988) Rectangular and trapezoidal Broad crested weir Meyer-Peter-Muller
NWS BREACH orifice flow modified by Smart
Singh & Quiroga (1987) Trapezoidal Broad crested weir Einstein-Brown
BEED
Loukola & Houkuna (1998) Trapezoidal Broad crested weir Meyer-Peter-Muller
EDBREACH
Broich (1998) Diffusion approach de Saint-Venant Several transport eqs.
DEICH N1/N2
Section 4.4. Physically based models
Chapter 5
First get your facts, then you can distort them at your leisure.
Mark Twain
5.1 Introduction
While capabilities of computational modelling systems are continuously advancing,
data from sensor measurements, satellites and computational operations are rapidly
expanding. Hence, data mining techniques are becoming increasingly more popular
nowadays and are being applied to different fields including water science and en-
gineering (Minns and Hall, 1996; Price, 2000; Babovic et al., 2001; Mynett, 2002,
2004a,b, 2005; Solomatine, 2002).
Data mining techniques can be used to extract knowledge from large amounts of
data. Despite the scarcity of reliable data related to historical dam failure events, it
was hypothesized that present day data mining techniques might prove to be useful
to some extent for predicting breach characteristics and peak outflow resulting from
dam failure. Ultimate breach width and dam peak outflow might be predicted based
on dam and reservoir characteristics at the failure time. In this chapter, we present
a methodology for predicting dam failure characteristics and peak outflow using a
range of data mining techniques, including linear and non–linear regression methods.
The algorithms and underlying theory are introduced in the following section.
58 Section 5.2. Main principles of data mining techniques
The engineering of intelligent machines has been a focus of scientific research for a
long time. Already in 1950 Alan Turing (1950) proposed a test that would measure
machine’s capability to perform human–like conversation. It was John McCarthy
(1956) who first introduced the term ‘Artificial Intelligence (AI)’ as the topic of the
Dartmouth Conference in 1956, the first conference devoted to this subject, defin-
ing AI as “the science and engineering of making intelligent machines, especially
intelligent computer programs”. The ultimate goal of the artificial intelligence is to
imitate human intelligence.
The field of machine learning is concerned with the question of how to construct com-
puter programs that automatically improve with experience. It is a field based on
computer science, psychology, neuroscience and engineering. In recent years many
successful machine learning applications have been developed, ranging from data
mining programs, to information filtering systems, all aiming to program comput-
ers in the way that they could “learn to improve automatically with experience”
(Mitchell, 1997). There are different manners of machine learning, namely: super-
vised, unsupervised and reinforcement learning.
In the unsupervised learning the model is fit to input data with no a priori output.
The learner’s task is to represent the inputs in a more efficient way, as clusters, cate-
gories or reduce the dimensions. Unsupervised learning is used for data compression,
outlier detection, classification, etc.
In this chapter we use the supervised learning techniques and algorithms, namely lin-
ear and non–linear techniques, for extracting information from the available dataset
of historical dam failure events.
Chapter 5. Data Mining Techniques in Dam Breach Modelling 59
At the end of the 18th century, Gauss (1809) and Legendre (see Stigler, 1981) pro-
posed the method of Least Squares (LS) regression that consists of minimizing the
sum of the squared residuals with respect to the coefficient vector w as
k
X
minimize ri2 , (5.2)
w
i=1
where the residuals ri are the differences between what is actually observed and
what is estimated. However, this method is known to be highly influenced from
the presence of outliers in the dataset. Thus other versions of this estimator were
proposed such as replacing the squared residuals by the median of squared resid-
uals (Rousseeuw, 1984; Rousseeuw and Leroy, 2003). The least absolute deviation
method introduced in 1757 by Boscovich (Birkes and Dodge, 1993) (also known as
least absolute value method) and least median of squares linear regression methods
are considered better methods for regression and often recommended as robust or
outlier resistant alternatives of LS, though they can exhibit instabilities for small
changes in the data.
In contrast to the LS method, it minimizes the sum of the absolute values of the
residuals. Here, we use the Least Median of Squares (LMS) method (Rousseeuw,
1984) that is considered a less sensitive and more robust fitting technique compared
with the simple linear regression method. It is also considered to be the most widely
used robust estimator. It minimizes the median of the squared residuals with respect
to the coefficient vector w:
minimize med ri2 . (5.4)
w i
Thus the largest residuals in the sample (i.e. those whose absolute values are larger
than the median) are ignored, making this technique more robust in the presence of
outliers or noisy data. At least 50% of the data would need to be corrupt in order
60 Section 5.2. Main principles of data mining techniques
to skew the result, while for ordinary least squares a single corrupt data sample can
already give the resulting regression line an excessively large slope.
Artificial Neural Networks (ANNs) are envisioned to have similarities to the human
brain functioning. As the latter are built of very complex webs of interconnected
neurons, ANNs are built to form complex interconnected sets of units, each of which
takes a number of real–valued inputs and produces a single real–valued output (Fig-
ure 5.1). They can be used for approximating discrete–valued, real–valued and
vector–valued target functions.
Several algorithms are known to solve this learning problem e.g. perceptron rule,
delta rule, etc. (Mitchell, 1997). The perceptron rule finds a successful weight vector
when the training examples are linearly separable. It revises the weight wi associated
with input xi according to the rule:
wi ← wi + ∆wi , (5.6)
where
∆wi = η (t − o) Xi . (5.7)
Here t is the target output for the current training example, o is the output generated
by the perceptron, and η is a positive constant called the learning rate. The role of
Chapter 5. Data Mining Techniques in Dam Breach Modelling 61
hw
Vw Qp
hw
Hd
Vw Qp
Hd
Input layer Hidden layer Output layer
Figure 5.1: Architecture of a three layer neural network with three inputs and one
output.
Input layer Hidden layer Output layer
X1
X1
w1
w1
Inputs Inputs
X2 w2 X2
∑
w2
∑ Output Outpu
Figure 5.3: Commonly used activation functions: (a) Binary (threshold step func-
tion), (b) Sigmoid, (c) Piecewise Linear, and (d) Gaussian activation functions.
the learning rate is to control (lessen) the degree to which weights are changed every
time step. The rule converges within a finite number of applications of the perceptron
training rule to a weight vector that correctly classifies the training data, provided
they are linearly separable and provided a sufficiently small η is used (Mitchell,
1997). Contrary to the perceptron rule that can fail to converge when the data are
not linearly separable, the delta rule (or sometimes the LMS rule, Adaline rule, or
Widrow-Hoff rule - after its inventors) converges towards a best–fit approximation
to the target concept in that case. The delta rule uses the gradient descent to
search the hypothesis space of possible weight vectors to find the weights that best
fit the training data. This is done by specifying a measure for the training error of
a hypothesis (weight vector) relative to the training examples such as:
1 X
E(w) ≡ (to − od ), (5.8)
2
m∈M
where m is the set of training examples, to is the target output for training example
m, and o is the output of the linear unit for training example m. To understand
the gradient descent algorithm, we visualize the entire hypothesis space of possible
weight vectors and their associated E values, as illustrated in Figure 5.4.
During the gradient descent search, a weight vector is determined that minimizes
E by starting with an arbitrary initial weight vector, then repeatedly modifying
the weights in small steps, during the learning phase. During each step, the weight
vector is altered in the direction that produces the steepest descent along the error
surface shown in Figure 5.4. The direction can be found by computing the derivative
of E with respect to each component of the vector w. This vector derivative is called
the gradient of E with respect to w, written ∆Ew.
∂E ∂E ∂E
∆E(w) ≡ , , ..., . (5.9)
∂w0 ∂w1 ∂wn
The gradient specifies the direction that produces the steepest increase in E. The
negative of the vector therefore gives the direction of steepest decrease. Single per-
ceptrons can only express linear decision surfaces. In contrast, multilayer perceptron
(MLP) networks trained with a Backpropagation algorithm are capable of capturing
Chapter 5. Data Mining Techniques in Dam Breach Modelling 63
Figure 5.4: Hypothesis space of possible weight vectors and their associated error
values E (Mitchell, 1997).
Despite the biological motivation of the neural networks, the learned neural
networks are less easily communicated to humans and should be used when
the readability of the results is not important.
Each time a new query instance is encountered, its relationship to the previously
stored examples is examined in order to assign a target function value for the new
instance. These methods fit the training data only in a region around the location
of the query instance instead of estimating the target function once for the entire in-
stance space. Therefore, even a very complex target function can still be described,
by constructing it from a collection of less complex local approximations using the
instance based learning methods (Mitchell, 1997). These methods can construct a
different approximation to the target function for each specific query instance re-
quiring classification.
However, there are disadvantages associated with these kinds of methods such as:
the cost of classifying new instances can be high since the computation takes place
at classification time rather than when the training examples are first encountered.
And since all attributes of the instances are considered when attempting to retrieve
similar training examples from memory, the instances that are truly most ‘similar’
may well be a large distance apart.
The instance based learning methods include Nearest neighbor, locally weighted
regression methods, and case-based reasoning methods. The Nearest neighbor
method (IBk) chooses the closest points near the query point and uses its output.
The weighted average model averages the outputs of neighbouring points, inversely
weighted by their distance to the query point. The locally weighted learning re-
gression model (LWL) weighs the outputs of neighbouring points according to their
distance to the query point and then performs a local linear regression based on the
weighted data.
where ar (x) denotes the value of the r–th attribute of instance x. Then the distance
between two instances xi and xj is defined to be d(xi , xj ), where
v
u n
uX 2
d(xi , xj ) ≡ t (ar (xi ) − ar (xj )) . (5.11)
r=1
is a function that approximates the function f (x) and that returns the most common
value of f among the k training examples nearest to xq . If k is chosen equal to 1
then the 1–Nearest neighbor algorithm assigns to F (xq ) the value f (xi ) where
xi is the training instance nearest to xq . For larger values of k, the algorithm assigns
the most common value among the k nearest training examples.
The algorithm can better be explained through the graphical presentation of the
Voronoi diagram (Figure 5.5). The instances are points in a two–dimensional space
with the target function being boolean valued with positive and negative training
examples shown by ‘+’ and ‘-’ respectively. The 1–Nearest neighbor algorithm
classifies the query instance xq , as positive, whereas the 5–Nearest neighbor
algorithm classifies it as a negative example. The diagram shows the shape of the
decision surface induced by 1–Nearest neighbor over entire instance space.
The distance between instances is calculated based on all attributes of the instance.
As such it is important to select the most important defining attributes. Large
number of non important (irrelevant) attributes might influence the distance between
neighbours and as a result lead to misclassification. The k–Nearest neighbor
algorithm is robust to noisy training data and quite effective when it is provided a
hc hc H HH
d
Hd
---
-
+ + - + -
+ +
xq + xq
+ - -
+
+ +
- -
(a) (b)
Figure 5.5: (a) Example of Nearest neighbor and (b) Voronoi diagram.
where
1
wi ≡ 2. (5.16)
d(xq , xi )
Considering all training instances while approximating the function without the cost
of misleading is possible with distance weighting as the very distant examples will
have very little effect on F (xq ). The only disadvantage of considering all examples
is the ‘longer’ processing time. Furthermore, by taking the weighted average, the
impact of noisy training examples will be smoothed.
Chapter 5. Data Mining Techniques in Dam Breach Modelling 67
As before, ai (x) denotes the value of the ith attribute of the instance x. Fitting the
local training examples is done through an error criterion E (xq ), expressed in three
different manners.
1. Minimize the squared error over just the k nearest neighbors:
1 X 2
E1 (xq ) ≡ (f (x) − F (x)) . (5.18)
2
x∈knrs
2. Minimize the squared error over the entire set of training instances M , while
weighing the error of each training example by some decreasing function N of
its distance from xq :
1X 2
E2 (xq ) ≡ (f (x) − F (x)) N (d (xq , x)). (5.19)
2
x∈M
3. Combine 1 ands 2:
1 X 2
E3 (xq ) ≡ (f (x) − F (x)) N (d (xq , x)). (5.20)
2
x∈knrs
5.3 Application
5.3.1 Data preparation and model evaluation
During this research, we use the Waikato Environment for Knowledge Analysis
(WEKA) modelling package (Witten and Frank, 2000). It is a comprehensive suite
68 Section 5.3. Application
of Java class libraries that implement many state–of–the–art machine learning and
data mining algorithms. Tools are provided for preprocessing data, creating mod-
els using a variety of learning schemes, and analyzing the resulting classifiers and
their performance. The techniques described in the previous section are applied to
the relatively small database of 108 historical dam failure events compiled by Wahl
(2004). For each dam failure event the information consists of:
1. Dam characteristics before failure occurred: dam type, height and length,
width at crest and bottom, upstream and downstream slope;
We apply data preprocessing for transforming the raw data into a format that will
be more easily and effectively used by data mining techniques. The first step in this
analysis consists of visual inspection of the data, dealing with missing and inaccurate
values and calculating statistical properties. Domain knowledge is applied for filling
in missing values and resolving inconsistencies as shown in Table 5.1. In the first row
for each of the dams some information is missing or is considered inaccurate. The
given water depth and volume in the reservoir at the failure time for Swift Montana
dam that failed from overtopping are substituted with values higher than the dam
height and reservoir storage respectively. For Kendall dam the missing values of
the water volume and depth in the reservoir at the time of the failure are assumed
to be larger than maximum dam specification, for the reason that it failed due to
overtopping.
