Professional Documents
Culture Documents
Abstract— The aim of this paper is to investigate the breach width, breach side slope and breach time [5-9].
scaling effect in modeling of the earthen dam breach Froehlich in 1995 and Webby in 1996, studying the failed
process during the overtopping or piping. Small scale dams, presented a relationship for the maximum outflow
models are inexpensive but in most cases yield unreal discharge from a dam breach [10, 11]. Concerning the
results. In scaling the earthen dam breach phenomenon, physical modeling of breaching in the earthen dam,
the effect of grains detachment should be taken into Cristofano in 1965, solved a mathematical model based
account. In this article attempt is made to consider the on the following assumptions: the breach geometric shape
effect of grains detachment in an appropriate way in the is trapezoidal and a has constant bottom width, the side
scaling method. For this purpose the results of real failed slopes of breach walls depends on the angle of repose of
dams are utilized. A number of dams with a high height materials, The bottom slope of the breach canal is equal to
and a number of dams with low height were selected and the internal friction angle of the materials and the model
it was assumed that the laboratory dams are replaced by is based on the empirical coefficients [12]. Harris and
the small dams. Then the ratio of their corresponding Wagner in 1967 (HW model), considered the following
heights is taken as the scaling factor and the scale of assumptions: When overtopping happens, erosion takes
grains detachment is calculated. Calculation of the place and continues till reaching the bed invert. The
maximum outflow discharge from dam based on this ratio Schoklitsch sediment transport equation is used, and the
yields an appropriate estimate of this parameter. breach shape is assumed to be parabolic [13]. Fread in
Keywords— dam, breach, outflow discharge, scaling, 1977, developed the DAMBRK model using the
detuchment. following assumptions: Breaching starts from the dam
crest and uniformly extends to the downstream till the
I. INTRODUCTION ultimate breach is formed. This model also models the
Investigation of the dam preach process is mainly flood routing [14]. Brown and Rogers (BRDSM) in 1981
performed in the form of estimating the ultimate breach extended the HW model adding piping failure mode to
parameters or based on the instantaneous modeling of the this model [15]. Ponce and Tsivoglou in 1981, assumed
process and estimation of the outflow hydrograph from the following: they used Peter-Meyer and Muller
the dam. Various researchers in the past have searched on sediment transport equations, used the one dimensional
these two fields. The soil Conservation Service in 1981 unsteady flow and the one dimensional sediment
presented some relationships for maximum outflow continuity equations, Manning coefficient is used for the
discharge from the dam breach [1]. MacDonald and discharge flow computations and the breach width is
Langridge-Monopolis in 1984, using the results of 42 taken variable with respect to the flow within the breach
dam failures, and taking advantage of a series of 42 [16]. Singh and scarlatos in 1987 proposed the BEED
logarithmic diagrams presented the breach parameters model using the following assumptions: they used the
values [2]. Sigh and Snorrason in the same year, studying Einstein-Brown and Bagnold equations, used the slope
20 failed dams presented some ranges for the breach stability theory (Chugaev, 1965), considered the failure
width and time [3]. Costa in 1985, using the results of 31 mode only as the dam crest overtopping and applied
failed dams, presented a relationship based on the dam empirical coefficients for the outflow discharge from the
reservoir volume and the height of water behind dam for breach [17]. The SIM1 and SIM2 Flow model was
calculation of the maximum outflow from the breach [4]. developed in the same year for flood routing at the
FERC in 1987, using the results of damaged dams, downstream and also obtaining breach characteristics.
estimated a range for the breach width, wall side slope Among the main assumptions it could be refered to two of
and the breach time [5]. In this respect Froehlich in 1987, them: it assumes certain shapes for the breach, such as
United State Bureau of Reclamation (USBR) in 1988, triangular, rectangular, trapezoidal shapes and it uses the
Singh and Scarlatos in 1988, Von Thun and Gillette in Schoklitsch sediment transport equation [18]. Fread in
1990, have estimated similar ranges for the parameters of 1988, developed the BREACH model for failure by