Dam Break
Excutive Summary
Analytical tools and techniques used in approximating dam breakages are usually evaluted and comparison made in orders to ascertain there effectiveness. During dam construction, it is necessary to evaluate the potentiality of dam failure modes, breach the necessary paramenters related to failuere modes, and define routing and the map of the consequent discharge hydrograph. This paper outlines how mapping of propable inudation emanating form the dam failures needs numerous elements i.e. likely dam failures, break parameters, hydrologic scenario that are connected to failure models, including routing and mapping of the consequent discharge hydrograph. The unsteadily flowing routing models i.e HEC-RAS are oftenly applied in computation and rfelction of the dam's downstream consequences emaneting from dam failures. Approximation of the break elements i.e. time of development and width is carried out externally to the model in use.
Introduction
In the recent past most agencies are enganging themselves in reviewing and updating safety measures concerned with dam safety and risk management. Studies relating to Dam break, involves updates on likely maximum flood inflow hydrographs and routing of most probable dam break floods to evaluate downstream impacts . The approximation of these estimate dimensions and developments is essentail in investigation of the dam safety. The flows in the downstream location and other inundated areas of the dam is directly proportional to the breach parameters, other factors tat influence include; the breach location, time of formation and the size (USACE, 1980). All these parameters are essentail in dam failure analysis.
The geometric design of a dam break ought to be approximated in order to reflect the resultant flood wave and down stream impacts . In this case an example of models that can be used to demonistrate dam breach outflow hydrograph computing and downstream routing include HEC-HMS (HEC, 2006b), HEC-RAS (HEC,2006a), NWS-DAMBRK (Fread, 1988b) amon others. The models requires the probable breach properties to be approximated outside the model. During investigation of dam break, breach dimenisions and time taken in develoment must be put in consideration in estimation of the failure scenarios (Washington State Dept. Of Ecology 1992). The necessitaties include various failure modes and different hydrologic events . The breach parameters related to hydrologics of the level of the likely maximum flood level may be different from that of sunny day failures broght about, likely, by a seismic event. Hence, anumber of breach parameters ought to be made for each connection of hydrologic event and failure scenario
Dam Break Simulation with HEC-RAS model:
Dam break tests are performed with HEC-RAS model for dam safety study and also flood damage analyses for circumstances that involves likely levee breaks. These studies in most cases need to ascertain the following circumstances and their associated uncertainties.
Hydrologic Scenarios (USACE, 1980).
Sunny day failure and,
Large hydrologic event
Failure Modes, they include (USACE, 1980).;
Overtopping
Piping
Breach definition input data and information (USACE, 1980).
Failure mode and initiation specification
Breach growth progression
Breach side slopes
Breach development time
Ultimate breach bottom elevation
Maximum breach bottom width
• Failure initiation
Selected time
Reservoir stage
Reservoir stage and duration
Data Required for Breach Simulation with HEC-RAS model .
The model employs the following parameter to define dam break (Froehlich, 1995);
Formation Time: critical breach development period
Trigger Condition: pool elevation, or clock time pool elevation and duration
Weir and Pipe Flow Coefficients: weir coefficients are applied in computation of weir flow / overtopping, whereas orifice coefficient is aplied in computation force flow./piping (Washington State Dept. Of Ecology 1992).
Location: transverse location of the centerline of the breach in the dam
Failure Mode: overtopping or piping
Shape and Progression: bottom width, bottom elevation, left and right side slopes. Linear or non-linear time formation
The dam break charactericts can be estimated in various ways which include;
Comparative analysis: this study involves making comparisons between historical failures of dams of similar sizes, water volume and materials. This is done through regression equations derived from past dam failures in order to estimate the peak outflow or breach size and time of development (Froehlich, 1995). Also computer-based models i.e computer programs that are used to develop models thus physically breaching the system by use erosion equations, priciples of hydrolics and soil mechanics equations.
Failure Location:
The...
Controversies in Understanding the Formation of the Grand Canyon: Evidence for a Lava Dam Breach Modern attempts to explain ancient natural wonders are often fraught with controversies. The Grand Canyon, one of the seven natural wonders of the world, is no exception. There are a number of conflicting theories as to how the canyon was formed. The most commonly believed one is that the Colorado River slowly downcut into grandiose canyon
The source of the current crisis can be traced to 1998 when an initial agreement was reached on a plan of action and policy guidelines to establish the Nile Basin Initiative at the 2nd Nile Technical Advisory Committee meeting held in Arusha. A few months later, the Nile Basin Initiative (NBI) was officially launched at an extraordinary meeting of the Nile Basin Council of Ministers, in Dar es Salaam,
Kidnapping, extortion and detention are real dangers for businesses that operate both overseas and in domestic markets. Top management of these firms often overlooks these things by saying that it will never happen to us. They seem to not understand how much damage it can do to a business. "With more than 1,000 annual kidnappings of business professionals and executives all around the world and number of terrorist's attacks, such
Nursing Research Utilization Project Proposal: Hospital Noise The level of noise in a hospital is a serious issue for the nurses and the patients. Surveys have been created in an effort to determine if the noise is bothersome, what kinds of problems it causes, and whether there is anything that can be done about the noise levels. It is important not only to identify the problem, but to determine what can
Finally, social networks have the ability to tag specific content down to the image and determine their privacy stings. It would be a good idea to also understand these settings as well. How confident could/should one be that such information is kept secure? Given the advertising-based model many of the social networking sites are reverting to, there is little probability that all information a person requests to be secure will stay
Ethics, Values and Decision-Making in Nursing Practice RIGHT FROM WRONG A nurse's primary tasks are monitoring the patient's vital signs, administering medications, and helping doctors treat and perform procedures (Williams, 2012). Oftentimes and in many cases, these technical skills must be guided by certain and pertinent moral and ethical principles. This ethical and moral component of her overall responsibility is so important and critical that a code of ethics was created by
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now