The problem of dealing with small datasets is that there is not enough data for train-
Chapter 5. Data Mining Techniques in Dam Breach Modelling 69
ing and testing the model. Thus, we consider a 10-fold cross validation procedure
in this study. In the cross validation method, the result does not depend on how
the dataset is divided: every instance is used only once in testing. In this case, the
dataset is randomly reordered and then split into ten folds of (approximately) equal
size. During each iteration one fold is used for testing and the rest for training the
model. The test results are collected and averaged over all folds. The Root Mean
Square Error (RMSE) is used to measure the model performance:
v
u n
u1X 2
RM SE = t (yi − ŷi ) , (5.21)
n i=1
where yi and ŷi represent the observed and computed values for the calculated
attribute, whether it is average breach width or peak outflow. Lower RMSE values
guarantee better performance of the model.
For this analysis, only the overtopping failure mode is considered. In the dataset,
most of the 23 dams belong to earthfill, mixed earthfill and rockfill types with
or without revetment on the dam slopes. For 20% of the dams no information
is available on their material type. Table 5.2 shows the performance of different
algorithms applied to the available dataset. We apply the LMS (Section 5.2.1)
algorithm to the available data using the cross validation procedure and use the
equation obtained from LMS on the dataset (23 dams). The RMSE obtained is about
70 Section 5.3. Application
180
160 LMS1
140 USBR
120
Predicted
100
80
60
40
20
0
0 20 40 60 80 100 120 140 160 180
Observed
Figure 5.6: Average breach width prediction based on the water depth in the reser-
voir.
30% lower than the error when using the USBR equation on the same dataset, thus
making former more applicable for predicting the average breach width in case of
dam failure from overtopping. Figure 5.6 shows the observed and predicted average
breach width computed using the LMS algorithm and the USBR equation. As can
be seen from Figure 5.6, the USBR prediction tends to underestimate the average
breach width, while LMS prediction results in a correct or overestimated average
breach width.
Since in the dataset, 84% of the dams failing from overtopping belong to the low
and medium dam categories, another experiment is performed for predicting breach
width excluding the high dams from the dataset. It can be seen from Table 5.3
and Figure 5.7 that the LMS model performance increases by 30%, while the USBR
equation performs 40% better than in the previous experiment. Both LWL and LMS
algorithms perform 20% and 10% better, compared to the USBR equation.
From both experiments different equations (LMS1 and LMS2) are obtained, the
second one demonstrating better performance on the dataset used for this analysis.
It can be seen that for the prediction of breach width for non–high earthfill dams
Chapter 5. Data Mining Techniques in Dam Breach Modelling 71
Table 5.3: Prediction of average breach width for 18 low and medium dams.
Method RMSE
LWL using inverse–distance weighting kernels 9.6
LMS2: Bavg = 3.8hw − 1 10.9
USBR: Bavg = 3hw 12
50
LWL
40 LMS
USBR
Predicted
30
20
10
0
0 10 20 30 40 50
Observed
Figure 5.7: Average breach width prediction based on the water depth behind the
dam at initial failure time for low and medium dams.
the LMS2 and USBR equations are performing almost the same with very small
difference in RMSE.
As can be seen from Table 5.4, models created with IBk and MLP perform compa-
rably better than the Singh & Snorrason equation in case of peak outflow prediction
based on dam height only. Two neighbours are used for classification in case of IBk
application, while no changes are made in the default settings for the MLP network
in WEKA. The decision to use default parameters is motivated by the scarcity of
72 Section 5.3. Application
12000
IBk
10000
MLP
8000
Predicted
6000
4000
2000
0
0 2000 4000 6000 8000 10000 12000
Observed
data and therefore the difficulty of having a separate validation set for parameter
estimation. Though IBk RMSE estimate is high, it is 57% smaller compared to the
one obtained from the Singh & Snorrason’s empirical equation. The performance of
IBk and MLP model and the Singh & Snorrason equation is presented in Figure 5.8.
Due to missing data, a smaller dataset of 22 dams is used for predicting peak out-
flow based on reservoir storage and dam height. The performance of the developed
data mining models is compared with the available empirical formulations of Singh
& Snorrason, Hagen and Costa (Table 5.5).
Using the same data mining algorithms the results obtained by including the reser-
voir storage in the analysis are compared to the empirical equations of Costa (Figure
5.9). Here, better model performance is observed using MLP rather than with IBk
algorithm. Higher errors are observed when Hagen and Costa equations are applied
to the whole dataset. However, better results can be expected if the distinction
between failure types is taken into consideration, which in turn implies the necessity
of more data.
Chapter 5. Data Mining Techniques in Dam Breach Modelling 73
10000
MLP
8000 IBk
Costa
Predicted
6000
4000
2000
0
0 2000 4000 6000 8000 10000
Observed
Figure 5.9: Peak outflow prediction based on dam height and reservoir storage.
5.4 Conclusions
Despite the shortage of documented data from historic dam failure events, in this
chapter we demonstrate that it is possible to improve currently available empirical
relations and prediction capabilities for breach characteristics by applying data min-
ing techniques. Encouraging results are obtained for predicting the average breach
width based on the water depth behind the dam at the initial failure time. The
applied data mining algorithms, LMS and MLP, perform better than the available
empirical equation of USBR (1988).
A 30% improved performance of the LMS and MLP models is observed when the
complete dataset is used. Since 84% of the dams in the dataset belong to low and
medium category, another experiment is carried out excluding the instances belong-
ing to high dams. An improvement of the LMS and MLP model performance (9.6
and 10.9 RMSE respectively) and USBR equation (12.0 RMSE) is observed, leading
to the conclusion that the data mining models seem to perform slightly better in
experiments for predicting average breach width for low and medium earthfill dams
74 Section 5.4. Conclusions
Furthermore, the prediction of peak outflow based on dam height and reservoir stor-
age provides better results compared to the prediction of peak outflow based on
dam height only. The results obtained by using IBk and MLP algorithms are better
than the ones obtained by applying the empirical equations developed by Singh &
Snorrason, that predict peak outflow based on dam height only, and of Hagen and
Costa, whose equations use dam height, depth and volume of water in the reservoir
for peak outflow prediction. Clearly, the relatively small number of recorded dam
failure events contained in the database, limits the capabilities of data mining tech-
niques. However, with increasing amount of information about historic (or future)
dam failure events, better results might be expected.
Chapter 6
Controversial conclusions are drawn by different researchers (Johnson and Illes, 1976;
MacDonald and Langridge-Monopolis, 1984; Morris, 2005) related to the initial,
progressive, and ultimate breach shape, since proper monitoring of a real dam failure
event is difficult to achieve so far. During laboratory and field experiments the
76 Section 6.1. Development of a dam breach model
initial breach shape is commonly predefined and thus influences in some way its
further development (see Section 2.3.1). In the model BReaching of the EArthfill
DAm (BREADA) it is possible to choose between two breaching developments. One
formulation assumes a trapezoidal breach shape to be initially formed at the crest
of the dam, which progresses to the dam bottom elevation (usually assumed at
streambed elevation at the dam toe). Once the dam bottom is reached, the breaching
develops in a lateral direction only. In the second formulation, a triangular breach
channel is initially formed and progresses to the dam bottom (see Figure 6.1). Once
the dam bottom is reached, the breaching develops in lateral direction having a
trapezoidal shape. The latter is considered by several authors (Johnson and Illes,
1976; MacDonald and Langridge-Monopolis, 1984; Macchione and Rino, 1989) to be
a common type of breach evolution during historical dam failure events.
Presence of internal structures and weak points inside the dam’s body.
Damage to the dam structure that can occur during operation life, possibly at
the slopes or at the crest.
The breaching of a dam usually initiates at the weakest point on the dam crest or
downstream slope when overtopping occurs. In our model, the initial breaching is
assumed to occur at the dam crest in the middle of the dam length (unless specified
otherwise) and further breaching develops parallel to the dam crest (the implemented
breach development mode is described in Section 2.3.2).
For routing of the flow through the breach, the reservoir routing principle is applied:
dV
= Qin − Qb − Qc − Qoutlet , (6.1)
dt
where Qin , Qb , Qc and Qoutlet are the inflow into the reservoir, the flow through
the breach, the flow over the crest, and the flow through the outlet, respectively and
dV /dt represents the change of reservoir volume in time.
δβ δβ hc hc
δ δβ β
hc hc
H hd
H hd H Hhd hd
y y y y
hc hc H H
hd hd
hc hc H Hhd hd
(a) (b)
Figure 6.1: Breach development in both formulations: (a) triangular shape to the
bottom of the dam and afterwards trapezoidal shape and (b) trapezoidal shape with
vertical and lateral erosion to the bottom of the dam and afterwards lateral erosion
only.
load transport (see Section 4.4 and Table 4.4). In the BREADA model, the erosion
of the embankment material is calculated using an empirical formula presented by
Meyer-Peter and Müller (1948).
Meyer-Peter and Müller (1948) performed the experiments on uniform bed mate-
rial as well as with mixtures of particles with diameter ranging from 0.4 to 29mm,
channel slope from 0.0004 to 0.02, water depth of 0.1 to 1.2m and specific weight
of particles in range from 0.25 to 3.2N/m3 . The bed load transport rate [m2 /s]
empirical equation obtained was written as
1/2
qbl = φb [(s − 1) g] d3/2
m , (6.2)
where s is the relative density ρs /ρ, ρs is soil density, dm is the mean particle
diameter [m] considered 1.1 to 1.3 times the d50 for nearly uniform material and
equal to the d50 for mixture of materials (van Rijn, 1993), and φb is the bed load
transport rate expressed in dimensionless form as
3/2
φb = 8 (µθ − θcr ) , (6.3)
78 Section 6.1. Development of a dam breach model
where θcr is generally interpreted as the critical mobility parameter that for mixtures
of sediments on stream beds it is usually taken equal to 0.047. During a dam breach
erosion, θcr might be considered negligible compared to θ that is the dimensionless
particle mobility parameter estimated as
RI
θ= . (6.4)
(s − 1) dm
where k 0 is the grain–related Strickler coefficient and k is the overall Strickler coeffi-
cient. Yalin (1972) emphasized that if the plane is flat and the flow is two dimensional
then the ratio k/k 0 becomes 1.
R is the hydraulic radius, γ is the water specific weight, γs is the soil specific weight,
and S is the energy slope that can be calculated with Strickler’s equation
u2
S= ,
k 2 R4/3
where u is the mean flow velocity. Assuming that the solid discharge entering our
domain from the reservoir is null and considering a space step ∆x = 1m, we can
write the following mass conservation:
dAb dqbl c
= (6.7)
dt dx
as
dAb
= qbl c, (6.8)
dt
where c is the wetted perimeter.
We assume that the initial conditions - water depth in the reservoir, initial breach
depth and the inflow hydrograph - are known. For each time step, the flow over the
crest, through the spillway and the outlet is calculated based on reservoir elevation.
The difference between inflow and outflow is then used to calculate the change
Chapter 6. BREADA model: Breach Model for Earthfill Dams 79
in reservoir storage and the new reservoir elevation. The reservoir stage–volume
relationship is provided to the model through a mathematical expression. Based on
this relationship the reservoir water level is extracted for every estimated reservoir
storage at each time step. Other flow characteristics specific for different breach
shapes are presented in the following.
Once the dam bottom is reached, the breaching develops in lateral direction into a
trapezoidal shape. The breach area cross section for trapezoidal breach shape with
y < 0 is equal to
Hd
Ab = (Hd − 2y) (tan β + tan δ) . (6.22)
2
The wetted area is
hc
A = (hc − 2y) (tan β + tan δ) , (6.23)
2
where hc is the critical depth derived as
p
3y + 2H + 9y 2 − 8Hy + 4H 2
hc = . (6.24)
5
Using the above expressions the discharge through the breach channel may be written
as r
g tan β + tan δ 3/2 −1/2
Qb = [hc (hc − 2y)] (hc − y) . (6.25)
2 2
The breach bottom elevation can be estimated at every time step with
2
1/2
dy ker 3/2 hc (hc − 2y) cos β + cos δ cos β + cos δ
= − 3 (γg) h c − y . (6.26)
dt k 2Hd (hc − y)3/2 sin (β + δ) sin (β + δ)
Based on the formulations described above, a software package (see Figure 6.2) is
developed using Borland Delphi. The program has user–friendly graphical interface,
which allows the user to load the necessary information and to run the model.
The Schaeffer Dam was a 30.5m high non–cohesive earthfill dam constructed across
Beaver Creek in USA. The dam failed due to heavy rains described in Follansbee and
Jones (1922) as ‘cloud-bursts’, which led to water levels in the reservoir higher than
the dams top elevation. Some of the dam and reservoir characteristics are presented
in Table 6.1.
