Verified Document

Dam Break Literature Review

Dam Break Excutive Summary

Analytical tools and techniques used in approximating dam breakages are usually evaluted and comparison made in orders to ascertain there effectiveness. During dam construction, it is necessary to evaluate the potentiality of dam failure modes, breach the necessary paramenters related to failuere modes, and define routing and the map of the consequent discharge hydrograph. This paper outlines how mapping of propable inudation emanating form the dam failures needs numerous elements i.e. likely dam failures, break parameters, hydrologic scenario that are connected to failure models, including routing and mapping of the consequent discharge hydrograph. The unsteadily flowing routing models i.e HEC-RAS are oftenly applied in computation and rfelction of the dam's downstream consequences emaneting from dam failures. Approximation of the break elements i.e. time of development and width is carried out externally to the model in use.

Introduction

In the recent past most agencies are enganging themselves in reviewing and updating safety measures concerned with dam safety and risk management. Studies relating to Dam break, involves updates on likely maximum flood inflow hydrographs and routing of most probable dam break floods to evaluate downstream impacts . The approximation of these estimate dimensions and developments is essentail in investigation of the dam safety. The flows in the downstream location and other inundated areas of the dam is directly proportional to the breach parameters, other factors tat influence include; the breach location, time of formation and the size (USACE, 1980). All these parameters are essentail in dam failure analysis.

The geometric design of a dam break ought to be approximated in order to reflect the resultant flood wave and down stream impacts . In this case an example of models that can be used to demonistrate dam breach outflow hydrograph computing and downstream routing include HEC-HMS (HEC, 2006b), HEC-RAS (HEC,2006a), NWS-DAMBRK (Fread, 1988b) amon others. The models requires the probable breach properties to be approximated outside the model. During investigation of dam break, breach dimenisions and time taken in develoment must be put in consideration in estimation of the failure scenarios (Washington State Dept. Of Ecology 1992). The necessitaties include various failure modes and different hydrologic events . The breach parameters related to hydrologics of the level of the likely maximum flood level may be different from that of sunny day failures broght about, likely, by a seismic event. Hence, anumber of breach parameters ought to be made for each connection of hydrologic event and failure scenario

Dam Break Simulation with HEC-RAS model:

Dam break tests are performed with HEC-RAS model for dam safety study and also flood damage analyses for circumstances that involves likely levee breaks. These studies in most cases need to ascertain the following circumstances and their associated uncertainties.

Hydrologic Scenarios (USACE, 1980).

Sunny day failure and,

Large hydrologic event

Failure Modes, they include (USACE, 1980).;

Overtopping

Piping

Breach definition input data and information (USACE, 1980).

Failure mode and initiation specification

Breach growth progression

Breach side slopes

Breach development time

Ultimate breach bottom elevation

Maximum breach bottom width

• Failure initiation

Selected time

Reservoir stage

Reservoir stage and duration

Data Required for Breach Simulation with HEC-RAS model .

The model employs the following parameter to define dam break (Froehlich, 1995);

Formation Time: critical breach development period

Trigger Condition: pool elevation, or clock time pool elevation and duration

Weir and Pipe Flow Coefficients: weir coefficients are applied in computation of weir flow / overtopping, whereas orifice coefficient is aplied in computation force flow./piping (Washington State Dept. Of Ecology 1992).

Location: transverse location of the centerline of the breach in the dam

Failure Mode: overtopping or piping

Shape and Progression: bottom width, bottom elevation, left and right side slopes. Linear or non-linear time formation

The dam break charactericts can be estimated in various ways which include;

Comparative analysis: this study involves making comparisons between historical failures of dams of similar sizes, water volume and materials. This is done through regression equations derived from past dam failures in order to estimate the peak outflow or breach size and time of development (Froehlich, 1995). Also computer-based models i.e computer programs that are used to develop models thus physically breaching the system by use erosion equations, priciples of hydrolics and soil mechanics equations.

Failure Location:

The...

shape, type, structural elements of the dam and failure. All the factors relating to the dam, specifically historical record of the seepage and problems concerned with the foundation, ought to be put in consideration so that to place the breach in the most likely point of each failure mode. If the likely point is not identified, the centreline on the breach ought to be set to the centerline of the downstream mainchanel
Failure Mode

HEC-RAS and HEC-HMS modes are designed with hydraulic algorithms that simulates the hydrolics of piping failure and overtopping . In this case the failure mode is brought a bout by the mechanism which starts and develops the breach. Overtop failure begins at brim of the dam and spreads to maximun extends (USACE, 1980). On the other hand, piping failures begins from anywhere on elevations or locations and develops to the minor extents. The final breach size and growth or development time is more essentail in approximation of the outflow hydrograph as compared to the failure mode.

Breach development time.

Models such as HEC-RAS and HEC-HMS requires same input data as compared to the data a breach development time requires (Washington State Dept. Of Ecology 1992. This time can be discussed under:

Overlapping failure: it refers to the duration between which the breach has just eroded back to the upstream part of the dam, it is usually at the top to the time when it is completetly formed. For example, major erosion has ceased, but not up to the time the resevoir pool is emptied.

Piping Failure: it refers to the time starting at the point a major flow and material are flowing through the pipe failures to the stage the breach is fully developed.

