Download presentation
Presentation is loading. Please wait.
Published byMartina Williamson Modified over 9 years ago
1
Formulation of a New Breach Model for Embankments IMPACT Project Workshop, Wallingford 2002 Breach Formation Theme
2
Introduction Do we need a new model?
3
The PhD Project Started on 1st of October 1998 Ended on the 31st of January 2002 Objectives: –Improve the understanding of the process embankment breaching. –Develop a model based on that understanding
4
The HR Breach Model Lateral and Longitudinal Breach Growth Flow Equations Sediment Transport Equations
5
Lateral Growth (existing models). Uniform Erosion Constant Shape. Top Width Adjustment Constant bottom width Most stable section Assuming a shape Slope Instability (some)
6
Breach Growth (Real Cases 1)
7
Breach Growth (Real Cases 2)
8
Breach Growth (Real Cases 3)
9
Breach Growth (Physical Modeling at HR)
10
Growth Mechanisms Continuous Erosion – Computed using a sediment transport equation. Mass Failure – Shear failure – Bending failure
11
Shear Failure (1)
12
Shear Failure (2)
13
Bending Failure (1)
14
Bending Failure (2)
15
Longitudinal Breach Growth (New Model) The sediment transport continuity equation.
16
Sediment Transport Equations Difficult to decide which one? Selected Equations: –Yang 1979 (Non Cohesive) –Visser 1998 (Non Cohesive) –Chen and Anderson 1986 (Non Cohesive)
17
Flow Equations Weir Equation Flow over the crest and on the downstream face Bernoulli Equation Hydraulic calculations on the crest and the downstream face
18
Material Uncertainty
19
Composite Embankments (1)
20
Composite Embankments (2) Core Failure Modes: –Sliding –Overturning –Bending
21
Piping (1)
22
Piping (2) Processes –Flow through the pipe –Pipe widening and deepening –Failure of the material above the pipe –Failure of the top of the dam –Similar processes to overtopping
23
Numerical Model Results
24
Case Study (1)
25
Case Study (1) Comparison
26
Case Study (2) Central
27
Case Study (2) Side
28
And.. Finally An acceptable approach has been achieved for a new breach model More research is needed
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.