According to Follansbee and Jones (1922), the dam was washed away in 30 minutes.
82 Section 6.2. Validation of the BREADA model
5000
4000
Discharge [m /s]
3
3000
2000
1000
0
00:00 00:15 00:30 00:45 01:00 01:15 01:30
Time [hr:mm]
Figure 6.3: Sensitivity analysis for breach side angle with the BREADA model.
At the end of failure the breach opening was observed to be of a trapezoidal shape
with a top width of about 210m (some 70% of dam crest length) and side slopes of
approximately 1:2.25 [H:V]. A peak outflow of 4,500m3 /s was recorded.
The available record of parameters for the Schaeffer Dam is incomplete and, there-
fore, a sensitivity analysis is undertaken to identify which of the (unknown) input
data influences the outflow discharge. The inflow into the reservoir was estimated by
Follansbee and Jones (1922) to be 270m3 /s and belongs to the maximum discharge
estimated for Beaver Creek, due to the storm that occurred more than 24 hours
before the failure of the dam. It includes the rainfall and tributary inflow. In our
experiment a reservoir stage–area curve is created based on the available information
for some representative reservoir levels. Model parameters, namely the initial breach
depth, breach side slope and erodibility coefficient are part of the sensitivity analy-
sis for the BREADA model and the internal friction angle is part of the sensitivity
analysis for the BREACH model. In this section, we briefly discuss the influence of
side slope and internal friction angle on breach outflow hydrograph.
Figure 6.3 presents the resulting outflow hydrograph simulated for sensitivity anal-
ysis of the breach channel side slope (β = δ) by the BREADA model. The angle
that the breach sides create with the vertical is varied from 25◦ to 40◦ . It can be
observed that the variation in the side slope influences the peak outflow magnitude
and its time of occurrence. This is expected since the breach channel area depends
on the breach channel side slope. Smaller is the angle that the breach side creates
with the vertical, smaller is the initial breach channel cross section area. This leads
to smaller initial breach outflow meaning an increase of water depth in the reservoir.
84 Section 6.2. Validation of the BREADA model
12000
10000
Discharge [m /s]
8000
3
6000
4000
2000
0
00:08 00:20 00:32 00:44
Time [hr:mm]
Figure 6.4: Sensitivity analysis for internal friction angle with the BREACH model.
This process continues for few minutes. Then the water depth in the reservoir that
is increased as a result of lower outflow values, initiates higher erosion rates, thus
higher discharge rates flowing through the breach channel. In Figure 6.3 we can
observe that the angle of 25◦ is producing a more realistic breach outflow hydro-
graph, with peak values similar to the observed one and a flood duration of about
30 minutes. This result is consistent with the observed final side slope of the breach
channel of 1:2.25.
Figure 6.4 presents the sensitivity analysis of the BREACH model for variable in-
ternal friction angle. The angle of 40◦ generates a peak outflow about 40% higher
than the recorded value, but lower than the peak outflow obtained for angles of
25◦ and 30◦ . For the internal friction angle equal to 60◦ , the obtained side slope
angle is 26◦ coinciding with the observed one and the corresponding peak outflow is
4,000m3 /s. This happens due to the same reason as for the BREADA model. The
internal friction angle value affects the enlargement of the breach width. During all
the simulations, the duration of the hydrograph rising limb in the BREACH model
is very short, fast reaching the maximum peak outflow.
In order to evaluate the applicability of data mining techniques to dam breach mod-
elling, the models created with IBk and MLP algorithms in Section 5.3.3 are used to
predict the peak outflow for the Schaeffer Dam and the resulting peak outflow val-
ues are analyzed. The results of peak outflow estimation for the Schaeffer Dam are
presented in Figure 6.5. The peak outflow estimated by the IBk model is 4,000m3 /s
viz. about 10% smaller than the observed value, while a 34% lower peak outflow is
predicted by the MLP model.
Chapter 6. BREADA model: Breach Model for Earthfill Dams 85
12000
Measured
10000 MLP
IBk
Peak flow [m /s]
8000
3
6000
4000
2000
0
0 5 10 15 20 25 30 35 40
Dam height [m]
Table 6.2: Peak outflow estimation using empirical equations for Schaeffer Dam.
Reference Peak outflow
(m3 /s)
Regression Equations
Singh and Snorrason (1982) - Eq. 4.5 2230
MacDonald and Langridge-Monopolis (1984) - Eq. 4.4 2584
Costa (1985) - Eq. 4.11 2422
Froehlich (1987) - Eq. 4.12 3843
Envelope Equations
Hagen (1982) - Eq. 4.2 9700
MacDonald and Langridge-Monopolis (1984) - Eq. 4.3 8460
Costa (1985) - Eq. 4.7 6991
- Eq. 4.8 9435
Using the empirical relations (see Table 6.2), the peak outflow varies from 2,230m3 /s
to 3,843m3 /s excluding the upper limits from the envelope equations. Froehlich’s
equation estimating peak outflow based on depth and volume of water in the reser-
voir at failure time, performs better than the other equations, where the estimated
peak outflow is 15% lower than the recorded peak outflow.
quences are particularly high in terms of human casualties when no warning system
is available. A dam break analysis is required for every constructed large dam for
the purpose of identifying the impact of failure in the downstream areas and the
necessary measures for mitigating the consequences.
In this section, we undertake a dam break analysis for the hypothetical failure of
Bovilla Dam (Figure 6.6) that was constructed on the Terkuze river, 15km north-
east of Tirana City, Albania. It is an earthfill homogeneous dam, 81m high, and
135m long at the crest. The dam’s filling material is composed of gravel and sand,
taken from alluvial deposits of the Terkuze River upstream of the dam. The nor-
mal capacity of the reservoir (Figure 6.6) is 80 million m3 at the pool elevation of
318m from which 50 million m3 are used for water supply and the rest for irrigation.
Bovilla Reservoir can accommodate the average annual volume that the Terkuze
River brings, that is evaluated to be nearly 105 million m3 water. The purpose
for constructing the Bovilla Dam is to provide enough water to the continuously
expanding population of Tirana city and to satisfy the demands for irrigation pur-
poses.
Though dams are meant to function for a long period of time, the probability of their
failure is never zero. The Bovilla Dam is classified into the high hazard category
due to populated areas located just 10 km from the dam. The dam construction
lead to permanent displacement of more than 400 families from their homes and
traditional livelihood in 1993. However, a year later, people started to settle near
Chapter 6. BREADA model: Breach Model for Earthfill Dams 87
Bovilla Reservoir
Bovilla Reservoir Disolv1.shp
Disolv1.shp Populated areas 2001.shp
Populated Areas 1994.shp Schools, hospitals, government offices
Commercial Low density informal housing area
Construction area Mix of apartments and single-family housing
Existing rural construction Residential multi-story construction
Hospitals Singe-family detached housing
Industrial area Residential and commercial
New construction Very low density rural settlement
Terkuza River Medium density informal housing
Retail, wholesale,office or hotel
Airport
Terkuza River
(a) (b)
Figure 6.7: Land use data for the area downstream the dam showing the populated
areas for the years (a) 1994 and (b) 2001.
the river banks downstream the dam. Figure 6.7 shows the land use data for two
different years: 1994, a year after the work for construction of the dam had been
started and 2001, five years after the work was completed. A potential failure of the
Bovilla Dam may lead to highly devastating consequences in the areas downstream.
Therefore, a dam break analysis needs to be conducted to identify the potential
flood propagation scenarios and consequences in case of a failure event. Modelling
of the flood wave propagation induced by a potential dam break event can help the
implementation of emergency plans, risk assessment, and future development of the
areas.
The pertinent properties of the dam and the reservoir are presented in Table 6.3.
The impenetrability of the upstream slope of the dam is achieved by mean of a
geo-textile material. There is a bottom outlet, used for water release for flood con-
trol and irrigation purposes. The total discharge capacity of the bottom outlet is
150m3 /s and is designed to handle 1,000 year return period flood event with peak
discharge in the river of 700m3 /s. This flood brings an increase of the water level
in the reservoir to maximum of 320m. Two gates are installed at the outlet tower:
the principal gate and the emergency gate. Next to the outlet tower an intake tower
releases water on a regular basis for water supply.
The hydrologic data consist of the flood discharge time series for return period events
of 10, 100 and 1,000 years (Albinfrastrukture, 1996). The relationship between reser-
voir surface area and water elevation (Figure 6.9) is obtained from digital elevation
data (Figure 6.8) using Arc–GIS. An area 32km downstream of the dam is consid-
ered in this analysis. The terrain elevation varies from 240m above sea level at the
88 Section 6.3. Failure analysis of an earthfill dam
Bovilla Reservoir
Terkuza River
Grid
300 - 1050
250 - 300
180 - 250
140 - 180
120 - 140
80 - 120
70 - 80
60 - 70
50 - 60
40 - 50
30 - 40
20 - 30
10 - 20
No Data
Figure 6.8: Digital elevation grid for the area downstream the dam.
Chapter 6. BREADA model: Breach Model for Earthfill Dams 89
330
320
310
Elevation (m)
300
290
280
270
260
250
240
0 1 2 3 4 5
Area (km2)
(a) (b)
Figure 6.9: (a) Surface area-water elevation relationship for Bovilla reservoir and
(b) Surface boundary for different elevations starting from inner boundary at 240m,
250m, 270m, 280m, 300m, 321m elevation, respectively
dam site to 15m above sea level at the downstream boundary. The floodplain at
the first kilometers from the dam is quite narrow and steep, but expands rapidly
afterwards.
Different scenarios can lead to dam overtopping, namely the inflow into the reservoir
is higher than the spillway’s capacity, malfunctioning of the spillway, etc. Currently,
there is no methodology that is able to determine the extent of overtopping (flow
depth and duration of flow over the crest) that the earth dam can withstand. Dam
failure depends on the resistance of the embankment soil to water flow, type of dam
covering material, slope of the embankment, which in turn influences the flow ve-
locities, etc. In this study, we conduct a sensitivity analysis for the inflows into the
reservoir assuming the 1,000 year and the 100 year return period flood events to
inflow into the reservoir when the dam erosion is initiated. We ignore the effect of
90 Section 6.3. Failure analysis of an earthfill dam
other small stream and rainfall inflows into the reservoir and the hydrologic charac-
teristics of the basin.
Final breach bottom level corresponds to the stream bed elevation. Failure
of a high dam, might not always develop down to the bottom as the width
of the dam is usually much wider at that location. However, we make this
assumption for the sake of simplicity.
Water depth in the reservoir at the initial time is assumed at the dam top
elevation or 0.2m above.
We start with a sensitivity analysis of the two different breach development formu-
lations: (a) trapezoidal breach shape throughout simulation (see Section 6.1.2), and
(b) triangular breach shape till dam foundation is reached and trapezoidal breach
shape afterwards (see Section 6.1.1). In Figure 6.10 we can observe that the hydro-
graphs do not differ significantly from each other in terms of peak outflow magni-
tude, but differ in timing. The trapezoidal breach development formulation exhibits
slower breaching of the dam. While this might seem counterintuitive, the result can
be expected due to the fact that the ratio between the vertical and lateral erosion is
limited to a constant factor (in this case ∆B/∆y = 2), signifying slow enlargement
of the breach width. For the following simulations we use the second formulation of
breach development unless specified otherwise.
Figure 6.11 presents the sensitivity analysis for two different inflows into the reser-
voir. It can be observed that the magnitude of inflow into the reservoir does not
influence notably the flood hydrograph. The peak of the flood hydrograph is reached
about 6 minutes faster and is only 3% higher for the 1,000 year return period flood
event compared to the 100 year return period event. That is expected as the inflow
peak discharge for the 1,000 year return period flood is just 700m3 /s compared to
430m3 /s for the flood with return period of 100 years, with both values being sig-
nificantly lower than the breach outflow. For further analysis we assume the inflow
in the reservoir at the failure time to be 1.05 times higher than the peak discharge
of 1,000 year return period flood used for the design of the spillway, thus consider-
ing dam (and the spillway) to be able to accommodate lower inflow floods into the
reservoir.
Two different stage–volume relationships are created for the reservoir: one based on
the GIS data and the other based on the data provided by the designers of the dam
(Albinfrastrukture, 1996). The latter does not include the reservoir dead storage
information, but only the active storage capacity. The peak outflow obtained by the
model for different reservoir stage–volume relationships differs as much as 15% (see
Figure 6.12). This emphasizes the uncertainty related with the actual volume of
Chapter 6. BREADA model: Breach Model for Earthfill Dams 91
70000
1st Formulation
60000
2nd Formulation
50000
Discharge [m /s]
3
40000
30000
20000
10000
0
00:00 00:30 01:00 01:30 02:00 02:30 03:00 03:30
Time [hr:min]
Figure 6.10: Breach outflow hydrograph for first and second breach development
formulations.
60000
T=100
50000 T=1000
Discharge [m /s]
40000
3
30000
20000
10000
0
0:00 0:30 1:00 1:30 2:00 2:30 3:00
Time [hr:min]
Figure 6.11: Breach outflow hydrograph for 1,000 and 100 year return period flood
event.
