2020
DOI: 10.3390/w12123566
|View full text |Cite
|
Sign up to set email alerts
|

Modelling of Flood Inundation due to Levee Breaches: Sensitivity of Flood Inundation against Breach Process Parameters

Abstract: This paper analyses the sensitivity of flood inundation due to river levee breach against breach process parameters using the 1996 Awash River levee breach case at Wonji, Ethiopia. A parametric levee breach model integrated into the 2D hydrodynamic numerical model Telemac-2D is used to simulate a levee breach flood event at Wonji, Ethiopia. Levee breach process parameters are systemically varied to find out their effect on the flood inundation. The analysis of the model results shows that the flood inundation … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…The 2D depth-averaged hydrodynamic model TELEMAC-2D, from the TELEMAC-MASCARET hydro-informatic system (www.opentelemac.org), is used to simulate freesurface flow using the finite element method on a triangular element mesh [40]. TE-LEMAC-2D has been widely applied for simulating flood propagation induced by levee breaching [28][29][30][31][32][33][34][35][36][37][38][39][40][41]. The mesh composed of 311,112 nodes is elaborated from breaklines so that topographic singularities (e.g.…”
Section: Model Set Upmentioning
confidence: 99%
See 2 more Smart Citations
“…The 2D depth-averaged hydrodynamic model TELEMAC-2D, from the TELEMAC-MASCARET hydro-informatic system (www.opentelemac.org), is used to simulate freesurface flow using the finite element method on a triangular element mesh [40]. TE-LEMAC-2D has been widely applied for simulating flood propagation induced by levee breaching [28][29][30][31][32][33][34][35][36][37][38][39][40][41]. The mesh composed of 311,112 nodes is elaborated from breaklines so that topographic singularities (e.g.…”
Section: Model Set Upmentioning
confidence: 99%
“…Simplified models describe the levee breaching by making assumptions on the location, initiation, development, number, and shape of the levee breach, often based on engineering experience, and knowledge of historical events [28]. In the present study, breaches are initiated at pre-defined locations (Figure 1-(a)), identified from historical observations [46][47] and field survey.…”
Section: Levee Breachesmentioning
confidence: 99%
See 1 more Smart Citation
“…In this study, we evaluated the computational performance of client-side flood map generation using the HAND model and WebAssembly. We selected different DEM resolutions (1,5,10,25,50, and 100 m) and grid sizes (1,4,9,16, and 25 million cells) for evaluation. Based on the selected elevation data resolution and grid size, generated maps represent city, county, and state scale in coverage (Table 3).…”
Section: Evaluation Of Parameter Sensitivitymentioning
confidence: 99%
“…Of natural disasters worldwide 40% are floods [2]. It is important to model and predict inundation extent of floods, which is critical information for flood mitigation [3,4], preparedness [5], and planning and response efforts [6]. Real-time and accurate predictions of flood inundation extent can facilitate understanding the potential flood risk and damage [7,8], and support flood mitigation and planning [9].…”
Section: Introductionmentioning
confidence: 99%