Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from dissertation:
Analytical tools and techniques used in approximating dam breakages are usually evaluted and comparison made in orders to ascertain there effectiveness. During dam construction, it is necessary to evaluate the potentiality of dam failure modes, breach the necessary paramenters related to failuere modes, and define routing and the map of the consequent discharge hydrograph. This paper outlines how mapping of propable inudation emanating form the dam failures needs numerous elements i.e. likely dam failures, break parameters, hydrologic scenario that are connected to failure models, including routing and mapping of the consequent discharge hydrograph. The unsteadily flowing routing models i.e HEC-RAS are oftenly applied in computation and rfelction of the dam's downstream consequences emaneting from dam failures. Approximation of the break elements i.e. time of development and width is carried out externally to the model in use.
In the recent past most agencies are enganging themselves in reviewing and updating safety measures concerned with dam safety and risk management. Studies relating to Dam break, involves updates on likely maximum flood inflow hydrographs and routing of most probable dam break floods to evaluate downstream impacts . The approximation of these estimate dimensions and developments is essentail in investigation of the dam safety. The flows in the downstream location and other inundated areas of the dam is directly proportional to the breach parameters, other factors tat influence include; the breach location, time of formation and the size (USACE, 1980). All these parameters are essentail in dam failure analysis.
The geometric design of a dam break ought to be approximated in order to reflect the resultant flood wave and down stream impacts . In this case an example of models that can be used to demonistrate dam breach outflow hydrograph computing and downstream routing include HEC-HMS (HEC, 2006b), HEC-RAS (HEC,2006a), NWS-DAMBRK (Fread, 1988b) amon others. The models requires the probable breach properties to be approximated outside the model. During investigation of dam break, breach dimenisions and time taken in develoment must be put in consideration in estimation of the failure scenarios (Washington State Dept. Of Ecology 1992). The necessitaties include various failure modes and different hydrologic events . The breach parameters related to hydrologics of the level of the likely maximum flood level may be different from that of sunny day failures broght about, likely, by a seismic event. Hence, anumber of breach parameters ought to be made for each connection of hydrologic event and failure scenario
Dam Break Simulation with HEC-RAS model:
Dam break tests are performed with HEC-RAS model for dam safety study and also flood damage analyses for circumstances that involves likely levee breaks. These studies in most cases need to ascertain the following circumstances and their associated uncertainties.
Hydrologic Scenarios (USACE, 1980).
Sunny day failure and,
Large hydrologic event
Failure Modes, they include (USACE, 1980).;
Breach definition input data and information (USACE, 1980).
Failure mode and initiation specification
Breach growth progression
Breach side slopes
Breach development time
Ultimate breach bottom elevation
Maximum breach bottom width
• Failure initiation
Reservoir stage and duration
Data Required for Breach Simulation with HEC-RAS model .
The model employs the following parameter to define dam break (Froehlich, 1995);
Formation Time: critical breach development period
Trigger Condition: pool elevation, or clock time pool elevation and duration
Weir and Pipe Flow Coefficients: weir coefficients are applied in computation of weir flow / overtopping, whereas orifice coefficient is aplied in computation force flow./piping (Washington State Dept. Of Ecology 1992).
Location: transverse location of the centerline of the breach in the dam
Failure Mode: overtopping or piping
Shape and Progression: bottom width, bottom elevation, left and right side slopes. Linear or non-linear time formation
The dam break charactericts can be estimated in various ways which include;
Comparative analysis: this study involves making comparisons between historical failures of dams of similar sizes, water volume and materials. This is done through regression equations derived from past dam failures in order to estimate the peak outflow or breach size and time of development (Froehlich, 1995). Also computer-based models i.e computer programs that are used to develop models thus physically breaching the system by use erosion equations, priciples of hydrolics and soil mechanics equations.
The location of the breach failure depends on several factors i.e. shape, type, structural elements of the dam and failure. All the factors relating to the dam, specifically historical record of the seepage and problems concerned with the foundation, ought to be put in consideration so that to place the breach in the most likely point of each failure mode. If the likely point is not identified, the centreline on the breach ought to be set to the centerline of the downstream mainchanel
HEC-RAS and HEC-HMS modes are designed with hydraulic algorithms that simulates the hydrolics of piping failure and overtopping . In this case the failure mode is brought a bout by the mechanism which starts and develops the breach. Overtop failure begins at brim of the dam and spreads to maximun extends (USACE, 1980). On the other hand, piping failures begins from anywhere on elevations or locations and develops to the minor extents. The final breach size and growth or development time is more essentail in approximation of the outflow hydrograph as compared to the failure mode.
Breach development time.
Models such as HEC-RAS and HEC-HMS requires same input data as compared to the data a breach development time requires (Washington State Dept. Of Ecology 1992. This time can be discussed under:
Overlapping failure: it refers to the duration between which the breach has just eroded back to the upstream part of the dam, it is usually at the top to the time when it is completetly formed. For example, major erosion has ceased, but not up to the time the resevoir pool is emptied.
Piping Failure: it refers to the time starting at the point a major flow and material are flowing through the pipe failures to the stage the breach is fully developed.