92 Section 6.3. Failure analysis of an earthfill dam
70000
GIS Data
60000
Active Storage Capacity
Discharge [m /s]
50000
3
40000
30000
20000
10000
0
0:00 0:30 1:00 1:30 2:00 2:30 3:00
Time [hr:min]
Figure 6.12: Breach outflow hydrograph for two reservoir stage–volume relationship.
water in the reservoir at the failure time, which is affected as well from the sediment
mass accumulated in the basin throughout the years, though not considered in this
analysis.
Two user–defined parameters of the BREADA model, initial breach channel depth
D and the angle that the breach channel sides create with the vertical β = δ, are
subject to a sensitivity analysis. Different values for initial breach channel depth
(D=1m, 0.5m, and 0.3m) are considered in order to understand the influence of
the initial conditions on the breach development. As shown in Figure 6.13, D does
not affect the breach outflow magnitude, but has an impact on the peak timing.
Higher initial depth in the breach opening results in faster breach development. In
contrast, β has an influence on the breach outflow hydrograph (Figure 6.14). For
different values of β the magnitude of the peak discharge changes. An increase of
β leads to a decrease of the peak discharge and vice versa similarly as observed in
Section 6.2. Compared to the angle of 35◦ , the magnitude of the breach outflow for
angles of 40◦ and 45◦ , decreases 11.8% and 15.8% respectively.
Furthermore, we compare the dam breach modelling results obtained from the
BREADA and BREACH model. In Figure 6.15 it can be observed that though the
peak outflows differ in range of only 10%, the timing, which is a very important fac-
tor for proper warning of the population downstream from the dam, is significantly
different. In the BREACH model the peak outflow occurs after about 39 minutes
from the beginning of initial breach, while the peak outflow in the BREADA model
Chapter 6. BREADA model: Breach Model for Earthfill Dams 93
60000
D = 1.0m
50000
D = 0.5m
Discharge [m /s]
40000 D = 0.3m
3
30000
20000
10000
0
0:00 0:30 1:00 1:30 2:00 2:30 3:00 3:30
Time [hr:min]
Figure 6.13: Sensitivity analysis for different initial breach depth D (β=40◦ ; Q1% ).
60000
β = 35°
50000 β = 40°
β = 45°
Discharge [m /s]
40000
3
30000
20000
10000
0
0:00 0:30 1:00 1:30 2:00 2:30 3:00 3:30
Time [hr:min]
Figure 6.14: Sensitivity analysis for different breach angle β (D=0.5m; Q1% ).
94 Section 6.3. Failure analysis of an earthfill dam
80000
BREADA
70000 BREACH
60000
Discharge [m /s]
3
50000
40000
30000
20000
10000
0
0:00 0:30 1:00 1:30 2:00
Time [hr:mm]
Figure 6.15: Breach outflow hydrograph for the BREACH and BREADA model.
occurs about 70 minutes later. A sharper rising limb is produced by the BREACH
model compared to a more gradual development of the breach in the BREADA
model.
The breach cross section could be a possible reason for this discrepancy - the
BREACH model develops a rectangular breach shape from the beginning till the
moment when the sides of the breach channel collapse, creating a trapezoidal shape.
This moment in time depends on the dam material internal friction angle that in
turn controls the side slope. Instead, the BREADA model develops a triangular
shape till the bottom of the dam is reached and then develops into a trapezoidal
breach shape. This leads to a slower development of the breach in the latter model.
However, the duration of the rising limb produced by the BREACH model is only
6 minutes, and that might not be realistic. The results obtained from both breach
models represent two different scenarios, one being less catastrophic to the down-
stream area due to slower development despite 10% higher peak outflow, and the
other predicting a disastrous situation with faster development of breaching. In
both models we do not take into account the cover layer at the upstream slope of
the dam, which might influence the results. Peak outflows obtained by the BREACH
and BREADA models are 63,570m3 /s and 68,740m3 /s respectively.
To conclude, we predict the peak outflow using the empirical equations. From the
results in Table 6.4, it can clearly be seen that only Hagen’s formula produces almost
the same peak outflow as predicted using the dam breach models. The upper curve
Chapter 6. BREADA model: Breach Model for Earthfill Dams 95
Table 6.4: Peak outflow estimation based on dam height and reservoir storage.
Reference Peak outflow
(m3 /s)
Hagen (1982) - Eq. 4.2 67,230
MacDonald and Langridge-Monopolis (1984) - Eq. 4.3 43,630
- Eq. 4.4 13,030
Costa (1985) - Eq. 4.9 38,910
- Eq. 4.11 13,950
- Eq. 4.7 39,560
- Eq. 4.8 58,950
Froehlich (1987) - Eq. 4.12 31,980
Broich (1998) - Eq. 4.13 14,260
- Eq. 4.14 21,040
of the envelope equation proposed by Costa is 17% and 9% lower than the peak
outflow produced by the BREADA and BREACH models respectively. These re-
sults were expected since Hagen’s formula is the only formula derived from historical
data of earthfill dams failing due to overtopping, with a range of characteristics that
covers the characteristics of the Bovilla Dam. The dam considered in this study, is
higher than all of the 22 dams that Froehlich used for deducing his equation. More-
over, other empirical formulas were extracted from data sets where no distinction
was made between dam material or failure type.
We ignore the reservoir sediment or the dam material, which are flushed away to-
gether with the water stored in the reservoir, but instead consider propagation of
clear water in the valley. The flooded areas are treated as rigid, meaning neither
erosion nor deposition processes are modelled despite the awareness that these pro-
cesses will occur during a real dam failure flood wave propagation. The presence of
the debris material in the flood water, which will affect the flow pattern significantly,
96 Section 6.3. Failure analysis of an earthfill dam
The roughness of the floodplain area is subject to sensitivity analysis. The extent
of the dam break flood event is unprecedented in the natural history of the valley,
thus the calibration of the roughness coefficients is not possible. Sobek 1D2D has
an option to apply constant or variable roughness coefficients for the channel reach
and the overland area. A constant Manning’s roughness coefficient n equal to 0.07
is assumed for the river channel. Constant and variable roughness coefficients are
used for the overland area. The roughness coefficients for different land use cate-
gories (Figure 6.16) are deduced from the Tables of Manning’s n presented in Chow
(1959); van der Sande et al. (2003); Huang (2005).
The flood wave propagation scenario for the breach outflow hydrograph generated
by the BREADA model is presented in Figure 6.17. The extent of flooding for two
time intervals is given for the purpose of comparing with the flood patterns when the
breach outflow hydrograph of the BREACH model is used as upstream boundary
condition in the flood modelling analysis. Simulation results show that the flood
wave reaches the location 26 km downstream of the dam (downstream of the river
reach presented in Figures 6.17 and Figure 6.18) in approximately 5, 4, and 3 hours
time span for constant Manning n = 0.15, n = 0.1, and for roughness based on land
use data. It reaches the populated areas located 9 km downstream the dam in 1hr
and 40 minutes, enough time to warn population for immediate evacuation. At 13
km away from the dam, flood peaks are dampened out as the wave reaches the wide
flat areas; still, the water depth at the villages, including the international airport
Chapter 6. BREADA model: Breach Model for Earthfill Dams 97
(a) (b)
Figure 6.17: Routing of the BREADA model outflow hydrograph using Sobek 1D2D
with Manning coefficient in the floodplain area equal to 0.15 (a) 2hr 38min after the
breach has been initiated and (b) 4hr 38min after the breach has been initiated.
exceeds 2m. The flood speed reaches 7m/s at the populated areas when taking into
account the land use based roughness.
The flood wave propagation scenario for the breach outflow hydrograph generated
by the BREACH model is presented in Figure 6.18. Owing to the fast breach de-
velopment in the BREACH model, the flood wave reaches 26 km downstream of
the dam in 4, 3, and 2 hours time span for constant Manning n = 0.15, n = 0.1,
and for land use based roughness. In this scenario the time interval from the initial
breaching to the time the flood wave approaches the first residential areas is only 40
minutes. Higher water depths are observed in some locations in comparison to the
BREDA model scenario (see Figure 6.19).
The different roughness maps provide different flood hazard scenarios. The results of
a sensitivity analysis for constant and land use based Manning roughness coefficients
on the floodplain are presented in Figure 6.19. The water depths are shown for var-
ious locations in the valley downstream the dam (see Figure 6.17). As expected, the
increase in floodplain roughness coefficient decreases the flood propagation speed,
thereby delaying the flooding of a particular area. An increase in water depth is
observed at the high elevation locations (e.g. location A which correspond to a res-
idential area) while there is no notable change in water depth at the low elevation
areas (location C that corresponds to the airport area). The water depth in A ob-
tained using the BREACH model hydrograph as upstream boundary condition is
lower than the one obtained by using the BREADA model hydrograph, associated
98 Section 6.4. Uncertainty in dam break analysis
(a) (b)
Figure 6.18: Routing of the BREACH model outflow hydrograph using Sobek 1D2D
when Manning coefficient in the floodplain area equals to 0.15: (a) 2hr 18min after
the breach has been initiated and (b) 4hr 18min after the breach has been initiated.
this with the higher peak outflow values for the latter. These differences are damp-
ened at the location C further away from the dam where the floodplain area is wide.
According to the flood maps the water depths in residential areas are in the order
of 5m. The failure of Bovilla Dam would jeopardize the lives of thousands of peo-
ple living downstream and extensively affect the environment and the economy of
the area. Based on preliminary population data for the regions inundated by flood
water, the population at risk consists of at least 10,000 people. In case of a dam
failure event, the population faces significant risk. Immediate construction of a flood
warning system is necessary to avoid human casualties, in particular for residents
living as close as 9km away from the dam.
The inundation maps provide an estimate regarding the direct consequences, but
the indirect (long term) consequences as a result of dam failure will be enormous as
well. The development of the areas should be planned by taking into consideration
the above mentioned flood hazard maps ensuring better protection of the people
facing the risk in a potential dam failure event, as well as decreasing economic and
environmental consequences as a result of the failure.
9
A: n = L A: n = 0.10 A: n = 0.15
8 C: n = L C: n = 0.10 C: n = 0.15
7
Water Depth [m]
6
5
4
3
2
1
0
1:00 2:00 3:00 4:00 5:00
Time [hr:mm]
(a)
9
A: n = 0.10 B: n = 0.10 C: n = 0.10
8 A: n = 0.15 B: n = 0.15 C: n = 0.15
7
Water Depth [m]
6
5
4
3
2
1
0
01:00 02:00 03:00 04:00
Time [hr:mm]
(b)
Figure 6.19: Sensitivity analysis of the roughness coefficient at locations 11km, 15km,
and 19km downstream the dam (namely A, B, and C respectively) for (a) BREADA
outflow hydrograph (L stands for land use data) and (b) BREACH outflow hydro-
graph.
100 Section 6.4. Uncertainty in dam break analysis
they affect the model results. Identifying the uncertainty associated with the pre-
diction of floods imposed by dam failure is necessary for effective flood management
and emergency planning. Three sources of uncertainty are identified in Section 3.4
namely, input uncertainty, model uncertainty, and completeness uncertainty. The
latter, often referred as ignorance uncertainty, is associated with all omissions that
occur due to lack of knowledge.
Input uncertainty
Neither the inflow into the reservoir nor the water depth in the reservoir at the fail-
ure time are known for the analysis of a hypothetical dam failure. Both values are
assumed depending on the event that will be simulated e.g. inflow is higher than
the spillway design capacity or the dam design flood for the overtopping failure, and
the water depth in reservoir corresponds to the maximum depth. These characteris-
tics are a source of uncertainty. However, the sensitivity analysis shows that inflow
hydrograph influence is not significant for the large Bovilla Dam. An increase in the
inflow with 60% (from Q1% to Q0.1% ) for Bovilla reservoir resulted in an increase of
the peak outflow with only 1%.
Although the reservoir area and storage volume are considered to be deterministic
quantities, the calculated reservoir area and storage volume at a given elevation may
vary due to different measurement and computational techniques used for their es-
timation. Moreover the reservoir area and storage volume might be different from
what is assumed, depending on the sedimentation in the reservoir during the years
before the failure occurs. The reservoir characteristics, namely the approximated
shape, volume, and area, all affect the final results.
Dam material characteristics at the failure time are part of the sensitivity analysis
and are very important for the correct estimation of the breach development and
characteristics. Roughness coefficient and Digital Elevation Model (DEM) data for
the floodplain area influence the scale of flooding in terms of magnitude and time
and are part of sensitivity analysis.
Model uncertainty
Model uncertainty is associated with different formulations implemented for mod-
elling the processes involved during the breaching of the structures, mathematical
and numerical description of the processes, etc. Different models result in differ-
ent output for the common problem due to various approximations made in the
description of the processes. The model related parameters influence significantly
the scale of flooding. We observe that two formulations of the BREADA model, us-
ing different breach shapes for breach development, lead to different breach outflow
hydrographs with differences in timing, which is a very important factor in flood
analysis. The same is observed when comparing the BREACH and the BREADA
models.