Generally, Dam break concept focuses on description and hydraulics of overlapping breaches. The final size of the break ought to be defined. It is the size assumed to remain after the breach has stopped developing (Froehlich, 1995). The breach migt cease to develop when the whole dam has been eroded or when the reservoir has been completely been drained and hence there is luck of water to cause more erosion. Ultimately, the erosion stops at the bottom elevation, it can be either at the bed rock or reservior pool buttom, the size of the breach is reflected by the width of the bottom or the side slopes of the dam (Mac Donald, 1984).It is important to describe the beach initiation scenario called trigger mechanism, and the time it takes for the breach to develop to the maximum size. The time of growth is elapsed from the important flow through the breach to the period at which the final size is obtained. In the case of over lapping failure, the breach parameters ought to define the initiation process and weir process that controls water release from thm storage.

A number of options can be employed in identification of the breach initiation period. One of the methods involves specification of the duration of which the pool evaluation exceeds a specific threshold. This data may be influenced by geotechnical investigation. Another method involves, specification of pool elevations, the breach starts to develop soon at the point when the elevation is reached (Washington State Dept. Of Ecology 1992. Finally, the third method involves specification of the duration of simulation irrespective of the pool elevation. It is very important for "Sunny days" failures that are not connected with hydrologic events.

In the case shapes, the breach shape grows / changes in shape from the initiation stage to the ultimate configuration. The most simple growth rate is linear; in this case, its dimensions develop at a regular rate (Mac Donald, 1984). Routes are there that stimulates a breach which initially develops at fast pace then the pace drops as it approaches the end of the development time.

Determination of the size and growth rate of dam breaks

Estimation of the growth rate and size for dam breaks is not an easy task. Hence, simulations models facilatates the user to estimate the effects of a range of parameters from the data obtained from the examination. There are number of equations involved:

Regression Equations

There are number of regression equations that have been in the pasted applied in dam safety research obtained in literature and still are being put in consideration in making conclusion concerning guidance for the corps of engineers portfolio risk assessment studies i.e.Von Thun and Gillette, Macdonald and Langridge-monopolis and Froahlich (Froehlich, 1995). From these equations we obtain an standard literature review of this subject .

According to Froelich equation, Froelich used: Zoned earthen, rockfall data set and 63 earthen to come up with a set of equation s that were to be applied in estimation of the mean failure time, width and side slopes of dam break. During actual application, he calculated the height of the break by assuming that the break gegins from the top of the dam to the natural ground elevationbeing at the centreline of the break point…

Sources used in this document:
Resources Program, July1992, http://www.ecy.wa.gov/programs/wr/dams/Images/pdfs/technote_1.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Conflicting Theories for the Creation of the Grand Canyon
Words: 1787 Length: 5 Document Type:

Controversies in Understanding the Formation of the Grand Canyon: Evidence for a Lava Dam Breach Modern attempts to explain ancient natural wonders are often fraught with controversies. The Grand Canyon, one of the seven natural wonders of the world, is no exception. There are a number of conflicting theories as to how the canyon was formed. The most commonly believed one is that the Colorado River slowly downcut into grandiose canyon

Egypt Is Going to Take
Words: 9929 Length: 36 Document Type: Dissertation

The source of the current crisis can be traced to 1998 when an initial agreement was reached on a plan of action and policy guidelines to establish the Nile Basin Initiative at the 2nd Nile Technical Advisory Committee meeting held in Arusha. A few months later, the Nile Basin Initiative (NBI) was officially launched at an extraordinary meeting of the Nile Basin Council of Ministers, in Dar es Salaam,

Contract Issues in "Proof of
Words: 2353 Length: 7 Document Type: Essay

Kidnapping, extortion and detention are real dangers for businesses that operate both overseas and in domestic markets. Top management of these firms often overlooks these things by saying that it will never happen to us. They seem to not understand how much damage it can do to a business. "With more than 1,000 annual kidnappings of business professionals and executives all around the world and number of terrorist's attacks, such

Nursing Research Utilization Project Proposal: Hospital Noise
Words: 4925 Length: 18 Document Type: Essay

Nursing Research Utilization Project Proposal: Hospital Noise The level of noise in a hospital is a serious issue for the nurses and the patients. Surveys have been created in an effort to determine if the noise is bothersome, what kinds of problems it causes, and whether there is anything that can be done about the noise levels. It is important not only to identify the problem, but to determine what can

Public Vs. Private Social Networking
Words: 1928 Length: 5 Document Type: Research Paper

Finally, social networks have the ability to tag specific content down to the image and determine their privacy stings. It would be a good idea to also understand these settings as well. How confident could/should one be that such information is kept secure? Given the advertising-based model many of the social networking sites are reverting to, there is little probability that all information a person requests to be secure will stay

Ethics Values and Decision-Making in Nursing Practice
Words: 1664 Length: 5 Document Type: Essay

Ethics, Values and Decision-Making in Nursing Practice RIGHT FROM WRONG A nurse's primary tasks are monitoring the patient's vital signs, administering medications, and helping doctors treat and perform procedures (Williams, 2012). Oftentimes and in many cases, these technical skills must be guided by certain and pertinent moral and ethical principles. This ethical and moral component of her overall responsibility is so important and critical that a code of ethics was created by

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now