Technical Papers
May 18, 2013

Genetic Programming Simulation of Dam Breach Hydrograph and Peak Outflow Discharge

Publication: Journal of Hydrologic Engineering
Volume 19, Issue 4

Abstract

In this paper, genetic programming (GP) was used to simulate outflow hydrograph from earthen dam breach. The required data for the modeling were collected from literature, new experimental tests, and a physically based model. A number of homogeneous cohesive and noncohesive embankments were constructed in the flume and breached by overtopping flows. In the experiments, 40 embankments were constructed and tested in various sizes with different materials. The results demonstrate that the results of the GP method are in good agreement with the observed values. The model was tested for a case study (Teton Dam). In addition, an experimental-based broad-crest weir (EXBCW), a lumped model for calculating the peak outflow discharge due to an earth dam breach, was proposed on the basis of the governing equation of broad-crest weir outflow and experimental data. Finally, the results of the EXBCW model were compared with the observed data and results of empirical and GP-based methods.

Get full access to this article

View all available purchase options and get full access to this article.

References

Aytek, A., and Kisi, O. (2008). “A genetic programming approach to suspended sediment modeling.” J. Hydrol., 351(3–4), 288–298.
Azamathulla, H. M., Ghani, A., Zakaria, N. A., and Guven, A. (2010). “Genetic programming to predict bridge pier scour.” J. Hydraul. Eng., 165–169.
Babaeian Amini, A., Nourani, V., and Hakimzadeh, H. (2011). “Application of artificial intelligence tools to estimate peak outflow from earth dam breach.” Int. J. Earth Sci. Eng., 4(6), 243–246.
Babovic, V., Keijzer, M., Aguilera, D. R., and Harrington, J. (2001). “Automatic discovery of settling velocity equations.”, Danish Technical Research Council (STVF).
Broich, K. (2003). “Sediment transport in breach formation process.” 〈http://www.impact-project.net/publications/wp2_pub5.pdf〉 (Jan. 7, 2014).
Chinnarasri, C., Jirakitlerd, S., and Wongwises, S. (2004). “Embankment dam breach and outflow characteristics.” Civ. Eng. Environ. Syst., 21(4), 247–264.
Coleman, S. E., Andrews, D. P., and Webby, M. G. (2002). “Overtopping breaching of non-cohesive homogeneous embankments.” J. Hydraul. Eng., 829–838.
Costa, J. E. (1985). “Floods from dam failures.”, U.S. Geological Survey, Denver.
Dorado, J., Rabunal, J. R., Pazos, A., Rivero, D., Santos, A., and Puertas, J. (2003). “Prediction and modelling of the rainfall-runoff transformation of a typical urban basin using ANN and GP.” Appl. Artif. Intel., 17(4), 329–343.
Falco, D., Cioppa, A. D., and Tarantino, E. (2005). “A genetic programming system for time series prediction and its application to El Niño forecast.” Adv. Soft Comput., 32, 151–162.
Federal Energy Regulatory Commission (FERC). (1987). “Engineering guidelines for the evaluation of hydropower projects.” FERC 0119-1, Office of Hydropower Licensing, Washington, DC.
Franca, M. J., and Almeida, A. B. (2004). “A computational model of rock-fill dam breaching caused by overtopping.” J. Hydraul. Res., 42(2), 197–206.
Fread, D. L. (1988). BREACH: An erosion model for earthen dam failures, National Weather Service, National Oceanic and Atmospheric Administration, Silver Spring, MD.
Froehlich, D. C. (1995). “Peak outflow from breached embankment dam.” J. Water. Resour. Plann., 90–97.
Froehlich, D. C. (2002). “Impact project field tests 1 & 2.” 〈http://www.impact-project.net/cd2/papers/4_froehlich.pdf〉 (Jan. 7, 2014).
Fujita, Y., and Tamura, T. (1987). “Enlargement of breaches in flood levees on alluvial plains.” J. Natural Disast. Sci., 9(1), 37–60.
Garg, V., and Jothiprakash, V. (2010). “Modelling the time variation of reservoir trap efficiency.” J. Hydrol. Eng., 1001–1016.
Giustolisi, O. (2004). “Using genetic programming to determine Chezy resistance coefficient in corrugated channels.” J. Hydroinform., 6(3), 157–173.
Goldberg, D. E. (1989). Genetic algorithms in search, optimization and machine learning, Addison-Wesley Longman Publishing, Boston, MA.
Hahn, W., Hanson, G. J., and Cook, K. R. (2000). “Breach morphology observations of embankment overtopping tests.” Proc. Conf. Water Resources Engineering and Water Resources Planning and Management, Minneapolis.
Harris, E. L., Babovic, V., and Falconer, R. A. (2003). “Velocity predictions in compound channels with vegetated floodplains using genetic programming.” Int. J. River Basin Manage., 1(2), 117–123.
Höeg, K., Lövoll, A., and Vaskinn, K. A. (2004). “Stability and breaching of embankment dams: Field tests on 6 m high dams.” Int. J. Hydropower Dams, 11(1), 88–92.