Chapter 6. BREADA model: Breach Model for Earthfill Dams 101
Completeness uncertainty
The completeness uncertainty represents unknown contributions and hence is a qual-
itative analysis rather than quantitative. Processes that are currently considered
irrelevant for the dam failure flood analysis, might prove to be important if inves-
tigated in greater detail. There are many processes that we omit in modelling due
to current lack of knowledge or awareness (e.g. wind can have impact on the failure
of the dam but its influence is usually not considered in any analysis for high dams
except for dikes). For the overtopping of an earthfill dam, the wind direction might
influence the failure process. The wind blowing toward the dam during high flood
might contribute to higher depth of water overtopping the dam.
Two different methods are used for predicting breach outflow hydrograph in case of
hypothetical failure of an earthfill dam. We compare the resulting breach outflow
hydrographs obtained from the BREADA (Zagonjolli et al., 2005) and the BREACH
model (Fread, 1988). Despite only 10% difference in the peak outflow values obtained
from the two breach models, significant differences are observed in timing and shape
of the hydrograph.
Furthermore, we compare the resulting peak outflows of the BREACH and BREADA
models with the range of peak outflows obtained using the empirical formulations de-
veloped during the last decades and data mining techniques (see e.g. Zagonjolli and
Mynett (2005b,a)). Though empirical formulations can be used for a ‘rough/fast’
prediction of the peak outflow values, they are not applicable for dam break flood
forecasting where knowledge about breach development in time is important. Ha-
gen’s empirical formula produces almost the same peak outflow as predicted using
physically based numerical models. Other empirical formulas do not show good
agreement, that can be explained from the fact that the Bovilla Dam characteristics
are not within the range of dam characteristics in the datasets used for developing
those formula.
The resulting breach outflow hydrographs, constituting the upstream boundary con-
dition for the 1D2D hydrodynamic model, led to two different flood progression sce-
narios in the areas downstream from the dam. For numerical simulation of flood
102 Section 6.5. Discussion and conclusions
propagation downstream of the dam, the breach models are coupled with the Sobek
1D2D modelling package developed by WL | Delft Hydraulics (the Netherlands).
The choice of erodibility factor for the BREADA model turns out to have a high
influence on the breach outflow hydrograph timing and shape, but here we assume
a scenario where the breach development is slower, simulating flood propagation for
the fastest (BREACH) and slowest flood wave (BREADA). Roughness in the areas
subject to flooding influences flood speed and characteristics. A constant and vari-
able roughness based on land use data is used.
Based on preliminary population data for several regions inundated by flood water,
the Population at Risk consists of at least 10,000 people. Immediate construction
of a flood warning system is proposed, as a key source for avoiding loss of human
lives, for residents living as close as 9km away from the dam; since in case of a dam
failure event, this population faces significant risk.
Chapter 7
A Numerical-Constraint
based Model
The more constraints one imposes, the more one frees one’s
self. And the arbitrariness of the constraint serves only to
obtain precision of execution.
Igor Stravinsky
7.1 Introduction
During past decades different methodologies were proposed to prevent and manage
floods. The traditional approach to prevent the impact of flooding through flood
protection is more recently being replaced by a flood management approach (Plate,
2000; Brinkhuis–Jak et al., 2003; de Vriend, 2005; Samuels et al., 2005; Simonovic
and Ahmad, 2005) recognizing that absolute flood prevention is unachievable and
unsustainable, due to high costs and inherent uncertainties. In the Netherlands, the
standard policy of raising dikes crest levels in order to maintain the required level
of flood protection is being abandoned in favor of a new policy of creating ‘Room
for the River’ that involves widening river cross sections by relocating dikes further
away from the river, lowering floodplains, etc. (van Schijndel, 2005). Partitioning of
the area at risk into compartments, utilizing the highway and railroad embankments
as well as the natural terrain, could possibly lead to an increase in warning time and
a reduction of the flooded area.
The risk associated with flooding is usually defined as the product of probability
and consequences. This expression leads to a situation where the total risk of an
event with low probability and high consequences is equal to the total risk of an
event that has high probability of occurrence but low consequences. Generally, risk
reduction measures aim to reduce the probability of flooding and might often be
104 Section 7.2. Description of the numerical–constraint based approach
easier to implement, although minimizing the probability of a flood can come at the
expense of increasing its destructive power (when it happens), thus increasing the
consequences.
In this chapter we present a numerical–constraint based approach for flood risk re-
duction and decision support as well as a case study illustrating its application to a
system of polders at risk (Zagonjolli et al., 2006). The model developed is able to
simulate different flood mitigation scenarios taking into account the social and eco-
nomic value of the areas that could be prone to inundation. The impact of flooding
is minimized by selecting the most feasible mitigation scenarios.
Figure 7.1 shows the transformation of a flood prone area into a graph. The area
surrounded by outer dikes (either wet or dry boundary dikes) consists of 12 polders
separated by inner dikes (dikes that belong to more than one polder). Each of the
polders, represented as a vertex v of the graph, has a maximum capacity to store
Chapter 7. A Numerical-Constraint based Model 105
L K
L
I K
J I
H
J
H
F
G F
D G
E
C D
E C
B A
B A
flood water. For each inner dike there is an edge connecting two vertices (polders).
Therefore, all possible ways of flood propagation in the area prone to flooding are
represented as all possible paths from the initially flooded polder to the polder that
needs to be protected. For example, we can assume an initial breaching to occur
at the river dike in polder C as a result of hydraulic conditions or as a result of
the decision to deliberately initiate breaching at that particular location. We also
assume that polder J is estimated (based on the given evaluation) to be the most
important polder that requires maximum protection. Then the algorithm finds the
optimal route for the flood water propagation avoiding the most valuable polder(s)
or a particular polder that needs to be protected. Therefore, one of the main ques-
tions arising while addressing a flood mitigation problem, that is find all possible
paths for flood water before it arrives at the protected area, is efficiently addressed
by our numerical–constraint based model, utilizing graph algorithms with different
selection criteria as discussed later in this chapter.
A notable advantage of this approach over traditional numerical models is the calcu-
lation of a single (or small number) of paths found by the graph algorithm to be most
feasible flood propagation scenarios, resulting in minimal damage. Using a ‘forward
approach’ involving traditional numerical simulation would require a ‘brute’ force
approach of evaluating all (many) possible ways of the flood propagation, thus con-
ducting extensive simulations and only later providing the user with the possibility
to manually select the most appealing scenario. This might lead to unnecessary
106 Section 7.2. Description of the numerical–constraint based approach
complications during the simulations, resulting in high computation cost and com-
plexity of the model.
Let us denote the directed graph in Figure 7.2 as G = (V, E) where V is the vertex
set corresponding to the available polders and E is the edge set and any edge corre-
sponding to the to link between adjacent polders. In case of directed graphs every
edge (u, v) ∈ E is represented through a set of ordered pairs of vertices. In our case,
the direction of each of the edges is not decided beforehand, but according to the
hydraulic conditions in each polder at the every time step, as explained later in the
chapter. We distinguish two types of vertices in our graph: a source s and a sink t.
If polder C is the initial flooded polder then this polder will be the source vertex in
the graph network and polder J, the most valuable polder in the area which we aim
to protect from flooding, will be the sink vertex. Other vertices in the graph that
are neither sources nor sinks are called intermediate vertices. Water flows through
the intermediate vertices and might be stored in them. We assume that every vertex
lies on some path from the source to the sink vertex. The rate at which water enters
a vertex must equal the rate at which it leaves the vertex and the amount remaining
in the vertex, so mass conservation is preserved.
A non–negative real–valued function p is defined on the edges set and represents the
capacity function of our network G. Its value on a particular edge is the capacity of
the edge e that represents the maximum rate of flow from one polder in the other.
The capacity function of the network is related to the initial flow conditions at polder
C.
s1
s2 t1
S’ s3 t2 t’
s4 t3
s5
Figure 7.2: A network with multi source and multi sink vertices.
and
g − (v) = g + (v) , ∀ v ∈ V. (7.2)
The value g (e) expresses the rate at which the water flow travels along e. The
upper bound in condition (7.1) is called the capacity constraint; it imposes the
natural restriction that the flow along an edge cannot exceed the capacity of the
edge or cannot be higher than the available water in the polder from where water
is flowing out. Condition (7.2), called the conservation condition, requires that
for any intermediate vertex (polder), the volume of water flowing into v is equal
to the volume flowing out of v. The conservation condition implies that the flow
entering Polder C is equal to the sum of the volumes of water distributed over the
intermediary and sink vertex. Our aim is, given the network G with source s and
sink t, to find the best way of accommodating a flood in the paths consisting of
polder vertices that have a low economic value. As polder J is the polder to be
protected from being flooded, we assume that the graph has many sinks that are
the polders adjacent to the polder to be protected, and name polder J the supersink
t.
dVp
= Qin − Qout , (7.3)
dt
where V is the polder volume, t is time and Qin and Qout are the flow rates in each
direction into and out of the cell (see Figure 7.3), corresponding to flow through the
breaching dike.
Main Properties of proposed Numerical Model
108 Section 7.2. Description of the numerical–constraint based approach
Qoutflow
dV
= Q up + Qdown + Qleft + Q right
dt
Figure 7.3: Mass conservation principle in an area compartmentalised in many pold-
ers. Each cell in the domain represents a polder.
There are different factors that might initiate the failure of a dike structure as de-
scribed in Section 2.2. PC–Ring (Vrouwenvelder, 1999; Vrouwenvelder et al., 2001)
is a tool developed and used in the Netherlands to calculate the total failure proba-
bility of a flood defence system consisting of dikes. A dike ring system is as weak as
its weakest link (dike section). Thus, the failure probabilities are calculated for the
weakest links in a system of dikes and not for every dike section. The total failure
probability includes the failure probabilities for overtopping and overflowing, insta-
bility of inner or outer slope, uplifting/piping. The failure probabilities are usually
calculated for dikes along a river, sea or other water body; it is common that the
failure probability of dikes that are not exposed to water, i.e. tertiary dikes is not
known.
Currently, in our model, we consider the overflowing failure mode as the most likely
failure mode for dikes during a flood event. During overflowing, the water level
exceeds (even in the absence of waves) the crest level of the dike and the water
flowing over the dike and along the inner (landward) slope induces structural fail-
ure. The probability of water levels exceeding the dike crest level is expressed as
P (Z < 0), where Z is a reliability or state function that represents the difference
Strength − Load. For Z < 0, the load is higher than the strength of the dike and as
such it fails, and vice versa (for Z > 0 the dike does not fail). The state when Z = 0
is called the limit state. For overflowing of the dikes, Z is expressed as follows:
1/3
q 2c
Z = hd + − hw , (7.4)
0.36g
Chapter 7. A Numerical-Constraint based Model 109
where hd is the dike height [m], qc is the critical discharge [m3 /s] or the maximum
discharge flowing over the dike for which failure of the dike is not initiated, and hw
is the occurring water level [m]. The second term in Eq. 7.4 expresses the critical
depth on a broad crested weir.
The flow exchange between two polders in case of a dike failure from overflowing is
estimated using the BREADA model (Zagonjolli et al., 2005; Zagonjolli and Mynett,
2006a,b) presented in Chapter 6 that is adapted for dike failure by increasing the
erodibility coefficient and taking into account the submergence of the breach flow.
Since the BREADA model is applicable for non–cohesive dams, that means that all
the dikes in the domain are assumed to be non–cohesive dikes.
Below we describe in more detail how these objectives can be satisfied within the
proposed methodology.
Natural flooding
We define the flooding of the area that occurs without deliberate intervention as oc-
curring naturally. In a system of polders it is usually preferable to take into account
the probability of several dike failure modes as well as the associated uncertainties.
Knowing the failure probability of all dike sections is beneficial when identifying the
potential breach location. Moreover, when deliberate breaching of a dike is con-
sidered, it provides the possibility to choose the dike section with highest failure
probability. Our modelling tool is built to take into consideration this information,
if provided by the user. However, in our example application we consider only dike
elevation and water depth in the polder as the primary source for breach initiation.
Once the water level in the polder raises higher than the top elevation of any of the
surrounding dikes, overflow breaching of that dike is assumed to be initiated leading
to the flooding of the polder. Another important element for dike breach initiation
is the duration of the overflowing water, which should be large enough to initiate
erosion. We do not specify the overflow duration time in our model, but ensure that
the duration is long enough as the filling up of the first polder coincides with the
rising limb of the inflow hydrograph, which implies that further increase of water
level in the polder is expected.
Then the numerical model for natural flooding uses the suggested path to simulate
controlled flood propagation. This means that previously not breached dikes will be
breached for the purpose of accommodating the excess water and controlling flood
propagation to protect the most valuable polder. In case the flood could be retained
within the polders located on its path before reaching most valuable polder, then J
will be dry, otherwise it will be the last polder to be flooded, thus having more time
for evacuation.
It can be observed that in some cases both the longest path and the maximum stor-
age volume objectives could lead to the same solution. Obviously, in case of a unique
longest path, it possesses the largest storage capacity than any other one. However,
the situation is completely different in case a restriction on the number of polders
that should be used to accommodate flooding is imposed.
