1996
DOI: 10.1007/978-94-015-8747-1
|View full text |Cite
|
Sign up to set email alerts
|

Dam Breach Modeling Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
105
0
5

Year Published

1997
1997
2017
2017

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 183 publications
(113 citation statements)
references
References 23 publications
3
105
0
5
Order By: Relevance
“…From this formula it was possible to calculate the outflow through a levee breach as a function of the water levels of river and polder as well as the breach dimensions. However, for the temporal and spatial breach development at the two breach locations no functional relationship could be found due to the very complex breach mechanism and the high variability in the factors influencing the breach development (Singh, 1996). We therefore treated the breach dimension as an uncertainty source in the uncertainty analysis.…”
Section: Levee Failurementioning
confidence: 99%
“…From this formula it was possible to calculate the outflow through a levee breach as a function of the water levels of river and polder as well as the breach dimensions. However, for the temporal and spatial breach development at the two breach locations no functional relationship could be found due to the very complex breach mechanism and the high variability in the factors influencing the breach development (Singh, 1996). We therefore treated the breach dimension as an uncertainty source in the uncertainty analysis.…”
Section: Levee Failurementioning
confidence: 99%
“…One method relies on regression equations that relate observed peak discharge to some measure of the impounded water volume: depth, volume, or some combination thereof [e.g., Evans, 1986;. The other method employs computer implementation of a physically based model of breach formation and lake drainage (see, e.g., summaries by Fread [1989] and Singh [1996]). Regression relations are expedient but generally provide no better than order-of-magnitude predictions of probable peak discharge.…”
Section: Introductionmentioning
confidence: 99%
“…The sketch of flow over a trapezoidal weir and is shown in Figure 3 [26] Where g is the acceleration of gravity, ( H ) is head over the breach and (f) is the breach shape factor. Another equation for calculating the discharge of the breach channel during the overtopping failure is introduced [28][29] …”
Section: Broad Weir Equationmentioning
confidence: 99%