Johnson, F. A., and Illes, P. (1976). “A classification of dam failures.” Int. Water Power Dam Constr., 28(12), 43–45.
Koza, J. R. (1992). Genetic programming on the programming of computers by means of natural selection, MIT Press, Cambridge, MA.
MacDonald, T. C., and Monopolis, J. L. (1984). “Breaching characteristics of dam failures.” J. Hydraul. Eng., 567–586.
MATLAB [Computer software]. Natick, MA, Mathworks, Inc.
Meadowcroft, I. C., Morris, M. W., Allsop, N. W. H., and McConnell, K. (1996). “Tollesbury managed set back experiment: Breach design and construction, and embankment failure experiment.”, Wallingford, U.K.
Mohamed, M. A. A., Morris, M., Hanson, G. J., and Lakhal, K. (2004). “Breach formation: Laboratory and numerical modeling of breach formation.” Proc. Dam Safty, ASDSO Phoenix, Arizona.
Morris, M. W., Hassan, M., and Vaskinn, K. A. (2005). “Conclusions and recommendations from the IMPACT Project WP2: Breach formation.” 〈http://www.impact-project.net/cd4/cd/Presentations/THUR/17-1_WP2_10Summary_v2_0.pdf〉 (Jan. 7, 2014).
Nourani, V., Hakimzadeh, H., and Amini, A. B. (2012a). “Implementation of artificial neural network technique in the simulation of dam breach hydrograph.” J. Hydroinform., 14(2), 478–496.
Nourani, V., Komasi, M., and Alami, M. T. (2012b). “Hybrid wavelet-genetic programming approach to optimize ANN modelling of rainfall-runoff process.” J. Hydrol. Eng., 724–741.
Rabunal, J. R., Puertas, J., Suarez, J., and Rivero, D. (2007). “Determination of the unit hydrograph of a typical urban basin using genetic programming and artificial neural networks.” Hydrol. Process., 21(4), 476–485.
Rezapour, O. M., Shui, L. T., and Dehghani, A. A. (2010). “Review of genetic programing in water resource engineering.” Austr. J. Basic Appl. Sci., 4(11), 5663–5667.
Singh, K. P., and Snorrason, A. (1984). “Sensitivity of outflow peaks and flood stages to the selection of dam breach parameters and simulation models.” J. Hydrol., 68(1–4), 295–310.
Singh, V. P., and Quiroga, C. A. (1988). “Dimensionless analytical solutions for dam-breach erosion.” J. Hydraul. Res., 26(2), 179–197.
Singh, V. P., and Scarlatos, P. D. (1988). “Analysis of gradual earth-dam failure.” J. Hydraul. Eng., 21–42.
Soil Conservation Service (SCS). (1981). “Simplified dam-breach routing procedure.” Technical Release 66, U.S. Dept. of Agriculture, Washington, DC.
Tingsanchali, T., and Chinnarasri, C. (2001). “Numerical modeling of dam failure due to flow overtopping.” Hydrol. Sci. J., 46(1), 113–130.
U.S. Bureau of Reclamation (USBR). (1988). “Downstream hazard classification guidelines.” ACER Technical Memorandum No. 11, Assistant Commissioner-Engineering and Research, Denver.
Visser, P. J., et al. (1996). “A large-scale experiment on breaching in sand-dikes.” Proc. Coastal Dynamics’95, Gdansk, Poland, 583–594.
Von Thun, J. L., and Gillette, D. R. (1990). “Guidance on breach parameters, unpublished internal document.” U.S. Bureau of Reclamation, Denver.
Wahl, T. L. (1998). “Prediction of embankment dam breach parameters.” Dam Safety Research Rep., DSO-98-004, 〈http://www.usbr.gov/pmts/hydraulics_lab/twahl/breach/damfailuredatabase.zip〉 (May 2013).
Wang, Z., and Bowles, D. S. (2006). “Three-dimensional non-cohesive earthen dam breach model.” Adv. Water Res., 29(10), 1528–1545.
Webby, M. G. (1996). “Discussion of peak outflow from breached embankment dam.” J. Water Resour. Plann., 316–317.
Wishart, J. S. (2007). “Overtopping breaching of rock-avalanche dams.” M. Sc. thesis, Univ. of Canterbury.
Zhu, Y., Visser, P. J., and Vrijling, J. K. (2006). “Laboratory observations of embankment breaching.” 7th Int. Conf. on Hydroscience and Engineering, Philadelphia.

Information & Authors

Information

Published In

Go to Journal of Hydrologic Engineering
Journal of Hydrologic Engineering
Volume 19Issue 4April 2014
Pages: 757 - 768

History

Received: Jan 18, 2013
Accepted: May 16, 2013
Published online: May 18, 2013
Discussion open until: Oct 18, 2013
Published in print: Apr 1, 2014

Permissions

Request permissions for this article.

Authors

Affiliations

Habib Hakimzadeh [email protected]
Associate Professor, Faculty of Civil Engineering, Sahand Univ. of Technology, 5166616471 Tabriz, Iran. E-mail: [email protected]
Vahid Nourani [email protected]
Associate Professor, Faculty of Civil Engineering, Univ. of Tabriz, 5166616471 Tabriz, Iran (corresponding author). E-mail: [email protected]; [email protected]
Alireza Babaeian Amini [email protected]
Assistant Professor, Faculty of Civil Engineering, Univ. of Bonab, 5157938531 Bonab, Iran. E-mail: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share