7.3 Application
The domain area of the case study considered in this section is schematized in Figure
7.4 together with the information about dike height and top elevation as well as the
polder’s maximum storage capacities and economic values. The value is expressed in
112 Section 7.3. Application
L 2.3; 8.8 K
2; 8.5 (0.18; 0.7)L K
5
2; 8. 2; 8.5 (0.16; 0.7)
; 10
;
3.5
8.9
Figure 7.4: Transformation of the case study area into the graph. Dike height and
the dike top elevation [m] as well as polder area [km2 ] and its relevant value are
presented.
relative terms varying in a scale from 0 to 1. However, the overall score is calculated
based on a particular economic value of each polder and its social and environmental
aspects are considered as contributing elements, although not expressed in mone-
tary terms. These values are not depending on the water level or velocities in the
polder, but are used as indicators for the polders that are more valuable and require
most protection. Including a depth–damage function as one of the constraints in our
model is foreseen as future work and can be incorporated into existing framework.
TAW (2002) provides guidelines for the critical discharge on overtopped sea dikes of
clay or sand material with either good or bad grass cover. However, to our knowl-
edge, no information exists concerning the critical discharges of overflowed inner
dikes. In the case study, qc = 0.16m3 /s is assumed , which leads to a water depth of
0.2m above the dike crest to initiate dike failure. Due to the fact that the application
is used for demonstration purposes of the developed method, we may argue that our
assumption can be considered reasonable for the purpose of dike breach initiation.
The initial dike to breach is the river dike of Polder C. The breach outflow for that
dike is assumed rather than estimated using a breach model. The hydrograph has
maximum peak outflow of 400 m3 /s. As can be observed in Figure 7.4 the border
dikes have higher heights to satisfy the property of rigid boundaries that never suffer
failure. The same condition is applied for the other river dikes as well.
Chapter 7. A Numerical-Constraint based Model 113
2.5
Water depth [m]
2.0
1.5
1.0
0.5
Time [s]
0.0
0 2000 4000 6000 8000 10000
C D E F G J L K I H
Figure 7.5: The natural flooding of the polders - water depth in polders as a function
of time.
In Figure 7.5 the rate of change of water depth in every polder for a natural prop-
agation of the flood in the domain is shown. It can be observed that Polder J is
flooded. The breaching of the dikes is initiated when the water depth is higher than
hd + 02m. For simplicity, our domain is considered flat with bottom elevation of the
dikes to be the same.
Using the Longest Path objective, for the area presented in Figure 7.4, the longest
path suggested by the algorithm is [C, A, B, D, E, G, F, I, H, K, L, J] (see Figure
7.6 and Figure 7.7). Note, that the first and the last polders are considered as most
crucial for the model, however the intermediate polders might not necessarily be
flooded based on their ranking order in the path. We observe that in this case the
polder we aim to protect is dry at the end of the simulations. The flood water is
directed towards the other polders and the result is the expected flood propagation
scenario at the end of the simulation.
The path obtained when selecting the polders with the largest maximum volume
capacity is [C, A, B, D, E, G, F, I, H, K, L, J] which corresponds to the one ob-
tained for the longest path. This could be expected since the longest path and the
maximum volume objective appeared to be the same objectives in terms of storage
capacity.
A very different flood path propagation (compared to the longest and maximum
storage paths) is obtained for the minimum total damage scenario, thus selecting
114 Section 7.3. Application
1.5
1.0
0.5
Time [s]
0.0
0 2000 4000 6000 8000 10000
C D E F G I L H K
Figure 7.6: The longest path and the maximum polder volume flooding scenarios.
F F
G G
D D
E C E C
B A B A
C-D-E, D-F, E-G, F-G-J-L-K-(IH) C-D-E, D-F, F-G, E-G, F-I-(HK), K-H, K-L
Figure 7.7: The natural and longest path flooding of the polders in graph represen-
tation.
Chapter 7. A Numerical-Constraint based Model 115
2.5
Water depth [m]
2.0
1.5
1.0
0.5
Time [s]
0.0
0 2000 4000 6000 8000 10000
C D E G F B A
I (0.25) I (0.25)
J (0.15) J (1)
H (0.07) H (0.1)
F (0.13) F (0.6)
G (0.11) G (0.7)
D (0.16) D (0.4)
Figure 7.9: The flooding of the polders based on the largest storage volume and the
minimum value objective.
116 Section 7.4. Conclusions
the less valuable polders in our domain to be flooded. The polders are found to be
[C, A, B, E, D, F, G, J] and the flooding pattern is shown in Figure 7.8 and Figure
7.9. The Polder J is dry at the end of this simulation.
7.4 Conclusions
The main idea behind the proposed approach of using graph theory to develop con-
straints for numerical simulations is to manage the flooding process within a system
of polders or dike ring areas divided into a number of compartments. For this pur-
pose we use a numerical–constraint based model that takes into account not only
physical processes involved in dike breaching and flow propagation but also social,
economic and environmental values of the areas prone to inundation. We simulate
different scenarios of flooding based on the hydraulic processes and the constraints
introduced to minimize the flood damage in each protected area.
By temporarily storing the water in compartments, the total risk might be mini-
mized. The flooding probability is increased for some compartments, while the total
flood risk is decreased. The filling process of the compartments depends on the fail-
ure process of the dike and on the condition whether a deliberate breaching of the
dike is involved or ‘natural’ failure of hydraulic structure occurs. In both cases the
same breaching model is used, but in the former case dikes are deliberately lowered.
There is a possibility to include faster breach development of the dikes that might
not have a slow breaching process depending on the methods used to remove (open)
a dike section. Furthermore, the model can be enhanced by including the presence
of additional hydraulics structures.
The key difference of our method in comparison to existing ones, is that instead
of assigning a particular probability to a scenario, we propose an alternative ap-
proach of evaluating and mitigating consequences based on a numerical–constraint
based approach. In particular, we evaluate different ways for flood mitigation dur-
ing a flood event. In the simulation we take into account compartments created by
the available dikes, roads and natural high grounds in the areas prone to flooding.
Through constraints, we optimize the strategy for choosing the most feasible flood
propagation scenario that minimizes socio–economic consequences. This is done by
utilizing algorithms based on graph theory that efficiently transform dike ring areas
into a graph and find different optimal paths applicable for each objective function.
The main strategy consists of navigating floodwater ‘away’ from the most populated
or economically valuable regions.
Based on the considerations presented above, we may suggest that flood risk man-
agement could draw significant benefit from a constraint based methodology by using
a set of measures that ‘keeps the system dry’. Including targets and goals inside
Chapter 7. A Numerical-Constraint based Model 117
the support system, allows better prediction of different scenarios since in this case
the model will provide optimal solutions. However, the case might be that some
extreme floods in the low-lying areas, caused by prolonged heavy rainfall might not
be prevented as a result of measures taken or the method used.
Chapter 8
Conclusions and
Recommendations
. . . the river . . .
Keeping his seasons and rages, destroyer, reminder
Of what men choose to forget. Unhonoured, unpropitiated
By worshippers of the machine, but waiting, watching and
waiting.
T.S. Eliot
8.1 Conclusions
In this thesis, various approaches are proposed and applied for simulating dam and
dike failure events, flood water routing in downstream areas, and flood risk reduction,
providing a unified framework for addressing flood related events. Numerical, data
mining, graph theory and constraint based methods are applied to the problem of
breach modelling and flood water mitigation. The findings related to each of the
proposed approaches are listed below.
We focus on dams and dikes composed of earth material since they constitute the
120 Section 8.1. Conclusions
largest percentage of total number of dams and dikes built around the world and the
largest number of failures occurs in these structures as well. For structures with co-
hesive material, two processes are most likely to develop: erosion and headcutting.
The latter was found to be predominant during field and laboratory experiments
(Morris, 2005). The cohesive bond between the particles of the cohesive soil presents
higher resistance to the flow, while for the non–cohesive soil the physical properties
of the particles (size, shape, density, porosity, and fall velocity) contribute to the
resistance to the flow. Because the particles are not bound together, the erosion
process is believed to be the predominant breaching mechanism. However, any in-
stability in part of the structure might also result in mass failure. In this thesis, a
dam breach model is developed for simulating overtopping failure of non–cohesive
dams.
BREADA model
The BREADA model developed in this thesis assumes two different breach shape
evolutions in time and space with two important time intervals. In the first formu-
lation, the initial trapezoidal breach shape develops in vertical and lateral direction,
until the ground is reached and then progresses in lateral direction only. In the
second formulation, a triangular breach shape is initially assumed and continues to
expand in vertical direction until the bottom level of the structure is reached. During
the second phase, the trapezoidal breach progresses in lateral direction until either
the water flow force can not cause any further erosion or the breach has reached its
maximum allowed dimensions that are limited by the dam geometry. Flow through
the breach channel is calculated as a weir flow and the erosion of the dam material is
estimated with a bed load transport empirical equation. The model developed is val-
idated against the historical failure event of Schaeffer Dam in USA. Good agreement
is observed in terms of peak outflow prediction for a range of model parameters.
Four different methods to calculate dam breach peak outflow are evaluated against
the documented failure event of the Schaeffer Dam. We compare the breach outflow
hydrograph and the peak outflow obtained from our model with the BREACH model
as well as with the range of peak outflows obtained from empirical equations and
data mining techniques. The results show a wide range of predicted peak outflows.
When using empirical equations, the peak outflow discharge varies in a range of
±50%. Though the best performing empirical equation for the Schaefer dam can be
identified, this does not imply its direct applicability to other failure events. When
the dam breach models BREACH and BREADA are used the predicted peak outflow
varies in a narrower range depending on the assumptions and selected parameters.
Good results are obtained from the IBk data mining model that predicts only a 10%
lower peak outflow than the recorded one.
Many dam material characteristics are needed for modelling, but their (precise) val-
ues are not always available. The largest uncertainty is observed in the hydrograph
shape, particularly in the timing of the breach development. While the BREACH
model exhibits a very sharp rising limb meaning fast development of the breaching, a
smooth rising limb is observed for the BREADA model, the former leading to worst
downstream flood conditions while the slower wave produed by the latter will leave
more warning time to the population downstream.
Other sources of uncertainty also affect the modelling of dam break flood propaga-
tion, especially when failure of large dam is involved. The roughness of the areas
subject to flooding is not known beforehand. The resulting flood propagation sce-
narios depend on the roughness coefficient used (either constant or land use based
122 Section 8.1. Conclusions
one). Moreover, we ignore the reservoir sediment or the dam material, which are
flushed away together with the water stored in the reservoir, but instead consider
propagation of clear water in the valley. The presence of the material attached to the
water, which will affect the flow pattern significantly is taken into account through
higher values of roughness coefficients.
Once the potential risk is identified, the task is to find the ways of reducing this risk
and take measures for warning the population downstream in case of a structural
failure event. Our modelling results can be used as flood hazard maps and can assist
communities in planning future developments in areas that are prone to flooding.
We believe that flood risk management could benefit from a constraint based ap-
proach by using a set of measures that keep the system dry. Including objectives
in a hydrodynamic modelling package, allows better prediction of different scenarios
since in this case the model will provide optimal solutions. However, it might still be
the case that some extreme floods or floods caused due to prolonged heavy rainfall
over the domain area might not be prevented as a result of measures taken or the
method used.
Chapter 8. Conclusions and Recommendations 123
8.2 Recommendations
The following recommendations for further research are suggested.
During the past three decades different dam breach modelling methods have
been proposed for predicting the outflow hydrograph and peak outflow value.
However, none of the methods can guarantee to obtain accurate breach charac-
teristics. The complexity of breach development usually motivates researchers
to make many approximations to obtain simpler mathematical description of
the processes involved, thus increasing the uncertainty related to the structural
failure development. This is the case when modelling erosion and headcut ero-
sion processes. Many laboratory and field experiments have been performed
to provide in depth understanding of these processes. However, the complete
physical description is far from perfect. A possible direction for future inves-
tigation could be the analysis of erosion processes in a river stretch during a
high flow and evaluating its application to a dam breaching event.
For high dams the monitoring and recording of failure events has not been
satisfactory so far, making the calibration of breaching models difficult and
leading to uncertainty in the prediction results. The drawback of the exper-
imental tests is that the weakest spot on the dam structure is predefined,
influencing further development of the breaching. The optimal solution is real
time dam monitoring and aerial pictures of breach development, but these
proposed measures might be difficult to implement, since breaching caused by
overtopping usually occurs during bad weather conditions, therefore limiting
the monitoring possibilities. However, due to technological advances both in
hardware and software sensor technology, one might expect (real time) moni-
toring of dikes and dams during breach development to become possible and
feasible.
Scale models are currently the main source of validation data for dam/dike
breach modelling. Although hydraulic conditions, such as water velocity, etc.
are effectively replicated in laboratories, the exact scaling factors for the soil
properties and sediment transport are usually not available. Therefore, an
interesting direction for future research is to investigate scaling of soil related
properties. Furthermore, simulation and visualization of breaching processes
in 3D might lead to better descriptions of the phenomena.