Generally, Dam break concept focuses on description and hydraulics of overlapping breaches. The final size of the break ought to be defined. It is the size assumed to remain after the breach has stopped developing (Froehlich, 1995). The breach migt cease to develop when the whole dam has been eroded or when the reservoir has been completely been drained and hence there is luck of water to cause more erosion. Ultimately, the erosion stops at the bottom elevation, it can be either at the bed rock or reservior pool buttom, the size of the breach is reflected by the width of the bottom or the side slopes of the dam (Mac Donald, 1984).It is important to describe the beach initiation scenario called trigger mechanism, and the time it takes for the breach to develop to the maximum size. The time of growth is elapsed from the important flow through the breach to the period at which the final size is obtained. In the case of over lapping failure, the breach parameters ought to define the initiation process and weir process that controls water release from thm storage.
A number of options can be employed in identification of the breach initiation period. One of the methods involves specification of the duration of which the pool evaluation exceeds a specific threshold. This data may be influenced by geotechnical investigation. Another method involves, specification of pool elevations, the breach starts to develop soon at the point when the elevation is reached (Washington State Dept. Of Ecology 1992. Finally, the third method involves specification of the duration of simulation irrespective of the pool elevation. It is very important for "Sunny days" failures that are not connected with hydrologic events.
In the case shapes, the breach shape grows / changes in shape from the initiation stage to the ultimate configuration. The most simple growth rate is linear; in this case, its dimensions develop at a regular rate (Mac Donald, 1984). Routes are there that stimulates a breach which initially develops at fast pace then the pace drops as it approaches the end of the development time.
Determination of the size and growth rate of dam breaks
Estimation of the growth rate and size for dam breaks is not an easy task. Hence, simulations models facilatates the user to estimate the effects of a range of parameters from the data obtained from the examination. There are number of equations involved:
There are number of regression equations that have been in the pasted applied in dam safety research obtained in literature and still are being put in consideration in making conclusion concerning guidance for the corps of engineers portfolio risk assessment studies i.e.Von Thun and Gillette, Macdonald and Langridge-monopolis and Froahlich (Froehlich, 1995). From these equations we obtain an standard literature review of this subject .
According to Froelich equation, Froelich used: Zoned earthen, rockfall data set and 63 earthen to come up with a set of equation s that were to…[continue]
"Dam Break" (2012, May 28) Retrieved December 5, 2016, from http://www.paperdue.com/essay/dam-break-111300
"Dam Break" 28 May 2012. Web.5 December. 2016. <http://www.paperdue.com/essay/dam-break-111300>
"Dam Break", 28 May 2012, Accessed.5 December. 2016, http://www.paperdue.com/essay/dam-break-111300
Code of Hammurabi -- exodus A Comparison/contrast Between the codes of hammurabi & THE BOOK OF EXODUS Sometime in the early fourth millennium B.C.E. In Mesopotamia (currently Iran, Iraq and formerly Persia), a very critical event occurred which changed the face of civilization, namely the settlement of the great river valley bounded by the rivers Tigris and Euphrates. It was after this pivotal event that writing, art, architecture and new political forms were
Infrastructure Projects Importance of Infrastructure Infrastructure projects have direct impact on the economic growth of society. Research shows that most societies have become better stewards of the environment as a result of sustainable infrastructure within the society. For security, the societies can no longer afford to ignore the aging dams, broken water mains, congested roads as well as, deficient bridges. Infrastructure projects developments have enabled the societies to remain a strong and
And towns where millions of resettled villagers and farmers have been located have no choice but to accept already overcrowded conditions, and job and housing shortages. Because of the many dams, those farmlands located close to the estuary will be rendered useless due to the lower than usual flow of the river. This will occur because salt water will intrude during dry seasons, ruining the land for growing crops (Hsu,
The source of the current crisis can be traced to 1998 when an initial agreement was reached on a plan of action and policy guidelines to establish the Nile Basin Initiative at the 2nd Nile Technical Advisory Committee meeting held in Arusha. A few months later, the Nile Basin Initiative (NBI) was officially launched at an extraordinary meeting of the Nile Basin Council of Ministers, in Dar es Salaam,
A water right is an action that was started by a prospective applicant and they had to follow the terms and conditions laid down by the SWRCB including providing progressive reports. After a period of time, the SWRCB granted water rights to a certain body and this is exactly what happened to Mono Lake as well (Mono Basin EIR, 1993). It took a long battle to overturn this amendment
Nursing Research Utilization Project Proposal: Hospital Noise The level of noise in a hospital is a serious issue for the nurses and the patients. Surveys have been created in an effort to determine if the noise is bothersome, what kinds of problems it causes, and whether there is anything that can be done about the noise levels. It is important not only to identify the problem, but to determine what can
Finally, social networks have the ability to tag specific content down to the image and determine their privacy stings. It would be a good idea to also understand these settings as well. How confident could/should one be that such information is kept secure? Given the advertising-based model many of the social networking sites are reverting to, there is little probability that all information a person requests to be secure will stay