Improving the accuracy of existing physically based models by using the in-
formation extracted from a database of recorded dam failure events is another
direction of this research. Currently, the available database consists of about
100 dam failure events and suffers from inconsistencies between the different
sources. Increased efforts in documenting and sharing the information related
124 Section 8.2. Recommendations
to historical dam dike failure events is necessary. This will lead not only to bet-
ter validation of the physically based models, but also to more accurate data
mining models for discovering patterns and relationships among dam failure
events.
During structural breaching, the dam material is flushed away together with
the water, changing the morphology in the areas downstream. The modelling
of flood propagation is usually accomplished by assuming clear water and
rigid terrain throughout the flood water propagation domain. However, in-
cluding the interaction of debris flow and non–rigid terrain boundaries may
significantly affect the flooding pattern. This problem has recently received
significant attention and further research in this area is necessary.
Bibliography
Albinfrastrukture: 1996, Diga e Bovilles (in albanian and italian), Technical report,
Ministry of Construction, Albania.
Alcamo, J. and Bartnicki, J.: 1987, A framework for error analysis of a long-range
transport model with emphasis on parameter uncertainty, Atmospheric Environ-
ment 21(10), 2121–2131.
Alonso, C. V., Bennett, S. J. and Stein, O. R.: 2002, Predicting head cut erosion and
migration in concentrated flows typical of upland areas, Water Resources Research
38(12), 39.1–39.15.
Archer, D.: 2006, Global warming: Understanding the forecast, Blackwell Publishing
Ltd.
Babovic, V., Keijzer, M., Aguilera, D. R. and Harrington, J.: 2001, An evolutionary
approach to knowledge induction: Genetic programming in hydraulic engineer-
ing, ASCE, Proc. of the World Water and Environmental Resources Congress,
Orlando, Florida, USA, pp. 64–64.
Birkes, D. and Dodge, Y.: 1993, Alternative methods of regression, John Wiley, New
York.
Bogárdi, J.: 1974, Sediment transport in alluvial streams, Akadémiai Kiadó, Bu-
dapest, Hungary.
Bowles, D. S.: 2001, Evaluation and use of risk estimates in dam safety decision
making, Proc. of the United Engineering Foundation Conference on Risk-Based
Decision-Making, Santa Barbara, California, USA, pp. 17–32.
126 Bibliography
Brinkhuis–Jak, M., Holterman, S. R., Kok, M. and Jonkman, S. N.: 2003, Cost
benefit analysis and flood damage mitigation in the Netherlands, Paper for the
ESREL Conference, Maastricht, the Netherlands, pp. 16–18.
Broich, K.: 1998, Mathematical modelling of dam break erosion caused by overtop-
ping, Proc. of the 2nd CADAM Meeting, Universität der Bunderswehr, München,
Germany. Available at www.hrwallingford.co.uk/projects/CADAM/.
Broich, K.: 2003, Sediment transport in breach formation process, Proc. of the
3rd IMPACT Workshop, Université Catholique de Louvain, Louvain–la–Neuve,
Belgium. Available at www.impact-project.net.
Brown, C.: 1950, Sediment transportation, Engineering Hydraulics pp. 769–857.
Brown, R. J. and Rogers, D. C.: 1977, A simulation of the hydraulic events during
and following the Teton Dam failure, Proc. of Dam–Break Flood Routing Model
Workshop, U.S. Water Resource Council, Bethesda, Maryland, pp. 131–163.
Brown, R. J. and Rogers, D. C.: 1981, Users manual for program BRDAM, U.S.
Bureau of Reclamation, Denver, Colorado.
Chanson, H.: 2005, Applications of de Saint–Venant equations and method of char-
acteristics to the dam break wave problem, University of Queensland, Australia.
Chaudhry, M. H.: 1993, Open-channel flow, Prentice Hall, New Jersey.
Chow, V. T.: 1959, Open channel hydraulic, McGraw-Hill, New York.
Coleman, S., Andrews, D. and Webby, M.: 2002, Overtopping breaching of noncohe-
sive homogeneous embankments, Journal of Hydraulic Engineering 128(9), 829–
838.
Commissie Rivierdijken: 1977, Rapport Commissie Rivierdijken (in Dutch). The
Hague, the Netherlands.
Corman, T. H., Leiserson, C. E. and Rivest, R. L.: 2001, Introduction to algorithms,
MIT Press, Cambridge, USA.
Costa, J. E.: 1985, Floods from dam failures, Open-file report, U.S. Department of
the Interior Geological Survey, Denver, USA.
Costa, J. E. and Schuster, R. L.: 1988, The formation and failure of natural dams,
Geological Society of American Bulletin 100(7), 1054–1068.
Cristofano, E. A.: 1965, Method of computing erosion rate for failure of earthfill
dams, U.S. Department of the Interior, Bureau of Reclamation, Denver, Colorado.
Cunge, J. A., Holly, F. M. and Verwey, A.: 1980, Practical aspects of computational
river hydraulics, Pitman Publishing Ltd., London.
Bibliography 127
CUR/TAW: 1990, Probabilistic design of flood defences, Report 141, Technical Ad-
visory Committee on Water Defences, Center for Civil Engineering Research and
Codes, Gouda, the Netherlands.
de Vriend, H.: 2005, State of the art in flood management research, Proc. of the 3rd
International Symposium on Flood Defence, Nijmegen, the Netherlands.
Dodge, M. M.: 1997, Hans Brinker or the silver skates, The World Wide SchoolTM,
Seattle, Washington, USA.
Dressler, R. F.: 1952, Hydraulic resistance effect upon dam-break functions, Journal
of Research, National Bureau of Standards, USA 49(3), 217–225.
Dressler, R. F.: 1954, Comparison of theories and experiments for the hydraulic dam-
break wave, Vol. 3, Proc. of the International Association of Scientific Hydrology,
Rome, Italy, pp. 319–328.
Du Boys, M. P.: 1879, Études du régime du Rhône et de laction exercée par les
eaux sur un lit à fond de graviers indéfiniment affouillable, Annales des Ponts et
Chaussées 5(18), 141–195.
Einstein, H. A.: 1942, Formulas for the transportation of bed load, ASCE Transac-
tions 107, 561–573.
Exner, F. M.: 1925, Ber die wechselwirkung zwischen wasser und geschiebe inflssen,
Sitzungber. Acad. Wissenscaften Wien Math. Naturwiss, Abt. 2A, 134 pp. 165–
180.
128 Bibliography
Flannery, T.: 2006, The Weather Makers: how man is changing the climate and
what it means for life on earth, Atlantic Monthly Press.
FLOODsite: 2005, Language of Risk-Project Definitions, Consortium Report T32-
04-01. Available at www.floodsite.net.
Follansbee, R. and Jones, E. E.: 1922, The Arkansas River flood of June 3-5, 1921,
Water-Supply Paper 487 .
Franca, M. J. and Almeida, A. B.: 2004, A computational model of rockfill
dam breaching caused by overtopping (RoDaB), Journal of Hydraulic Research
42(2), 197–206.
Fread, D. L.: 1988, BREACH: an erosion model for earthen dam failures, Hydrologic
Research Laboratory, National Weather Service, NOAA.
Froehlich, D. C.: 1987, Embankment-dam breach parameters, Proc. of the ASCE
National Conference on Hydraulic Engineering, Williamsburg, Virginia, USA,
pp. 570–575.
Funtowicz, S. O. and Ravetz, J. R.: 1990, Uncertainty and quality in science for
policy, Springer.
Galy-Lacaux, C., Delmas, R., Kouadio, G., Richard, S. and Gosse, P.: 1999, Long-
term greenhouse gas emissions from hydroelectric reservoirs in tropical forest re-
gions, Global Biogeochemical Cycles 13(2), 503–517.
Gauss, C. F.: 1809, Theoria motus corporum coelestium in sectionibus conicus solem
ambientium, Vol. Translation reprinted as Theory of motions of the heavenly bodies
moving about the sun in conic sections. Dover, New York, 1963, Perthes et Besser.
Gerritsen, H.: 2005, What happened in 1953? The Big Flood in the Netherlands in
retrospect, Philosophical Transactions: Mathematical, Physical and Engineering
Sciences 363(1831), 1271–1291.
Hagen, V. K.: 1982, Re-evaluation of design floods and dam safety, Vol. 1, Proc.
of 14th Congress of International Commission on Large Dams, Rio de Janeiro,
Brasil, pp. 475–491.
Hanson, G. J., Robinson, K. M. and Cook, K. R.: 2001, Prediction of headcut
migration using a deterministic approach., Transactions of the ASAE 44(3), 525–
531.
Hanson, G. J., Temple, D. M. and Cook, K. R.: 1999, Dam overtopping resistance
and breach processes research, Proc. of the Annual Conference Association of
State Dam Safety Officials, St. Louis, Missouri, USA.
Harris, G. W. and Wagner, D. A.: 1967, Outflow from breached earth dams, Uni-
versity of Utah, Salt Lake City, Utah, USA.
Bibliography 129
Hartford, D. N. D. and Baecher, G. B.: 2004, Risk and uncertainty in dam safety,
Thomas Telford.
Hervouet, J. M.: 2000, A high resolution 2-D dam-break model using parallelization,
Hydrological Processes 14(13), 2211–2230.
Hervouet, J. M.: 2007, Hydrodynamics of free surface flows: Modelling with the finite
element method, John Wiley & Sons.
Hoffman, F. O. and Hammonds, J. S.: 1994, Propagation of uncertainty in risk
assessments: The need to distinguish between uncertainty due to lack of knowledge
and uncertainty due to variability, Risk Analysis 14(5), 707–712.
Hooijer, A., Klijn, F., Pedroli, G. B. M. and van Os, A. G.: 2004, Towards sustain-
able flood risk management in the Rhine and Meuse river basins: synopsis of the
findings of IRMA-SPONGE, River Research and Applications 20(3), 343–357.
Huang, Y.: 2005, Appropriate modeling for integrated flood risk assessment, PhD
thesis, University of Twente, the Netherlands.
IMPACT: 2004, Investigation of Extreme Flood Processes and Uncertainties, EC
Contract EVG1-CT-2001-00037, www.impact-project.net.
International Commission on Large Dams: 2005, Risk assessment in dam safety
management: a reconnaissance of benefits, methods and current applications,
CIGB/ICOLD. Bulletin 130.
IPCC: 2001, Climate Change 2001: The scientific basis, Third Assessment Report
of the IPCC, Cambridge University Press.
Janssen, P. H. M., Heuberger, P. S. C. and Sanders, R.: 1994, UNCSAM: A tool for
automating sensitivity and uncertainty analysis, Environmental Software 9(1), 1–
11.
Johnson, F. A. and Illes, P.: 1976, A classification of dam failures, International
Water Power and Dam Construction 28(12), 43–45.
Klijn, F., van Buuren, M. and van Rooij, S. A. M.: 2004, Flood-risk management
strategies for an uncertain future: Living with Rhine River floods in the Nether-
lands, AMBIO: A Journal of the Human Environment 33(3), 141–147.
Knight, D., Cao, S., Liao, H., Samuels, P., Wright, N., Liu, X. and Tominaga, A.:
2006, Floods are we prepared?, Journal of Disaster Research 1(2), 325–333.
Krzysztofowicz, R.: 2001, The case for probabilistic forecasting in hydrology, Journal
of Hydrology 249(1), 2–9.
Kwadijk, J. and Rotmans, J.: 1995, The impact of climate change on the river
Rhine: A scenario study, Climatic Change 30(4), 397–425.
130 Bibliography
Lafitte, R.: 2001, Hydropower, The 20th edition of the Survey of Energy Resources,
World Energy Council.
Leal, J., Ferreira, R. M. L. and Cardoso, A. H.: 2002, Dam-break waves on movable
bed, Vol. 2, River Flow 2002, Proc. of the International Conference on Fluvial Hy-
draulics, Louvain-la-Neuve, Belgium, Swets & Zeitlinger, Lisse, the Netherlands,
pp. 981–990.
Lou, W. C.: 1981, Mathematical modeling of earth dam breaches, PhD thesis, Col-
orado State University, USA.
Loukola, E. and Huokuna, M.: 1998, A numerical erosion model for embankment
dams failure and its use for risk assessment, Proc. of the 2nd CADAM Meeting,
Universität der Bunderswehr, München, Germany.
Macchione, F. and Rino, A.: 1989, Dimensionless analytical solutions for dam-breach
erosion, Journal of Hydraulic Research 27(3), 447–452.
McCarthy, J., Minsky, M. L., Rochester, N. and Shannon, C. E.: 1956, A proposal
for the Dartmouth summer research project on Artificial Intelligence, Retrieved
from www-formal.stanford.edu/jmc/history/dartmouth.
McCulloch, W. S. and Pitts, W.: 1943, A logical calculus of the ideas imminent in
nervous activity, Bulletin of Mathematical Biophysics 5, 115–133.
McCully, P.: 1996, Silenced rivers: The ecology and politics of large dams, Zed
Books, London & New Jersey.
Merabtene, T., Yoshitani, J. and Kuribayashi, D.: 2004, Managing flood and water-
related risks: A challenge for the future, Proc. of the AOGS Joint 1st Annual
Meeting & 2nd APHW Conference, Singapore.
Meyer-Peter, E. and Müller, R.: 1948, Formulas for bed-load transport, Proc. of the
2nd Meeting of the International Association for Hydraulic Structures Research,
pp. 39–64.
Montuori, C.: 1965, Introduction d’un débit constant dans un canal vide, Proc. of
the 11th IAHR Congress, Leningrad, Russia, pp. 1–7.
Morris, M. W.: 2005, IMPACT: Final technical report, Proc. of the 1st IMPACT
Workshop, HR Wallingford, UK.
Mynett, A. E.: 2002, Hydroinformatics in aquatic resources management, Proc.
of the NATO Advanced Research Workshop on “New Paradigms in River and
Estuary Management”, Moscow, Idaho, USA.
Mynett, A. E.: 2004a, Artificial Intelligence techniques in environmental hydroin-
formatics, Proc. of the IAHR-Asian and Pacific Division Conference, Hong Kong.
Mynett, A. E.: 2004b, Hydroinformatics tools for ecohydraulics modelling, Proc. of
the 6th International Conference on Hydroinformatics, Singapore.
Mynett, A. E.: 2005, Hydroinformatics applications in hydroscience and engineering,
Chapter 2, Encyclopedia of Hydrological Sciences, Willey Publishers.
Mynett, A. E. and de Vriend, H. J.: 2005, Next generation information and commu-
nication technology (ICT) for integrated water management of the Yellow River
Basin, Proc. of the 2nd Yellow River Forum, Zhengzou, China.
Nishat, A.: 2006, Experiences from Bangladesh on disaster management with focus
on floods, Meeting Report on Regional Journalist Workshop on Water Issues in
Asia, Bangkok, Thailand.
NPDP: 2007, Dam incidents database, National Performance of Dams Program,
Stanford University, California, USA. Available at npdp.stanford.edu.
Nsom, B.: 2002, Horizontal viscous dam–break flow: Experiments and theory, Jour-
nal of Hydraulic Engineering 128(5), 543–546.
Olı́as, M., Cerón, J., Fernández, I., Moral, F. and Rodrı́guez-Ramı́rez, A.: 2005,
State of contamination of the waters in the Guadiamar Valley five years after the
Aznalcóllar spill, Water, Air, & Soil Pollution 166(1), 103–119.
Plate, E. J.: 2000, Flood management as part of sustainable development, Vol. 1,
Proc. of the International Symposium on River Flood Defence, Kassel, Germany.
Ponce, V. M. and Tsivoglou, A. J.: 1981, Modeling gradual dam breaches, Journal
of Hydraulic Division 107(7), 829–838.
Powledge, G. R., Ralston, D. C., Miller, P., Chen, Y. H., Clopper, P. E. and Temple,
D. M.: 1989, Mechanics of overflow erosion on embankments. Part II. Hydraulic
and design considerations, Journal of Hydraulic Engineering 115(8), 1056–1075.
Price, R. K.: 2000, Hydroinfomatics for river flood management, Vol. 71, NATO
Science Series 2 Environmental Security, Kluwer Academic Publishers, pp. 237–
250.
132 Bibliography
Pugh, C. A. and Harris, D. W.: 1982, Prediction of landslide generated water waves,
Vol. Q. 54, Proc. of the 14th International Congress on Large Dams (ICOLD),
Rio de Janerio, Brazil, pp. 1056–1075.
Qing, D.: 1997, The River Dragon has come!: Three Gorges dam and the fate of
China’s Yangtze River and its people, ME Sharpe.
Ralston, D.: 1987, Mechanics of embankment erosion during overflow, Proc. of the
ASCE National Conference in Hydraulic Engineering, pp. 733–738.
Ré, R.: 1946, Etude du lacher instantané d’une retenue d’eau dans un canal par
la méthode graphique (Study of the Sudden Water Release from a Reservoir in a
Channel by a Graphical Method.), Jl La Houille Blanche (in French) 1(3), 181–
187.
Ritter, A.: 1892, Die Fortpflanzung der Wasserwellen (Propagation of waves),
Zeitschrift des Vereines Deutscher Ingenieure 36(33), 947–954.
Robinson, K. M. and Hanson, G. J.: 1994, A deterministic headcut advance model,
Transactions of the ASAE 37(5), 1437–1443.
Rogers, J. D.: 2007, Background on failure of Teton Dam near Rexburg,
Idaho on June 5, 1976, University of Missouri-Rolla, USA. Retrieved from
web.umr.edu/˜rogersda/teton dam.
Rosa, L. P. and dos Santos, M. A.: 2000, Certainty & uncertainty in the science of
greenhouse gas emissions from hydroelectric reservoirs, Report prepared for the
World Commission on Dams.
Rosenblatt, F.: 1958, The perceptron: A probabilistic model for information storage
and organization in the brain., Psychological Review 65(6), 386–408.
Rousseeuw, P. J.: 1984, Least median of squares regression, Journal of the American
Statistical Association 79(388), 871–880.
Rousseeuw, P. J. and Leroy, A. M.: 2003, Robust regression and outlier detection,
Wiley-Interscience.
Rowe, W. D.: 1994, Understanding uncertainty, Risk Analysis 14(5), 743–750.
Rozov, A. L.: 2003, Modeling of washout of dams, Journal of Hydraulic Research
41(6), 565–577.
Saltelli, A.: 2004, Global Sensitivity Analysis: An Introduction, pp. 27–43.
Saltelli, A., Chan, K. and Scott, E. M.: 2000, Sensitivity analysis, Wiley.
Samuels, P., Klijn, F. and Dijkman, J.: 2005, River flood risk management policies
in different parts of the world: Synthesis of special session by NCR, Proc. of the
3rd International Symposium on Flood Defence, Nijmegen, the Netherlands.
Bibliography 133
Stelling, G. S., Kernkamp, H. W. J. and Laguzzi, M. M.: 1998, Delft flooding system:
a powerful tool for inundation assessment based upon a positive flow simulation,
Proc. of 5th International Conference on Hydroinformatics, pp. 449–456.
Stigler, S. M.: 1981, Gauss and the invention of least squares, The Annals of Statis-
tics 9(3), 465–474.
Stoker, J. J.: 1957, Water waves: The mathematical theory with applications, Pure
and Applied Mathematics 4.
TAW: 2002, Wave run-up and wave overtopping at dikes, Technical report, Technical
Advisory Committee on Water Defences, the Netherlands.
Temple, D. and Moore, J.: 1997, Headcut advance prediction for earth spillways,
Transactions of the ASAE 40(3), 557–562.
Thoft–Christensen, P. and Baker, M. J.: 1982, Structural reliability theory and its
applications, Springer.
Tingsanchali, T. and Hoai, H. C.: 1993, Numerical modelling of dam surface ero-
sion due to flow overtopping, Vol. 1, Advances in HydroScience and Engineering,
Washington, USA, pp. 883–890.
Tinney, R. E. and Hsu, H. Y.: 1961, Mechanics of washout of an erodible fuse plug,
Journal of the Hydraulics Division 87(3), 1–30.
Toro, E. F.: 1999, Rieman solvers and numerical methods for fluid dynamics: A
practical introduction, Springer-Verlag, Heidelberg, Berlin.
Tremblay, A., Lambert, M. and Gagnon, L.: 2004, Do hydroelectric reservoirs emit
greenhouse gases?, Environmental Management 33, 509–517.
Turing, A. M.: 1950, Computing machinery and intelligence, Mind 59(236), 433–460.
U.S. Army Corps of Engineers: 1960, Floods resulting from suddenly breached dams:
Conditions of minimum resistance, Report 1(374), U.S. Army Engineers Water-
ways Experiment Station, Vicksburg, Mississippi.
U.S. Army Corps of Engineers: 1961, Floods resulting from suddenly breached dams:
Conditions of high resistance, Report 2(374), U.S. Army Engineers Waterways
Experiment Station, Vicksburg, Mississippi.
Bibliography 135
van de Ven, G. P.: 2004, Man-made lowlands: History of water management and
land reclamation in the Netherlands, Matrijs, Utrecht, the Netherlands.
van der Sande, C. J., de Jong, S. M. and de Roo, A. P. J.: 2003, A segmentation
and classification approach of IKONOS-2 imagery for land cover mapping to assist
flood risk and flood damage assessment, International Journal of Applied Earth
Observation and Geoinformation 4(3), 217–229.
van der Sluijs, J. P.: 1997, Anchoring amid uncertainty: On the management of
uncertainties in risk assessment of anthropogenic climate change, PhD thesis,
Utrecht University, the Netherlands.
van Rijn, L. C.: 1993, Principles of sediment transport in rivers, estuaries and
coastal seas, Aqua Publications.
van Schijndel, S.: 2005, The Planning Kit, a decision making tool for the Rhine
branches, Proc. of the 3rd International Symposium on Flood Defence, Nijmegen,
the Netherlands.
Vaskinn, K. A.: 2003, Stability and failure mechanisms of dams, Proc. of the 3rd
IMPACT Workshop, Université Catholique de Louvain, Louvain-la-Neuve, Bel-
gium.
VenW: 2005, Floris study-Full report, Flood Risks and Safety in the Netherlands
(Floris) Project, Dutch Ministry of Transport, Public Works and Water Manage-
ment.
Verheij, H. J.: 2002, Modification breach growth model in HIS–OM, Q3299, Tech-
nical report, WL | Delft Hydraulics (in Dutch).
Vis, M., Klijn, F., de Bruijn, K. M. and van Buuren, M.: 2003, Resilience strategies
for flood risk management in the Netherlands, International Journal of River
Basin Management 1, 33–40.
Visser, P. J.: 1998, Breach growth in sand–dikes, PhD thesis, Delft University of
Technology.
136 Bibliography
Visser, P. J., Smit, M. J. and Snip, D. W.: 1996, Zwin ’94 experiment: Meetop-
stelling en overzicht meetresultaten, Report 4–96, Delft University of Technology,
the Netherlands.
Vrijling, J. K.: 2001, Probabilistic design of water defense systems in the Nether-
lands, Reliability Engineering and System Safety 74(3), 337–344.
Wentz, F. J., Ricciardulli, L., Hilburn, K. and Mears, C.: 2007, How much more
rain will global warming bring?, Science 317(5835), 233–235.
Witten, I. H. and Frank, E.: 2000, Data mining: Practical machine learning tools
and techniques with Java implementations, Morgan Kaufmann.
Wolters, H. A., Platteeuw, M. and Schoor, M. M.: 2001, Guidelines for rehabilitation
and management of floodplains, NCR publication.
World Commission on Dams: 2000, Dams and development: A new framework for
decision-making, Earthscan.
Wu, W., Wang, S. S. Y., Jia, Y. F. and Robinson, K. M.: 1999, Numerical simulation
of two-dimensional headcut migration, ASCE, Proc. of the International Water
Resources Engineering Conference, Seattle, WA, USA.
Zagonjolli, M. and Mynett, A.: 2006a, Dam breaching uncertainty and its effect
in downstream areas, Proc. of the 7th International Conference on Hydroscience
and Engineering, Philadelphia, USA, Michael Piasecki and College of Engineering,
Drexel University.
Bibliography 137
Greek letters
Symbol Description
AI Artificial Intelligence
ANNs Artificial Neural Networks
BREADA BReaching of the EArthfill DAm
Floris FLOod RIsks and Safety
GHGs GreenHouse Gases
GIS Geographical Information System
IBL Instance Based Learning
IPCC Intergovernmental Panel on Climate Change
LMS Least Median of Squares
LS Least Squares
LWL Locally Weighted Learning
MLP Multi Layer Perceptron
NPDP National Performance of Dams Program in USA
PAR People At Risk
RL Reinforcement Learning
RMSE Root Mean Square Error
SMDBRK National Weather Service Simplified Dam Break Model
TAW Technical Advisory Committee on Water Defences in the Netherlands
USBR U.S. Bureau of Reclamation
WCD World Commission on Dams
WEKA Waikato Environment for Knowledge Analysis
Curriculum Vitae
Migena Zagonjolli was born in 1975 in Tirana, Albania. She studied hydraulic en-
gineering at the Polytechnic University of Tirana, Albania, where she graduated in
1999. From then until 2001 she worked at the Department of Hydraulic Engineering
as an assistant lecturer in Hydraulics and Water Resources Management. During
this period she visited the University of Limerick, Republic of Ireland, as a guest
researcher.
From 2001 to 2003 she studied at UNESCO–IHE in Delft, the Netherlands, where
she obtained her MSc degree in Hydroinformatics on a research topic related to dam
break modelling. In 2004 she started her PhD research within the collaboration
framework between WL | Delft Hydraulics, UNESCO–IHE and Delft University of
Technology. She addressed a range of research topics, including data mining and
analysis, computational modelling of dam and dike breaching, sediment transport,
and flood risk assessment. One of the novel aspects of her research is the design of
a numerical–constraint based model for flood propagation and risk mitigation.